Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 14, Issue 12 - Dec 2011
Volume 14, Issue 11 - Nov 2011
Volume 14, Issue 10 - Oct 2011
Volume 14, Issue 9 - Sep 2011
Volume 14, Issue 8 - Aug 2011
Volume 14, Issue 7 - Jul 2011
Volume 14, Issue 6 - Jun 2011
Volume 14, Issue 5 - May 2011
Volume 14, Issue 4 - Apr 2011
Volume 14, Issue 3 - Mar 2011
Volume 14, Issue 2 - Feb 2011
Volume 14, Issue 1 - Jan 2011
Selecting the target year
Cepstral Normalization Combined with CSFN for Noisy Speech Recognition
Choi, Sook-Nam ; Shen, Guang-Hu ; Chung, Hyun-Yeol ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1221~1228
DOI : 10.9717/kmms.2011.14.10.1221
The speech recognition system works well in general indoor environment. However, the recognition performance is dramatically decreased when the system is used in the real environment because of the several noises. In this paper we proposed CSFN-CMVN to improve the recognition performance of the existing CSFN(Cepstral distance based SFN). The CSFN-CMVN method is a combined method of cepstral normalization with CSFN that normalizes silence features using cepstral euclidean distance to classify speech/silence for better performance. From the test results using Aurora 2.0 DB, we could find out that our proposed CSFN-CMVN improves about 7% of more average word accuracy in all the test sets comparing with the typical silence features normalization SFN-I. We can also get improved accuracy of 6% and 5% respectively in compared tests with the conventional SFN-II and CSFN, showing the effectiveness of our proposed method.
Real-time Volume Rendering using Point-Primitive
Kang, Dong-Soo ; Shin, Byeong-Seok ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1229~1237
DOI : 10.9717/kmms.2011.14.10.1229
The volume ray-casting method is one of the direct volume rendering methods that produces high-quality images as well as manipulates semi-transparent object. Although the volume ray-casting method produces high-quality image by sampling in the region of interest, its rendering speed is slow since the color acquisition process is complicated for repetitive memory reference and accumulation of sample values. Recently, the GPU-based acceleration techniques are introduced. However, they require pre-processing or additional memory. In this paper, we propose efficient point-primitive based method to overcome complicated computation of GPU ray-casting. It presents semi-transparent objects, however it does not require preprocessing and additional memory. Our method is fast since it generates point-primitives from volume dataset during sampling process and it projects the primitives onto the image plane. Also, our method can easily cope with OTF change because we can add or delete point-primitive in real-time.
An Efficient Architecture Design of Low Complexity in Quantization of H.264/AVC
Lama, Ramesh Kumar ; Yun, Jung-Hyun ; Kwon, Goo-Rak ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1238~1242
DOI : 10.9717/kmms.2011.14.10.1238
An efficient architecture for the reduction of complexity in forward quantization of H.264/AVC is presented in this paper. Since the multiplication operation in forward quantization plays crucial role in complexity of algorithm. More efficient quantization architecture with simplified high speed multiplier is proposed. It uses the modification of the quantization operation and the high speed multiplier is applied for simplification of quantization process.
A Vehicle Model Recognition using Car`s Headlights Features and Homogeneity Information
Kim, Mih-Ho ; Choi, Doo-Hyun ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1243~1251
DOI : 10.9717/kmms.2011.14.10.1243
This paper proposes a new vehicle model recognition using scale invariant feature transform to car`s headlights image. Proposed vehicle model recognition raises the accuracy using "homogeneity" calculated from the distribution of features. In the experiment with 400 test images taken from 54 different vehicles, proposed method has 90% recognition rate and 16.45 homogeneity.
Content based Video Segmentation Algorithm using Comparison of Pattern Similarity
Won, In-Su ; Cho, Ju-Hee ; Na, Sang-Il ; Jin, Ju-Kyong ; Jeong, Jae-Hyup ; Jeong, Dong-Seok ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1252~1261
DOI : 10.9717/kmms.2011.14.10.1252
In this paper, we propose the comparison method of pattern similarity for video segmentation algorithm. The shot boundary type is categorized as 2 types, abrupt change and gradual change. The representative examples of gradual change are dissolve, fade-in, fade-out or wipe transition. The proposed method consider the problem to detect shot boundary as 2-class problem. We concentrated if the shot boundary event happens or not. It is essential to define similarity between frames for shot boundary detection. We proposed 2 similarity measures, within similarity and between similarity. The within similarity is defined by feature comparison between frames belong to same shot. The between similarity is defined by feature comparison between frames belong to different scene. Finally we calculated the statistical patterns comparison between the within similarity and between similarity. Because this measure is robust to flash light or object movement, our proposed algorithm make contribution towards reducing false positive rate. We employed color histogram and mean of sub-block on frame image as frame feature. We performed the experimental evaluation with video dataset including set of TREC-2001 and TREC-2002. The proposed algorithm shows the performance, 91.84% recall and 86.43% precision in experimental circumstance.
A Study on the Fast Removement of Overlaps in Image Morphing Using Mass-Spring System
Choi, Do-Won ; Hwang, Chi-Jung ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1262~1274
DOI : 10.9717/kmms.2011.14.10.1262
A fast and stable deformation model is essential for realistic simulation of image morphing. In order to stabilize deformation, we used two internal thin plate mass-spring systems that compute the displacements of the x- and y-components of all nodes on the mesh. The deformation results are globally smoother and more stable due to the direction limitation of thin plate mass-spring systems. One-to-one deformation is one of the important issues in image morphing. We focus on fast removing overlaps in the process of deformation. To rapidly remove overlaps, the external forces are set automatically on four or eight neighboring nodes. The speed of removing overlaps is faster when external forces are set on four or eight neighbouring nodes than when on two neighbouring nodes.
A Systolic Array for High-Speed Computing of Full Search Block Matching Algorithm
Jung, Soon-Ho ; Woo, Chong-Ho ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1275~1286
DOI : 10.9717/kmms.2011.14.10.1275
This paper proposes a high speed systolic array architecture for full search block matching algorithm (FBMA). The pixels of the search area for a reference block are input only one time to find the matched candidate block and reused to compute the sum of absolute difference (SAD) for the adjacent candidate blocks. Each row of designed 2-dimensional systolic array compares the reference block with the adjacent blocks of the same row in search area. The lower rows of the designed array get the pixels from the upper row and compute the SAD with reusing the overlapped pixels of the candidate blocks within same column of the search area. This designed array has no data broadcasting and global paths. The comparison with existing architectures shows that this array is superior in terms of throughput through it requires a little more hardware.
An Adaptive Regional Clustering Scheme Based on Threshold-Dataset in Wireless Sensor Networks for Monitoring of Weather Conditions
Choi, Dong-Min ; Shen, Jian ; Chung, Il-Yong ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1287~1302
DOI : 10.9717/kmms.2011.14.10.1287
Clustering protocol that is used in wireless sensor network is an efficient method that extends the lifetime of the network. However, when this method is applied to an environment in which collected data of the sensor node easily overlap, sensor nodes unnecessarily consumes energy. In the case of clustering technique that uses a threshold, the lifetime of the network is extended but the degree of accuracy of collected data is low. Therefore it is hard to trust the data and improvement is needed. In addition, it is hard for the clustering protocol that uses multi-hop transmission to normally collect data because the selection of a cluster head node occurs at random and therefore the link of nodes is often disconnected. Accordingly this paper suggested a cluster-formation algorithm that reduces unnecessary energy consumption and that works with an alleviated link disconnection. According to the result of performance analysis, the suggested method lets the nodes consume less energy than the existing clustering method and the transmission efficiency is increased and the entire lifetime is prolonged by about 30%.
A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment
Lee, Byung-Kwan ; Jeong, Eun-Hee ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1303~1310
DOI : 10.9717/kmms.2011.14.10.1303
This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner`s data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.
A Study on Design and Implementation of Gesture Proposal System
Moon, Sung-Hyun ; Yoon, Tae-Hyun ; Hwang, In-Sung ; Kim, Seok-Kyoo ; Park, Jun ; Han, Sang-Yong ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1311~1322
DOI : 10.9717/kmms.2011.14.10.1311
Gesture is applied in many applications such as smart-phone, tablet-PC, and web-browser since it is a fast and simple way to invoke commands. For gesture applications, a gesture designer needs to consider both user and system during designing gestures. In spite of development of gesture design tools, some difficulties for gesture design still remains as followings; first, a designer must design every gesture manually one by one, and, second, a designer must repeatedly train gestures. In this paper, we propose a gesture proposal system that automates gesture training and gesture generation to provide more simple gesture design environment. Using automation of gesture training, a designer does not need to manually train gestures. Proposed gesture proposal system would decrease difficulties of gesture design by suggesting gestures of high recognition possibility that are generated based on mahalanobis distance calculation among generated and pre-existing gestures.
Border-based HSFI Algorithm for Hiding Sensitive Frequent Itemsets
Lee, Dan-Young ; An, Hyoung-Keun ; Koh, Jae-Jin ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1323~1334
DOI : 10.9717/kmms.2011.14.10.1323
This paper suggests the border based HSFI algorithm to hide sensitive frequent itemsets. Node formation of FP-Tree which is different from the previous one uses the border to minimize the impacts of nonsensitive frequent itemsets in hiding process, including the organization of sensitive and border information, and all transaction as well. As a result of applying HSFI algorithms, it is possible to be the example transaction database, by significantly reducing the lost items, it turns out that HSFI algorithm is more effective than the existing algorithm for maintaining the quality of more improved database.
Design and Implementation of A Weakness Analyzer for Mobile Applications
Mun, Il-Yong ; Oh, Se-Man ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1335~1347
DOI : 10.9717/kmms.2011.14.10.1335
The dissemination and use of mobile applications have been rapidly expanding these days. And in such a situation, the security of mobile applications has emerged as a new issue. Although the safety of general software such as desktop and enterprise software is systematically achieved from the development phase to the verification phase through secure coding, there have been not sufficient studies on the safety of mobile applications yet. This paper deals with deriving weakness enumeration specialized in mobile applications and implementing a tool that can automatically analyze the derived weakness. Deriving the weakness enumeration can be achieved based on CWE(Common Weakness Enumeration) and CERT(Computer Emergency Response Team) relating to the event-driven method that is generally used in developing mobile applications. The analysis tool uses the dynamic tests to check whether there are specified vulnerabilities in the source code of mobile applications. Moreover, the derived vulnerability could be used as a guidebook for programmers to develop mobile applications.
A Study on Children Edutainment Contents Development with Hand Gesture Recognition and Electronic Dice
Ok, Soo-Yol ;
Journal of Korea Multimedia Society, volume 14, issue 10, 2011, Pages 1348~1364
DOI : 10.9717/kmms.2011.14.10.1348
As the existing edutainment contents for children are mostly comprised of educational tools which unilaterally induce educatees to passively respond to them, the content-creating methodologies in terms of which active and voluntary learning is made possible is urgently needed. In this paper, we present the implementation of the tangible `electronic dice` interface as an interactive tool for behavior-based edutainment contents, and propose a methodology for developing edutainment contents for children by utilizing the recognition technique of hand movement based on depth-image information. Also proposed in the paper are an authoring and management tool of learning quizzes that allows educators to set up and manage their learning courseware, and a log analysis system of learning achievement for real-time monitoring of educational progress. The behavior-based tangible interface and edutainment contents that we propose provide the easy-to-operate interaction with a real object, which augments educatees` interest in learning, thus leading to their active and voluntary attitude toward learning. Furthermore, The authoring and management tool and log analysis system allow us to construct learning programs by children`s achievement level and to monitor in real-time the learning development of children educatees by understanding the situation and behavior of their learning development from the analytic results obtained by observing the processes of educatees` solving problems for themselves, and utilizing them for evaluation materials for lesson plans.