• Title/Summary/Keyword: multiple embedding

Search Result 85, Processing Time 0.023 seconds

Development of a Robust Multiple Audio Watermarking Using Improved Quantization Index Modulation and Support Vector Machine (개선된 QIM과 SVM을 이용한 공격에 강인한 다중 오디오 워터마킹 알고리즘 개발)

  • Seo, Ye-Jin;Cho, San-Gjin;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • This paper proposes a robust multiple audio watermarking algorithm using improved QIM(quantization index modulation) with adaptive stepsize for different signal power and SVM(support vector machine) decoding model. The proposed algorithm embeds watermarks into both frequency magnitude response and frequency phase response using QIM. This multiple embedding method can achieve a complementary robustness. The SVM decoding model can improve detection rate when it is not sure whether the extracted data are the watermarks or not. To evaluate robustness, 11 attacks are employed. Consequently, the proposed algorithm outperforms previous multiple watermarking algorithm, which is identical to the proposed one but without SVM decoding model, in PSNR and BER. It is noticeable that the proposed algorithm achieves improvements of maximum PSNR 7dB and BER 10%.

An Empirical Digital Image Watermarking using Frequency Properties of DWT (DWT의 주파수 특성을 이용한 실험적 디지털 영상 워터마킹)

  • Kang, I-Seul;Lee, Yong-Seok;Seob), Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.295-312
    • /
    • 2017
  • Digital video content is the most information-intensive and high-value content. Therefore, it is necessary to protect the intellectual property rights of these contents, and this paper also proposes a watermarking method of digital image for this purpose. The proposed method uses the frequency characteristics of 2-Dimensional Discrete Wavelet Transform (2D-DWT) for digital images and digital watermark on global data without using local or specific data of the image for watermark embedding. The method to insert digital watermark data uses a simple Quantization Index Modulation (QIM) and a multiple watermarking method that inserts the same watermark data in multiple. When extracting a watermark, multiple watermarks are extracted and the final watermark data is determined by a simple statistical method. This method is an empirical method for experimentally determining the parameters in the watermark embedding process. The proposed method performs experiments on various images against various attacks and shows the superiority of the proposed method by comparing the performance with the representative existing methods.

New QECCs for Multiple Flip Error Correction (다중플립 오류정정을 위한 새로운 QECCs)

  • Park, Dong-Young;Kim, Baek-Ki
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.907-916
    • /
    • 2019
  • In this paper, we propose a new five-qubit multiple bit flip code that can completely protect the target qubit from all multiple bit flip errors using only CNOT gates. The proposed multiple bit flip codes can be easily extended to multiple phase flip codes by embedding Hadamard gate pairs in the root error section as in conventional single bit flip code. The multiple bit flip code and multiple phase flip code in this paper share the state vector error information by four auxiliary qubits. These four-qubit state vectors reflect the characteristic that all the multiple flip errors with Pauli X and Z corrections commonly include a specific root error. Using this feature, this paper shows that low-cost implementation is possible despite the QECC design for multiple-flip error correction by batch processing the detection and correction of Pauli X and Z root errors with only three CNOT gates. The five-qubit multiple bit flip code and multiple phase flip code proposed in this paper have 100% error correction rate and 50% error discrimination rate. All QECCs presented in this paper were verified using QCAD simulator.

Rectangular Marker Recognition using Embedded Context Information (맥락 정보를 이용한 장방형 마커 인식 및 증강현실 응용)

  • Lee, Won-Woo;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.74-79
    • /
    • 2009
  • Fiducial markers have been used frequently in augmented reality applications. However, they represent only ID information to identify a marker, and thus they have limitations when we have multiple types of markers. In this paper, we propose a new marker design for augmented reality applications. We embed a marker’s context, such as type, size, orientation, and ID, in the barcode that has been used just for storing an ID. BY embedding the context information, it is possible to recognize multiple types of markers at once and to render corresponding contents with proper scale. Our marker design can be used in a mobile augmented reality environment where many unknown types of markers may exist.

  • PDF

An Implementation of the Position Controller for Multiple Motors Using CAN (CAN 통신을 이용한 다중모터 위치제어기 구현)

  • Yi, Keon-Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.2
    • /
    • pp.55-60
    • /
    • 2002
  • This paper presents a controller for the multiple DC motors using the CAN(Controller Area Network). The controller has a benefit of reducing the cable connections and making the controller boards compact through the network including expansibility. CAN, among the field buses, is a serial communication methodology which has the physical layer and the data link layer in the ISO's OSI (Open System Interconnect) 7 layered reference model. It provides the user with many powerful features including multi-master functionality and the ability to broadcast / multicast telegrams. When we use a microprocessor chip embedding the CAN function, the system becomes more economical and reliable to react shortly in the data transmission. The controller, we proposed, is composed of two main controllers and a sub controller, which have built with a one-chip microprocessor having CAN function. The sub controller is plugged into the Pentium PC to perform a CAN communication, and connected to the main controllers via the CAN. Main controllers are responsible for controlling two motors respectively. Totally four motors, actuators for the biped robot in our laboratory, are controlled in the experiment. We show that the four motors are controlled properly to actuate the biped robot through the network in real time.

Co-registration of Multiple Postmortem Brain Slices to Corresponding MRIs Using Voxel Similarity Measures and Slice-to-Volume Transformation

  • Kim Tae-Seong
    • Journal of Biomedical Engineering Research
    • /
    • v.26 no.4
    • /
    • pp.231-241
    • /
    • 2005
  • New methods to register multiple hemispheric slices of the postmortem brain to anatomically corresponding in-vivo MRI slices within a 3D volumetric MRI are presented. Gel-embedding and fiducial markers are used to reduce geometrical distortions in the postmortem brain volume. The registration algorithm relies on a recursive extraction of warped MRI slices from the reference MRI volume using a modified non-linear polynomial transformation until matching slices are found. Eight different voxel similarity measures are tested to get the best co-registration cost and the results show that combination of two different similarity measures shows the best performance. After validating the implementation and approach through simulation studies, the presented methods are applied to real data. The results demonstrate the feasibility and practicability of the presented co­registration methods, thus providing a means of MR signal analysis and histological examination of tissue lesions via co­registered images of postmortem brain slices and their corresponding MRI sections. With this approach, it is possible to investigate the pathology of a disease through both routinely acquired MRls and postmortem brain slices, thus improving the understanding of the pathological substrates and their progression.

Pulmonary arteriovenous fistula-Report of one case- (폐동정맥루 치험 1례)

  • Im, Seung-Pyeong;Yun, Gap-Jin
    • Journal of Chest Surgery
    • /
    • v.16 no.3
    • /
    • pp.362-367
    • /
    • 1983
  • Pulmonary arteriovenous fistula is a congenital malformation resulting from errant capillary development, with incomplete formation or disintegration of the vascular septa that normally divide the primitive connections between the venous and arterial plexuses. It generally occurs as part of the disorder known as hereditary hemorrhagic telangiectasia [Rendu-Osler-Weber disease]. The hereditary lesion is transmitted as a simple non-sex-linked dominant trait. It may be single or multiple, too small to see on plain chest films or large and easily recognized. One third of the lesions are multiple on plain chest film. The pathogenesis of its symptoms is that unoxygenated, desaturated arterial blood enters into the pulmonary venous system, directly. Recently we have experienced a case of the pulmonary arteriovenous fistula in 26 years old male soldier, which was confirmed by pulmonary angiography preoperatively. 2 thumb-tip sized, well circumscribed cystic masses filled with bright red colored blood were seen in subpleural and anterolateral portion of the right upper lobe. Right upper Iobectomy was performed due to close approximation of the fistula with pulmonary vein. Microscopically, it shows angiomatous dilatation of the abnormal vessels embedding in the parenchyma. Postoperative physiologic studies show nearly normal arterial oxygen saturation, hemoglobin and RBC count. There was good, uneventful postoperative course.

  • PDF

Efficient Optical Watermark Using Multiple Phase Wrapping and Real-Valued Functions (다중위상래핑과 실수값 함수를 이용한 효율적인 광 워터마킹)

  • Cho, Kyu-Bo;Seo, Dong-Hoan;Lee, Seung-Hee;Hong, Jae-Keun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.10-19
    • /
    • 2009
  • In this paper, an efficient optical watermark method using multiple phase wrapping and real-valued decoding key is proposed. In the embedding process, two zero-padded original images placed in two quadrants on input plane are multiplied with two statistically independent random phase patterns and are Fourier transformed, respectively. Two encoded images are obtained by taking the real-valued data from these Fourier transformed images. And then two phase-encoded patterns, used as a hidden image and a decoding key, are generated by the use of multiple phase wrapping from each of the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at all quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed method.

Image watermarking technique applying multiple encryption techniques (다중 암호화 기법을 적용한 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.503-510
    • /
    • 2020
  • In this paper, we proposed an effective technique that greatly improves the security of the watermark by concealing the multiple-encrypted watermark in the LSB of the image pixel. Even if multiple encrypted watermark hidden in the LSBs of an image pixel are extracted, it is impossible to decrypt them, so the security of the watermark is maintained very high. If the watermark is multiple encrypted and hidden in the image using the proposed technique, the visual quality of the watermark-hidden image is very high, making it impossible to distinguish between the original image and the resulting image in which the watermark is hidden. The original watermark data can be completely extracted without loss, according to the procedure of the proposed technique, from the resulting image that the watermark is encrypted and hidden in the original image. The performance of the proposed technique was analyzed mathematically and the superiority of the proposed technique was confirmed through experiments. The proposed technique is an excellent image watermarking technique that greatly improves the security of the watermark hidden in the image compared to the existing technique.

A Case of Retronychia on Toenail (발톱에 발생한 역행조갑 환자의 치험례)

  • Choi, Seok-Min;Kim, Chul-Han;Kang, Sang-Gue;Tark, Min-Seong
    • Archives of Plastic Surgery
    • /
    • v.37 no.2
    • /
    • pp.178-181
    • /
    • 2010
  • Purpose: Retronychia is the embedding of the nail into proximal nail fold. Retronychia starts with disruption of the longitudinal growth of the nail. With the growth of a new nail, the old one is pushed upwards and backwards. This leads to embedding of the top nail into the ventral aspect of the proximal nail fold and results with chronic paronychia. We present a case of retronychia that was rarely reported in the literature. Methods: A 46-year old female presented with a 3-month history of painful right first, 2nd, 3rd toenail changes. Although she was initially treated with broad spectrum antibiotics, she did not response to therapy. Later, she presented to our department because of progressively worsening pain that impaired her walking. Physical examination revealed with proximal nail fold erythema, painful swelling, yellowish nail discoloration, and distal onycholysis. Bacterial and fungus culture showed no organism. Treatment was surgical nail avulsion under local anesthesia. Results: The postoperative course was uneventful. 10 months later, the patient had a normal growing nail and was free of symptoms. Conclusion: We report a case of retronychia on toenail. Retronychia is a proximal nail plate ingrowth into the proximal nail fold which is associated with multiple generations of nail plate misaligned beneath the proximal nail. Management consisted of simple avulsion of superimposed nail. Retronychia is suspected with a persistent paronychia, particularly in the setting of trauma. Avulsion of the top nail confirms the diagnosis and may be curative if the underlying nail appears healthy.