• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.027 seconds

An Adaptive Watermark Detection Algorithm for Vector Geographic Data

  • Wang, Yingying;Yang, Chengsong;Ren, Na;Zhu, Changqing;Rui, Ting;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.323-343
    • /
    • 2020
  • With the rapid development of computer and communication techniques, copyright protection of vector geographic data has attracted considerable research attention because of the high cost of such data. A novel adaptive watermark detection algorithm is proposed for vector geographic data that can be used to qualitatively analyze the robustness of watermarks against data addition attacks. First, a watermark was embedded into the vertex coordinates based on coordinate mapping and quantization. Second, the adaptive watermark detection model, which is capable of calculating the detection threshold, false positive error (FPE) and false negative error (FNE), was established, and the characteristics of the adaptive watermark detection algorithm were analyzed. Finally, experiments were conducted on several real-world vector maps to show the usability and robustness of the proposed algorithm.

A Study on Improving the Accuracy of Wafer Align Mark Center Detection Using Variable Thresholds (가변 Threshold를 이용한 Wafer Align Mark 중점 검출 정밀도 향상 연구)

  • Hyeon Gyu Kim;Hak Jun Lee;Jaehyun Park
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.108-112
    • /
    • 2023
  • Precision manufacturing technology is rapidly developing due to the extreme miniaturization of semiconductor processes to comply with Moore's Law. Accurate and precise alignment, which is one of the key elements of the semiconductor pre-process and post-process, is very important in the semiconductor process. The center detection of wafer align marks plays a key role in improving yield by reducing defects and research on accurate detection methods for this is necessary. Methods for accurate alignment using traditional image sensors can cause problems due to changes in image brightness and noise. To solve this problem, engineers must go directly into the line and perform maintenance work. This paper emphasizes that the development of AI technology can provide innovative solutions in the semiconductor process as high-resolution image and image processing technology also develops. This study proposes a new wafer center detection method through variable thresholding. And this study introduces a method for detecting the center that is less sensitive to the brightness of LEDs by utilizing a high-performance object detection model such as YOLOv8 without relying on existing algorithms. Through this, we aim to enable precise wafer focus detection using artificial intelligence.

  • PDF

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

Ultrasonic guided waves-based fatigue crack detection in a steel I-beam: an experimental study

  • Jiaqi Tu;Xian Xu;Chung Bang Yun;Yuanfeng Duan
    • Smart Structures and Systems
    • /
    • v.31 no.1
    • /
    • pp.13-27
    • /
    • 2023
  • Fatigue crack is a fatal problem for steel structures. Early detection and maintenance can help extend the service life and prevent hazards. This paper presents the ultrasonic guided waves-based (UGWs-based) fatigue crack detection of a steel I-beam. The semi-analytical finite element model has been built to obtain the wave propagation characteristics. Damage indices in both time and frequency domains were analyzed by considering the characteristic variations of UGWs including the amplitude, phase angle, and wave packet energy. The pulse-echo and pitch-catch methods were combined in the detection scheme. Lab-scale experiments were conducted on welded steel I-beams to verify the proposed method. Results show that the damage indices based on the characteristic variations in the time domain can identify and localize the fatigue crack before it enters the rapid growth stage. The damage severity can be reasonably evaluated by analyzing the time-domain damage indices. Two nonlinear damage indices in the frequency domain give earlier warnings of the fatigue crack than the time-domain damage indices do. The identification results based on the above two nonlinear indices are found to be less consistent under various excitation frequencies. More robust nonlinear techniques needed to be searched and tested for early crack detection in steel I-beams in further study.

A Real-Time PCR Assay for the Quantitative Detection of Ralstonia solanacearum in Horticultural Soil and Plant Tissues

  • Chen, Yun;Zhang, Wen-Zhi;Liu, Xin;Ma, Zhong-Hua;Li, Bo;Allen, Caitilyn;Guo, Jian-Hua
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.193-201
    • /
    • 2010
  • A specific and rapid real-time PCR assay for detecting Ralstonia solanacearum in horticultural soil and plant tissues was developed in this study. The specific primers RSF/RSR were designed based on the upstream region of the UDP-3-O-acyl-GlcNAc deacetylase gene from R. solanacearum, and a PCR product of 159 bp was amplified specifically from 28 strains of R. solanacearum, which represent all genetically diverse AluI types and all 6 biovars, but not from any other nontarget species. The detection limit of $10^2\;CFU/g$ tomato stem and horticultural soil was achieved in this real-time PCR assay. The high sensitivity and specificity observed with field samples as well as with artificially infected samples suggested that this method might be a useful tool for detection and quantification of R. solanacearum in precise forecast and diagnosis.

Implementation of Paper Keyboard Piano with a Kinect (키넥트를 이용한 종이건반 피아노 구현 연구)

  • Lee, Jung-Chul;Kim, Min-Seong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2012
  • In this paper, we propose a paper keyboard piano implementation using the finger movement detection with the 3D image data from a kinect. Keyboard pattern and keyboard depth information are extracted from the color image and depth image to detect the touch event on the paper keyboard and to identify the touched key. Hand region detection error is unavoidable when using the simple comparison method between input depth image and background depth image, and this error is critical in key touch detection. Skin color is used to minimize the error. And finger tips are detected using contour detection with area limit and convex hull. Finally decision of key touch is carried out with the keyboard pattern information at the finger tip position. The experimental results showed that the proposed method can detect key touch with high accuracy. Paper keyboard piano can be utilized for the easy and convenient interface for the beginner to learn playing piano with the PC-based learning software.

Damage detection of shear buildings using frequency-change-ratio and model updating algorithm

  • Liang, Yabin;Feng, Qian;Li, Heng;Jiang, Jian
    • Smart Structures and Systems
    • /
    • v.23 no.2
    • /
    • pp.107-122
    • /
    • 2019
  • As one of the most important parameters in structural health monitoring, structural frequency has many advantages, such as convenient to be measured, high precision, and insensitive to noise. In addition, frequency-change-ratio based method had been validated to have the ability to identify the damage occurrence and location. However, building a precise enough finite elemental model (FEM) for the test structure is still a huge challenge for this frequency-change-ratio based damage detection technique. In order to overcome this disadvantage and extend the application for frequencies in structural health monitoring area, a novel method was developed in this paper by combining the cross-model cross-mode (CMCM) model updating algorithm with the frequency-change-ratio based method. At first, assuming the physical parameters, including the element mass and stiffness, of the test structure had been known with a certain value, then an initial to-be-updated model with these assumed parameters was constructed according to the typical mass and stiffness distribution characteristic of shear buildings. After that, this to-be-updated model was updated using CMCM algorithm by combining with the measured frequencies of the actual structure when no damage was introduced. Thus, this updated model was regarded as a representation of the FEM model of actual structure, because their modal information were almost the same. Finally, based on this updated model, the frequency-change-ratio based method can be further proceed to realize the damage detection and localization. In order to verify the effectiveness of the developed method, a four-level shear building was numerically simulated and two actual shear structures, including a three-level shear model and an eight-story frame, were experimentally test in laboratory, and all the test results demonstrate that the developed method can identify the structural damage occurrence and location effectively, even only very limited modal frequencies of the test structure were provided.

Corroded and loosened bolt detection of steel bolted joints based on improved you only look once network and line segment detector

  • Youhao Ni;Jianxiao Mao;Hao Wang;Yuguang Fu;Zhuo Xi
    • Smart Structures and Systems
    • /
    • v.32 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Steel bolted joint is an important part of steel structure, and its damage directly affects the bearing capacity and durability of steel structure. Currently, the existing research mainly focuses on the identification of corroded bolts and corroded bolts respectively, and there are few studies on multiple states. A detection framework of corroded and loosened bolts is proposed in this study, and the innovations can be summarized as follows: (i) Vision Transformer (ViT) is introduced to replace the third and fourth C3 module of you-only-look-once version 5s (YOLOv5s) algorithm, which increases the attention weights of feature channels and the feature extraction capability. (ii) Three states of the steel bolts are considered, including corroded bolt, bolt missing and clean bolt. (iii) Line segment detector (LSD) is introduced for bolt rotation angle calculation, which realizes bolt looseness detection. The improved YOLOv5s model was validated on the dataset, and the mean average precision (mAP) was increased from 0.902 to 0.952. In terms of a lab-scale joint, the performance of the LSD algorithm and the Hough transform was compared from different perspective angles. The error value of bolt loosening angle of the LSD algorithm is controlled within 1.09%, less than 8.91% of the Hough transform. Furthermore, the proposed framework was applied to fullscale joints of a steel bridge in China. Synthetic images of loosened bolts were successfully identified and the multiple states were well detected. Therefore, the proposed framework can be alternative of monitoring steel bolted joints for management department.

Asymmetric public-key watermarking based on correlation method (상관도 검출기반의 비대칭 공개 키 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.151-159
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

  • PDF

An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction

  • Yang, Zhiyong;Li, Chunlin;Liu, Yanpei;Liu, Yunchang;Xu, Lijun
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2014
  • In this paper, we propose a new implementation of a failure detector. The implementation uses a dual model of heartbeat and interaction. First, the heartbeat model is adopted to shorten the detection time, if the detection process does not receive the heartbeat message in the expected time. The interaction model is then used to check the process further. The expected time is calculated using the exponential smoothing method. Exponential smoothing can be used to estimate the next arrival time not only in the random data, but also in the data of linear trends. It is proven that the new detector in the paper can eventually be a perfect detector.