• Title/Summary/Keyword: Robustness

Search Result 4,401, Processing Time 0.026 seconds

Multiple Barcode Watermarking Technique for Improve Robustness and Imperceptibility (강인성과 비지각성 향상을 위한 다중 바코드 워터마킹 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1723-1729
    • /
    • 2016
  • Digital watermarking is tried to get an optimum tradeoffs between its performance characteristics, robustness, transparency and capacity. This paper is, therefore, suggesting a watermarking technique that builds multiple barcodes in various frequency bands to implement embedded watermarks that is imperceptible and robust against various attacks. Even though a watermark technique with duplicated barcode watermarks embedded in various frequency bands can satisfy robustness as there is high possibility that watermarks embedded in an image remains after various attacks, the duplicated barcode data can weaken imperceptibility. Thus, to satisfy the conflicting characteristic requirements of watermarks, robustness and imperceptibility, different barcode data is embedded in each frequency band. The test shows that ownership authentication with the technique suggested in this thesis does not require specialized hardware, and extracted watermarks can be easily identified through a mobile barcode scanner app, which allows low complexity, low cost and swift identification.

HoloMarking: Digital Watermarking Method using Fresnel Hologram (홀로마킹: Fresnel 홀로그램을 이용한 디지털 워터마킹 기법)

  • Choi, Hyun-Jun;Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.604-610
    • /
    • 2009
  • This paper propose a digital watermarking method for digital contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm insert a watermark(digital hologram) by generated using Fresnel transform which improve the robustness. The inserting positions of the watermark choose by considering the frequency property of an image and a watermark. Also the amount of watermarking for watermark bit decide by considering the level of 2DDWT. This algorithm was implemented by C++ and experimented for invisibility and robustness with optical system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than 15%, which is enough in robustness against the attacks.

S-Band Low Noise Amplifier Based on GaN HEMT for High Input Power Robustness (고입력 내성을 위한 GaN HEMT 기반 S-대역 저잡음 증폭기)

  • Kim, Hong-Hee;Kim, Sang-Hoon;Choi, Jin-Joo;Choi, Gil-Wong;Kim, Hyoung-Joo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.2
    • /
    • pp.165-170
    • /
    • 2015
  • In this paper, we present design and measurement of LNA(Low Noise Amplifier) based on GaN HEMT(Gallium Nitride High Electron Mobility Transistor) to reduce the total noise figure of radar receiver and for robustness of LNA. In radar receiver using LNA based on GaAs(Gallium Arsenide) technology, limiter is necessary at the very front of the radar receiver to protect LNA. As a result, total noise figure of radar receiver is deteriorated. In this research, measured noise figure of LNA based on GaN HEMT is below 2 dB. In the case of commercialized GaAs LNA, recommended maximum input power is about 30 dBm. On the other hand, GaN HEMT LNA which is designed and measured is burned-out when input power is 43 dBm and robustness is guaranteed at input power 45.4 dBm.

Optimal Network Design for Enhancing the Precision of National Geodetic Network (국가 측지망의 정밀도 향상을 위한 최적 측지망 설계에 관한 연구)

  • Cho, Jae-Myoung;Yun, Hong-Sik;Wie, Gwang-Jae
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.6
    • /
    • pp.587-594
    • /
    • 2010
  • This paper describe the optimal design of geodetic network by analytical technique based on the quality criteria of network. We described an example of geodetic network design taking into account the precision, reliability and robustness that are the main criteria of network design. The main goal of this paper is to evaluate the criteria to design the geodetic network coinciding with the criteria of high precision(error ellipse, 2DRMS, CEP), reliability(internal and external reliability) and robustness(maximum shear strain, principal strain, dilatation). The network design parameters computed in this study show that precision and reliability has not much improved by about 2% and 3%, respectively, than the observed network, while robustness has much improved by about 3, 100%. It also shown that maximum errors of precision, reliability and robustness were reduced by 5%, 7% and 16,957%, respectively.

A Methodology for Evaluating Intrusion Detection System (침입탐지시스템 평가 방법론)

  • Yoo, Shin-Geun;Lee, Nam-Hoon;Shim, Young-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3445-3461
    • /
    • 2000
  • Although many different intrusion detectionsystems have been developed there have not been enough researches on the methodology for evaluating these intrusion delection systems. With this understanding,in this paper we present a methodology for evaluating infrusion detection systems from the view point of performance and robustness, both of which are considered the most important criteria Current research on evaluating the performance f intrusion detection systems mostly foduson the in issuse detection but not on the anormaly detection. Regarding evalieting robustness it is not easy to apply off -line methodologies and methods for testing robustness hae not been proposed in on -line methodolomes, In this paper we provide an systematic way of classifyin and generating anomalies and using this reult, present an methodology for evaluating the pertormance of intrusion detection systems in detecting anomaalies ans well as misuses . Moreover, ww study the factors that can damage the robustness of intrusion detection systems and suggest an methodology for assessing the robustness of intrusion detection systems.

  • PDF

Study of the Robustness Bounds with Lyapunoved-Based Stability Concept

  • Jo, Jang-Hyen
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.700-705
    • /
    • 2005
  • The purpose of this project is the derivation and development of techniques for the new estimation of robustness for the systems having uncertainties. The basic ideas to analyze the system which is the originally nonlinear is Lyapunov direct theorems. The nonlinear systems have various forms of terms inside the system equations and this investigation is confined in the form of bounded uncertainties. Bounded means the uncertainties are with same positive/negative range. The number of uncertainties will be the degree of freedoms in the calculation of the stability region. This is so called the robustness bounds. This proposition adopts the theoretical analysis of the Lyapunov direct methods, that is, the sign properties of the Lyapunov function derivative integrated along finite intervals of time, in place of the original method of the sign properties of the time derivative of the Lyapunov function itself. This is the new sufficient criteria to relax the stability condition and is used to generate techniques for the robust design of control systems with structured perturbations. Using this relaxing stability conditions, the selection of Lyapunov candidate function is of various forms. In this paper, the quadratic form is selected. this generated techniques has been demonstrated by recent research interest in the area of robust control design and confirms that estimation of robustness bounds will be improved upon those obtained by results of the original Lyapunov method. In this paper, the symbolic algebraic procedures are utilized and the calculating errors are reduced in the numerical procedures. The application of numerical procedures can prove the improvements in estimations of robustness for one-and more structured perturbations. The applicable systems is assumed to be linear with time-varying with nonlinear bounded perturbations. This new techniques will be extended to other nonlinear systems with various forms of uncertainties, especially in the nonlinear case of the unstructured perturbations and also with various control method.

  • PDF

Robustness Analysis of Predictor Feedback Controller for Discrete-Time Linear Systems with Input Delays (입력지연을 갖는 이산시간 선형시스템을 위한 예측기 피드백 제어기의 강인성 해석)

  • Choi, Joon-Young
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1265-1272
    • /
    • 2019
  • We analyze the robustness of the existing predictor feedback controller for discrete-time linear systems with constant input delays against the structured model uncertainty. By modeling the constant input delay with a first-order PdE (Partial difference Equation), we replace the input delay with the PdE states. By applying a backstepping transformation, we build a target system that enables to construct an explicit Lyapunov function. Constructing the explicit Lyapunov function that covers the entire state variables, we prove the existence of an allowable maximum size of the structured model uncertainty to maintain stability and establish the robustness of the predictor feedback controller. The numerical example demonstrates that the stability of closed-loop system is maintained in the presence of the structured model uncertainty, and verifies the robustness of the predictor feedback controller.

A Robust Blind Watermarking for Digital Image Using DWT According to its Resolution (해상도에 따른 DWT 기반 디지털 영상의 강인성 블라인드 워터마킹)

  • Lee, Yongseok;Seo, Youngho;Kim, Dongwook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.888-900
    • /
    • 2015
  • This paper proposes a blind watermarking scheme using DWT satisfying robustness, invisibility, and security to protect the ownership of digital image contents. This scheme does not determine any watermarking position by local image information. It rather inserts the watermark information into all the four lowest frequency subbands after transforming the host image by n-level 2-dimensional DWT, depending on, the sizes of the host image and the watermark data. Its watermark insertion methodology uses some weighting factors according to the kind of the subband and its energy level to adjust the invisibility and the robustness of the watermark. This method is experimented for various pixel-value change attacks and geometric attacks with various images having different resolutions and aspect ratios. With the experimental results and by comparing with existing methods, we show that the proposed method has a great deal of general usage with good watermark invisibility and good robustness against attacks.

A Study on Fingerprinting Robustness Indicators for Immersive 360-degree Video (실감형 360도 영상 특징점 기술 강인성 지표에 관한 연구)

  • Kim, Youngmo;Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.743-753
    • /
    • 2020
  • In this paper, we propose a set of robustness indicators for immersive 360-degree video. With the full-fledged service of mobile carriers' 5G networks, it is possible to use large-capacity, immersive 360-degree videos at high speed anytime, anywhere. Since it can be illegally distributed in web-hard and torrents through DRM dismantling and various video modifications, however, evaluation indicators that can objectively evaluate the filtering performance for copyright protection are required. In this paper, a robustness indicators is proposed that applies the existing 2D Video robustness indicators and considers the projection method and reproduction method, which are the characteristics of Immersive 360-degree Video. The performance evaluation experiment has been carried out for a sample filtering system and it is verified that an excellent recognition rate of 95% or more has been achieved in about 3 second execution time.

The Effects of Feedback Loops on the Network Robustness by using a Random Boolean Network Model (랜덤 불리언 네트워크 모델을 이용한 되먹임 루프가 네트워크 강건성에 미치는 영향)

  • Kwon, Yung-Keun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.3
    • /
    • pp.138-146
    • /
    • 2010
  • It is well known that many biological networks are very robust against various types of perturbations, but we still do not know the mechanism of robustness. In this paper, we find that there exist a number of feedback loops in a real biological network compared to randomly generated networks. Moreover, we investigate how the topological property affects network robustness. To this end, we properly define the notion of robustness based on a Boolean network model. Through extensive simulations, we show that the Boolean networks create a nearly constant number of fixed-point attractors, while they create a smaller number of limit-cycle attractors as they contain a larger number of feedback loops. In addition, we elucidate that a considerably large basin of a fixed-point attractor is generated in the networks with a large number of feedback loops. All these results imply that the existence of a large number of feedback loops in biological networks can be a critical factor for their robust behaviors.