The search functionality is under construction.

Author Search Result

[Author] Suk-Hwan LEE(14hit)

1-14hit
  • Mobile 3D Game Contents Watermarking Based on Buyer-Seller Watermarking Protocol

    Seong-Geun KWON  Suk-Hwan LEE  Ki-Ryong KWON  Eung-Joo LEE  Soo-Yol OK  Sung-Ho BAE  

     
    PAPER-Application Information Security

      Vol:
    E91-D No:7
      Page(s):
    2018-2026

    This paper presents a watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds the copyright information and user's phone number into the spatial and encryption domains of the mobile animation data using the Buyer-Seller watermarking protocol. In addition, a user operation key is also inserted, so only the authorized user can play the 3D animation game on the mobile device. The proposed method was implemented using a mobile animation tool, and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • Robust Hashing of Vector Data Using Generalized Curvatures of Polyline

    Suk-Hwan LEE  Seong-Geun KWON  Ki-Ryong KWON  

     
    PAPER-Information Network

      Vol:
    E96-D No:5
      Page(s):
    1105-1114

    With the rapid expansion of vector data model application to digital content such as drawings and digital maps, the security and retrieval for vector data models have become an issue. In this paper, we present a vector data-hashing algorithm for the authentication, copy protection, and indexing of vector data models that are composed of a number of layers in CAD family formats. The proposed hashing algorithm groups polylines in a vector data model and generates group coefficients by the curvatures of the first and second type of polylines. Subsequently, we calculate the feature coefficients by projecting the group coefficients onto a random pattern, and finally generate the binary hash from binarization of the feature coefficients. Based on experimental results using a number of drawings and digital maps, we verified the robustness of the proposed hashing algorithm against various attacks and the uniqueness and security of the random key.

  • MAP-MRF Estimation Based Weather Radar Visualization

    Suk-Hwan LEE  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2018/04/10
      Vol:
    E101-D No:7
      Page(s):
    1924-1932

    Real-time weather radar imaging technology is required for generating short-time weather forecasts. Moreover, such technology plays an important role in critical-weather warning systems that are based on vast Doppler weather radar data. In this study, we propose a weather radar imaging method that uses multi-layer contour detection and segmentation based on MAP-MRF estimation. The proposed method consists of three major steps. The first step involves generating reflectivity and velocity data using the Doppler radar in the form of raw data images of sweep unit in the polar coordinate system. Then, contour lines are detected on multi-layers using the adaptive median filter and modified Canny's detector based on curvature consistency. The second step interpolates contours on the Cartesian coordinate system using 3D scattered data interpolation and then segments the contours based on MAP-MRF prediction and the metropolis algorithm for each layer. The final step involves integrating the segmented contour layers and generating PPI images in sweep units. Experimental results show that the proposed method produces a visually improved PPI image in 45% of the time as compared to that for conventional methods.

  • Blocking Artifact Reduction in Block-Coded Image Using Block Classification and Feedforward Neural Network

    Kee-Koo KWON  Suk-Hwan LEE  Seong-Geun KWON  Kyung-Nam PARK  Kuhn-Il LEE  

     
    LETTER-Digital Signal Processing

      Vol:
    E85-A No:7
      Page(s):
    1742-1745

    A new blocking artifact reduction algorithm is proposed that uses block classification and feedforward neural network filters in the spatial domain. At first, the existence of blocking artifact is determined using statistical characteristics of neighborhood block, which is then used to classify the block boundaries into one of four classes. Thereafter, adaptive inter-block filtering is only performed in two classes of block boundaries that include blocking artifact. That is, in smooth regions with blocking artifact, a two-layer feedforward neural network filters trained by an error back-propagation algorithm is used, while in complex regions with blocking artifact, a linear interpolation method is used to preserve the image details. Experimental results show that the proposed algorithm produces better results than the conventional algorithms.

  • Vector Watermarking Method for Digital Map Protection Using Arc Length Distribution

    Suk-Hwan LEE  Xiao-Jiao HUO  Ki-Ryong KWON  

     
    PAPER-Information Network

      Vol:
    E97-D No:1
      Page(s):
    34-42

    With the increasing demand for geographic information and position information, the geographic information system (GIS) has come to be widely used in city planning, utilities management, natural resource environments, land surveying, etc. While most GIS maps use vector data to represent geographic information more easily and in greater detail, a GIS vector map can be easily copied, edited, and illegally distributed, like most digital data. This paper presents an invisible, blind, secure, and robust watermarking method that provides copyright protection of GIS vector digital maps by means of arc length distribution. In our method, we calculate the arc lengths of all the polylines/polygons in a map and cluster these arc lengths into a number of groups. We then embed a watermark bit by changing the arc length distribution of a suitable group. For greater security and robustness, we use a pseudo-random number sequence for processing the watermark and embed the watermark multiple times in all maps. Experimental results verify that our method has good invisibility, security, and robustness against various geometric attacks and that the original map is not needed in the watermark extraction process.

  • Vector Map Data Compression Using Polyline Feature

    Suk-Hwan LEE  Won-Joo HWANG  Jai-Jin JUNG  Ki-Ryong KWON  

     
    PAPER-Multimedia Environment Technology

      Vol:
    E97-A No:7
      Page(s):
    1595-1604

    Detailed high capacity vector maps must be compressed effectively for transmission or storage in Web GIS (geographic information system) and mobile GIS applications. In this paper, we present a polyline compression method that consists of polyline feature-based hybrid simplification and second derivative-based data compression. The polyline hybrid simplification function detects the feature points from a polyline using DP, SF, and TF algorithms, and divides the polyline into sectors using these feature points. It then simplifies the sectors using an algorithm to determine the minimum area difference among the DP, SF, and TF results. The polyline data compression method segments the second derivatives of the simplified polylines into integer and fractional parts. The integer parts are compressed using the minimum bounding box of the layer to determine the broad position of the object. The fractional parts are compressed using hierarchical precision levels. Experimental results verify that our method has higher simplification and compression efficiency than conventional methods and produces good quality compressed maps.

  • Deblocking Algorithm for Block-Based Coded Images Using Singularity Detection from Multiscale Edges

    Suk-Hwan LEE  Seong-Geun KWON  Kee-Koo KWON  Byung-Ju KIM  Jong-Won LEE  Kuhn-Il LEE  

     
    LETTER-Image

      Vol:
    E86-A No:8
      Page(s):
    2172-2178

    The current paper presents an effective deblocking algorithm for block-based coded images using singularity detection in a wavelet transform. Blocking artifacts appear periodically at block boundaries in block-based coded images. The local maxima of a wavelet transform modulus detect all singularities, including blocking artifacts, from multiscale edges. Accordingly, the current study discriminates between a blocking artifact and an edge by estimating the Lipschitz regularity of the local maxima and removing the wavelet transform modulus of a blocking artifact that has a negative Lipschitz regularity exponent. Experimental results showed that the performance of the proposed algorithm was objectively and subjectively superior.

  • Perceptual Encryption Based on Features of Interpolating Curve for Vector Map

    Ngoc-Giao PHAM  Suk-Hwan LEE  Ki-Ryong KWON  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:5
      Page(s):
    1156-1164

    Nowadays, vector map content is widely used in the areas of life, science and the military. Due to the fact that vector maps bring great value and that their production process is expensive, a large volume of vector map data is attacked, stolen and illegally distributed by pirates. Thus, vector map data must be encrypted before being stored and transmitted in order to ensure the access and to prevent illegal copying. This paper presents a novel perceptual encryption algorithm for ensuring the secured storage and transmission of vector map data. Polyline data of vector maps are extracted to interpolate a spline curve, which is represented by an interpolating vector, the curvature degree coefficients, and control points. The proposed algorithm is based on encrypting the control points of the spline curve in the frequency domain of discrete cosine transform. Control points are transformed and selectively encrypted in the frequency domain of discrete cosine transform. They are then used in an inverse interpolation to generate the encrypted vector map. Experimental results show that the entire vector map is altered after the encryption process, and the proposed algorithm is very effective for a large dataset of vector maps.

  • Complex EGI Based 3D-Mesh Watermarking

    Jong-Won LEE  Suk-Hwan LEE  Ki-Ryong KWON  Kuhn-Il LEE  

     
    LETTER

      Vol:
    E88-A No:6
      Page(s):
    1512-1519

    We proposed 3D-mesh watermarking using CEGI distribution that has robustness against mesh simplification, cropping, vertex randomization, and rotation and which does not need the original model for detection the watermark. The proposed algorithm embeds the watermark bits into the normal vector direction of meshes that are mapped into the cells that have the large magnitude of complex weight in patch CEGIs. The watermark can be detected based on the known center point of each patch and the rank table of the cell in each patch instead of original model. Experimental results verified that the proposed algorithm has robustness against the attacks.

  • Adaptive Postprocessing Algorithm in Block-Coded Images Using Block Classification and MLP

    Kee-Koo KWON  Byung-Ju KIM  Suk-Hwan LEE  Seong-Geun KWON  Kuhn-Il LEE  

     
    LETTER-Image

      Vol:
    E86-A No:4
      Page(s):
    961-967

    A novel postprocessing algorithm for reducing the blocking artifacts in block-based coded images is proposed using block classification and adaptive multi-layer perceptron (MLP). This algorithm is exploited the nonlinearity property of the neural network learning algorithm to reduce the blocking artifacts more accurately. In this algorithm, each block is classified into four classes; smooth, horizontal edge, vertical edge, and complex blocks, based on the characteristic of their discrete cosine transform (DCT) coefficients. Thereafter, according to the class information of the neighborhood block, adaptive neural network filters (NNF) are then applied to the horizontal and vertical block boundaries. That is, for each class a different two-layer NNF is used to remove the blocking artifacts. Experimental results show that the proposed algorithm produced better results than conventional algorithms both subjectively and objectively.

  • 3D Keyframe Animation Watermarking Based on Orientation Interpolator

    Suk-Hwan LEE  Ki-Ryong KWON  

     
    PAPER-Application Information Security

      Vol:
    E90-D No:11
      Page(s):
    1751-1761

    This paper presents 3D keyframe animation watermarking using orientation interpolators. 3D keyframe animation consists of a number of transform nodes, including a geometrical node from the initial model and several interpolator nodes that represent object movement. Therefore, the proposed algorithm randomly selects transform nodes with orientation interpolator nodes, then resamples the quaternion components to maintain a uniform key time. Thereafter, watermark bits are embedded into quaternion components with large rotation angles. Experimental results verify the robustness of the proposed algorithm to geometrical and timeline attacks, along with the subjective and objective quality of its invisibility.

  • Postprocessing Algorithm in Block-Coded Images Using the Adaptive Filters along the Pattern of Neighborhood Blocks

    Suk-Hwan LEE  Seong-Geun KWON  Kee-Koo KWON  Byung-Ju KIM  Kuhn-Il LEE  

     
    LETTER-Image Processing, Image Pattern Recognition

      Vol:
    E85-D No:12
      Page(s):
    1967-1974

    A postprocessing algorithm is presented for blocking artifact reduction in block-coded images using the adaptive filters along the pattern of neighborhood blocks. Blocking artifacts appear as irregular high-frequency components at block boundaries, thereby reducing the noncorrelation between blocks due to the independent quantization process of each block. Accordingly, block-adaptive filtering is proposed to remove such components and enable similar frequency distributions within two neighborhood blocks and a high correlation between blocks. This type of filtering consists of inter-block filtering to remove blocking artifacts at the block boundaries and intra-block filtering to remove ringing noises within a block. First, each block is classified into one of seven classes based on the characteristics of the DCT coefficient and MV (motion vector) received in the decoder. Thereafter, adaptive intra-block filters, approximated to the normalized frequency distributions of each class, are applied adaptively according to the various patterns and frequency distributions of each block as well as the filtering directions in order to reduce the blocking artifacts. Finally, intra-block filtering is performed on those blocks classified as complex to reduce any ringing noise without blurring the edges. Experimental tests confirmed the effectiveness of the proposed algorithm.

  • Information Hiding in Noncoding DNA for DNA Steganography

    Kevin Nathanael SANTOSO  Suk-Hwan LEE  Won-Joo HWANG  Ki-Ryong KWON  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:7
      Page(s):
    1529-1536

    This paper presents an information hiding method for DNA steganography with which a massive amount of data can be hidden in a noncoding strand. Our method maps the encrypted data to the DNA sequence using a numerical mapping table, before concealing it in the noncoding sequence using a secret key comprising sector length and the random number generator's seed. Our encoding algorithm is sector-based and reference dependent. Using modular arithmetic, we created a unique binary-base translation for every sector. By conducting a simulation study, we showed that our method could preserve amino acid information, extract hidden data without reference to the host DNA sequence, and detect the position of mutation error. Experimental results verified that our method produced higher data capacity than conventional methods, with a bpn (bit-per-nucleotide) value that ranged from approximately 1-2, depending on the selected sector length. Additionally, our novel method detected the positions of mutation errors by the presence of a parity base in each sector.

  • Spatial Error Concealment Algorithm Using Novel Block Classification with a Variable Operating Region

    Byung-Ju KIM  Kee-Koo KWON  Suk-Hwan LEE  Seong-Geun KWON  Kuhn-Il LEE  

     
    LETTER-Image

      Vol:
    E86-A No:6
      Page(s):
    1554-1559

    A novel postprocessing algorithm for concealing spatial block errors in block-based coded images is proposed using block classification with a variable operating region (VOR). In the proposed algorithm, a missing block is classified as flat, edge, or complex based on local information from the surrounding blocks which is extracted using a Sobel operation in a VOR. In this case, the VOR is determined adaptively according to the number of edge directions in the missing block. Using the classification, the flat blocks are then concealed by the linear interpolation (LI) method, the edge blocks are concealed by the boundary multi-directional interpolation (BMDI) method, and the complex blocks are concealed by a combined linear interpolation and boundary matching (CLIBM) method. Experimental results demonstrated that the proposed algorithm improved the PSNR and visual quality of the concealment for both original images and JPEG compressed images, and produced better results than conventional algorithms.