• Title/Summary/Keyword: IT마크

Search Result 787, Processing Time 0.023 seconds

A Burst-mode Automatic Power Control Circuit Robust io Mark Density Variations (마크 밀도 변화에 강한 버스트 모드 자동 전력 제어 회로)

  • 기현철
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.4
    • /
    • pp.67-74
    • /
    • 2004
  • As data rate was increased, the conventional burst-mode automatic power control circuit caused errors due to the effort of the mark density variation. To solve this problem we invented a new structured peak-comparator which could eliminate the effect of the mark density variation even in high date rate, and revised the conventional one using it. We proposed a burst-mode automatic power control circuit robust to mark density variations. We found that the peak-comparator in the proposed automatic power control circuit was very robust to mark density variations because it affected very little by the mark density variation in high date rate and in the wide variation range of the reference current and the difference current.

Development of a Software Benchmark Test Process (소프트웨어 벤치마크 테스트 프로세스 개발)

  • Oh, Young-Bae;Kim, Jae-Woong;Jung, Young-Eun;Shin, Seok-Kyu
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.401-405
    • /
    • 2002
  • 제품으로서의 소프트웨어가 급속히 보급되면서 소프트웨어 제품 품질 평가의 필요성이 증가하고 있다. 소프트웨어는 하드웨어와 다른 무형의 제품으로서 기술 및 품질에 대한 표준화와 시험 평가 방법의 도출이 어렵다. 최근에 개발된 소프트웨어 품질 모델과 도메인별 제품 표준화 노력으로 소프트웨어 제품 평가 방법이 개발되고 있다. 이와 더불어 제품을 비교 평가하여 소비자에게 제품을 선택할 수 있는 기준을 줄 수 있는 벤치마크 테스트의 필요성이 제기되고 있다. 본 연구에서는 하드웨어와 비교되는 소프트웨어 벤치마크 테스트의 특성을 살펴보고 본 연구에서 개발한 벤치마크 테스트를 위한 표준 프로세스 개발 결과를 제시하고 개발된 프로세스의 각 단계별 활동에 대하여 논한다.

  • PDF

A Blind Watermarking Algorithm using CABAC for H.264/AVC Main Profile (H.264/AVC Main Profile을 위한 CABAC-기반의 블라인드 워터마킹 알고리즘)

  • Seo, Young-Ho;Choi, Hyun-Jun;Lee, Chang-Yeul;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.181-188
    • /
    • 2007
  • This paper proposed a watermark embedding/extracting method using CABAC(Context-based Adaptive Binary Arithmetic Coding) which is the entropy encoder for the main profile of MPEG-4 Part 10 H.264/AVC. This algorithm selects the blocks and the coefficients in a block on the bases of the contexts extracted from the relationship to the adjacent blocks and coefficients. A watermark bit is embedded without any modification of coefficient or with replacing the LSB(Least Significant Bit) of the coefficient with a watermark bit by considering both the absolute value of the selected coefficient and the watermark bit. Therefore, it makes it hard for an attacker to find out the watermarked locations. By selecting a few coefficients near the DC coefficient according to the contexts, this algorithm satisfies the robustness requirement. From the results from experiments with various kinds and various strengths of attacks the maximum error ratio of the extracted watermark was 5.02% in maximum, which makes certain that the proposed algorithm has very high level of robustness. Because it embeds the watermark during the context modeling and binarization process of CABAC, the additional amount of calculation for locating and selecting the coefficients to embed watermark is very small. Consequently, it is highly expected that it is very useful in the application area that the video must be compressed right after acquisition.

Transition of Domestic Corporate Symbol Mark - Chiefly Focusing on Portfolio of CI Specialized Companies - (국내 기업심볼마크의 변천 - CI 전문회사들의 포트폴리오를 중심으로 -)

  • Lee, Jae-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.207-214
    • /
    • 2007
  • Symbol mark started with expressing the symbolic form through the long history of human beings, in order to transmit self or group's life and thoughts, and since the Industrial Revolution, symbol mark has beer used for the business activities of enterprise, along with the acquirement of term 'CI'. The symbol mark design of A.E.G, designed by Peter Behrens in 1907 is the onset of symbol mark in the CI concept, and the concept of CI and symbol mark was introduced to our nation in the early of 1970s. Since then, until now, CI has reflected the phase of the times as a key factor of CI, while repeating numerous changes, and recently, it is a state that the expression methods of symbol mark have been varied with the popularization of trend, appealing to emotion in the whole society and culture. Accordingly, this thesis examines the corporate symbol mark through the portfolio of representative CI specializes companies from the introduction period of CI to the present, and analyze the features of the time in order to present the basis of the direction of symbol mark design for the creation of future corporate images.

Incremental Watermarking using Complex Wavelet Transform (콤플렉스 웨이블릿 변환을 이용한 점진적 워터마킹)

  • Lee Na-Young;Kim Won;Kim Kwan-Jung;Kim Gye-Young
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.39-46
    • /
    • 2003
  • Generally, the existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and all watermark extractions need the same time regardless of degree of distortion. In this paper, we propose the incremental watermarking technique that used a Complex Wavelet Transform(CWT) in order to solve these problems. The proposed incremental watermarking technique embeds a watermark in a phase component after a CWT with an original image, and a watermark is extracted from an watermarked image by stages. A watermark owner can insist on copyright of an image after comparing a correlation between the extracted watermark and the original watermark if it is larger than the threshold. Also, the incremental watermark extraction determines the extraction time of a watermark by the level of distortion. The proposed technique through performance evaluation displayed that it was robust in geometric distortion than the existing watermarking technique.

  • PDF

Scalable Digital Watermarking Techniques for Optimal Distributed Contents (최적의 분산 컨텐츠를 위한 다중 계층 디지털 워터마킹 기법)

  • Seo Jung-Hee;Park Hung-Bog
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.291-300
    • /
    • 2005
  • We are required to adequately adjust the distributed contents to each device and users' demands on the network and to obtain authentication of ownership for our information to prevent the illegal usage of our digital information by non-owners. In this paper, we propose scalable digital watermarking of contents within a compression domain based on Orthogonal Forward Wavelet Transforms, and the proposed method focuses on robust watermark algorithms that are not visually recognizable to embedded ownership information. Therefore, it proposes a watermark insertion methods based on spread spectrum techniques and Provides a watermark key. As a result, it not only extracted the contained watermark from the intentionally altered images, but also secured the watermark information extraction from partial images and ensure the decrease of BER (Bit Error Rate) in the images containing watermarks even when more watermark inserted images are transmitted.

A Study on the Peirce's Semiotics and Understanding of Symbol Marks (퍼어스 기호론과 심볼마크의 이해)

  • Hwang, Hyun-Taik
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.5-16
    • /
    • 2005
  • As for the public, it is hard to understand semiotics because of the scope of an enormous semiotics education. This study is making semiotics of Charles Sanders Peirce the subject. I thought that utilization can hold his semiotics study in a visual design field. First of all, this study considered design related papers related to the existing semiotics again and study found an error of the existing semiotics study and understanding did category concept with re-definition about semiotics of Peirce. Explained a symbol mark through understanding of semiotics of Peirce. This study was able to get the following conclusion through these results. 1) A symbol mark means one product, sonics, company oneself with a custom. Therefore, it is a rule symbol in the Representation side. 2) A symbol mark symbolizes an object with one symbol, so a symbol mark is a symbol in an object. 3) Because a symbol mark exists through a social rule, in semiotics definition of Peirce, this must become understanding with a Argument symbol. 4) A symbol mark is what a company or an organization field used from the past, and the public are recognizing this how. Therefore, it works as fact a company attaches a symbol mark to own product, and to show the public a symbol mark. A symbol mark is Dicent Sign in Interpretant. A rule and understanding about a lot of types which have various mutual relation, Peirce classification and understanding of a symbol mark tells to demand is holding that understanding a type of semiotics with the concept that is not an image to us.

  • PDF

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

The High-Reliable Image Authentication Technique using Histogram Compensation (히스토그램 보정을 이용한 고신뢰성 영상 인증 기법)

  • Kim, Hyo-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1088-1094
    • /
    • 2010
  • Image authentication algorithms have to discriminate forged contents in the various critical fields of military, medical services, digital documents. They must ensure perceptual invisibility and fragility against malicious attacks. It is desirable that watermarking algorithms support sufficient insertion capacity and blind feature. And, high reliable algorithms that can eliminate false-positive and false-negative errors are needed in the watermark extraction process. In this paper, we control coefficients of high frequency band in a DCT domain and compensate brightness histogram for high reliability. As a result, we found that the proposed algorithm guarantee various requirements such as perceptual invisibility with high PSNR values, fragility, high reliability and blind feature. In addition, experiment results show that the proposed algorithm can be used steganographic applications by sufficient capacity of watermark.

A New Watermarking Algorithm for Copyright Protection of Stereoscopic Image (스테레오 영상의 소유권 보호를 위한 워터마킹 기법)

  • Seo, Young-Ho;Koo, Ja-Myung;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1663-1674
    • /
    • 2012
  • In this paper, we propose a new watermarking technique for copyright protection of stereo image. The proposed technique embeds watermark to the region which corresponds to occlusion of the disparity map to be extracted by the proposed stereo matching and the frequency coefficient with the appropriate value. We use discrete wavelet transform for frequency transform tool. The proposed algorithm consists of stereo matching, watermark rearrange, mark space selection, and watermark embedding/extracting. We tested the experiment about 4 stereo images which are from Middlebury site. We embedded the watermark to 4 stereo images and extracted it from the images after attacks. We also visually analyzed the watermark embedding images in 3D TV environment.