Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 15, Issue 12 - Dec 2012
Volume 15, Issue 11 - Nov 2012
Volume 15, Issue 10 - Oct 2012
Volume 15, Issue 9 - Sep 2012
Volume 15, Issue 8 - Aug 2012
Volume 15, Issue 7 - Jul 2012
Volume 15, Issue 6 - Jun 2012
Volume 15, Issue 5 - May 2012
Volume 15, Issue 4 - Apr 2012
Volume 15, Issue 3 - Mar 2012
Volume 15, Issue 2 - Feb 2012
Volume 15, Issue 1 - Jan 2012
Selecting the target year
Detection of Forged Regions and Filtering Regions of Digital Images Using the Characteristics of Re-interpolation
Hwang, Min-Gu ; Har, Dong-Hwan ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 179~194
DOI : 10.9717/kmms.2012.15.2.179
Digital image forgery is becoming a topic of great interest with regard to honesty in imaging. We can often see forged digital images in a variety of places, such as the internet, and magazines, and in images used in political ads, etc. These can reduce the reliability and factual basis of the information contained in image. Therefore, objectivity is needed to determine if the image is forged so as to prevent confusion in the viewing public. Most digital forgeries consist of image resizing, rotating including the following interpolations. To find evidence of interpolation in forged images, this paper proposes a new method for detecting digital image forgery using general interpolation factors analyzed through re-interpolation algorithm of the forged images in order to determine the differences in the patterns. Through the re-interpolation algorithm we could detect the forged region and filtering region used image retouching included to interpolation.
Ground Target Classification Algorithm based on Multi-Sensor Images
Lee, Eun-Young ; Gu, Eun-Hye ; Lee, Hee-Yul ; Cho, Woong-Ho ; Park, Kil-Houm ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 195~203
DOI : 10.9717/kmms.2012.15.2.195
This paper proposes ground target classification algorithm based on decision fusion and feature extraction method using multi-sensor images. The decisions obtained from the individual classifiers are fused by applying a weighted voting method to improve target recognition rate. For classifying the targets belong to the individual sensors images, features robust to scale and rotation are extracted using the difference of brightness of CM images obtained from CCD image and the boundary similarity and the width ratio between the vehicle body and turret of target in FLIR image. Finally, we verity the performance of proposed ground target classification algorithm and feature extraction method by the experimentation.
Segmentation of Defective Regions based on Logical Discernment and Multiple Windows for Inspection of TFT-LCD Panels
Chung, Gun-Hee ; Chung, Chang-Do ; Yun, Byung-Ju ; Lee, Joon-Jae ; Park, Kil-Houm ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 204~214
DOI : 10.9717/kmms.2012.15.2.204
This paper proposes an image segmentation for a vision-based automated defect inspection system on surface image of TFT-LCD(Thin Film Transistor Liquid Crystal Display) panels. TFT-LCD images have non-uniform brightness, which is hard to finding defective regions. Although there are several methods or proposed algorithms, it is difficult to divide the defect with high reliability because of non-uniform properties in the image. Kamel and Zhao disclosed a method which based on logical stage algorithm for segmentation of graphics and character. This method is a one of the local segmentation method that has a advantage. It is that characters and graphics are well segmented in an image which has non-uniform property. As TFT-LCD panel image has a same property, so this paper proposes new algorithm to segment regions of defects based on Kamel and Zhao's algorithm. Our algorithm has an advantage that there are a few ghost objects around the defects. We had experiments to prove performance in real TFT-LCD panel images, and comparing with the FFT(Fast Fourier Transform) method which is used a bandpass filter.
Study of Improvement of Search Range Compression Method of VP-tree for Video Indexes
Park, Gil-Yang ; Lee, Samuel Sang-Kon ; Hwang, Jea-Jeong ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 215~225
DOI : 10.9717/kmms.2012.15.2.215
In multimedia database, a multidimensional space-based indexing has been used to increase search efficiency. However, this method is inefficient in terms of ubiquity because it uses Euclidean distance as a scale of distance calculation. On the contrary, a metric space-based indexing method, in which metric axiom is prerequisite is widely available because a metric scale other than Euclidean distance could be used. This paper is attempted to propose a way of improving VP-tree, one of the metric space indexing methods. The VP-tree calculates the distance with an object which is ultimately linked to the a leaf node depending on the node fit for the search range from a root node and examines if it is appropriate with the search range. Because search speed decreases as the number of distance calculations at the leaf node increases, however, this paper has proposed a method which uses the latest interface on query object as the base point of trigonometric inequality for improvement after focusing on the trigonometric inequality-based range compression method in a leaf node. This improvement method would be able to narrow the search range and reduce the number of distance calculations. According to a system performance test using 10,000 video data, the new method reduced search time for similar videos by 5-12%, compared to a conventional method.
A Study on New Selective Agent Attack Technology in Windows System
Kim, Yeong-Woo ; Lim, Young-Hwan ; Park, Won-Hyung ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 226~233
DOI : 10.9717/kmms.2012.15.2.226
Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.
Cost-Benefit Analysis of Telepresence System for Public Sector Relocation
Jun, Eun-Suk ; Park, Keon-Chul ; Lee, Bong-Gyou ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 234~241
DOI : 10.9717/kmms.2012.15.2.234
The purpose of this study is to analyze the economic effects of telepresence system for public sector relocation. As a Green IT system, the importance of telepresence is being recognized increasingly as a means to replacing a majority of business trips and thereby reducing greenhouse gases emitted in the process. However, there are only a few related researches that analyze the economic effects of telepresence at the moment. This study conducts the cost-benefit analysis of 157 public sectors which are to relocate from 2012 based on the sample case of National Information Society Agency. The results obtained reveals that telepresence would save about 180 billion won and reduce about 580t
emission. This study are expected to provide the academic framework for organizations contemplating the adoption of Green IT system moving forward.
A Study of Verification for Modification of Location Information in Disaster Image Transmitting Through a Smart-phone
Seo, Tae-Woong ; Lee, Sung-Ryoul ; Bae, Byung-Chul ; Yoon, E-Joong ; Kim, Chang-Soo ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 242~249
DOI : 10.9717/kmms.2012.15.2.242
Recently, value added location based service and convergence monitoring and control system is growing. The cases include increasing usage of smart-phone for taking picture, wireless network, GPS and digital map. Especially, Smart-phone is appropriate for using image information and location information. However it is possible to be exploited for forgery and manipulation. So we experimented on transferring modified data on the smart-phone as image and location information in EXIF and researched the technology for data verification. In addition, we have designed security monitoring and control prototype considering axis-address matching analysis used geocoding, watermarking verification, encryption.
A Study on Portable Multi Electrical Cupping System
Kim, Jong-Chan ; Yang, Chul-Oh ; Ban, Kyeong-Jin ; Lee, Kwang-Eui ; Kim, Chee-Yong ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 250~257
DOI : 10.9717/kmms.2012.15.2.250
Recently oriental medicine has become a new issue in the global medical field because of increasing demands for the treatment of old people. Western medical equipment is becoming popular with big companies related to IT, communication and medical treatment. But globalization of oriental medicine techniques is inadequate due to lack of knowledge about oriental medicine. The cupping equipment has great growth potential because it is easy for old people to use the equipment. The purpose of this paper is to promote the portable multi electrical cupping system. The system may be used by patients themselves without any help from others. By using many cupping cups at the same time and regulating the timer and vacuum pressure. The patient can decrease itching and relax the hardened muscles. The system is expected to grow in the future as oriental medicine will be in high demand in aging society with IT convergence industry.
A Design of Disaster Prevention System and Detection of Wave Overtopping Number for Storm Surge base on CCTV
Choi, Eun-Hye ; Kim, Chang-Soo ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 258~265
DOI : 10.9717/kmms.2012.15.2.258
Our country is suffering from many human victims and property damages caused to occur great and small tidal waves in southern areas every year. Even though there were progressing many researches for storm surges, it was required more researches for detection of tidal wave and prevention system of its which can be applied in practical living fields. In this paper, we propose the disaster prevention system that can approximately detect a dangerousness of coast flooding and number of overtopping per time based on images of CCTV considering actual field application. And if it is detected a hazard of flooding of coast, the proposed detection system for tidal wave based GIS is quickly informed the areas of flooding to manager. The analyzing results of CCTV image of this proposed are derived from difference images between photos of fine day and photos or videos which are taken for the typhoon which is called "DIANMU" at our laboratory.
Design and Implementation of Multilingual support method for 3-tiered softwares
Koh, Jeong-Gook ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 266~272
DOI : 10.9717/kmms.2012.15.2.266
Multilingual support of software is necessary for entering global market. 3-tier architecture is a solution for problems of 2-tier architecture. It divides an application into a client-tier and an application-tier, and presentation logic and database are connected by middleware. The advantage of 3-tier architecture is the enhanced performance through load balancing, scalability, easier maintenance and reusability. This paper proposes a multilingual support method that utilizes common resource files for 3-tier enterprise softwares, applies the proposed method to development of multilingual version of billing solution, and verify the usefulness of it. It is easy for development and maintenance of software, the addition of language supported. Proposed method holds a resource file for each language and provides a multilingual support class library. Therefore this method reduces a waste of memory and disk space. Deployment of a class library into an application tier makes development and maintenance of software, the addition of new language supported easy. To avoid inappropriate modification of a resource file, a multilingual support class library is provided in a dll file.
An Implementation for Disaster Information Service and Search Function based on Smartphone Application
Lee, Jung-Ki ; Kim, Chang-Soo ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 273~280
DOI : 10.9717/kmms.2012.15.2.273
Recently, our society is affected by frequent occurrence of disaster such as local heavy rain and landslide. So, disaster organization and facility are stepping up their efforts to establish an effective disaster information system. Especially, researches of smartphone based disaster information service are conducted actively because smartphone becomes an ubiquitous to society and has various advantages. However, in general, these services only provide simple disaster information and do not consider several elements that is desired by the situation and conditions. Therefore, this paper establishes efficient disaster information service through implementation of application that connect disaster collection system and ability to search disaster information according the terms desired of user.
Design and Implementation of Location-based Mobile Bus Guide System using Social Tagging
Shin, Hyun-Jeong ; Chang, Byeong-Mo ;
Journal of Korea Multimedia Society, volume 15, issue 2, 2012, Pages 281~289
DOI : 10.9717/kmms.2012.15.2.281
The goal of our research is to develop more effective bus information system using user generated information and social tagging. In this research, we have developed a smartphone-based bus guide system using social tagging and awareness of location. It will guide users to the nearby bus stops and provides users with information about the bus lines at the bus stops. Information around bus-stops can also be registered as tags into the system by users and can be utilized for bus information service. Simple keyword search utilizing tagging information can provide users with bus information about destinations.