• Title/Summary/Keyword: Embedding method

Search Result 701, Processing Time 0.027 seconds

Area-Optimization for VLSI by CAD (CAD에 의한 VLSI 설계를 위한 면적 최적화)

  • Yi, Cheon-Hee
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.4
    • /
    • pp.708-712
    • /
    • 1987
  • This paper deals with minimizing layout area of VLSI design. A long wire in a VLSI layout causes delay which can be reduced by using a driver. There can be significant area increase when many drivers are introduced in a layout. This paper describes a method to obtain tight bound on the worst-case increase in area when drivers are introduced along many long wires in a layout. The area occupied by minimum-area embedding for a circuit can depend on the aspect ratio of the bounding rectangle of the layout. This paper presents a separator-based area optimal embeddings for VLSI graphs in rectangles of several aspect ratios.

  • PDF

Non-natural Image Steganography Based on Noise Visibility Function(NVF) (Noise Visibility Function(NVF)를 이용한 비자연 영상에서의 스테가노그래피)

  • 홍지희;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1807-1810
    • /
    • 2003
  • Steganography based on Just Noticeable Difference(JND) has been used for natural images. However, it has been recognized to have defects for the non-natural images such as scanned text images, cartoons, etc. In this paper, an alternative method is proposed to improve this problem. A new scheme is designed specially for the non-natural images. Instead of JND, Noise Visibility Function(NVF) is used. NVF value and edge strength value of each pixel ate combined to decide the embedding data capacity and the visibility of data embedded images have been improved specially for the non-natural images.

  • PDF

Embedding Method a Secret Data into JPEG Algorithm (JPEG 알고리즘에 기밀 데이터 합성법)

  • 박지환;박태진
    • Review of KIISC
    • /
    • v.6 no.1
    • /
    • pp.65-78
    • /
    • 1996
  • 본 논문에서는 JPEG 알고리즘을 이용하여 화상데이터를 부호화할때 디지털 서명문과 같은 기밀 데이터를 몰래 집어넣어 합성하는 방식에 대하여 고찰한다 그 기본원리는 DCT 계수를 양자화 할 때 필연적으로 생기는 오차를 이용하는 것으로 0이 아닌 양자화 계수를 합성하고자 하는 기밀데이터에 따라 근처의 정수로 조절하는 것이다. 이 방식을 SIDBA 표준화상에 적용하여 화상의 열화는 무시할 정도로 작으면서 원하는 크기의 기밀 데이터를 합성할 수 있음을 보인다. 또한, 화질의 열화를 최소화시키면서 일정량의 기밀 데이터를 합성시키기 위하여 블록당 1화소를 적절히 선택하여 제3자의 공격에 대한 안전성을 향상시키는 방법을 제시하고 컴퓨터 시뮬레이션을 통하여 성능을 분석한다.

  • PDF

Image Watermarking using holographic watermark (홀로그래픽 watermark를 이용한 영상 watermarking I I)

  • 김규태;김수길;김종원;최종욱
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.181-183
    • /
    • 2003
  • We propose a new watermarking scheme that can be used to embed multiple bits and also resilient to JPEG compression and geometrical transforms such as scaling, rotation, and cropping, based on off-axis holographic watermark that allows multiple watermark recovery without original content(cover image). The holographic watermark is that Fourier transformed digital hologram is embedded into cover image in the spatial domain. The proposed method has not only increased robustness with a stronger embedding but also imperceptibility of the watermark in the evaluation process.

  • PDF

Extraction of S-Parameters for a Slot Unit on the Post-Wall Waveguide from Measured Data

  • Lee, Jae-Ho;Park, Jung-Yong
    • Journal of electromagnetic engineering and science
    • /
    • v.12 no.1
    • /
    • pp.122-127
    • /
    • 2012
  • Post-wall waveguide structures have attracted a great deal of attention for micro- and millimeter-wave applications. One of the waveguide’s applications is a slotted waveguide array. In order to design the slotted array, the characteristics of a slot unit alone on the post-wall waveguide should be investigated. In this paper, a method for extracting the S-parameters of a unit slot is proposed. This simple method requires only two kinds of waveguides: waveguides without a slot unit and waveguides with a slot unit. Three kinds of slot units are fabricated, and the extracted results show a high level of agreement with predicted (simulated) results. With this method, the equivalent slot length can also be found.

Digital Watermarking Technique for the Copyright Protection of Motion Pictures (동영상 저작권 보호를 위한 디지털 워터마킹 기술)

  • 류대현
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.4
    • /
    • pp.438-450
    • /
    • 1999
  • In this paper, a new watermaking method embedding digital watermarks in the compressed video for the copy protection of multimedia data. The proposed method segments objects and embeds independent watermarks in each objects by spread spectrum method in the bitstream domain which is compressed by DCT and motion compensated coding method like MPEG-2. And, the proposed method not only embeds watermarks but show the robustness to the attacks like average operation or statistical analysis.

  • PDF

Barcode Pattern Image Watermark Using Triplet (트리플릿을 이용한 바코드 패턴 이미지 워터마크)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2330-2335
    • /
    • 2008
  • In this paper, we proposed a robust watermark scheme for image based on the discrete wavelet transform. In the first, we use the triplet method for embedding and extraction of watermark. Triplet method uses relationship among the discrete wavelet coefficients at the same position in the three detail subband of image. In the second, we use barcode Pattern Image for watermark scheme. By using barcode Pattern Images, a user is able to make many kinds of own watermark. In the third, the proposed method for image watermark provides the invisiblility which the other user can not discriminate watermark from watermarked image. The advantage of the proposed method is visibility when we extracted watermark from the image. The corresponding experimental results show that the proposed method has performance of a robustness from the noise attack.

A Reliability Analysis on the To-Box Reinforcement Method of PSC Beam Bridges (PSC보의 박스화 보강방법의 신뢰성해석)

  • Bang, Myung-Seok
    • Journal of the Korean Society of Safety
    • /
    • v.21 no.3 s.75
    • /
    • pp.94-100
    • /
    • 2006
  • The goal of this study is to show the way to increase the safety of deteriorated PSC beam bridges by the to-box reinforcing method. This method is to change the open girder section into the closed box section by connecting bottom flanges of neighboring PSC girders with the precast panels embedding PS tendons at the anchor block. The box section is composed of three concrete members with different casting ages, RC slab, PSC beam, precast panel. This different aging requires a time-dependent analysis considering construction sequences. Reliability index and failure probability are produced by the AFOSM reliability analysis. Transversely five schemes and longitudinally two schemes are considered. The full reinforcing scheme, transversely and longitudinally, shows the highest reliability index, but it requires more cost for retrofit. The partial reinforcing scheme 4, 4-1 are recommended in this study as the economically best scheme.

Offline Camera Movement Tracking from Video Sequences

  • Dewi, Primastuti;Choi, Yeon-Seok;Cha, Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.69-72
    • /
    • 2011
  • In this paper, we propose a method to track the movement of camera from the video sequences. This method is useful for video analysis and can be applied as pre-processing step in some application such as video stabilizer and marker-less augmented reality. First, we extract the features in each frame using corner point detection. The features in current frame are then compared with the features in the adjacent frames to calculate the optical flow which represents the relative movement of the camera. The optical flow is then analyzed to obtain camera movement parameter. The final step is camera movement estimation and correction to increase the accuracy. The method performance is verified by generating a 3D map of camera movement and embedding 3D object to the video. The demonstrated examples in this paper show that this method has a high accuracy and rarely produce any jitter.

  • PDF

Image Steganographic Method using Variable Length for Data Embedding (가변 길이 자료 은닉이 가능한 이미지 스테가노그래픽 방법 연구)

  • Jung, Ki-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.115-122
    • /
    • 2008
  • Wu and Tsai's pixel-value differencing method and Chang and Tseng's side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel's smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they may tolerate larger changes than those in smooth areas. However, both methods are subject to the fall off the boundary problem(FOBP). This study proposes a new scheme that can solve the FOBP. The experimental results demonstrate that the proposed method resolves the problem, and achieves a higher image quality index value than other methods.