1-14hit |
Seong-Geun KWON Suk-Hwan LEE Ki-Ryong KWON Eung-Joo LEE Soo-Yol OK Sung-Ho BAE
This paper presents a watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds the copyright information and user's phone number into the spatial and encryption domains of the mobile animation data using the Buyer-Seller watermarking protocol. In addition, a user operation key is also inserted, so only the authorized user can play the 3D animation game on the mobile device. The proposed method was implemented using a mobile animation tool, and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.
Suk-Hwan LEE Seong-Geun KWON Ki-Ryong KWON
With the rapid expansion of vector data model application to digital content such as drawings and digital maps, the security and retrieval for vector data models have become an issue. In this paper, we present a vector data-hashing algorithm for the authentication, copy protection, and indexing of vector data models that are composed of a number of layers in CAD family formats. The proposed hashing algorithm groups polylines in a vector data model and generates group coefficients by the curvatures of the first and second type of polylines. Subsequently, we calculate the feature coefficients by projecting the group coefficients onto a random pattern, and finally generate the binary hash from binarization of the feature coefficients. Based on experimental results using a number of drawings and digital maps, we verified the robustness of the proposed hashing algorithm against various attacks and the uniqueness and security of the random key.
Real-time weather radar imaging technology is required for generating short-time weather forecasts. Moreover, such technology plays an important role in critical-weather warning systems that are based on vast Doppler weather radar data. In this study, we propose a weather radar imaging method that uses multi-layer contour detection and segmentation based on MAP-MRF estimation. The proposed method consists of three major steps. The first step involves generating reflectivity and velocity data using the Doppler radar in the form of raw data images of sweep unit in the polar coordinate system. Then, contour lines are detected on multi-layers using the adaptive median filter and modified Canny's detector based on curvature consistency. The second step interpolates contours on the Cartesian coordinate system using 3D scattered data interpolation and then segments the contours based on MAP-MRF prediction and the metropolis algorithm for each layer. The final step involves integrating the segmented contour layers and generating PPI images in sweep units. Experimental results show that the proposed method produces a visually improved PPI image in 45% of the time as compared to that for conventional methods.
Kee-Koo KWON Suk-Hwan LEE Seong-Geun KWON Kyung-Nam PARK Kuhn-Il LEE
A new blocking artifact reduction algorithm is proposed that uses block classification and feedforward neural network filters in the spatial domain. At first, the existence of blocking artifact is determined using statistical characteristics of neighborhood block, which is then used to classify the block boundaries into one of four classes. Thereafter, adaptive inter-block filtering is only performed in two classes of block boundaries that include blocking artifact. That is, in smooth regions with blocking artifact, a two-layer feedforward neural network filters trained by an error back-propagation algorithm is used, while in complex regions with blocking artifact, a linear interpolation method is used to preserve the image details. Experimental results show that the proposed algorithm produces better results than the conventional algorithms.
Suk-Hwan LEE Xiao-Jiao HUO Ki-Ryong KWON
With the increasing demand for geographic information and position information, the geographic information system (GIS) has come to be widely used in city planning, utilities management, natural resource environments, land surveying, etc. While most GIS maps use vector data to represent geographic information more easily and in greater detail, a GIS vector map can be easily copied, edited, and illegally distributed, like most digital data. This paper presents an invisible, blind, secure, and robust watermarking method that provides copyright protection of GIS vector digital maps by means of arc length distribution. In our method, we calculate the arc lengths of all the polylines/polygons in a map and cluster these arc lengths into a number of groups. We then embed a watermark bit by changing the arc length distribution of a suitable group. For greater security and robustness, we use a pseudo-random number sequence for processing the watermark and embed the watermark multiple times in all maps. Experimental results verify that our method has good invisibility, security, and robustness against various geometric attacks and that the original map is not needed in the watermark extraction process.
Suk-Hwan LEE Won-Joo HWANG Jai-Jin JUNG Ki-Ryong KWON
Detailed high capacity vector maps must be compressed effectively for transmission or storage in Web GIS (geographic information system) and mobile GIS applications. In this paper, we present a polyline compression method that consists of polyline feature-based hybrid simplification and second derivative-based data compression. The polyline hybrid simplification function detects the feature points from a polyline using DP, SF, and TF algorithms, and divides the polyline into sectors using these feature points. It then simplifies the sectors using an algorithm to determine the minimum area difference among the DP, SF, and TF results. The polyline data compression method segments the second derivatives of the simplified polylines into integer and fractional parts. The integer parts are compressed using the minimum bounding box of the layer to determine the broad position of the object. The fractional parts are compressed using hierarchical precision levels. Experimental results verify that our method has higher simplification and compression efficiency than conventional methods and produces good quality compressed maps.
Suk-Hwan LEE Seong-Geun KWON Kee-Koo KWON Byung-Ju KIM Jong-Won LEE Kuhn-Il LEE
The current paper presents an effective deblocking algorithm for block-based coded images using singularity detection in a wavelet transform. Blocking artifacts appear periodically at block boundaries in block-based coded images. The local maxima of a wavelet transform modulus detect all singularities, including blocking artifacts, from multiscale edges. Accordingly, the current study discriminates between a blocking artifact and an edge by estimating the Lipschitz regularity of the local maxima and removing the wavelet transform modulus of a blocking artifact that has a negative Lipschitz regularity exponent. Experimental results showed that the performance of the proposed algorithm was objectively and subjectively superior.
Ngoc-Giao PHAM Suk-Hwan LEE Ki-Ryong KWON
Nowadays, vector map content is widely used in the areas of life, science and the military. Due to the fact that vector maps bring great value and that their production process is expensive, a large volume of vector map data is attacked, stolen and illegally distributed by pirates. Thus, vector map data must be encrypted before being stored and transmitted in order to ensure the access and to prevent illegal copying. This paper presents a novel perceptual encryption algorithm for ensuring the secured storage and transmission of vector map data. Polyline data of vector maps are extracted to interpolate a spline curve, which is represented by an interpolating vector, the curvature degree coefficients, and control points. The proposed algorithm is based on encrypting the control points of the spline curve in the frequency domain of discrete cosine transform. Control points are transformed and selectively encrypted in the frequency domain of discrete cosine transform. They are then used in an inverse interpolation to generate the encrypted vector map. Experimental results show that the entire vector map is altered after the encryption process, and the proposed algorithm is very effective for a large dataset of vector maps.
Jong-Won LEE Suk-Hwan LEE Ki-Ryong KWON Kuhn-Il LEE
We proposed 3D-mesh watermarking using CEGI distribution that has robustness against mesh simplification, cropping, vertex randomization, and rotation and which does not need the original model for detection the watermark. The proposed algorithm embeds the watermark bits into the normal vector direction of meshes that are mapped into the cells that have the large magnitude of complex weight in patch CEGIs. The watermark can be detected based on the known center point of each patch and the rank table of the cell in each patch instead of original model. Experimental results verified that the proposed algorithm has robustness against the attacks.
Kee-Koo KWON Byung-Ju KIM Suk-Hwan LEE Seong-Geun KWON Kuhn-Il LEE
A novel postprocessing algorithm for reducing the blocking artifacts in block-based coded images is proposed using block classification and adaptive multi-layer perceptron (MLP). This algorithm is exploited the nonlinearity property of the neural network learning algorithm to reduce the blocking artifacts more accurately. In this algorithm, each block is classified into four classes; smooth, horizontal edge, vertical edge, and complex blocks, based on the characteristic of their discrete cosine transform (DCT) coefficients. Thereafter, according to the class information of the neighborhood block, adaptive neural network filters (NNF) are then applied to the horizontal and vertical block boundaries. That is, for each class a different two-layer NNF is used to remove the blocking artifacts. Experimental results show that the proposed algorithm produced better results than conventional algorithms both subjectively and objectively.
This paper presents 3D keyframe animation watermarking using orientation interpolators. 3D keyframe animation consists of a number of transform nodes, including a geometrical node from the initial model and several interpolator nodes that represent object movement. Therefore, the proposed algorithm randomly selects transform nodes with orientation interpolator nodes, then resamples the quaternion components to maintain a uniform key time. Thereafter, watermark bits are embedded into quaternion components with large rotation angles. Experimental results verify the robustness of the proposed algorithm to geometrical and timeline attacks, along with the subjective and objective quality of its invisibility.
Suk-Hwan LEE Seong-Geun KWON Kee-Koo KWON Byung-Ju KIM Kuhn-Il LEE
A postprocessing algorithm is presented for blocking artifact reduction in block-coded images using the adaptive filters along the pattern of neighborhood blocks. Blocking artifacts appear as irregular high-frequency components at block boundaries, thereby reducing the noncorrelation between blocks due to the independent quantization process of each block. Accordingly, block-adaptive filtering is proposed to remove such components and enable similar frequency distributions within two neighborhood blocks and a high correlation between blocks. This type of filtering consists of inter-block filtering to remove blocking artifacts at the block boundaries and intra-block filtering to remove ringing noises within a block. First, each block is classified into one of seven classes based on the characteristics of the DCT coefficient and MV (motion vector) received in the decoder. Thereafter, adaptive intra-block filters, approximated to the normalized frequency distributions of each class, are applied adaptively according to the various patterns and frequency distributions of each block as well as the filtering directions in order to reduce the blocking artifacts. Finally, intra-block filtering is performed on those blocks classified as complex to reduce any ringing noise without blurring the edges. Experimental tests confirmed the effectiveness of the proposed algorithm.
Kevin Nathanael SANTOSO Suk-Hwan LEE Won-Joo HWANG Ki-Ryong KWON
This paper presents an information hiding method for DNA steganography with which a massive amount of data can be hidden in a noncoding strand. Our method maps the encrypted data to the DNA sequence using a numerical mapping table, before concealing it in the noncoding sequence using a secret key comprising sector length and the random number generator's seed. Our encoding algorithm is sector-based and reference dependent. Using modular arithmetic, we created a unique binary-base translation for every sector. By conducting a simulation study, we showed that our method could preserve amino acid information, extract hidden data without reference to the host DNA sequence, and detect the position of mutation error. Experimental results verified that our method produced higher data capacity than conventional methods, with a bpn (bit-per-nucleotide) value that ranged from approximately 1-2, depending on the selected sector length. Additionally, our novel method detected the positions of mutation errors by the presence of a parity base in each sector.
Byung-Ju KIM Kee-Koo KWON Suk-Hwan LEE Seong-Geun KWON Kuhn-Il LEE
A novel postprocessing algorithm for concealing spatial block errors in block-based coded images is proposed using block classification with a variable operating region (VOR). In the proposed algorithm, a missing block is classified as flat, edge, or complex based on local information from the surrounding blocks which is extracted using a Sobel operation in a VOR. In this case, the VOR is determined adaptively according to the number of edge directions in the missing block. Using the classification, the flat blocks are then concealed by the linear interpolation (LI) method, the edge blocks are concealed by the boundary multi-directional interpolation (BMDI) method, and the complex blocks are concealed by a combined linear interpolation and boundary matching (CLIBM) method. Experimental results demonstrated that the proposed algorithm improved the PSNR and visual quality of the concealment for both original images and JPEG compressed images, and produced better results than conventional algorithms.