• Title/Summary/Keyword: Function Embedding

Search Result 115, Processing Time 0.022 seconds

A Quantitative Study of the Quality of Deconvolved Wide-field Microscopy Images as Function of Empirical Three-dimensional Point Spread Functions

  • Adur, Javier;Vicente, Nathalie;Diaz-Zamboni, Javier;Izaguirre, Maria Fernanda;Casco, Victor Hugo
    • Journal of the Optical Society of Korea
    • /
    • v.15 no.3
    • /
    • pp.252-263
    • /
    • 2011
  • In this work, for the first time, the quality of restoration in wide-field microscopy images after deconvolution was analyzed as a function of different Point Spread Functions using one deconvolution method, on a specimen of known size and on a biological specimen. The empirical Point Spread Function determination can significantly depend on the numerical aperture, refractive index of the embedding medium, refractive index of the immersion oil and cover slip thickness. The influence of all of these factors is shown in the same article and using the same microscope. We have found that the best deconvolution results are obtained when the empirical PSF utilized is obtained under the same conditions as the specimen. We also demonstrated that it is very important to quantitatively check the process' outcome using several quality indicators: Full-Width at Half-Maximum, Contrast-to-Noise Ratio, Signal-to-Noise Ratio and a Tenengrad-based function. We detected a significant improvement when using an indicator to measure the focus of the whole stack. Therefore, to qualitatively determinate the best deconvolved image between different conditions, one approach that we are pursuing is to use Tenengrad-based function indicators in images obtained using a wide-field microscope.

Experimental Verification of the Versatility of SPAM-based Image Steganalysis (SPAM 기반 영상 스테그아날리시스의 범용성에 대한 실험적 검증)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.526-535
    • /
    • 2018
  • Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.

Data Hiding Using Sequential Hamming + k with m Overlapped Pixels

  • Kim, Cheonshik;Shin, Dongkyoo;Yang, Ching-Nung;Chen, Yi-Cheng;Wu, Song-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6159-6174
    • /
    • 2019
  • Recently, Kim et al. introduced the Hamming + k with m overlapped pixels data hiding (Hk_mDH) based on matrix encoding. The embedding rate (ER) of this method is 0.54, which is better than Hamming code HC (n, n - k) and HC (n, n - k) +1 DH (H1DH), but not enough. Hamming code data hiding (HDH) is using a covering function COV(1, n = 2k -1, k) and H1DH has a better embedding efficiency, when compared with HDH. The demerit of this method is that they do not exploit their space of pixels enough to increase ER. In this paper, we increase ER using sequential Hk_mDH (SHk_mDH ) through fully exploiting every pixel in a cover image. In SHk_mDH, a collision maybe happens when the position of two pixels within overlapped two blocks is the same. To solve the collision problem, in this paper, we have devised that the number of modification does not exceed 2 bits even if a collision occurs by using OPAP and LSB. Theoretical estimations of the average mean square error (AMSE) for these schemes demonstrate the advantage of our SHk_mDH scheme. Experimental results show that the proposed method is superior to previous schemes.

A Study on the Efficiency Method of Location-Based Control Function Applied to MDM Applications (MDM 앱에 적용되는 위치 기반 통제 기능의 효율화 방법에 관한 연구)

  • ChangIk Oh;SuGil Hwang;Hyun Son;Dongho Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.171-177
    • /
    • 2023
  • When configuring MDM services only with applications without a central control server, a method that allows security control to be released based on GPS signals in areas sufficiently far from the security area of the workplace is generally applied by embedding and distributing location information of workplaces in MDM applications. This study proposed a method in which each individual directly enters the location information of the security control area needed for them in the distributed app and maintains it as setting information without embedding location information of a specific area such as work in the MDM applications. The method proposed in this study can improve universality, compatibility and the security control level of MDM services, and minimize deployment costs.

Incorporating Fuzzy Inference into Watermarking in the Transform Domain (변환영역에서의 퍼지추론을 적용한 워터마킹)

  • Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.364-370
    • /
    • 2006
  • In this paper, the decision method of optimal sub-band which is supposed to embedded watermark incorporating fuzzy inference into transform-based watermarking is proposed. After performing the DCT, maximum variation of human visual properties, such as text degree, contrast sensitivity function is calculated, and by using these, membership function is generated. After embedding the watermark to the selected bands obtained from fuzzy inference, performance of imperceptibility and robustness are evaluated. In order to testify the proposed scheme, such attacks as JPEG, filtering, cropping are utilized. and in addition, by using an AWGN channel of OFDM/QPSK system, PSNR as well as correlation are calculated, and finally evaluated the performance.

  • PDF

An Implementation of the Position Controller for Multiple Motors Using CAN (CAN 통신을 이용한 다중모터 위치제어기 구현)

  • Yi, Keon-Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.2
    • /
    • pp.55-60
    • /
    • 2002
  • This paper presents a controller for the multiple DC motors using the CAN(Controller Area Network). The controller has a benefit of reducing the cable connections and making the controller boards compact through the network including expansibility. CAN, among the field buses, is a serial communication methodology which has the physical layer and the data link layer in the ISO's OSI (Open System Interconnect) 7 layered reference model. It provides the user with many powerful features including multi-master functionality and the ability to broadcast / multicast telegrams. When we use a microprocessor chip embedding the CAN function, the system becomes more economical and reliable to react shortly in the data transmission. The controller, we proposed, is composed of two main controllers and a sub controller, which have built with a one-chip microprocessor having CAN function. The sub controller is plugged into the Pentium PC to perform a CAN communication, and connected to the main controllers via the CAN. Main controllers are responsible for controlling two motors respectively. Totally four motors, actuators for the biped robot in our laboratory, are controlled in the experiment. We show that the four motors are controlled properly to actuate the biped robot through the network in real time.

Blind Watermarking Using HVS and Wavelet Transform (HVS 모델과 웨이블릿 변환을 이용한 블라인드 워터마킹)

  • 주상현;이선화
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1169-1176
    • /
    • 2003
  • In this paper, we propose a blind watermarking that embeds watermarks into wavelet middle frequency subbands using human visual system. Wavelet middle frequency pairs(MFP) show similar distortion against general image processing attacks such as compression and filtering. So the quantization between MFPs is more robust than conventional methods that directly quantize DWT coefficients. We use a noise visibility function(NVF) to obtain a good visual quality This is able to preserve embedding positions after many attacks. Our experimental results show that the proposed scheme is robust to various image processing such as JPEG, while preserving good visual quality above 44㏈.

Seismic response of a rigid foundation embedded in a viscoelastic soil by taking into account the soil-foundation interaction

  • Messioud, Salah;Sbartai, Badreddine;Dias, Daniel
    • Structural Engineering and Mechanics
    • /
    • v.58 no.5
    • /
    • pp.887-903
    • /
    • 2016
  • This study analyses the seismic response of a three-dimensional (3-D) rigid massless square foundation resting or embedded in a viscoelastic soil limited by rigid bedrock. The foundation is subjected to harmonic oblique seismic waves P, SV, SH and R. The key step is the characterization of the soil-foundation interaction by computing the impedance matrix and the input motion matrix. A 3-D frequency boundary element method (BEM) in conjunction with the thin layer method (TLM) is adapted for the seismic analysis of the foundation. The dynamic response of the rigid foundation is solved from the wave equations by taking into account the soil-foundation interaction. The solution is formulated using the frequency BEM with the Green's function obtained from the TLM. This approach has been applied to analyze the effect of soilstructure interaction on the seismic response of the foundation as a function of the kind of incident waves, the angles of incident waves, the wave's frequencies and the embedding of foundation. The parametric results show that the non-vertical incident waves, the embedment of foundation, and the wave's frequencies have important impact on the dynamic response of rigid foundations.

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain

  • Liu, Jinhua;Rao, Yunbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.452-472
    • /
    • 2019
  • Most existing wavelet-based multiplicative watermarking methods are affected by geometric attacks to a certain extent. A serious limitation of wavelet-based multiplicative watermarking is its sensitivity to rotation, scaling, and translation. In this study, we propose an image watermarking method by using dual-tree complex wavelet transform with a multi-objective optimization approach. We embed the watermark information into an image region with a high entropy value via a multiplicative strategy. The major contribution of this work is that the trade-off between imperceptibility and robustness is simply solved by using the multi-objective optimization approach, which applies the watermark error probability and an image quality metric to establish a multi-objective optimization function. In this manner, the optimal embedding factor obtained by solving the multi-objective function effectively controls watermark strength. For watermark decoding, we adopt a maximum likelihood decision criterion. Finally, we evaluate the performance of the proposed method by conducting simulations on benchmark test images. Experiment results demonstrate the imperceptibility of the proposed method and its robustness against various attacks, including additive white Gaussian noise, JPEG compression, scaling, rotation, and combined attacks.

An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing

  • Liu, Hsing-Han;Su, Pin-Chang;Hsu, Meng-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4537-4556
    • /
    • 2020
  • This research was based on the study conducted by Khodaei et al. (2012), namely, the least-significant-bit (LSB) substitution combined with the pixel-value differencing (PVD) steganography, and presented an improved irreversible image steganography method. Such a method was developed through integrating the improved LSB substitution with the modulus function-based PVD steganography to increase steganographic capacity of the original technique while maintaining the quality of images. It partitions the cover image into non-overlapped blocks, each of which consists of 3 consecutive pixels. The 2nd pixel represents the base, in which secret data are embedded by using the 3-bit LSB substitution. Each of the other 2 pixels is paired with the base respectively for embedding secret data by using an improved modulus PVD method. The experiment results showed that the method can greatly increase steganographic capacity in comparison with other PVD-based techniques (by a maximum amount of 135%), on the premise that the quality of images is maintained. Last but not least, 2 security analyses, the pixel difference histogram (PDH) and the content-selective residual (CSR) steganalysis were performed. The results indicated that the method is capable of preventing the detection of the 2 common techniques.