• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.038 seconds

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF

Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness (자율적인 상황인식을 위한 다중센서 위협데이타의 귀납적 분류)

  • Jeong, Yong-Woong;Noh, Sang-Uk;Go, Eun-Kyoung;Jeong, Un-Seob
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.

The weight analysis research in developing a similarity classification problem of malicious code based on attributes (속성기반 악성코드 유사도 분류 문제점 개선을 위한 가중치 분석 연구)

  • Chung, Yong-Wook;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.501-514
    • /
    • 2013
  • A grouping process through the similarity comparison is required to effectively classify and respond a malicious code. When we have a use of the past similarity criteria to be used in the comparison method or properties it happens a increased problem of false negatives and false positives. Therefore, in this paper we apply to choose variety of properties to complement the problem of behavior analysis on the heuristic-based of 2nd step in malicious code auto analysis system, and we suggest a similarity comparison method applying AHP (analytic hierarchy process) for properties weights that reflect the decision-making technique. Through the similarity comparison of malicious code, configured threshold is set to the optimum point between detection rates and false positives rates. As a grouping experiment about unknown malicious it distinguishes each group made by malicious code generator. We expect to apply it as the malicious group information which includes a tracing of hacking types and the origin of malicious codes in the future.

Application of Concurrent Engineering for Conceptual design of a Future Main Battle Tank (차세대 주력전차의 개념설계를 위한 동시공학의 적용)

  • 김진우;소한균
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.38-60
    • /
    • 1999
  • The main objective of this study is systemization of the technique of ROC quantification and optimization of baseline design by applying CE principle to the acquisition process of a weapon system. QFD and TOA techniques can be employed to a good working example of the conceptual design of a future main battle tank. In this paper, Product Planning Phase, the first phase of four QFD phases, is deployed in terms of eight steps including customer requirements and final product control characteristics. TOA is carried out considering only combat weight. In order to perform combat weight analysis and performance TOA, Preliminary Configuration Synthesis Methodology is used. Preliminary Configuration Synthesis Methodology employs the method of least squares and described linear equations of weight interrelation equation for each component of tank. As a result of QFD based upon the ROC, it was cleared that armor piercing power, main armament, type of ammunition, cruising range, combat weight, armor protection, power loading, threat detection and cost are primary factors influencing design and that combat weight is the most dominant one. The results of TOA based on the combat weight constraint show that 5100 lb reduction was required to satisfy the ROC. The baseline design of a future main battle tank is illustrated with assumption that all phases of QFD are employed to development and production process of subsystems, components, and parts of main battle tank. TOA is applied in iterative process between initial baseline design and ROC. The detailed design of each component is illustrated for a future main battle tank.

  • PDF

In situ Hybricization of White Spot Disease Virus Experimentally Infected Penaeid Shrimp

  • Lee, Won-Woo;Lee, Beom-Jue;Lee, Yeon-Hee;Lee, Yong-Soon;Park, Jae-Hak
    • Journal of Microbiology and Biotechnology
    • /
    • v.10 no.2
    • /
    • pp.215-220
    • /
    • 2000
  • Abstract White spot disease (WSD), resulting in more than 90% mortality of aquacultured penaeid shrimp, has been reported off the southern and western coasts of Korea since 1993. The pafuogen of WSD has been identified as being a virion wifu an envelope around a central nucleocapsid, and with an average size of 167 nm in diameter and 375 nm in length. In the present study, an in situ hybridization technique was developed as a rapid. sensitive, and specific diagnostic assay for the WSD viros infection in shrimp. Furthermore. the pathological changes ofWSD, in shrimp experimentally infected with WSD viroses. were investigated. Using a biotinylated 643 bp probe obtained from a peR using primers specific to the rod-shaped virus of Penaeus japonicus (RV-PJ), positive signals were detected in both naturally and experimentally infected shrimps. The in situ hybridization revealed positive reactions in the nuclei of the stromal matrix cells in the lymphoid organ, epithelia of the gills, foregut. epidermis, and hematopoietic cells of the interstitial tissues, suggesting the presence of WSD virus. Tills result indicates that the in situ hybridization method can be useful for a rapid and sensitive detection of WSD viruses in shrimp.shrimp.

  • PDF

Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses (컴퓨터 바이러스 분류를 위한 퍼지 클러스터 기반 진단시스템)

  • Rhee, Hyun-Sook
    • The KIPS Transactions:PartB
    • /
    • v.14B no.1 s.111
    • /
    • pp.59-64
    • /
    • 2007
  • In these days, malicious codes have become reality and evolved significantly to become one of the greatest threats to the modern society where important information is stored, processed, and accessed through the internet and the computers. Computer virus is a common type of malicious codes. The standard techniques in anti-virus industry is still based on signatures matching. The detection mechanism searches for a signature pattern that identifies a particular virus or stain of viruses. Though more accurate in detecting known viruses, the technique falls short for detecting new or unknown viruses for which no identifying patterns present. To cope with this problem, anti-virus software has to incorporate the learning mechanism and heuristic. In this paper, we propose a fuzzy diagnosis system(FDS) using fuzzy c-means algorithm(FCM) for the cluster analysis and a decision status measure for giving a diagnosis. We compare proposed system FDS to three well known classifiers-KNN, RF, SVM. Experimental results show that the proposed approach can detect unknown viruses effectively.

Convenient View Calibration of Multiple RGB-D Cameras Using a Spherical Object (구형 물체를 이용한 다중 RGB-D 카메라의 간편한 시점보정)

  • Park, Soon-Yong;Choi, Sung-In
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.8
    • /
    • pp.309-314
    • /
    • 2014
  • To generate a complete 3D model from depth images of multiple RGB-D cameras, it is necessary to find 3D transformations between RGB-D cameras. This paper proposes a convenient view calibration technique using a spherical object. Conventional view calibration methods use either planar checkerboards or 3D objects with coded-pattern. In these conventional methods, detection and matching of pattern features and codes takes a significant time. In this paper, we propose a convenient view calibration method using both 3D depth and 2D texture images of a spherical object simultaneously. First, while moving the spherical object freely in the modeling space, depth and texture images of the object are acquired from all RGB-D camera simultaneously. Then, the external parameters of each RGB-D camera is calibrated so that the coordinates of the sphere center coincide in the world coordinate system.

Application of Resistivity/SP Monitoring Technique to Maintenance of Water Utilization Facilities (수리시설물의 유지관리를 위한 비저항/SP 모니터링기법 연구)

  • Park, Sam-Gyu;Kim, Jung-Ho;Seo, Goo-Won;Won, Jong-Geun;Kim, Byung-Ho
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2005.05a
    • /
    • pp.71-76
    • /
    • 2005
  • The subject of this paper is research into the application of resistivity/SP monitoring to detecting the water leakage of water utilization facilities. For this purpose, we installed a comprehensive monitoring system consisting of resistivity/SP measurement, inclinometer, piezometer, and water gauge at an embankment, Using this monitoring system, we monitored the various kinds of measurement data and compared the resistivity structures and SP variations that of hydrological and engineering data in order to investigate the water leakage and stability of the embankment. The variations of resistivity and SP at the embankment were provided from the monitoring data and we could accurately locate the portions of which resistivities and SP have sharply changed, Furthermore, we could estimate the stability of the embankment more effectively and quantitatively by jointly interpreting the monitoring data of resistivity and SP, water level, pore water pressure, and subsurface displacement. The monitoring experiments in this study led us to the conclusion that for the efficient maintenance of the water utilization facilities, monitoring the resistivity and SP data would be much more preferable to performing the just one-time measurements.

  • PDF

Development of a Ubiquitous Vision System for Location-awareness of Multiple Targets by a Matching Technique for the Identity of a Target;a New Approach

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.68-73
    • /
    • 2005
  • Various techniques have been proposed for detection and tracking of targets in order to develop a real-world computer vision system, e.g., visual surveillance systems, intelligent transport systems (ITSs), and so forth. Especially, the idea of distributed vision system is required to realize these techniques in a wide-spread area. In this paper, we develop a ubiquitous vision system for location-awareness of multiple targets. Here, each vision sensor that the system is composed of can perform exact segmentation for a target by color and motion information, and visual tracking for multiple targets in real-time. We construct the ubiquitous vision system as the multiagent system by regarding each vision sensor as the agent (the vision agent). Therefore, we solve matching problem for the identity of a target as handover by protocol-based approach. We propose the identified contract net (ICN) protocol for the approach. The ICN protocol not only is independent of the number of vision agents but also doesn't need calibration between vision agents. Therefore, the ICN protocol raises speed, scalability, and modularity of the system. We adapt the ICN protocol in our ubiquitous vision system that we construct in order to make an experiment. Our ubiquitous vision system shows us reliable results and the ICN protocol is successfully operated through several experiments.

  • PDF

Automatic Person Identification using Multiple Cues

  • Swangpol, Danuwat;Chalidabhongse, Thanarat
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1202-1205
    • /
    • 2005
  • This paper describes a method for vision-based person identification that can detect, track, and recognize person from video using multiple cues: height and dressing colors. The method does not require constrained target's pose or fully frontal face image to identify the person. First, the system, which is connected to a pan-tilt-zoom camera, detects target using motion detection and human cardboard model. The system keeps tracking the moving target while it is trying to identify whether it is a human and identify who it is among the registered persons in the database. To segment the moving target from the background scene, we employ a version of background subtraction technique and some spatial filtering. Once the target is segmented, we then align the target with the generic human cardboard model to verify whether the detected target is a human. If the target is identified as a human, the card board model is also used to segment the body parts to obtain some salient features such as head, torso, and legs. The whole body silhouette is also analyzed to obtain the target's shape information such as height and slimness. We then use these multiple cues (at present, we uses shirt color, trousers color, and body height) to recognize the target using a supervised self-organization process. We preliminary tested the system on a set of 5 subjects with multiple clothes. The recognition rate is 100% if the person is wearing the clothes that were learned before. In case a person wears new dresses the system fail to identify. This means height is not enough to classify persons. We plan to extend the work by adding more cues such as skin color, and face recognition by utilizing the zoom capability of the camera to obtain high resolution view of face; then, evaluate the system with more subjects.

  • PDF