• Title/Summary/Keyword: Image-Number Theory

Search Result 66, Processing Time 0.031 seconds

Content Description on a Mobile Image Sharing Service: Hashtags on Instagram

  • Dorsch, Isabelle
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.2
    • /
    • pp.46-61
    • /
    • 2018
  • The mobile social networking application Instagram is a well-known platform for sharing photos and videos. Since it is folksonomy-oriented, it provides the possibility for image indexing and knowledge representation through the assignment of hashtags to posted content. The purpose of this study is to analyze how Instagram users tag their pictures regarding different kinds of picture and hashtag categories. For such a content analysis, a distinction is made between Food, Pets, Selfies, Friends, Activity, Art, Fashion, Quotes (captioned photos), Landscape, and Architecture image categories as well as Content-relatedness (ofness, aboutness, and iconology), Emotiveness, Isness, Performativeness, Fakeness, "Insta"-Tags, and Sentences as hashtag categories. Altogether, 14,649 hashtags of 1,000 Instagram images were intellectually analyzed (100 pictures for each image category). Research questions are stated as follows: RQ1: Are there any differences in relative frequencies of hashtags in the picture categories? On average the number of hashtags per picture is 15. Lowest average values received the categories Selfie (average 10.9 tags per picture) and Friends (average 11.7 tags per picture); for highest, the categories Pet (average 18.6 tags), Fashion (average 17.6 tags), and Landscape (average 16.8 tags). RQ2: Given a picture category, what is the distribution of hashtag categories; and given a hashtag category, what is the distribution of picture categories? 60.20% of all hashtags were classified into the category Content-relatedness. Categories Emotiveness (about 4.38%) and Sentences (0.99%) were less often frequent. RQ3: Is there any association between image categories and hashtag categories? A statistically significant association between hashtag categories and image categories on Instagram exists, as a chi-square test of independence shows. This study enables a first broad overview on the tagging behavior of Instagram users and is not limited to a specific hashtag or picture motive, like previous studies.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

Blocking-Artifact Reduction using Projection onto Adaptive Quantization Constraint Set (적응 양자화 제한 집합으로의 투영을 이용한 블록 현상 제거)

  • 정연식;김인겸
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.1
    • /
    • pp.79-86
    • /
    • 2003
  • A new quantization constraint set based on the theory of Projection onto Convex Set(POCS) is proposed to reduce blocking artifact appearing in block-coded images. POCS-based postprocessing for alleviating the blocking artifact consists of iterative projections onto smoothness constraint set and quantization constraint set, respectively. In general, the conventional quantization constraint set has the maximum size of range where original image data can be included, therefore over-blurring of restored image is unavoidable as iteration proceeds. The projection onto the proposed quantization constraint set can reduce blocking artifact as well as maintain the clearness of the decoded image, since it controls adaptively the size of quantization constraint set according to the DCT coefficients. Simulation results using the proposed quantization constraint set as a substitute for conventional quantization constraint set show that the blocking artifact of the decoded image can be reduced by the small number of iterations, and we know that the postprocessed image maintains the distinction of the decoded image.

A Study on the Multiresolutional Coding Based on Spline Wavelet Transform (스플라인 웨이브렛 변환을 이용한 영상의 다해상도 부호화에 관한 연구)

  • 김인겸;정준용;유충일;이광기;박규태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.12
    • /
    • pp.2313-2327
    • /
    • 1994
  • As the communication environment evolves, there is an increasing need for multiresolution image coding. To meet this need, the entrophy constratined vector quantizer(ECVQ) for coding of image pyramids by spline wavelet transform is introduced in this paper. This paper proposes a new scheme for image compression taking into account psychovisual feature both in the space and frequency domains : this proposed method involves two steps. First we use spline wavelet transform in order to obtain a set of biorthogonal subclasses of images ; the original image is decomposed at different scale using a pyramidal algorithm architecture. The decomposition is along the vertical and horizontal directions and maintains constant the number of pixels required the image. Second, according to Shannon's rate distortion theory, the wavelet coefficients are vectored quantized using a multi-resolution ECVQ(entropy-constrained vector quantizer) codebook. The simulation results showed that the proposed method could achieve higher quality LENA image improved by about 2.0 dB than that of the ECVQ using other wavelet at 0.5 bpp and, by about 0.5 dB at 1.0 bpp, and reduce the block effect and the edge degradation.

  • PDF

A Compressive Sensing Based Imaging Algorithm Using Incoherent Measurements and DCT (저상관도 측정치와 DCT를 이용한 압축센싱 기반 영상 획득 알고리듬)

  • Kim, Seehyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1961-1966
    • /
    • 2016
  • Compressive sensing has proved that a signal can be restored from less samples than the Nyquist rate. Reducing the required data rate is essential for a variety of fields including compression, transmission, and storage. It has been made lots of attempt to apply the compressive sensing theory into data intensive fields, such as image processing which needs to cover 4K and 8K pictures. In this paper, an image acquisition algorithm based on compressive sensing is proposed. It combines DCT, which can compact the energy of a image into a few coefficients, and the Noiselet transform, which is incoherent with DCT. The DCT coefficients represent the coarse structure of the images while the Noiselet information holds the fine details. Performance experiments with several images show that the proposed image acquisition algorithm not only outperforms the previous results, but also improves the reconstruction quality faster as the number of measurements increases.

A pre-stack migration method for damage identification in composite structures

  • Zhou, L.;Yuan, F.G.;Meng, W.J.
    • Smart Structures and Systems
    • /
    • v.3 no.4
    • /
    • pp.439-454
    • /
    • 2007
  • In this paper a damage imaging technique using pre-stack migration is developed using Lamb (guided) wave propagation in composite structures for imaging multi damages by both numerical simulations and experimental studies. In particular, the paper focuses on the experimental study using a finite number of sensors for future practical applications. A composite laminate with a surface-mounted linear piezoelectric ceramic (PZT) disk array is illustrated as an example. Two types of damages, one straight-crack damage and two simulated circular-shaped delamination damage, have been studied. First, Mindlin plate theory is used to model Lamb waves propagating in laminates. The group velocities of flexural waves in the composite laminate are also derived from dispersion relations and validated by experiments. Then the pre-stack migration technique is performed by using a two-dimensional explicit finite difference algorithm to back-propagate the scattered energy to the damages and damages are imaged together with the excitation-time imaging conditions. Stacking these images together deduces the resulting image of damages. Both simulations and experimental results show that the pre-stack migration method is a promising method for damage identification in composite structures.

A Study on the Color Collection of Real Image Using the Triplicated Piecewise Bezier Cubic-Curve (3중첩 구간적 베지어 3차 곡선을 이용한 실사 영상의 컬러 보정에 관한 연구)

  • 권희용;이지영
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2002
  • Due to non-linear characteristics of color spaces, color corrections using linear conversions for real image near color reappearance causes color distortions. In order to overcome this problem, the Bezier Curve, constructed with a set of arbitrary plane in the linear theory, has been used. However, the Bezier Curve increases in proportion to the number of data points, resulting in higher computational complexities. This paper attempts to use a Triplicated Piecewise Bezier Cubic-Curve (TPBC-Curve) of which the degree is cubic on the whole interval while keeping the characteristics of Bezier Curves. By Comparing the TPBC-Curve with Bezier Curve of 20 degree, the paper not only reduces the distortion during color correction but also lessens the relative increase of workload that is caused by the color correction in a small zone.

  • PDF

Fast-Converging Algorithm for Wavefront Reconstruction based on a Sequence of Diffracted Intensity Images

  • Chen, Ni;Yeom, Jiwoon;Hong, Keehoon;Li, Gang;Lee, Byoungho
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.3
    • /
    • pp.217-224
    • /
    • 2014
  • A major advantage of wavefront reconstruction based on a series of diffracted intensity images using only single-beam illumination is the simplicity of setup. Here we propose a fast-converging algorithm for wavefront calculation using single-beam illumination. The captured intensity images are resampled to a series of intensity images, ranging from highest to lowest resampling; each resampled image has half the number of pixels as the previous one. Phase calculation at a lower resolution is used as the initial solution phase at a higher resolution. This corresponds to separately calculating the phase for the lower- and higher-frequency components. Iterations on the low-frequency components do not need to be performed on the higher-frequency components, thus making the convergence of the phase retrieval faster than with the conventional method. The principle is verified by both simulation and optical experiments.

A Comparative Study of Image Recognition by Neural Network Classifier and Linear Tree Classifier (신경망 분류기와 선형트리 분류기에 의한 영상인식의 비교연구)

  • Young Tae Park
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.5
    • /
    • pp.141-148
    • /
    • 1994
  • Both the neural network classifier utilizing multi-layer perceptron and the linear tree classifier composed of hierarchically structured linear discriminating functions can form arbitrarily complex decision boundaries in the feature space and have very similar decision making processes. In this paper, a new method for automatically choosing the number of neurons in the hidden layers and for initalzing the connection weights between the layres and its supporting theory are presented by mapping the sequential structure of the linear tree classifier to the parallel structure of the neural networks having one or two hidden layers. Experimental results on the real data obtained from the military ship images show that this method is effective, and that three exists no siginificant difference in the classification acuracy of both classifiers.

  • PDF