• Title/Summary/Keyword: image identifier

Search Result 50, Processing Time 0.021 seconds

Image Identifier Based on Linear Component Extraction using Hough Transform (허프변환을 이용한 직선요소 검출 기반 정지영상 인식자)

  • Park, Je-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.111-117
    • /
    • 2010
  • The easily accessible handheld devices equipped with camera are widely available as common commodities. According to this trend, utilization of images is popular among common users for various purposes resulting in huge amount of images in local or network based storage systems. In this environment, identification of an image with a solid and effective manner is demanded in behalf of safe distribution and efficient management of images. The generated identifiers can be used as a file name in file systems or an index in image databases utilizing the uniqueness of the identifiers. In this paper, we propose a method that generates image identifiers using linear components in images. Some experiments of generation of identifiers are performed, and the results evaluate that the proposed method has feasible effectiveness.

Original Identifier Code for Patient Information Security

  • Ahmed Nagm;Mohammed Safy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.141-148
    • /
    • 2023
  • During the medical data transmissions, the protection of the patient information is vital. Hence this work proposes a spatial domain watermarking algorithm that enhances the data payload (capacity) while maintaining the authentication and data hiding. The code is distributed at every pixel of the digital image and not only in the regions of non-interest pixels. But the image details are still preserved. The performance of the proposed algorithm is evaluated using several performance measures such as the mean square error (MSE), the mean absolute error (MAE), and the peak signal to noise Ratio (PSNR), the universal image quality index (UIQI) and the structural similarity index (SSIM).

CNN-Based Fake Image Identification with Improved Generalization (일반화 능력이 향상된 CNN 기반 위조 영상 식별)

  • Lee, Jeonghan;Park, Hanhoon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1624-1631
    • /
    • 2021
  • With the continued development of image processing technology, we live in a time when it is difficult to visually discriminate processed (or tampered) images from real images. However, as the risk of fake images being misused for crime increases, the importance of image forensic science for identifying fake images is emerging. Currently, various deep learning-based identifiers have been studied, but there are still many problems to be used in real situations. Due to the inherent characteristics of deep learning that strongly relies on given training data, it is very vulnerable to evaluating data that has never been viewed. Therefore, we try to find a way to improve generalization ability of deep learning-based fake image identifiers. First, images with various contents were added to the training dataset to resolve the over-fitting problem that the identifier can only classify real and fake images with specific contents but fails for those with other contents. Next, color spaces other than RGB were exploited. That is, fake image identification was attempted on color spaces not considered when creating fake images, such as HSV and YCbCr. Finally, dropout, which is commonly used for generalization of neural networks, was used. Through experimental results, it has been confirmed that the color space conversion to HSV is the best solution and its combination with the approach of increasing the training dataset significantly can greatly improve the accuracy and generalization ability of deep learning-based identifiers in identifying fake images that have never been seen before.

Design of Container Image Preprocessing And Identifier Recognition System (컨테이너 영상 전처리 및 식별자 인식 시스템의 설계)

  • 박준표;이주표;황대훈
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.786-791
    • /
    • 2002
  • 오늘날 컨테이너의 과다한 물동량 증가로 인하여 수작업으로 이루어지는 컨테이너를 처리하는데 어려움을 겪고 있다. 따라서 식별자로 컨테이너를 자동 인식하고 그 결과를 항만 물류처리 자동화 시스템에 적용하고자 하는 필요성이 대두되고 있다. 이에 본 논문에서는 항만 물류처리 자동화 시스템을 사용하기 위하여 컨테이너의 인식 처리를 자동화하는데 그 방안으로 컨테이너의 RGB를 이용하여 바탕색과 문자색을 검출하고 바탕색과 문자색의 차를 이용해 가장 큰 차이를 보이는 RGB 값 중 하나로 영상을 이진화 하였다. 컨테이너의 식별자를 인식하기 위해서 신경망 알고리즘의 하나인 Back-propagation을 적용하여 기존의 식별자 인식 방법보다 신속하고 정확한 처리가 가능하도록 구현하였다.

  • PDF

Character Segmentation from Shipping Container Image using Morphological Operation (형태학적 연산을 이용한 운송 컨테이너 영상의 문자 분할)

  • 김낙빈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.4
    • /
    • pp.390-399
    • /
    • 1999
  • Extracting the character region(container identifier) in the image of a shipping container is one of the key factors in a system for identifying a shipping container automatically To improve the performance of the automatic recognition system for identifying a shipping container, thus a method partitioning the character region more correctly and efficiently is needed. In this paper, an efficient method is proposed to extract only the character region in the image of a shipping container. The proposed method removes noises that are not possibly related to the character using morphological operation, then the image is binarized using the threshold value that is determined from the image obtained previous step. Finally individual character area is extracted from the binary image. Also experiments are conducted to verify the efficiency of the proposed method. The results show that the proposed method partitions the character region correctly from container images.

  • PDF

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

Recognition of Identifiers from Shipping Container Image by Using Fuzzy Binarization and ART2-based RBF Network

  • Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.2
    • /
    • pp.1-18
    • /
    • 2003
  • The automatic recognition of transport containers using image processing is very hard because of the irregular size and position of identifiers, diverse colors of background and identifiers, and the impaired shapes of identifiers caused by container damages and the bent surface of container, etc. We proposed and evaluated the novel recognition algorithm of container identifiers that overcomes effectively the hardness and recognizes identifiers from container images captured in the various environments. The proposed algorithm, first, extracts the area including only all identifiers from container images by using CANNY masking and bi-directional histogram method. The extracted identifier area is binarized by the fuzzy binarization method newly proposed in this paper and by applying contour tracking method to the binarized area, container identifiers which are targets of recognition are extracted. We proposed and applied the ART2-based RBF network for recognition of container identifiers. The results of experiment for performance evaluation on the real container images showed that the proposed algorithm has more improved performance in the extraction and recognition of container identifiers than the previous algorithms.

  • PDF

Image Hashing Techniques Utilizing User-Defined Image Invariant Features (사용자에 의한 영상 불변 특징을 이용한 이미지 해쉬 기술)

  • Choi, YongSoo;Kim, HyoungJoong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.514-517
    • /
    • 2010
  • 이미지 해쉬는 기술자(Descriptor) 또는 구분자(Identifier)로서 영상의 유사성을 측정하는데 사용될 수 있다. 수많은 이미지 해쉬 기술들이 있지만, 그 중에서도 히스토그램 기반의 방법들이 일반적인 영상처리나 다양한 기하학적 공격들에 강인함을 보여준다. 이 논문에서는 강인한 히스토그램 기반 이미지 해쉬를 생성하기 위하여 영상의 양자화, 사용자 지정 윈도우를 적용하여 영상의 특성화 과정을 적용하며 해쉬 값 결정 알고리즘도 오류에 강하도록 설계하였다. 이러한 기술은 기존의 논문들이 보여주었던 성능을 향상시킨다. 특히, 통계적인 오류측정을 통해 수행결과를 설명함으로서 수행성능의 향상을 객관적으로 평가하였다.

Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History

  • Hou, Xiaodan;Zhang, Tao;Xiong, Gang;Wan, Baoji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1926-1945
    • /
    • 2012
  • In this paper, two practical forensics aided steganalyzers (FA-steganalyzer) for heterogeneous bitmap images are constructed, which can properly handle steganalysis problems for mixed image sources consisting of raw uncompressed images and JPEG decompressed images with different quality factors. The first FA-steganalyzer consists of a JPEG decompressed image identifier followed by two corresponding steganalyzers, one of which is used to deal with uncompressed images and the other is used for mixed JPEG decompressed images with different quality factors. In the second FA-steganalyzer scheme, we further estimate the quality factors for JPEG decompressed images, and then steganalyzers trained on the corresponding quality factors are used. Extensive experimental results show that the proposed two FA-steganalyzers outperform the existing steganalyzer that is trained on a mixed dataset. Additionally, in our proposed FA-steganalyzer scheme, we can select the steganalysis methods specially designed for raw uncompressed images and JPEG decompressed images respectively, which can achieve much more reliable detection accuracy than adopting the identical steganalysis method regardless of the type of cover source.

Design and Implementation of Multiple View Image Synthesis Scheme based on RAM Disk for Real-Time 3D Browsing System (실시간 3D 브라우징 시스템을 위한 램 디스크 기반의 다시점 영상 합성 기법의 설계 및 구현)

  • Sim, Chun-Bo;Lim, Eun-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.13-23
    • /
    • 2009
  • One of the main purpose of multiple-view image processing technology is support realistic 3D image to device user by using multiple viewpoint display devices and compressed data restoration devices. This paper proposes a multiple view image synthesis scheme based on RAM disk which makes possible to browse 3D images generated by applying effective composing method to real time input stereo images. The proposed scheme first converts input images to binary image. We applies edge detection algorithm such as Sobel algorithm and Prewiit algorithm to find edges used to evaluate disparities from images of 4 multi-cameras. In addition, we make use of time interval between hardware trigger and software trigger to solve the synchronization problem which has stated ambiguously in related studies. We use a unique identifier on each snapshot of images for distributed environment. With respect of performance results, the proposed scheme takes 0.67 sec in each binary array. to transfer entire images which contains left and right side with disparity information for high quality 3D image browsing. We conclude that the proposed scheme is suitable for real time 3D applications.