• Title/Summary/Keyword: Image technique

Search Result 5,841, Processing Time 0.035 seconds

Development of Camera-Based Measurement System for Crane Spreader Position using Foggy-degraded Image Restoration Technique

  • Kim, Young-Bok
    • Journal of Navigation and Port Research
    • /
    • v.35 no.4
    • /
    • pp.317-321
    • /
    • 2011
  • In this paper, a foggy-degraded image restoration technique with a physics-based degradation model is proposed for the measurement system. When the degradation model is used for the image restoration, its parameters and a distance from the spreader to the camera have to be previously known. In the proposed image restoration technique, the parameters are estimated from variances and averages of intensities on two foggy-degraded landmark images taken at different distances. Foggy-degraded images can be restored with the estimated parameters and the distance measured by the measurement system. On the basis of the experimental results, the performance of the proposed foggy-degraded image restoration technique was verified.

Image Watermarking Algorithm using Spatial Encryption (공간적 암호화를 사용하는 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.485-488
    • /
    • 2020
  • In this paper, a technique for securely concealing the watermark, which is intellectual property information, in the image pixel LSB using spatial encryption is proposed. The proposed watermarking technique can be effectively used to protect intellectual property of images. The proposed technique can be used to extract watermark without loss from the stego-image, which is a hidden image of spatially encrypted watermark. The experimental results confirmed the superiority of the proposed technique. As a result of performing watermarking using the proposed technique, the image quality of the stego-image is higher than 51 dB, so humans cannot visually recognize the presence of a watermark. Due to the watermark is spatially encrypted, the security of the watermark is excellent.

Adaptive Histogram Projection And Detail Enhancement for the Visualization of High Dynamic Range Infrared Images

  • Lee, Dong-Seok;Yang, Hyun-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.23-30
    • /
    • 2016
  • In this paper, we propose an adaptive histogram projection technique for dynamic range compression and an efficient detail enhancement method which is enhancing strong edge while reducing noise. First, The high dynamic range image is divided into low-pass component and high-pass component by applying 'guided image filtering'. After applying 'guided filter' to high dynamic range image, second, the low-pass component of the image is compressed into 8-bit with the adaptive histogram projection technique which is using global standard deviation value of whole image. Third, the high-pass component of the image adaptively reduces noise and intensifies the strong edges using standard deviation value in local path of the guided filter. Lastly, the monitor display image is summed up with the compressed low-pass component and the edge-intensified high-pass component. At the end of this paper, the experimental result show that the suggested technique can be applied properly to the IR images of various scenes.

Development of Simulation Model for Diffusion of Oil Spill in the Ocean (III) - Oil-droplet spreading measurement using 3-dimensional digital image processing technique- (해양유출기름의 확산 시뮬레이션 모델개발 (III) -3차원 디지털화상처리를 이용한 유적의 퍼짐 계측 -)

  • 이중우;도덕희;김기철;강신영
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.6 no.1
    • /
    • pp.47-55
    • /
    • 2000
  • A three-dimensional digital image processing technique is proposed to quantitatively predict the dispersion phenomena of oil droplet onto the surface of the water. This technique is able to get the dispersion rate of an oil droplet three-dimensionally just below the surface of the water over time. The obtained dispersion rate obtained through this technique is informative to the investigation into the relationship among the gravity, surface tensions between oil, water, and air. This technique is based upon the three-dimensional PIV(Particle Imaging Velocimetry) technique and its system mainly consists of a three CCD(Charge Coupled Device) cameras, an image grabber, and a host computer in which an image processing algorithm is adopted for the acquisition of dispersion rate oil an oil droplet.

  • PDF

Automatic image interpretation technique using DCT coefficient directivity information (DCT 계수 방향성을 이용한 자동 영상 판단 기법)

  • 서동진;나상일;이웅희;정동석
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.95-98
    • /
    • 2003
  • DCT or Wavelet based on Image compression technique occurred to compression artifact. In order to remove this problem, we can apply many improvement algorithms. But in these cases, these algolithms resulted in bad results against the good quality image. Therefore this paper proposes an automatic image interpretation technique not to apply to the good quality images. In this paper, we exploit the basic nature of DCT.

  • PDF

Evaluation of the Image Blurring in the Fast Spin Echo Technique ccording to Variation of the ETL (고속스핀에코기법을 이용한 MRI검사에서 ETL 변화에 따른 영상 blurring의 평가)

  • Kwon, Soon-Yong;Lim, Woo-Taek;Kang, Chung-Hawn;Kim, Kyeong-Soo;Kim, Soon-Bae;Kim, Hyun-Soo
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.15 no.2
    • /
    • pp.55-61
    • /
    • 2013
  • The purpose of this study is to evaluate image blurring according to variation of the ETL and propose the clinically appropriate ETL range. SIEMENS MAGNETOM Skyra 3.0T and 20 channel head coil were used for the study. MRI phantom was kept the lines horizontally to three direction(X,Y,Z) of the coil and T1, T2 weighted images that used the fast spin echo technique acquired. The ETL with increase of 10 was applied from 10 to 80. In addition, the ETL with increase of 1 was applied in the interval statistically significant differences occurred. And T1, T2 weighted images that used the conventional spin echo technique acquired to compare image blurring of the images that used the fast spin echo technique. The slope of lattice in the images was measured using Image J 1.47v program to evaluate image blurring. And image blurring was determined by the degree of the slope. The statistical significance of both techniques was evaluated by the Kruskal-Wallis test of the SPSS 17.0v. And the correlation of the ETL and image blurring was evaluated quantitatively by regression analysis. The slope of the T1, T2 weighted images that used fast spin echo technique decreased as contrasted with conventional spin echo technique. In the result of the Kruskal-Wallis test, the T1, T2 weighted images that used fast spin echo technique made a significant difference with conventional spin echo technique. Particularly, in the Tomhane' T2 test, the T1, T2 weighted images made a significant difference from ETL 22 and 31 respectively. In the result of the regression analysis, the R-squared of the T1, T2 weighted images are 0.762 and 0.793. It is difficult to apply the long ETL in the T1 weighted image caused by the short TR and multi-slices study. Therefore, clinical impact according to variation of the ETL is very slight in the T1 weighted images. But the application of the proper ETL is demanded in T2 weighted images using the fast spin echo technique in order to prevent image blurring.

  • PDF

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

Magnetic Resonance Brain Image Contrast Enhancement Using Histogram Equalization Techniques (히스토그램 평형 기법을 이용한 자기 공명 두뇌 영상 콘트라스트 향상)

  • Ullah, Zahid;Lee, Su-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.83-86
    • /
    • 2019
  • Histogram equalization is extensively used for image contrast enhancement in various applications due to its effectiveness and its modest functions. In image research, image enhancement is one of the most significant and arduous technique. The image enhancement aim is to improve the visual appearance of an image. Different kinds of images such as satellite images, medical images, aerial images are affected from noise and poor contrast. So it is important to remove the noise and improve the contrast of the image. Therefore, for this purpose, we apply a median filter on MR image as the median filter remove the noise and preserve the edges effectively. After applying median filter on MR image we have used intensity transformation function on the filtered image to increase the contrast of the image. Than applied the histogram equalization (HE) technique on the filtered image. The simple histogram equalization technique over enhances the brightness of the image due to which the important information can be lost. Therefore, adaptive histogram equalization (AHE) and contrast limited histogram equalization (CLAHE) techniques are used to enhance the image without losing any information.

  • PDF

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.