• Title/Summary/Keyword: 픽셀값

Search Result 28, Processing Time 0.02 seconds

Downscaling Forgery Detection using Pixel Value's Gradients of Digital Image (디지털 영상 픽셀값의 경사도를 이용한 Downscaling Forgery 검출)

  • RHEE, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.47-52
    • /
    • 2016
  • The used digital images in the smart device and small displayer has been a downscaled image. In this paper, the detection of the downscaling image forgery is proposed using the feature vector according to the pixel value's gradients. In the proposed algorithm, AR (Autoregressive) coefficients are computed from pixel value's gradients of the image. These coefficients as the feature vectors are used in the learning of a SVM (Support Vector Machine) classification for the downscaling image forgery detector. On the performance of the proposed algorithm, it is excellent at the downscaling 90% image forgery compare to MFR (Median Filter Residual) scheme that had the same 10-Dim. feature vectors and 686-Dim. SPAM (Subtractive Pixel Adjacency Matrix) scheme. In averaging filtering ($3{\times}3$) and median filtering ($3{\times}3$) images, it has a higher detection ratio. Especially, the measured performances of all items in averaging and median filtering ($3{\times}3$), AUC (Area Under Curve) by the sensitivity and 1-specificity is approached to 1. Thus, it is confirmed that the grade evaluation of the proposed algorithm is 'Excellent (A)'.

An efficient quality improvement scheme for magnified image by using simple convex surface and simple concave surface characteristics in image (영상의 단순 볼록 곡면과 단순 오목 곡면 특성을 이용한 확대 영상의 효율적인 화질 개선 기법)

  • Jung, Soo-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.59-68
    • /
    • 2013
  • In this paper, an effective scheme was proposed to estimate simple convex surface and simple concave surface which exist in image. This scheme is applied to input image to estimate simple convex surface or simple concave surface. When simple convex surface or simple concave surface exists, another proposed efficient interpolation scheme is used for the interpolated pixel to have the characteristics of simple convex surface or simple concave surface. The magnified image using the proposed schemes is more similar to the real image than the magnified image using the previous schemes. The PSNR values of the magnified images using the proposed schemes are greater than those of the magnified images using the previous interpolation schemes.

Regional Boundary Operation for Character Recognition Using Skeleton (골격을 이용한 문자 인식을 위한 지역경계 연산)

  • Yoo, Suk Won
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.361-366
    • /
    • 2018
  • For each character constituting learning data, different fonts are added in pixel unit to create MASK, and then pixel values belonging to the MASK are divided into three groups. The experimental data are modified into skeletal forms, and then regional boundary operation is used to create a boundary that distinguishes the background region adjacent to the skeleton of the character from the background of the modified experimental data. Discordance values between the modified experimental data and the MASKs are calculated, and then the MASK with the minimum value is found. This MASK is selected as a finally recognized result for the given experiment data. The recognition algorithm using skeleton of the character and the regional boundary operation can easily extend the learning data set by adding new fonts to the given learning data, and also it is simple to implement, and high character recognition rate can be obtained.

Invasion of Pivacy of Federated Learning by Data Reconstruction Attack with Technique for Converting Pixel Value (픽셀값 변환 기법을 더한 데이터 복원공격에의한 연합학습의 프라이버시 침해)

  • Yoon-ju Oh;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.63-74
    • /
    • 2023
  • In order to ensure safety to invasion of privacy, Federated Learning(FL) that learns using parameters is emerging. However a paper that leaks training data using gradients was recently published. Our paper implements an experiment to leak training data using gradients in a federated learning environment, and proposes a method to improve reconstruction performance by improving existing attacks that leak training data. Experiments using Yale face database B, MNIST dataset on the proposed method show that federated learning is not safe from invasion of privacy by reconstructing up to 100 data out of 100 training data when performance of federated learning is high at accuracy=99~100%. In addition, by comparing the performance (MSE, PSNR, SSIM) of pixels and the performance of identification by Human Test, we want to emphasize the importance of the performance of identification rather than the performance of pixels.

A Study of Image Characteristics due to Focus-Grid and Head Phantom Decentering from the Armorphos Silicon Thin Film Transistor Detector the Fixed Focus-Grid is Applied (고정식 초점형 격자가 적용된 비정절 실리콘 평판형 검출기에서 초점-격자와 두부 팬텀의 중심 변위에 의한 화질 특성에 관한 연구)

  • Choi, Jun-Gu;Kim, Byeong-Gi;Cha, Seon-Hwa;Kim, Gyeong-Su
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.9 no.1
    • /
    • pp.7-15
    • /
    • 2007
  • This study aim to investigate image characteristics due to focus-grid and head phantom decentering from the armorphos silicon thin film transistor detector the fixed focus-grid is applied, wish to propose right use method of digital medical equipment. Acquired image according to focus-grid and head phantom position decentering using head phantom on armorphos silicon thin film transistor detector the fixed focus-grid is applied. acquired image evaluate pixel value, histogram, plot profile, surface plot using NIB (Image J) image analysis program and compared decentering image with standard image. Mean value and standard deviation value of focus-grid lateral decentering and duplex decentering of focus-grid and head phantom decreased by ratio, consequently increase of horizontality, diagonal decentering. also, deteriorated contrast of image because frequency of high pixel value decreases fairly. according increases decentering, image distortion phenomenon was increase, by next time, pixel mean value of head phantom decentering was no big change but horizontality, diagonal, mean value and standard deviation value of pixel decreased by ratio. Even if increase pixel noise of image because wide latitude and post processing ability of digital detector, radiotechnologist can not recognize. Therefore, radiotechnologist must recognize correctly the photographing factors which increases pixel noise on the grid system installation digital detector and should exam.

  • PDF

A Discussion of the Two Alternative Methods for Quantifying Changes : by Pixel Values Versus by Thematic Categories (변화의 정량화 방법에 관한 고찰 : 픽셀값 대 분류항목별)

  • Choung, Song-Hak
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.1 no.1 s.1
    • /
    • pp.193-201
    • /
    • 1993
  • In a number of areas, there are important benefits to be gained when we bring both the detection and monitoring abilities of remote sensing as well as the philosophical approach and analytic capabilities of a geographic information system to bear on a problem. A key area in the joint applications of remote sensing technology and GIS is to identify change. Whether this change is of interest for its own sake, or because the change causes us to act (for example, to update a map), remote sensing provides an excellent suite of tools for detecting change. At the same time, a GIS is perhaps the best analytic toot for quantifying the process of change. There are two alternative methods for quantifying changes. The conceptually simple approach is to un the pixel values in each of the images. This method is practical but may be too simple to identify the variety of changes in a complex scene. The common alternative is called symbolic change detection. The analyst first decides on a set of thematic categories that are important to distinguish for the application. This approach is useful only if accurate landuse/cover classifications can be obtained. Persons conducting digital change detection must be intimately familiar with the environment under study, the quality of the data set and the characteristics of change detection algorithms. Also, much work remains to identify optimum change detection algorithms for specific geographic areas and problems.

  • PDF

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

New Hybrid Approach of CNN and RNN based on Encoder and Decoder (인코더와 디코더에 기반한 합성곱 신경망과 순환 신경망의 새로운 하이브리드 접근법)

  • Jongwoo Woo;Gunwoo Kim;Keunho Choi
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.129-143
    • /
    • 2023
  • In the era of big data, the field of artificial intelligence is showing remarkable growth, and in particular, the image classification learning methods by deep learning are becoming an important area. Various studies have been actively conducted to further improve the performance of CNNs, which have been widely used in image classification, among which a representative method is the Convolutional Recurrent Neural Network (CRNN) algorithm. The CRNN algorithm consists of a combination of CNN for image classification and RNNs for recognizing time series elements. However, since the inputs used in the RNN area of CRNN are the flatten values extracted by applying the convolution and pooling technique to the image, pixel values in the same phase in the image appear in different order. And this makes it difficult to properly learn the sequence of arrangements in the image intended by the RNN. Therefore, this study aims to improve image classification performance by proposing a novel hybrid method of CNN and RNN applying the concepts of encoder and decoder. In this study, the effectiveness of the new hybrid method was verified through various experiments. This study has academic implications in that it broadens the applicability of encoder and decoder concepts, and the proposed method has advantages in terms of model learning time and infrastructure construction costs as it does not significantly increase complexity compared to conventional hybrid methods. In addition, this study has practical implications in that it presents the possibility of improving the quality of services provided in various fields that require accurate image classification.