• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.04 seconds

Text extraction in images using simplify color and edges pattern analysis (색상 단순화와 윤곽선 패턴 분석을 통한 이미지에서의 글자추출)

  • Yang, Jae-Ho;Park, Young-Soo;Lee, Sang-Hun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.33-40
    • /
    • 2017
  • In this paper, we propose a text extraction method by pattern analysis on contour for effective text detection in image. Text extraction algorithms using edge based methods show good performance in images with simple backgrounds, The images of complex background has a poor performance shortcomings. The proposed method simplifies the color of the image by using K-means clustering in the preprocessing process to detect the character region in the image. Enhance the boundaries of the object through the High pass filter to improve the inaccuracy of the boundary of the object in the color simplification process. Then, by using the difference between the expansion and erosion of the morphology technique, the edges of the object is detected, and the character candidate region is discriminated by analyzing the pattern of the contour portion of the acquired region to remove the unnecessary region (picture, background). As a final result, we have shown that the characters included in the candidate character region are extracted by removing unnecessary regions.

Analysis of Mitochondrial DNA in Patients with Essential Tremor (본태성 수전증 환자의 미토콘드리아 DNA 분석)

  • Lee, Uhn;Yoo, Young Mi;Yoo, Chan Jong
    • Journal of Korean Neurosurgical Society
    • /
    • v.29 no.2
    • /
    • pp.188-195
    • /
    • 2000
  • Objective : Essential tremor(ET) is the most common movement disorder, however, there has been little agreement in the neurologic literature regarding diagnostic criteria for ET. Familial ET is an autosomal dominant disorder presenting as an isolated postural tremor. The main feature of ET is postural tremor of the arms with later involvement of the head, voice, or legs. In previous studies, it was reported that ET susceptibility was inherited in an autosomal dominant inheritance. As previous results, it would suggest that ET might be associated with defect of mitochondrial or nuclear DNA. Recent studies are focusing on molecular genetic detection of movement disorders, such as essential tremor and restless legs syndrome. Moreover, authors have analysed mitochondrial DNA(mtDNA) from the blood cell of positive control(PC) and ET patients via long and accurate polymerase chain reaction(LA PCR). Materials & Methods : Blood samples were collected from PC and 9 ET patients. Total DNA was extracted twice with phenol followed by chloroform : isoamylalcohol. For the analysis of mtDNA, LA PCR was performed by mitochondrial specific primers. Results : With this technique, deletions of large quantities were detected within several regions of mtDNA in ET patients except for D-loop and CO I regions. Conclusion : The authors believe that ET is a genentic disorder with deficiency of mitochondrial DNA multicomplexes and mitochondiral dysfunction could be one of major causative factors of ET. Mitochondrial dysfunction may play an important role in the pathogenesis and possibility of disease progression among familial group with ET patients.

  • PDF

The Ultraviolet Generation Characteristics of porcelain and Polymer Insulators by Corona Discharge (코로나 방전에 의한 자기 및 폴리머 애자의 자외선 발생특성)

  • Shong, Kil-Mok;Bang, Sun-Bae;Kim, Chong-Min;Kim, Young-Seok
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.4
    • /
    • pp.147-152
    • /
    • 2008
  • This paper describes the breakdown poperties of porcelain and polymer insulators using the UV camera. The experiment was carried out using condition of voltage at the KS C IEC 60060-1(2006). As these results, corona discharge in porcelain insulator was generated the weakness point of insulator union. And the corona discharge of polymer insulator happened in union of power source. Also, we could confirm easily weakness part of these insulators by ultraviolet image through the corona discharge. Besides, in the comparison with the exciting technique of ultrasonic detection, it confirmed that deterioration steps are corrected. These steps are possible to judge the deterioration of power facilities through reliable date. Hereafter, this study as the diagnostic technology suitable for the sites is used.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Enhanced Image Magnification Using Edge Information (에지정보를 이용한 개선된 영상확대기법)

  • Je, Sung-Kwan;Cho, Jae-Hyun;Cha, Eui-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2343-2348
    • /
    • 2006
  • Image magnification is among the basic image processing operations. The most commonly used technique for image magnification are based on interpolation method(such as nearest neighbor, bilinear and cubic interpolation). However, the magnified images produced by the techniques that often appear a variety of undesirable image artifacts such as 'blocking' and 'blurring' or too takes the processing time into the several processing for image magnification. In this paper, we propose image magnification method which uses input image's sub-band information such as edge information to enhance the image magnification method. We use the whole image and not use the one's neighborhood pixels to detect the edge information of the image that isn't occurred the blocking phenomenon. And then we emphasized edge information to remove the blurring phenomenon which incited of edge information. Our method, which improves the performance of the traditional image magnification methods in the processing time, is presented. Experiment results show that the proposed method solves the drawbacks of the image magnification such as blocking and blurring phenomenon, and has a higher PSNR and Correlation than the traditional methods.

Wavelet-based Digital watermarking Using Multiple threshold (다중 임계치를 적용한 웨이브릿 기반 디지털 워터마킹 기법)

  • Kim, Jae-Won;Nam, Jae-Yeal
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.419-428
    • /
    • 2003
  • Recently, digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data. A robust wavelet-based watermark casting scheme and a watermark retrieval technique are suggested in this paper. We present a method which can add the watermark to the significant coefficients in the DWT domain, and does not require the original image in the detection process. In adaptive watermark casting method is developed to select perceptually significant coefficients for each subband using multiple threshold. In the proposed method, an adaptive multiple threshold scheme is used to reflect characteristics of each subband and complexity of image. The watermark is adaptively weighted in different subbands to achieve robustness as well as high perceptual quality. The watermark, Gaussian random sequence is added to the large coefficients but not in the lowest subband in the DWT domain. Experimental results show that the proposed algorithm produced visually very good watermarked image which has good invisibility to human eyes and very robust against various image processing and compression attacks.

Monitoring of the Volcanic Ash Using Satellite Observation and Trajectory Analysis Model (인공위성 자료와 궤적분석 모델을 이용한 화산재 모니터링)

  • Lee, Kwon-Ho;Jang, Eun-Suk
    • Korean Journal of Remote Sensing
    • /
    • v.30 no.1
    • /
    • pp.13-24
    • /
    • 2014
  • Satellite remote sensing data have been valuable tool for volcanic ash monitoring. In this study, we present the results of application of satellite remote sensing data for monitoring of volcanic ash for three major volcanic eruption cases (2008 Chait$\acute{e}$n, 2010 Eyjafjallaj$\ddot{o}$kull, and 2011 Shinmoedake volcanoes). Volcanic ash detection products based on the Moderate Resolution Imaging Spectro-radiometer (MODIS) observation data using infrared brightness temperature difference technique were compared to the forward air mass trajectory analysis by the HYbrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model. There was good correlation between MODIS volcanic ash image and trajectory lines after the volcanic eruptions, which support the feasibility of using the integration of satellite observed and model derived data for volcanic ash forecasting.

Detection of Enterotoxins in Staphylococcus aureus Isolated from Clinical Specimens and Kimbap Using Multiplex PCR

  • Kim, Jong-Bae;Kim, Hong;Jin, Hyun-Seok;Kim, Young-Sam;Kim, Keun-Sung;Kang, Yun-Sook;Park, Jong-Seok;Lee, Dong-Ha;Woo, Gun-Jon
    • Biomedical Science Letters
    • /
    • v.7 no.2
    • /
    • pp.85-89
    • /
    • 2001
  • Many Staphylococcus aureus strains produce enterotoxins causing food poisoning. Staphylococcal enterotoxins are classified by serological criteria into five major groups - subtype A to E. It is difficult, time-consuming, and expensive to detect staphylococcal enterotoxins in the clinical laboratory. In this study, we fried to detect the enterotoxin genes of Staphylococcus aureus strains isolated from clinical specimens and Kimbap - rice rolled in a sheet of laver - using multiplex PCR technique. A total of 77 strains of Staphylococcus aureus from clinical specimens and 78 strains from Kimbap were isolated. Among clinical isolates of S. aureus, 60 strains (78.0%) were identified as producing enterotoxins. A total offs strains (91.6%) in the 60 staphylococcal enterotoxin producing strains were enterotoxin subtype C. In case of kimbap: 43 (55.1%) strains were detected to produce enterotoxins and 39 (90.6%) enterotoxin producing strains were subtype A.

  • PDF