• Title/Summary/Keyword: Image Signature

Search Result 143, Processing Time 0.029 seconds

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment (클라우드 네이티브 환경을 위한 오픈소스 기반 모니터링 서비스 간편 배포 및 이미지 서명 검사기 구현)

  • Gwak, Songi;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.637-645
    • /
    • 2022
  • Cloud computing has been gaining popularity over decades, and container, a technology that is primarily used in cloud native applications, is also drawing attention. Although container technologies are lighter and more capable than conventional VMs, there are several security threats, such as sharing kernels with host systems or uploading/downloading images from the image registry. one of which can refer to the integrity of container images. In addition, runtime security while the container application is running is very important, and monitoring the behavior of the container application at runtime can help detect abnormal behavior occurring in the container. Therefore, in this paper, first, we implement a signing checker that automatically checks the signature of an image based on the existing Docker Content Trust (DCT) technology to ensure the integrity of the container image. Next, based on falco, an open source project of Cloud Native Computing Foundation(CNCF), we introduce newly created image for the convenience of existing falco image, and propose implementation of docker-compose and package configuration that easily builds a monitoring system.

Implementation of Virtual Maritime Environment for LWIR Homing Missile Test (원적외선 호밍 유도탄 시험을 위한 가상 해상 환경의 구현)

  • Park, Hyeryeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.2
    • /
    • pp.185-194
    • /
    • 2016
  • It is essential for generating the synthetic image to test and evaluate a guided missile system in the hardware-in-the-loop simulation. In order to make the evaluation results to be more reliable, the extent of fidelity and rendering performance of the synthetic image cannot be left ignored. There are numerous challenges to simulate the LWIR sensor signature of sea surface depending on the incident angle, especially in the maritime environment. In this paper, we investigate the key factors in determining the apparent temperature of sea surface and propose the approximate formula consisting of optical characteristics of sea surface and sky radiance. We find that the greater the incident angle increases, the larger the reflectivity of sea surface, and the greater the water vapor concentration in atmosphere increases, the larger the amount of sky radiance. On the basis of this information, we generate the virtual maritime environment in LWIR region using the SE-WORKBENCH, physically based rendering software. The margin of error is under seven percentage points.

Surface Topography Measurement and Analysis for Bullet and Casing Signature Identification (총기 인식을 위한 측정 시스템 구현 및 해석 알고리즘 개발)

  • Rhee, Hyug-Gyo;Lee, Yun-Woo;Vorburger Theodore Vincent;Reneger Tomas Brian
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.1
    • /
    • pp.47-53
    • /
    • 2006
  • The Integrated Ballistics Identification Systems (IBIS) is widely used for bullet and casing signature identification. The IBIS obtains a pair of ballistic signatures from two bullets (or casings) using optical microscopy, and estimates a correlation score which can represent the degree of signature match. However, this method largely depends on lighting and surface conditions because optical image contrast is primarily a function of test surface's slope, shadowing, multiple reflections, optical properties, and illumination direction. Moreover, it can be affected with surface height variation. To overcome these problems and improve the identification system, we used well known surface topographic techniques, such as confocal microscopy and white-light scanning interferometry. The measuring instruments were calibrated by a NIST step height standard and verified by a NIST sinusoidal profile roughness standard and a commercial roughness standard. We also suggest a new analysis method for the ballistic identification. In this method, the maximum cross-correlation function CCFmax is used to quantify the degree of signature match. If the compared signatures were exactly the same, CCFmax would be $100\%$.

A Watermarking Scheme to Extract the Seal Image without the Original Image (원본정보 없이 씰영상의 추출이 가능한 이미지 워터마킹 기법)

  • Kim, Won-Gyum;Lee, Jong-Chan;Lee, Won-Don
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3885-3895
    • /
    • 2000
  • The emergence of digital imaging and digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. In the last few years, a large number of schemes have heen proposed for hiding copyright marks and other information in digital image, video, audio and other multimedia objects. In this paper, we propose a technique for embedding the watermark of visually recognizable patterns into the frequency domain of images. The embedded watermark can be retrieved from the decoded sequence witbout knowledge of the original. Because the source image is not required to extract the watermark, one cannot make the fake original that is invertible to watermarking scheme from the waternlarked image. In order to recover the embedded signature data without knowledge of the original, a prediction of the original value of the pixel containing the information is needed. The prediction is based on a averaging of amplitude values in a neighborhood around the pixel itself. Additionally the projxJsed technique could survive several kinds of image processings including JPEG lossy compression.

  • PDF

An Investigation Into 3-, 4-, and 5-Year-Old Children's Nonsymbolic Magnitude Comparison Ability According to Ratio Limit and Task Condition (비율제한 및 과제제시방법에 따른 3, 4, 5세 유아의 비상징 수 비교능력)

  • Cho, Woomi;Yi, Soon-Hyung
    • Korean Journal of Child Studies
    • /
    • v.38 no.1
    • /
    • pp.117-126
    • /
    • 2017
  • Objective: The purpose of this study was to investigate young children's nonsymbolic magnitude comparison ability according to ratio limit and task condition. Methods: The participants included 40 3-year-old children, 42 4-year-old children, and 41 5-year-old children recruited from 4 childcare centers located in Seoul, Korea. All magnitude comparison tasks were composed of image material tasks and concrete material tasks. In addition, each magnitude comparison task varied with the ratio of the two quantities; 0.5 ratio, 0.67 ratio, 0.75 ratio. Results and Conclusion: The results revealed that 3-, 4-, and 5-year-old children could perform nonsymbolic magnitude comparison tasks without learning experiences. Also, 3-, 4-, and 5-year-old children could perform concrete material tasks better than image material tasks in nonsymbolic magnitude comparison tasks. Furthermore, children's performance on nonsymbolic magnitude comparison tasks indicated the ratio signature of the approximate number system. Children have a degree of numerical capacity prior to formal mathematics instruction. Also, children were influenced by task conditions or sense stimulus when they processed numerical information. Furthermore, the approximate number system can be used in understanding the ordinality of number.

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.

Use of DNA-Specific Anthraquinone Dyes to Directly Reveal Cytoplasmic and Nuclear Boundaries in Live and Fixed Cells

  • Edward, Roy
    • Molecules and Cells
    • /
    • v.27 no.4
    • /
    • pp.391-396
    • /
    • 2009
  • Image-based, high-content screening assays demand solutions for image segmentation and cellular compartment encoding to track critical events - for example those reported by GFP fusions within mitosis, signalling pathways and protein translocations. To meet this need, a series of nuclear/cytoplasmic discriminating probes have been developed: DRAQ5$^{TM}$ and CyTRAK Orange$^{TM}$. These are spectrally compatible with GFP reporters offering new solutions in imaging and cytometry. At their most fundamental they provide a convenient fluorescent emission signature which is spectrally separated from the commonly used reporter proteins (e.g. eGFP, YFP, mRFP) and fluorescent tags such as Alexafluor 488, fluorescein and Cy2. Additionally, they do not excite in the UV and thus avoid the complications of compound UV-autofluorescence in drug discovery whilst limiting the impact of background sample autofluorescence. They provide a convenient means of stoichiometrically labelling cell nuclei in live cells without the aid of DMSO and can equally be used for fixed cells. Further developments have permitted the simultaneous and differential labelling of both nuclear and cytoplasmic compartments in live and fixed cells to clearly render the precise location of cell boundaries which may be beneficial for quantitative expression measurements, cell-cell interactions and most recently compound in vitro toxicology testing.

Modeling and Analysis of Radar Target Signatures in the VHF-Band Using Fast Chirplet Decomposition (고속 Chirplet 분리기법을 이용한 VHF 대역 레이더 표적신호 모델링 및 해석)

  • Park, Ji-hoon;Kim, Si-ho;Chae, Dae-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.475-483
    • /
    • 2019
  • Although radar target signatures(RTS), such as range profiles have played an important role for target recognition in the X-band radar, they would be less effective when a target is designed to have low radar cross section(RCS). Recently, a number of research groups have conducted the studies on the RTS in the VHF-band where such targets can be better detected than in the X-band. However, there is a lack of work carried out on the mathematical description of the VHF-band RTS. In this paper, chirplet decomposition is employed for modeling of the VHF-band RTS and its performance is compared with that of existing scattering center model generally used for the X-band. In addition, the discriminative signal analysis is performed by chirplet parameterization of range profiles from in an ISAR image. Because the chirplet decomposition takes long computation time, its fast form is further proposed for enhanced practicality.

RNSXI(real-name shooting X-ray of inspector) Settlement Realization applying PACS Database, In Digital Medical environment (PACS Database를 활용한 촬영실명제 정착화 실현)

  • Kang, Ji-Youn;Lee, Lae-Gon;Kang, Doo-Hee;Lee, Hwa-Sun;Hwang, Sun-Gwang
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.9 no.2
    • /
    • pp.5-9
    • /
    • 2007
  • As developing the medical treatment image portion with the change of these times, PACS, which is able to digitalize image portion data, has a lot of data-based image data. Applying this PACS, we would like to settle down RNSXI(real-name shooting X -ray of inspector) system. We interviewed with P ACS's operators of university hospitals which is using PACS in Seoul about the present conditions whether using of RNSXI or not. And we inquired the RNSXI equipments, applying PACS database, and Interface conditions undertook to do in our hospital. All university hospitals in Seoul are set up the P ACS system. But no hospital use the RNSXI. In our hospital, we can check inspector' name or initials who exposure x-ray with the PACS Viewer by looking over equipments(CR, DR, US, MG, MR, CT) and Interface of the DICOM Header data. However, some equipments like RF and Angio can not check inspector' name or initials. Under the Film/System environment, RNSXI system has been used frequently like that inspector's signature or initial added to a patient data. Though the digital medical treatment was developed, RNSXI system was declined. It is necessary to using RNSXI system in order to improving radiologists' rights, even if it is not under the application of the medical treatment image laws. If RNSXI system use, radiologists should specialize in their major and the Repeat rate should be reduced. In environment of PACS, RNSXI system can be used by linking both the equipments and the Interface with a production enterprise of P ACS. Therefore RNSXI system applying the P ACS datebase should settle down in our medical system for being provided lots of data.

  • PDF