• Title/Summary/Keyword: image authentication

Search Result 243, Processing Time 0.02 seconds

A Study on Space Utilization according to Changes in Non-face-to-Face Consumer Use : Focused on bank offices

  • Hwang, Sungi;Ryu, Gihwan;Yun, Daiyeol;Kim, Heeyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.271-278
    • /
    • 2020
  • Modern financial services go beyond the stage of internet banking, and new concepts of financial transactions such as Internet of Things, mobile banking, electronic payments, and fintech have emerged. As a result, banks are less influential in financial transactions, and changes are being demanded. In the present era, the basic business of banks has decreased, and it is transforming into a space where both consumer finance work and reside. The bank office stands for the brand image of the bank, and it is represented by trust with customers in the basic business of financial transactions, and the rise in real estate value is a natural social phenomenon due to the nature of the location and location of real estate owned by the bank. The business method and space of the bank office that meets the new paradigm of the modern society is an inefficient space only for the convenience and rest of consumers, but it must be used as a variety of spaces suitable for the region to increase the functional value of the bank office. Through this study, as a convenience space for consumers, various service facilities should be introduced to understand the characteristics of the region as a convenience space for consumers, and various service facilities should be introduced to meet the needs of consumers, and the bank office should be improved as a complex service space for local residents.

Fragile Image Watermarking Using Bit Planes (비트 플레인을 이용한 영상의 연성 워터마킹)

  • 이혜주
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.41-49
    • /
    • 2001
  • Digital watermarking has been proposed for copyright protection of digital data. According to the property of an embedded watermark, it is classified into two categories, robust watermarking and fragile watermarking. The former is used for copyright protection, and the latter applies to the authentication/integrity to verify the authenticity of data, If an Image has been modified or forged. the embedded watermark cannot be extracted from the Image. As a results, it is possible to defect the modification of the image. As pixels are represented by tilts, the modification of bits corresponds to the alteration of the image. In this paper, a new fragile watermarking is proposed In which two watermarks are embedded in order to detect some modification occurred In high and low bit Planes. From simulation results, the embedded watermark is Invisible in a watermarked image and we can locale some Places where the modification occurring

  • PDF

Binary Image Watermarking for Preserving Feature Regions (특징영역을 보존한 이진영상의 워터마킹)

  • 이정환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.624-631
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First a binary image is grouped into feature regions which has geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

Binary Image Watermarking Based on Grouping Feature Regions (특수런을 이용한 특징영역 분리에 의한 이진영상 워터마킹)

  • 이정환;박세현;노석호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.177-180
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First, a binary image is grouped into feature regions which have geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied to some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

  • PDF

Security Verification of Video Telephony System Implemented on the DM6446 DaVinci Processor

  • Ghimire, Deepak;Kim, Joon-Cheol;Lee, Joon-Whoan
    • International Journal of Contents
    • /
    • v.8 no.1
    • /
    • pp.16-22
    • /
    • 2012
  • In this paper we propose a method for verifying video in a video telephony system implemented in DM6446 DaVinci Processor. Each frame is categorized either error free frame or error frame depending on the predefined criteria. Human face is chosen as a basic means for authenticating the video frame. Skin color based algorithm is implemented for detecting the face in the video frame. The video frame is classified as error free frame if there is single face object with clear view of facial features (eyes, nose, mouth etc.) and the background of the image frame is not different then the predefined background, otherwise it will be classified as error frame. We also implemented the image histogram based NCC (Normalized Cross Correlation) comparison for video verification to speed up the system. The experimental result shows that the system is able to classify frames with 90.83% of accuracy.

Analyzing Preprocessing for Correcting Lighting Effects in Hyperspectral Images (초분광영상의 조명효과 보정 전처리기법 분석)

  • Yeong-Sun Song
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.5
    • /
    • pp.785-792
    • /
    • 2023
  • Because hyperspectral imaging provides detailed spectral information across a broad range of wavelengths, it can be utilized in numerous applications, including environmental monitoring, food quality inspection, medical diagnosis, material identification, art authentication, and crime scene analysis. However, hyperspectral images often contain various types of distortions due to the environmental conditions during image acquisition, which necessitates the proper removal of these distortions through a data preprocessing process. In this study, a preprocessing method was investigated to effectively correct the distortion caused by artificial light sources used in indoor hyperspectral imaging. For this purpose, a halogen-tungsten artificial light source was installed indoors, and hyperspectral images were acquired. The acquired images were then corrected for distortion using a preprocessing that does not require complex auxiliary equipment. After the corrections were made, the results were analyzed. According to the analysis, a statistical transformation technique using mean and standard deviation with reference to a reference signal was found to be the most effective in correcting distortions caused by artificial light sources.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Wavelet Based Intelligence image Watermarking Using Machine Vision of LabVIEW (LabVIEW의 Machine Vision을 이용한 웨이블릿 기반 지능형 이미지 Watermarking)

  • 송윤재;강두영;김형권;안태천
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.521-524
    • /
    • 2004
  • Recently, acgis of authentication and crcator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repealed through the entire image and adapted to the content of the image. Achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility and significant for invisible and robust watermark. We realize wavelet based image watermarking using Machine Vision of LabVIEW.

  • PDF

A Steganography for the Medical Images using Block Similarity (블록 유사도를 이용한 의료영상 스테가노그라피)

  • Moon, Il-Nam;Lee, Sin-Joo;Lee, Kwang-Man
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.952-958
    • /
    • 2009
  • Recently, due to problems in terms of illegal copying of medical image and the right ownership and authentication of data, it is necessary for us to study about those problems. In this study, we propose steganography with a method of the hiding information of high-resolution in digital medical image. The proposed algorithm is one of the way that inserts secret information by protecting ROI area which is regarded as and important feature of high-resolution digital medical image. As a result, the proposed method made it possible to insert secret information of massive storage and didn't affect the imperceptibility in medical image quality based on capacity and PSNR showed the all image quality of about 33.33dB.

DCI Based Watermarking for Image Verification and Authentication (인증과 무결성을 위한 DCT 기반 워터마킹)

  • 이혜란;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.506-509
    • /
    • 2001
  • 본 논문에서는 디지털 영상의 변조를 확인함과 동시에 변조의 위치를 확인하는 DCT 기반의 fragile watermarking을 제안한다. 디지털 영상의 인증과 무결성을 위해 기존의 Wong이 사용한 해쉬 함수와 비대칭키 암호 알고리즘을 사용하며, 영상에 DCT 변환을 함으로서 영상의 모든 픽셀에 워터마크를 삽입하지 않고서도 변조의 유무를 확인하는 것이 가능하다. 본 논문에서는 DCT 계수 중 일부 저주파 계수의 하위 비트에 워터마크를 삽입하여 워터마크의 비가시성과 연성을 만족하며 변조의 유무와 위치를 확인한 수 있게 된다.

  • PDF