• Title/Summary/Keyword: 콘텐츠 선택기법

Search Result 185, Processing Time 0.025 seconds

Zero-Watermarking Based on Chaotic Side Match Vector Quantization (무질서한 SMVQ 기반의 제로-워터마킹)

  • Kim, Hyoung-Do;Park, Chan-Kwon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.87-90
    • /
    • 2008
  • 디지털 워터마킹은 디지털 콘텐츠에 워터마크를 삽입함으로써 불법적인 복제를 방지하고, 지적재산권 및 저작권을 보호하며, 소유권을 주장할 수 있는 근거를 제시하는 기술이다. 기존의 워터마킹 기법에서는 워터마크를 삽입함으로써 데이터 왜곡과 품질 저하가 불가피하다는 단점이 있다. 이를 극복하기 위하여 원래 데이터를 변경하지 않는 제로-워터마킹 기법들이 제시되고 있다. 이 논문에서는 VQ(Vector Quantization) 방식의 블록 효과를 줄이고, 압축 비율과 품질을 향상시킨 SMVQ(Side Match Vector quantization) 방식에 대한 제로-워터마킹 체계인 CSMVQ(Chaotic SMVQ)를 제안한다. SMVQ 이미지 압축에서는 동일하게 두 이웃 블록의 접면 정보를 이용하기 위하여 좌측 상단에서 우측 하단으로 진행되므로, 임의의 순서로 블록을 선택하여 워터마크를 삽입하기 어렵다. CSMVQ에서는 이전에 부호화된 이웃 블록들의 접면 정보의 일치성을 동적으로 고려하여 부호화를 진행한다. 그러므로 무질서한 방식으로 워터마크가 삽입되도록 지원할 수 있다.

  • PDF

TV Program Recommendation Method Using LDA Clustering (LDA 클러스터링을 이용한 TV 프로그램 추천 기법)

  • Park, Chang-yong;Chung, Yeounoh;Kim, Noo-ri;Lee, Jee-hyoung
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.272-274
    • /
    • 2013
  • 최근 TV 시청자들의 콘텐츠 소비량이 증가함에 따라 방송사에서 제공하는 TV 프로그램들의 수량이 방대해지고 장르 또한 다양해지고 있기 때문에 시청자가 TV 프로그램을 선택하는 것이 점점 더 어려워지고 있다. 이러한 문제를 해결하기 위해 TV 프로그램 추천이라는 연구가 활발하게 이루어지고 있다. 기존의 연구에서는 시청자를 기반으로 하는 협업 필터링 추천 방법과 아이템을 기반으로 하는 협업 필터링 추천 방법이 제안되었지만 시청자의 시청 의도를 고려하는 연구는 사례는 적다. 이에 본 논문에서는 LDA 모델링을 이용하여 사용자의 시청 의도를 고려한 TV 프로그램 추천 기법을 제안한다. 실험을 통해 시청자의 시청 의도가 반영된 TV 프로그램 추천이 가능하다는 것을 검증했다.

Contents-based digital still-image protection using OCL (OCL을 이용한 콘텐츠 기반의 정지영상 보호 기법 연구)

  • Yoo, Hyouck-Min;Shin, Jin-Wook;Park, Dong-Sun;Yoon, Sook
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.1
    • /
    • pp.145-156
    • /
    • 2010
  • This paper presents a new contents-based digital still image protection method which includes a copyright message. Since the existing method using gradient values used a pixel based $3{\times}3$ Sobel operator, it was sensitive to attacks and could not extract exact copyright message. Therefore, in this paper, we present a algorithm which uses block based OCL(Orientation Certainty Level) instead of pixel. The experimental results show that the proposed scheme not only has good image quality, but also is robust to JPEG lossy compression, filtering, sharpening, blurring and noise. Moreover, the proposed algorithm has good performance more than 10% in rotation attacks than the existing method.

  • PDF

A Study on QoS Routing Performance Enhancement by using LSQR Scheduling in WiMAX Mesh Networks (와이맥스 메쉬 네트워크에서 LSQR 스케줄링을 이용한 QoS 라우팅 성능 향상에 관한 연구)

  • Tak, Wooyoung;Lee, Gowoon;Joh, Hangki;Ryoo, Intae
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.429-437
    • /
    • 2013
  • Recently, wireless mesh network has been focused as a core technology for resolving the issues of shadow zone and distributed bypass route as it has broad service coverage as well as good scalability features. It, however, provides users with relatively lower QoS than infrastructure-based networks. In order for addressing this QoS issue and also enhancing the routing performance of mobile WiMax mesh network, this paper proposes a load sensing QoS routing (LSQR) scheme. In the proposed LSQR, each node figures out network congestion status and selects a bypass route accordingly. With this scheme, we can expect good load balancing effect by changing the routing paths from centralized links to distributed links under a heavy traffic condition. From the simulation results using NS-2, it has been verified that the LSQR shows lower packet loss rates and data transmission delays than the existing representative routing schemes.

Prediction of the Movement Directions of Index and Stock Prices Using Extreme Gradient Boosting (익스트림 그라디언트 부스팅을 이용한 지수/주가 이동 방향 예측)

  • Kim, HyoungDo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.623-632
    • /
    • 2018
  • Both investors and researchers are attentive to the prediction of stock price movement directions since the accurate prediction plays an important role in strategic decision making on stock trading. According to previous studies, taken together, one can see that different factors are considered depending on stock markets and prediction periods. This paper aims to analyze what data mining techniques show better performance with some representative index and stock price datasets in the Korea stock market. In particular, extreme gradient boosting technique, proving itself to be the fore-runner through recent open competitions, is applied to the prediction problem. Its performance has been analyzed in comparison with other data mining techniques reported good in the prediction of stock price movement directions such as random forests, support vector machines, and artificial neural networks. Through experiments with the index/price datasets of 12 years, it is identified that the gradient boosting technique is the best in predicting the movement directions after 1 to 4 days with a few partial equivalence to the other techniques.

An Efficient Authentication Method for Secure Access to Wireless Mesh Networks (무선망 보안 접속을 위한 효율적인 인증 기법)

  • Heo, Ung;He, Yu-Shan;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.17-25
    • /
    • 2011
  • The wireless mesh networks are recently getting much attention for commercial applications. In such networks, the service should be uninterrupted when roaming from one domain to another while the authentication for a secure access should be maintained. The challenge is to consider the authentic coordination between the home domain and foreign domains and the maintenance of local authenticity between foreign domains. In this paper, a novel authentication method is presented so that a mobile mesh node can be effectively authenticated and obtain an secure connection in foreign domains. In the proposed method, the authentication process does not rely on an end-to-end connection between the foreign domain and the home domain. Even without a connectivity to the home domain, the foreign domain can provide an effective authentication of a mesh node by consulting one of the neighboring foreign domains that has been visited by the mobile mesh node. In order to verify the performance of our proposed method, a qualitative analysis has been performed and compared to those of conventional methods. The results show that our method is superior to the conventional ones in terms of authentication response time and authentication service robustness.

Evaluation of Photoneutron by Hypofractionated Radiotherapy (소분할 방사선치료 방식에 따른 광중성자 평가)

  • Park, Eun-Tae;Lee, Deuk-Hee;Kang, Se-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.347-354
    • /
    • 2015
  • Hypofractionated radiotherapy prescribes high dose once. Due to this there's a bad point that patients are exposed much dose in normal organ. But recently the study making up for a limit is continuing. Cause of preference of this kind of development of therapy technic and high-energy photon beam, patients can be exposed to additional radiation. Because photoneutron is created by photonuclear reaction. So, in this study I measured photoneutron and analyzed by DVH amounts of radiation from the treatment plan that was used to acute, metastatic pelvis cancer patients who was treated by hypofractionated radiotherapy applied IMRT. As a result, incidence of photoneutron based on the hypofractionated radiotherapy was not a big difference in proportion to the dose fractionation. Protective effects of normal organ by hypofractionated radiotherapy applying IMRT is relatively high compared to 3D CRT but also photoneutron was in created. So a proper treatment plan and a best therapy should be considerated.

Incremental Processing Scheme for Graph Streams Considering Data Reuse (데이터 재사용을 고려한 그래프 스트림의 점진적 처리 기법)

  • Cho, Jungkweon;Han, Jinsu;Kim, Minsoo;Choi, Dojin;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.465-475
    • /
    • 2018
  • Recently, as the use of social media and IoT has increased, large graph streams has been generating and studies on real-time processing for them have been actively carrying out. In this paper we propose a incremental graph stream processing scheme that reuses previous result data when the graph changes continuously. We also propose a cost model to selectively perform incremental processing and static processing. The proposed cost model computes the predicted value of the detection cost and the processing cost of the recalculation area based on the actually processed history and performs the incremental processing when the incremental processing is more profit than the static processing. The proposed incremental processing increases the efficiency by processing only the part that changes when the graph update occurs. Also, by collecting only the previous result data of the changed part and performing the incremental processing, the disk I/O costs are reduced. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

Vehicle Trust Evaluation for Sharing Data among Vehicles in Social Internet of Things (소셜 사물 인터넷 환경에서 차량 간 정보 공유를 위한 신뢰도 판별)

  • Baek, Yeon-Hee;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.68-79
    • /
    • 2021
  • On the Social Internet of Things (SIoT), social activities occur through which the vehicle generates a variety of data, shares them with other vehicles, and sends and receives feedbacks. In order to share reliable information between vehicles, it is important to determine the reliability of a vehicle. In this paper, we propose a vehicle trust evaluation scheme to share reliable information among vehicles. The proposed scheme calculates vehicle trust by considering user reputation and network trust based on inter-vehicle social behaviors. The vehicle may choose to scoring, ignoring, redistributing, etc. in the social activities inter vehicles. Thereby, calculating the user's reputation. To calculate network trust, distance from other vehicles and packet transmission rate are used. Using user reputation and network trust, local trust is calculated. It also prevents redundant distribution of data delivered during social activities. Data from the Road Side Unit (RSU) can be used to overcome local data limitations and global data can be used to calculate a vehicle trust more accurately. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

A Spatially Adaptive Post-processing Filter to Remove Blocking Artifacts based on POCS (POCS 기반의 블록화 현상 제거를 위한 적응적 후처리 기법)

  • Jeong, Jae-Hyun;Kim, Myoung-Jin;Hong, Min-Cheol
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.192-195
    • /
    • 2010
  • 영상 정보의 정확성을 필요로 하는 다양한 서비스 및 여러 학문 분야의 적용성으로 인해 물리적인 한계성을 극복할 수 있는 고해상도 영상처리 기법의 요구가 대두되고 있다 뿐만 아니라, 인터넷 상의 디지털 콘텐츠 중의 하나인 동영상 UCC의 제작환경이 보편화됨으로써 비전문적인 제작으로 인한 다양한 형태의 해상도 저하 및 영상의 왜곡 현상이 발생하여 고품질의 영상을 추구하는 사용자들의 요구를 충족시키지 못하고 있다. 이러한 문제점을 해결하기 위한 압축 동영상의 개선 된 영상 정보를 획득하기 위한 연구가 이루어지고 있지만 다음과 같은 문제점이 있다. 기존의 방법은 일반적으로 저역 통과 필터 기법과 정규화 영상 복원 방식으로 구분되어 연구되고 있으며, 저역 통과 기법은 계산량 측면에서 장점이 있으나, 영상과 양자화 정도에 따라 적응적이지 못한 단점이 있다. 또한 정규화 복원 방식은 압축 영상의 시각적으로 불편한 현상의 완화 정도를 결정하는 정규화 매개변수를 일괄적으로 모든 화소에 적용해, 화소의 위치에 대한 적응도가 낮고 정규화 매개 변수 선택 시 원 영상에 대한 정보를 알고 있다는 가정을 사용했으므로 실제 사용이 불가능하며, 영상들 사이의 불균일로 인해 적응적으로 처리하지 못하는 단점이 있다. 본 연구에서는 이러한 문제점을 극복할 수 있도록 압축 정보 활용을 통한 POCS 방식을 사용한 coding artifact 제거 방식에 대해 기술한다.

  • PDF