• Title/Summary/Keyword: key image

Search Result 1,422, Processing Time 0.028 seconds

A Study of the Color Image of Clothing -Selected the period of Art Deco- (아르데코 시대를 중심으로 한 복식의 색채 이미지에 관한연구)

  • 배화여전의상학과
    • Journal of the Korean Society of Costume
    • /
    • v.22
    • /
    • pp.119-134
    • /
    • 1994
  • The study was proposed to establish the effective color image planning and to suggest the color combination data for clothing through historic costume. To test the suggested method The Color Image Scale developed in Japan was adapted, For the practical study 21 fashion illustrations of Art Deco period (1910-1930) were selec-ted. Color images analysed from these illustrations were seleted with the key words extracted from political economical social background and art of Art Deco period. Three of the image categories clear modern and dynamic were sutable to express the images of this period. The image categories representing color image of Art Deco costume were dynamic modern classic, casual, clear, nature and gorgeous.

  • PDF

Optical Encryption System using a Computer Generated Hologram

  • Kim, Jong-Yun;Park, Se-Joon;Kim, Soo-Joong;Doh, Yang-Hoi;Kim, Cheol-Su
    • Journal of the Optical Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.19-22
    • /
    • 2000
  • A new image encoding and identification scheme is proposed for security verification by us-ing a CGH(computer generated hologram), random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying a QP- CGH(quadratic phase CGI) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for personal identification by a 4-f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.

Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm

  • Zhang, Leihong;Yuan, Xiao;Zhang, Dawei;Chen, Jian
    • Current Optics and Photonics
    • /
    • v.2 no.4
    • /
    • pp.315-323
    • /
    • 2018
  • A new multiple-image encryption scheme that is based on a compressive ghost imaging concept along with a Fourier transform sampling principle has been proposed. This further improves the security of the scheme. The scheme adopts a Fourier transform to sample the original multiple-image information respectively, utilizing the centrosymmetric conjugation property of the spatial spectrum of the images to obtain each Fourier coefficient in the most abundant spatial frequency band. Based on this sampling principle, the multiple images to be encrypted are grouped into a combined image, and then the compressive ghost imaging algorithm is used to improve the security, which reduces the amount of information transmission and improves the information transmission rate. Due to the presence of the compressive sensing algorithm, the scheme improves the accuracy of image reconstruction.

Implementation of an automatic face recognition system using the object centroid (무게중심을 이용한 자동얼굴인식 시스템의 구현)

  • 풍의섭;김병화;안현식;김도현
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.8
    • /
    • pp.114-123
    • /
    • 1996
  • In this paper, we propose an automatic recognition algorithm using the object centroid of a facial image. First, we separate the facial image from the background image using the chroma-key technique and we find the centroid of the separated facial image. Second, we search nose in the facial image based on knowledge of human faces and the coordinate of the object centroid and, we calculate 17 feature parameters automatically. Finally, we recognize the facial image by using feature parameters in the neural networks which are trained through error backpropagation algorithm. It is illustrated by experiments by experiments using the proposed recogniton system that facial images can be recognized in spite of the variation of the size and the position of images.

  • PDF

A Study of the Fractal Image Compression with a Quadtree Partioning Method and a HV Partitioning Method (Quadtree 분할방식과 HV 분할방식을 이용한 프랙탈 이미지 압축에 관한 연구)

  • Byun, Chae-Ung;Lee, Key-Seo;Chung, Chin-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.980-982
    • /
    • 1995
  • Image coding based on a fractal theory of iterated transformations presents highly compressed image. In this paper, we compress image using the partitioning method which devides image adaptively in horizon and vertical axis. This method can encode image more compactly than the quadtree partitioning method. The maximum range size can be selected as $32{\times}32$ blocks and the minimum size can be $4{\times}4$ blocks. And the domain size is twice as many as the range size.

  • PDF

Comparative Analysis of the Performance of SIFT and SURF (SIFT 와 SURF 알고리즘의 성능적 비교 분석)

  • Lee, Yong-Hwan;Park, Je-Ho;Kim, Youngseop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.12 no.3
    • /
    • pp.59-64
    • /
    • 2013
  • Accurate and robust image registration is important task in many applications such as image retrieval and computer vision. To perform the image registration, essential required steps are needed in the process: feature detection, extraction, matching, and reconstruction of image. In the process of these function, feature extraction not only plays a key role, but also have a big effect on its performance. There are two representative algorithms for extracting image features, which are scale invariant feature transform (SIFT) and speeded up robust feature (SURF). In this paper, we present and evaluate two methods, focusing on comparative analysis of the performance. Experiments for accurate and robust feature detection are shown on various environments such like scale changes, rotation and affine transformation. Experimental trials revealed that SURF algorithm exhibited a significant result in both extracting feature points and matching time, compared to SIFT method.

Triqubit-State Measurement-Based Image Edge Detection Algorithm

  • Wang, Zhonghua;Huang, Faliang
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1331-1346
    • /
    • 2018
  • Aiming at the problem that the gradient-based edge detection operators are sensitive to the noise, causing the pseudo edges, a triqubit-state measurement-based edge detection algorithm is presented in this paper. Combing the image local and global structure information, the triqubit superposition states are used to represent the pixel features, so as to locate the image edge. Our algorithm consists of three steps. Firstly, the improved partial differential method is used to smooth the defect image. Secondly, the triqubit-state is characterized by three elements of the pixel saliency, edge statistical characteristics and gray scale contrast to achieve the defect image from the gray space to the quantum space mapping. Thirdly, the edge image is outputted according to the quantum measurement, local gradient maximization and neighborhood chain code searching. Compared with other methods, the simulation experiments indicate that our algorithm has less pseudo edges and higher edge detection accuracy.

Cyber Natural History Museum Contents for Mobile Phones (모바일 폰 기반의 사이버 자연사 박물관)

  • Hong, Sung-Soo;Khan, Irfan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1422-1425
    • /
    • 2011
  • These days' mobile phones and their improved multimedia limits making it powerful enough to handle complicated tasks. Image processing related support for mobile devices is extremely comprehensive in mobile cyber museum. A key technical challenge is how to achieve the best-perceived image quality and transmitting data between client and server with given the limited screen size and display bit-depth of the mobile devices. This paper targets image processing features such as capturing rendering zooming, panning and image rotation for 360o view and customized algorithm related image processing with variety of search method i.e. alphabetical, visual search.

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Image Features Based Secure Access Control for Data Content Protection (데이터 내용 보호를 위한 이미지 특징 기반의 보안 접근 제어)

  • Ha, Sunju;Park, Daechul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.171-180
    • /
    • 2013
  • Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.