Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 11, Issue 12 - Dec 2008
Volume 11, Issue 11 - Nov 2008
Volume 11, Issue 10 - Oct 2008
Volume 11, Issue 9 - Sep 2008
Volume 11, Issue 8 - Aug 2008
Volume 11, Issue 7 - Jul 2008
Volume 11, Issue 6 - Jun 2008
Volume 11, Issue 5 - May 2008
Volume 11, Issue 4 - Apr 2008
Volume 11, Issue 3 - Mar 2008
Volume 11, Issue 2 - Feb 2008
Volume 11, Issue 1 - Jan 2008
Selecting the target year
A Study on Out-of-Vocabulary Rejection Algorithms using Variable Confidence Thresholds
Bhang, Ki-Duck ; Kang, Chul-Ho ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1471~1479
In this paper, we propose a technique to improve Out-Of-Vocabulary(OOV) rejection algorithms in variable vocabulary recognition system which is much used in ASR(Automatic Speech Recognition). The rejection system can be classified into two categories by their implementation method, keyword spotting method and utterance verification method. The utterance verification method uses the likelihood ratio of each phoneme Viterbi score relative to anti-phoneme score for deciding OOV. In this paper, we add speaker verification system before utterance verification and calculate an speaker verification probability. The obtained speaker verification probability is applied for determining the proposed variable-confidence threshold. Using the proposed method, we achieve the significant performance improvement; CA(Correctly Accepted for keyword) 94.23%, CR(Correctly Rejected for out-of-vocabulary) 95.11% in office environment, and CA 91.14%, CR 92.74% in noisy environment.
Design of a Lossless Audio Coding Using Cholesky Decomposition and Golomb-Rice Coding
Cheong, Cheon-Dae ; Shin, Jae-Ho ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1480~1490
Design of a linear predictor and matching of an entropy coder is the art of lossless audio coding. In this paper, we use the covariance method and the Choleskey decomposition for calculating linear prediction coefficients instead of the autocorreation method and the Levinson-Durbin recursion. These results are compared to the polynomial predictor. Both of them, the predictor which has small prediction error is selected. For the entropy coding, we use the Golomb-Rice coder using the block-based parameter estimation method and the sequential adaptation method with LOCO-land RLGR. The proposed predictor and the block-based parameter estimation have
improved compression ratios compared to FLAC lossless audio coder which use the autocorrelation method and the Levinson-Durbin recursion. The proposed predictor and the LOCO-I adaptation method could improved by
. But the proposed predictor and the RLGR adaptation method got better results with specific signals.
A Recognition Algorithm of Suspicious Human Behaviors using Hidden Markov Models in an Intelligent Surveillance System
Jung, Chang-Wook ; Kang, Dong-Joong ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1491~1500
This paper proposes an intelligent surveillance system to recognize suspicious patterns of the human behavior by using the Hidden Markov Model. First, the method finds foot area of the human by motion detection algorithm from image sequence of the surveillance camera. Then, these foot locus form observation series of features to learn the HMM. The feature that is position of the human foot is changed to each code that corresponds to a specific label among 16 local partitions of image region. Therefore, specific moving patterns formed by the foot locus are the series of the label numbers. The Baum-Welch algorithm of the HMM learns each suspicious and specific pattern to classify the human behaviors. To recognize the inputted human behavior pattern in a test image, the probabilistic comparison between the learned pattern of the HMM and foot series to be tested decides the categorization of the test pattern. The experimental results show that the method can be applied to detect a suspicious person prowling in corridor.
3D Face Recognition using Wavelet Transform Based on Fuzzy Clustering Algorithm
Lee, Yeung-Hak ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1501~1514
The face shape extracted by the depth values has different appearance as the most important facial information. The face images decomposed into frequency subband are signified personal features in detail. In this paper, we develop a method for recognizing the range face images by multiple frequency domains for each depth image using the modified fuzzy c-mean algorithm. For the proposed approach, the first step tries to find the nose tip that has a protrusion shape on the face from the extracted face area. And the second step takes into consideration of the orientated frontal posture to normalize. Multiple contour line areas which have a different shape for each person are extracted by the depth threshold values from the reference point, nose tip. And then, the frequency component extracted from the wavelet subband can be adopted as feature information for the authentication problems. The third step of approach concerns the application of eigenface to reduce the dimension. And the linear discriminant analysis (LDA) method to improve the classification ability between the similar features is adapted. In the last step, the individual classifiers using the modified fuzzy c-mean method based on the K-NN to initialize the membership degree is explained for extracted coefficient at each resolution level. In the experimental results, using the depth threshold value 60 (DT60) showed the highest recognition rate among the extracted regions, and the proposed classification method achieved 98.3% recognition rate, incase of fuzzy cluster.
A License Plate Detection Method Using Multiple-Color Model and Character Layout Information in Complex Background
Kim, Min-Ki ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1515~1524
This paper proposes a method that detects a license plate in complex background using a multiple-color model and character layout information. A layout of a green license plate is different from that of a white license plate. So, this study used a strategy that firstly assumes the plate color and then utilizes its layout information. At first, it extracts green areas from an input image using a multiple-color model which combined HIS and YIQ color models with RGB color model. If green areas are detected, it searches the character layout of the green plate by analyzing the connected components in each areas. If not detected, it searches the character layout of the white plate in all area. Finally, it extracts a license plate by grouping the connected components which corresponds to characters. Experimental result shows that 98.1% of 419 input images are correctly detected. It also shows that the proposed method is robust against illumination, shadow, and weather condition.
A Simulation of Mobile Base Station Placement for HAP based Networks by Clustering of Mobile Ground Nodes
Song, Ha-Yoon ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1525~1535
High Altitude Platform (HAP) based networks deploy network infrastructures of Mobile Base Station (MBS) in a form of Unmanned Aerial Vehicle (UAV) at stratosphere in order to build network configuration. The ultimate goal of HAP based network is a wireless network service for wide area by deploying multiple MBS for such area. In this paper we assume multiple UAVs over designated area and solve the MBS placement and coverage problem by clustering the mobile ground nodes. For this study we assumed area around Cheju island and nearby naval area where multiple mobile and fixed nodes are deployed and requires HAP based networking service. By simulation, visual results of stratospheric MBS placement have been presented. These results include clustering, MBS placement and coverage as well as dynamic reclustering according to the movement of mobile ground nodes.
Performance Evaluation of the RSVP-capable Router using Latency-Optimized Fair Queuing Scheduler
Kim, Tae-Joon ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1536~1546
RSVP-capable router supporting guaranteed services on the internet generally uses a packet scheduler based on the Weighted Fair Queuing (WFQ) algorithm to secure required qualities of traffic flows. A RSVP-capable router based on the LOFQ (Latency optimized fair queuing) algorithm had been proposed to improve the performance of the WFQ-based RSVP-router, but it required not only the RESV message to be expanded but also its performance could be evaluated only through simulation. This paper proposed a LOFQ based RSVP-capable router using the conventional RESV message and developed an algorithm to analyze the performance of the LOFQ based RSVP-capable routers. The performance evaluation using the developed algorithm showed that in terms of performance improvement the proposed router is inferior to the one using the expanded RESV message under a small packet size, but on the range of a large packet size both routers provide the same improvement.
A Study of Fire Shunt Guidance Based on Wireless Sensor Networks
Kim, Yong-Woo ; Kim, Do-Hyeon ; Kwak, Ho-Young ; Park, Hee-Dong ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1547~1554
This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.
Design of Invisible Watermarking for Biometric Image of Electronic ID Card
Shin, Yong-Nyuo ; Lee, Yong-Jun ; Kim, Won-Gyum ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1555~1565
Biometric information such as face and fingerprint information is highlighted in many security areas, including authentication, due to its uniqueness and convenience factors. However, if exploited maliciously, it can cause more serious damage than traditional security measures, like passwords. This paper reviews the watermarking method that is able to verify the integrity of this biometric information. The watermark to be inserted is the date of the biometric information acquisition. It is combined with 16-bit Cyclic Redundancy Checks prior to insertion. In particular, face and fingerprint images are saved in a specific compressed format. The proposed watermarking algorithm will be designed in such a way as to remain resilient against compression. The watermark inserted at the acquisition stage will be extracted at each storage and deployment stage, so that the integrity of the biometric information can be verified.
A Study of a Knowledge Inference Algorithm using an Association Mining Method based on Ontologies
Hwang, Hyun-Suk ; Lee, Jun-Yeon ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1566~1574
Researches of current information searching focus on providing personalized results as well as matching needed queries in an enormous amount of information. This paper aims at discovering hidden knowledge to provide personalized and inferred search results based on the ontology with categorized concepts and relations among data. The current searching occasionally presents too much redundant information or offers no matching results from large volumes of data. To lessen this disadvantages in the information searching, we propose an inference algorithm that supports associated and inferred searching through the Jess engine based on the OWL ontology constraints and knowledge expressed by SWRL with association rules. After constructing the personalized preference ontology for domains such as restaurants, gas stations, bakeries, and so on, it shows that new knowledge information generated from the ontology and the rules is provided with an example of the domain of gas stations.
Capture of Foot Motion for Real-time Virtual Wearing by Stereo Cameras
Jung, Da-Un ; Yun, Yong-In ; Choi, Jong-Soo ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1575~1591
In this paper, we propose a new method detecting foot motion capture in order to overlap in realtime foot's 3D virtual model from stereo cameras. In order to overlap foot's virtual model at the same position of the foot, a process of the foot's joint detection to regularly track the foot's joint motion is necessary, and accurate register both foot's virtual model and user's foot in complicated motion is most important problem in this technology. In this paper, we propose a dynamic registration using two types of marker groups. A plane information of the ground handles the relationship between foot's virtual model and user's foot and obtains foot's pose and location. Foot's rotation is predicted by two attached marker groups according to instep of center framework. Consequently, we had implemented our proposed system and estimated the accuracy of the proposed method using various experiments.
CGS System based on Three-Dimensional Character Modeling I (Part1:About Non-Digital Process)
Cho, Dong-Min ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1592~1600
This study is to help creative idea generation based on the theory of the 'reconstruction of character shape image elements', and aims to extrusion of creative and diverse shapes with combination of image elements upon computing creative image generation. In order to suggest the design generation methodology for the maximization of idea generation ability and to overcome restriction of thinking out of existing idea generation methodology, it has suggested the CGS(Character Generation System) that is a creative idea generation methodology identified and complemented the problem of the existing computerized idea generation(PDS with Proportion) method out of the preceded studies on the creative idea generation methodologies. this study is expected to have effectives as one method for idea generation or creative image generation assistance during the 3D character development process, and to serve as an assistance to overcome the restriction of the character shape image generation through diverse idea generations.
High-Speed Search Mechanism based on B-Tree Index Vector for Huge Web Log Mining and Web Attack Detection
Lee, Hyung-Woo ; Kim, Tae-Su ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1601~1614
The number of web service users has been increased rapidly as existing services are changed into the web-based internet applications. Therefore, it is necessary for us to use web log pre-processing technique to detect attacks on diverse web service transactions and it is also possible to extract web mining information. However, existing mechanisms did not provide efficient pre-processing procedures for a huge volume of web log data. In this paper, we proposed both a field based parsing and a high-speed log indexing mechanism based on the suggested B-tree Index Vector structure for performance enhancement. In experiments, the proposed mechanism provides an efficient web log pre-processing and search functions with a session classification. Therefore it is useful to enhance web attack detection function.
Insect Footprint Recognition using Trace Transform and a Fuzzy Method
Shin, Bok-Suk ; Cha, Eui-Young ; Woo, Young-Woon ;
Journal of Korea Multimedia Society, volume 11, issue 11, 2008, Pages 1615~1623
This paper proposes methods to classify scanned insect footprints. We propose improved SOM and ART2 algorithms for extracting segments, basic areas for feature extraction, and utilize Trace transform and fuzzy weighted mean methods for extracting feature values for classification of the footprints. In the proposed method, regions are extracted by a morphological method in the beginning, and then improved SOM and ART2 algorithms are utilized to extract segments regardless of kinds of insects. Next, A Trace transform method is used to find feature values suitable for various kinds of deformation of insect footprints. In the Trace transform method, Triple features from reconstructed combination of diverse functions, are used to classify the footprints. In general, it is very difficult to decide automatically whether the extracted footprint segment is meaningful for classification or not. So we use a fuzzy weighted mean method for not excluding uncertain footprint segments because the uncertain footprint segments may be possible candidates for classification. We present experimental results of footprint segment extraction and segment classification by the proposed methods.