• Title/Summary/Keyword: Visual Security

Search Result 248, Processing Time 0.034 seconds

Ramdomg Hash for Integrity Verification Method of Multimedia Data in Surveillance System (비디오 감시 장치 무결성 검증을 위한 랜덤 해시 방법)

  • Ghimire, Sarala;Lee, Bumshik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.11a
    • /
    • pp.165-168
    • /
    • 2019
  • The advancement in technology has led to the enormous use of multimedia applications. The video/image recorded by such applications provides critical information that can be used as a visual evidence. However, owing to the adequacy in using different editing tools, it is susceptible to malicious alterations. Thus, the reliability or the integrity of the visual information should be verified before using it as an evidence. In this paper, we propose an integrity verification method for the surveillance system using randomized hashing. The integrity value of the surveillance data is generated using the randomized hashing and elliptic curve cryptography (ECC), which is used later for the validation. The experimental results obtained from the embedded accident data recorder (ADR) system shows that the proposed method is very efficient and provides a high level of security.

  • PDF

Digital Color Image Watermarking for HVS(Human Visual System) using Daubechies wavelet

  • Park, Jong-Tae;Rhee, Kang-Hyeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1488-1492
    • /
    • 2004
  • The digital signal has been replaced the analog signal in most of every field of multimedia including still image, animation, and audio due to the enormous extension of computer supply and the fast development of computer network. The consumers of information are able to enjoy the abundance of information because of one of the digital signal traits that very easy to regenerate the original data. Because of the trait, however, it is very hard for the producers of information to keep the copyright with the merit of original copy in quality excellency. In this paper, the watermarking technology which inserts a RGB color watermark in color image using the visual characteristics of wavelet coefficient was proposed. As a result, the PSNR value of image was varied depending on perceptual parameter, but we can obtain 32dB as a whole.

Analysis of the Film's Promotional Website - Focus on Motion Graphic (모션그래픽 활용을 중심으로 영화홍보 웹사이트 분석)

  • Min, Jang-Geun;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.27-35
    • /
    • 2014
  • Motion Graphic developed in the visual fields such as film and TV is widely used from the fields of arts such as applied paintings to interactive media such as web sites. In particular, Motion Graphic is actively used in the film's promotion websites with the form of a mixture between characteristics of visual media and characteristics of websites. In this study, we analyze the characteristics of film's promotion websites, investigate previous studies for Motion Graphic analysis. And present a model for the analysis of websites including visual elements, media elements and motion elements as main elements. We select some of promotion websites for films among 2013 domestic hot films, carry out a case analysis, and present the direction of development on the base of the results.

An Encoding Scheme Considering Diffused Lights In a Visual Light Communication System (가시광통신체계에서 난반사 조명을 고려한 인코딩 스킴)

  • Eun, Seongbae;Kim, Dong kyu;Cha, Shin
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.186-193
    • /
    • 2019
  • Visible light communication technology is being studied and developed in various ways due to advantages such as high transmission speed, excellent positioning and higher security. However, existing visible light communication systems have difficulties in entering the market because they use special transmitters and receivers. We will overcome the difficulty if we develope a VLC system that uses a conventional LED light as a transmitter and a smartphone camera as a receiver. What matters is that LED lights include a scatter filter to prevent glareness for human eyes, but the existing VLC(Visual Light Communication) method can not be applied. In this paper, we propose a method to encode data with On / Off patterns of LEDs in the lighting with $M{\times}N$ LEDs. We defined parameters like L-off-able and K-seperated to facilitate the recognition of On / Off patterns in the diffused Lights. We conducted experiments using an LED lighting and smart phones to determine the parameter values. Also, the maximum transmission rate of our encoding technique is mathematically presented. Our encoding scheme can be applied to indoor and outdoor positioning applications or settlement of commercial transactions.

A Study of Visual-psychological Effect of Wood on the Human - For the Virtual Small Room - (목재가 인간에게 미치는 시각심리적 영향에 관한 기초적 연구 - 가상의 작은 방을 대상으로 -)

  • Nam, Young-Sook;Kim, Eun-Il
    • Journal of the Korean housing association
    • /
    • v.23 no.5
    • /
    • pp.95-102
    • /
    • 2012
  • We studied in order to find out suitable amounts of board by visual effects to establish indoor boards and human psychological effects by several board designs. Thirty students of C university were tested in constant temperature/humidity room and interviewed after tests. The experimental visual images were projected from 54' TV. As a result, the board length that showed high preference and satisfaction was the 90cm both horizontal and vertical direction. We found that vertical board gave an impression of a linear and narrow shape and the horizontal board gave wide space and cool feeling from psychological analytical study. The factors affecting satisfaction in horizontal direction were refreshing, intimacy, beauty, area, splendor and those in vertical direction were a sense of security, beauty, texture, intimacy, continuity, extensity, natural feeling. We got 5 factors from the result of factor analysis in order to get psychological factor axis. Those were pleasantness, artificiality, openness, dynamics, refinement. By multiple regression analysis, the factor pleasantness had the highest impact on visual satisfaction on scenary. The study on psychological factor difference by analysis of variance showed that psychologically feeling amount about pleasantness, artificiality, dynamics, refinement, and openness had statistically meaningful difference despite of board direction. We found that the 90cm had a tendency as a changing point leading image change by the investigative analysis of board direction based on factor points.

Implementation of an Obfuscator for Visual C++ Source Code (비주얼 C++소스 코드를 위한 obfuscator 구현)

  • Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Automatic obfuscation is known to be the most viable method for preventing reverse engineering intentional1y making code more difficult to understand for security purposes. In this paper, we study and implement an obfuscation method for protecting MS Visual C++ programs against attack on the intellectual property in software like reverse engineering attack. That is, the paper describes the implementation of a code obfuscator, a tool which converts a Visual C++ source program into an equivalent one that is much harder to understand. We have used ANTLR parser generator for handling Visual C++ sources, and implemented some obfuscating transformations such as 'Remove comments', 'Scramble identifiers', 'Split variables', 'Fold array', 'Insert class', 'Extend loop condition', 'Add redundant operands', and 'Insert dead code'. We have also evaluated the performance and effectiveness of the obfuscator in terms of potency, resilience, and cost. When the obfuscated source code has been compared with the original source code, it has enough effectiveness for software protection though it incurs some run-time overheads.

Tracking of Moving Object Based on Embedded System (임베디드 기반의 이동물체 추적)

  • Jung, Dae-Yung;Lee, Sang-Lak;Choi, Han-Go
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.209-212
    • /
    • 2005
  • This paper describes detection and tracking of a moving object for unmanned visual surveillance. security systems. Using images obtained from camera it detects and tracks a moving object and displays bounding box enclosing the moving object. The algorithm for detection and tracking is tested using a personal computer, and then implemented on EMPOS II embedded system. Simulation results show that the tracking of a moving object based on embedded system is working well. However it needs to improve image acquisition time for real time implementation to apply security systems.

  • PDF

Study for Injurious Multimedia Contents Analysis Mechanism in Smart Devices (스마트 기기에서 유해 멀티미디어 콘텐츠 판별 메커니즘 및 성능 분석)

  • Min, Sun-Ho;Kim, Seok-Woo;Ha, Kyeoung-Ju;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1001-1006
    • /
    • 2013
  • In this paper, Recently, we describe the distinction mechanism analysis and injurious distinction mechanism performance analysis in order to determine harmfulness of the injurious multimedia which is being rapidly spread in the smart phone and Intelligent Robots. Based on the injurious mechanism distinction technologies, We defined individual injurious characteristics elements of multimedia(images and videos). Also, We analyze harmfulness of the injurious multimedia content by the visual characteristics modeling.

Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution

  • Dong, Keming;Kim, Hyoung Joong;Choi, Yong Soo;Joo, Sang Hyun;Chung, Byung Ho
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.990-1000
    • /
    • 2015
  • This paper presents an overlapping pattern substitution (PS) method. The original overlapping PS method as a reversible data hiding scheme works well with only four pattern pairs among fifteen possible such pairs. This paper generalizes the original PS method so that it will work well with an optimal pair from among the fifteen possible pattern pairs. To implement such an overlapping PS method, changeable and embeddable patterns are first defined. A class map is virtually constructed to identify the changeable and embeddable pairs. The run-lengths between consecutive least probable patterns are recorded. Experiments show that an implementation of our overlapping PS method works well with any possible type of pairs. Comparison results show that the proposed method achieves more embedding capacity, a higher PSNR value, and less human visual distortion for a given embedding payload.

Motion Picture Watermarking Algorithm (동영상 워터마킹 알고리즘)

  • 안일영;안용학
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.35-47
    • /
    • 2002
  • In this paper, we will provide an overview of the motion picture watermarking techniques. We will see previously proposed algorithms such as compressed domain watermarking, non-compressed domain watermarking and algorithms for realtime applications etc. We will see test results for signature embedding in motion picture. By spread spectrum method, we embed a signature in each frames. The quality of watermarked motion picture is measured by PSNR(peak signal to noise ratio) about several strengths of watermark. In watermark detection the sign of the correlation sum is the estimated embedded signature bits. We will see different mean PSNR with visual shape of the detected signature.

  • PDF