• Title/Summary/Keyword: Differential Image

Search Result 600, Processing Time 0.02 seconds

Triqubit-State Measurement-Based Image Edge Detection Algorithm

  • Wang, Zhonghua;Huang, Faliang
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1331-1346
    • /
    • 2018
  • Aiming at the problem that the gradient-based edge detection operators are sensitive to the noise, causing the pseudo edges, a triqubit-state measurement-based edge detection algorithm is presented in this paper. Combing the image local and global structure information, the triqubit superposition states are used to represent the pixel features, so as to locate the image edge. Our algorithm consists of three steps. Firstly, the improved partial differential method is used to smooth the defect image. Secondly, the triqubit-state is characterized by three elements of the pixel saliency, edge statistical characteristics and gray scale contrast to achieve the defect image from the gray space to the quantum space mapping. Thirdly, the edge image is outputted according to the quantum measurement, local gradient maximization and neighborhood chain code searching. Compared with other methods, the simulation experiments indicate that our algorithm has less pseudo edges and higher edge detection accuracy.

The Effect of Motives of Ramie Fabrics on Sensory Image Evaluation (모시 소재의 문양에 따른 감성 이미지 평가)

  • Lee, Soon-Im;Kim, Jae-Sook
    • The Research Journal of the Costume Culture
    • /
    • v.14 no.6
    • /
    • pp.1015-1026
    • /
    • 2006
  • The purpose of the study were to find out (1) the effect of motives on perceiver's image perception on ramie fabrics, and perceiver's trait, age and gender on sensory image evaluation of ramie fabrics. The research was a quasi experiment and experimental materials developed for the study were a set of material stimuli and semantic differential scales to measure sensory image of the stimuli, an aesthetic value scale. the independent design was motif design techniques(Plain Weave, burnt-out, embroidery, stripe, check). The subjects were 421 adults in Daejeon and Seachun. The results was as follows: The factor analysis of semantic differential scales for the ramie materials emerged 4 different image dimensions: attractiveness, hand, elegance, weight). The five design techniques showed significantly different image affects on some selective dimensions. The burn-out design gave the most attractive image, the embroidery design gave the softest image and plain weaved fabric presented the lightest hand image. Consumer's aesthetic values, gender and age tended to affect sensory image evaluation of ramie materials. On conclusion the result revealed that design strategy for the ramie material, design development though motives will be an essential process. and for material design pursued design image and target consumer's trait should be carefully considered.

  • PDF

The Study on the Image Shown on the Product, Brand and Advertisement of Jean Brand (전 브랜드의 상품, 상표, 광고 이미지에 관한 연구)

  • Choi Hyun-Ju;Kim Yoon-Kyoung;Lee Kyoung-Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.4 s.152
    • /
    • pp.531-541
    • /
    • 2006
  • The purpose of this study is to examine the semantic structure about the image shown on the product, brand and advertisement and figuring out its features through the correlation among brand images. For the study, nine brands(Guess, Bangbang, ONG, NIX, TBJ, Levi's, OPT, FRJ, Jambangee) as subjects for investigation has been selected and divided into the image of brand(9 brands), product(108 products, 12 pieces for each product) and advertisement(9 points) by the measure of 26 adjective pairs. The survey has been collected on the subject of 540 men and women who live in around Busan city areas and has been taken the statistics. The results on investigating the semantic structures of the product images about jean brands, there are five main factors, such as, individuality, attractiveness, activeness, modernity, hardness & softness. The results on examining the semantic structures of the brand images about jean brands, the factors are attractiveness, activeness, vitality, hardness & softness, fadness. The results on investigating the semantic structure of the advertisement images about jean brands, the factors are attractiveness, individuality, modernity, activeness. The results on the classification of brand images are presented as four groups, the first group is that brand and advertisement image are pretty similar but product image is differential according to brand and the second group, product and advertisement image are similar but brand image is differential. The third group is that product and brand image are similar but advertisement is differential and the fourth group, product, brand and advertisement are similar.

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.355-364
    • /
    • 2011
  • In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.

The moving object detection for moving picture with gaussian noise (프레임간 가우시안 잡음이 있는 동영상에서의 움직임 객체 검출)

  • Kim, dong-woo;Song, young-jun;Kim, ae-kyeong;Ahn, jae-hyeong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.839-842
    • /
    • 2009
  • It is used to differential image for moving object detection in general. But it is difficult to detect the accurate detection which uses differential image between frames. In this paper, the proposed method overcome the noise that is generated by camera, grabber card, or weather condition. It extract to moving big object such as human or vehicle. The proposed method process morphological filtering and binary for the image with noise, reduce error. We are expect to apply to a real-time moving object detection system at fog condition, pass the limit of the object detection method using the differential image.

  • PDF

A Differential Index Assignment Scheme for Tree-Structured Vector Quantization (나무구조 벡터양자화 기반의 차분 인덱스 할당기법)

  • 한종기;정인철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2C
    • /
    • pp.100-109
    • /
    • 2003
  • A differential index assignment scheme is proposed for the image encoding system in which a variable-length tree-structured vector quantizer is adopted. Each source vector is quantized into a terminal node of VLTSVQ and each terminal node is represented as a unique binary vector. The proposed index assignment scheme utilizes the correlation between interblocks of the image to increase the compression ratio with the image quality maintained. Simulation results show that the proposed scheme achieves a much higher compression ratio than the conventional one does and that the amount of the bit rate reduction of the proposed scheme becomes large as the correlation of the image becomes large. The proposed encoding scheme can be effectively used to encode R images whose pixel values we, in general, highly correlated with those of the neighbor pixels.

A Study on the Acceptance of Pop Musician's Image among Korean Adolescent: - Focusing on Subculture, Fan Costume play - (대중가수 이미지의 청소년 수용에 관한 연구 -팬코스프레 집단을 중심으로-)

  • 한자영;유송옥
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.5
    • /
    • pp.570-581
    • /
    • 2004
  • The purpose of this study is to analyze the acceptance and interpretation of pop musician's image in the Korean youth subculture, Fan Costume play(Fancos). Fancos subculture took the most active attitude to accepts of the pop musician's image and therefore was assumed to have various and differential acceptance aspects. The ethnographic method was used in order to approach more closely from their point of view. The cultural activity of Fancos subculture was imitation and reappearance of pop musician's appearance. Actually Fancos is a kind of fan-culture which idolized Korean pop music star. The acceptance of musician's appearance in Fancos is found out in two aspects. One is passive acceptance aspects that inforces conformity of star fashion and follows servilely ideal body image which promoted by cultural industry. The other is unique acceptance aspects that Fancos members interpret the musician's image in their own way. Those members experience pleasure through their own meaning. And homology of their appearance makes a distinction between of themselves from other youth and intensifies their group identity. As above analyzed, Fancos subculture has differential acceptance of pop music star's image comparing to other youth and even their stylistic appearance reflects not only their fandom but also their own meaning. Consequently, pop musician's image as a popular cultural text is accepted not equal to all populace but dissimilar along with contexts and trails of the acceptance group.

3D Image Conversion of 2D Still Image based-on Differential Area-Moving Scheme (차등적 영역 이동기법을 이용한 2차원 정지영상의 3차원 입체영상 변환)

  • 이종호;김은수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11A
    • /
    • pp.1938-1945
    • /
    • 2001
  • In this paper, a new scheme for image conversion of the 2D input images into the stereoscopic 3D images by using differential shifting method is proposed. First, the relative depth information is estimated by disparity and occlusion information from the input stereo images and then, each of image objects are segmented by gray-level using the estimated information. Finally, through the differential shifting of the segmented objects according to the horizontal parallax, a stereoscopic 3D image having optimal stereopsis is reconstructed. From some experimental results, it is found that the horizontal disparity can be improved about 1.6dB in PSNR for the reconstructed stereo image using the proposed scheme through comparing to that of the given input image. In the experiment of using the commercial stereo viewer, the reconstructed stereoscopic 3D images, in which each of the segmented objects are horizontally shifted in the range of 4 ∼5 pixels are also found to have the mast improved stereopsis.

  • PDF

Security Analysis based on Differential Entropy m 3D Model Hashing (3D 모델 해싱의 미분 엔트로피 기반 보안성 분석)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12C
    • /
    • pp.995-1003
    • /
    • 2010
  • The content-based hashing for authentication and copy protection of image, video and 3D model has to satisfy the robustness and the security. For the security analysis of the hash value, the modelling method based on differential entropy had been presented. But this modelling can be only applied to the image hashing. This paper presents the modelling for the security analysis of the hash feature value in 3D model hashing based on differential entropy. The proposed security analysis modeling design the feature extracting methods of two types and then analyze the security of two feature values by using differential entropy modelling. In our experiment, we evaluated the security of feature extracting methods of two types and discussed about the trade-off relation of the security and the robustness of hash value.