• Title/Summary/Keyword: Image Signature

Search Result 143, Processing Time 0.031 seconds

An Extended Concept-based Image Retrieval System : E-COIRS (확장된 개념 기반 이미지 검색 시스템)

  • Kim, Yong-Il;Yang, Jae-Dong;Yang, Hyoung-Jeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.303-317
    • /
    • 2002
  • In this paper, we design and implement E-COIRS enabling users to query with concepts and image features used for further refining the concepts. For example, E-COIRS supports the query "retrieve images containing black home appliance to north of reception set. "The query includes two types of concepts: IS-A and composite. "home appliance"is an IS-A concept, and "reception set" is a composite concept. For evaluating such a query. E-COIRS includes three important components: a visual image indexer, thesauri and a query processor. Each pair of objects in an mage captured by the visual image indexer is converted into a triple. The triple consists of the two object identifiers (oids) and their spatial relationship. All the features of an object is referenced by its old. A composite concept is detected by the triple thesaurus and IS-A concept is recolonized by the fuzzy term thesaurus. The query processor obtains an image set by matching each triple in a user with an inverted file and CS-Tree. To support efficient storage use and fast retrieval on high-dimensional feature vectors, E-COIRS uses Cell-based Signature tree(CS-Tree). E-COIRS is a more advanced content-based image retrieval system than other systems which support only concepts or image features.

Robust pattern watermarking using wavelet transform and multi-weights (웨이브렛 변환과 다중 가중치를 이용한 강인한 패턴 워터마킹)

  • 김현환;김용민;김두영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.557-564
    • /
    • 2000
  • This paper presents a watermarking algorithm for embedding visually recognizable pattern (Mark, Logo, Symbol, stamping or signature) into the image. first, the color image(RGB model)is transformed in YCbCr model and then the Y component is transformed into 3-level wavelet transform. Next, the values are assembled with pattern watermark. PN(pseudo noise) code at spread spectrum communication method and mutilevel watermark weights. This values are inserted into discrete wavelet domain. In our scheme, new calculating method is designed to calculate wavelet transform with integer value in considering the quantization error. and we used the color conversion with fixed-point arithmetic to be easy to make the hardware hereafter. Also, we made the new solution using mutilevel threshold to robust to common signal distortions and malicious attack, and to enhance quality of image in considering the human visual system. the experimental results showed that the proposed watermarking algorithm was superior to other similar water marking algorithm. We showed what it was robust to common signal processing and geometric transform such as brightness. contrast, filtering. scaling. JPEG lossy compression and geometric deformation.

  • PDF

Detection of Subsurface Defects in Metal Materials Using Infrared Thermography; Image Processing and Finite Element Modeling

  • Ranjit, Shrestha;Kim, Won Tae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.2
    • /
    • pp.128-134
    • /
    • 2014
  • Infrared thermography is an emerging approach to non-contact, non-intrusive, and non-destructive inspection of various solid materials such as metals, composites, and semiconductors for industrial and research interests. In this study, data processing was applied to infrared thermography measurements to detect defects in metals that were widely used in industrial fields. When analyzing experimental data from infrared thermographic testing, raw images were often not appropriate. Thus, various data analysis methods were used at the pre-processing and processing levels in data processing programs for quantitative analysis of defect detection and characterization; these increased the infrared non-destructive testing capabilities since subtle defects signature became apparent. A 3D finite element simulation was performed to verify and analyze the data obtained from both the experiment and the image processing techniques.

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

  • Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.775-792
    • /
    • 2015
  • Person re-identification is an important and challenging task in computer vision with numerous real world applications. Despite significant progress has been made in the past few years, person re-identification remains an unsolved problem. This paper presents a novel appearance-based approach to person re-identification. The approach exploits region covariance matrix and color histograms to capture the statistical properties and chromatic information of each object. Robustness against low resolution, viewpoint changes and pose variations is achieved by a novel signature, that is, the combination of Log Covariance Matrix feature and HSV histogram (LCMH). In order to further improve re-identification performance, third-party image sets are utilized as a common reference to sufficiently represent any image set with the same type. Distinctive and reliable features for a given image set are extracted through decision boundary between the specific set and a third-party image set supervised by max-margin criteria. This method enables the usage of an existing dataset to represent new image data without time-consuming data collection and annotation. Comparisons with state-of-the-art methods carried out on benchmark datasets demonstrate promising performance of our method.

Integrated CI Planning and Design of Green Tourism Village for Image Distinction (녹색관광마을의 이미지 차별화를 위한 CI통합계획)

  • Yun Hee-Jeong
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.34 no.2 s.115
    • /
    • pp.72-79
    • /
    • 2006
  • Integrated CI (country identity, community identity) planning is necessary for establishing identity and a distinct image as well as for managing green tourism villages. In addition, CI planning will be helpful for improving and advertising a village's image, capitalizing on its specialties and attracting many visitors to the village. Therefore, this study mainly intended to plan and design integrated CI for a green tourism village. For this purpose, this study selected Hari village in Hongsung-Kun, Chungnam province, which the Ministry of Agriculture and Forestry designated as a green tourism village in 2003. Twenty CI alternatives were developed, and a vote was conducted with 143 visitors and rural residents attending a village festival in 2004. This study resulted in a new brand-name, 'Hanuri,' and developed symbols, logotypes, distinctive colors, signature system as a basic system and name cards, packaging materials, and signs for use. Above all, this study led the residents to pursue a village identity, village image and community spirit, which can be an effective management strategy to create a distinct image in a green tourism village.

Binary Image Watermarking for Preserving Feature Regions (특징영역을 보존한 이진영상의 워터마킹)

  • 이정환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.624-631
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First a binary image is grouped into feature regions which has geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

Binary Image Watermarking Based on Grouping Feature Regions (특수런을 이용한 특징영역 분리에 의한 이진영상 워터마킹)

  • 이정환;박세현;노석호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.177-180
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First, a binary image is grouped into feature regions which have geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied to some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

  • PDF

A Object-Based Image Retrieval Using Feature Analysis and Fractal Dimension (특징 분석과 프랙탈 차원을 이용한 객체 기반 영상검색)

  • 이정봉;박장춘
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.173-186
    • /
    • 2004
  • This paper proposed the content-based retrieval system as a method for performing image retrieval through the effective feature extraction of the object of significant meaning based on the characteristics of man's visual system. To allow the object region of interest to be primarily detected, the region, being comparatively large size, greatly different from the background color and located in the middle of the image, was judged as the major object with a meaning. To get the original features of the image, the cumulative sum of tile declination difference vector the segment of the object contour had and the signature of the bipartite object were extracted and used in the form of being applied to the rotation of the object and the change of the size after partition of the total length of the object contour of the image into the normalized segment. Starting with this form feature, it was possible to make a retrieval robust to any change in translation, rotation and scaling by combining information on the texture sample, color and eccentricity and measuring the degree of similarity. It responded less sensitively to the phenomenon of distortion of the object feature due to the partial change or damage of the region. Also, the method of imposing a different weight of similarity on the image feature based on the relationship of complexity between measured objects using the fractal dimension by the Boxing-Counting Dimension minimized the wrong retrieval and showed more efficient retrieval rate.

  • PDF

Design of Three-dimensional Face Recognition System Using Optimized PRBFNNs and PCA : Comparative Analysis of Evolutionary Algorithms (최적화된 PRBFNNs 패턴분류기와 PCA알고리즘을 이용한 3차원 얼굴인식 알고리즘 설계 : 진화 알고리즘의 비교 해석)

  • Oh, Sung-Kwun;Oh, Seung-Hun;Kim, Hyun-Ki
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.539-544
    • /
    • 2013
  • In this paper, we was designed three-dimensional face recognition algorithm using polynomial based RBFNNs and proposed method to calculate the recognition performance. In case of two-dimensional face recognition, the recognition performance is reduced by the external environment like facial pose and lighting. In order to compensate for these shortcomings, we perform face recognition by obtaining three-dimensional images. obtain face image using three-dimension scanner before the face recognition and obtain the front facial form using pose-compensation. And the depth value of the face is extracting using Point Signature method. The extracted data as high-dimensional data may cause problems in accompany the training and recognition. so use dimension reduction data using PCA algorithm. accompany parameter optimization using optimization algorithm for effective training. Each recognition performance confirm using PSO, DE, GA algorithm.

Real-time Event Processing Role Management System for IFTTT Service (IFTTT 서비스를 위한 실시간 이벤트 처리 룰 관리 시스템)

  • Kim, KyeYoung;Lee, HyunDong;Cho, Dae-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1379-1386
    • /
    • 2017
  • As the Internet of Things evolves, various IoT services are provided. IFTTT is an abbreviation for If This Then That and refers to a service that links different web-based services. This paper proposes a system that generates and manages rules that combine the possibility of IFTTT service and the real-time event processing according to the concept of IoT service. Conventional database-based data processing methods are burdened to process a lot of data of IoT devices coming in real-time. The IoT device's data can be classified into formal data such as the amount of power, temperature value and position information, and informal data such as video or image data. Thus, this system classifies the data stream of IoT devices coming in real-time using the CEP engine Esper into a file signature table, classifies the formal/informal data, and shows the condition of the device data defined by the user and the service to be provided by applying the service.