Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 2014
Volume 17, Issue 11 - Nov 2014
Volume 17, Issue 10 - Oct 2014
Volume 17, Issue 9 - Sep 2014
Volume 17, Issue 8 - Aug 2014
Volume 17, Issue 7 - Jul 2014
Volume 17, Issue 6 - Jun 2014
Volume 17, Issue 5 - May 2014
Volume 17, Issue 4 - Apr 2014
Volume 17, Issue 3 - Mar 2014
Volume 17, Issue 2 - Feb 2014
Volume 17, Issue 1 - Jan 2014
Selecting the target year
Adaptive Zoom Motion Estimation Method
Jang, Won-Seok ; Kwon, Oh-Jun ; Kwon, Soon-Kak ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 915~922
DOI : 10.9717/kmms.2014.17.8.915
We propose an adaptive zoom motion estimation method where a picture is divided into two areas based on the distance information with a depth camera : the one is object area and the other is background area. In the proposed method, the zoom motion is only applied to the object area except the background area. Further, the block size of motion estimation for the object area is set to smaller than that of background area. This adaptive zoom motion estimation method can be reduced at the complexity of motion estimation and can be improved at the motion estimation performance by reducing the block size of the object area in comparison with the conventional zoom motion estimation method. Based on the simulation results, the proposed method is compared with the conventional methods in terms of motion estimation accuracy and computational complexity.
A study on enhancement of heterogeneous noisy image quality for the performance improvement of target detection and tracking
Kim, Y. ; Yoo, P.H. ; Kim, D.S. ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 923~936
DOI : 10.9717/kmms.2014.17.8.923
Images can be contaminated with different types of noise, for different reasons. The neighborhood averaging and smoothing by image averaging are the classical image processing techniques for noise removal. The classical spatial filtering refers to the aggregate of pixels composing an image and operating directly on these pixels. To reduce or remove effectively noise in image sequences, it usually needs to use noise reduction filter based on space or time domain such as method of spatial or temporal filter. However, the method of spatial filter can generally cause that signals of objects as the target are also blurred. In this paper, we propose temporal filter using the piece-wise quadratic function model and enhancement algorithm of image quality for the performance improvement of target detection and tracking by heterogeneous noise reduction. Image tracking simulation that utilizes real IIR(Imaging Infra-Red) images is employed to evaluate the performance of the proposed image processing algorithm.
Personal Identification Using Inner Face of Fingers from Contactless Hand Image
Kim, Min-Ki ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 937~945
DOI : 10.9717/kmms.2014.17.8.937
Multi-modal biometric system can use another biometric trait in the case of having deficiency at a biometric trait. It also has an advantage of improving the performance of personal identification by using multiple biometric traits, so studies on new biometric traits have continuously been performed. The inner face of finger is a relatively new biometric trait. It has two major features of knuckle lines and wrinkles, which can be used as discriminative features. This paper proposes a finger identification method based on displacement vector to effectively process some variation appeared in contactless hand image. At first, the proposed method produces displacement vectors, which are made by connecting corresponding points acquired by matching each pair of local block. It then recognize finger by measuring the similarity among all the detected displacement vectors. The experimental results using pubic CASIA hand image database show that the proposed method may be effectively applied to personal identification.
Mobility Prediction Algorithms Using User Traces in Wireless Networks
Luong, Chuyen ; Do, Son ; Park, Hyukro ; Choi, Deokjai ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 946~952
DOI : 10.9717/kmms.2014.17.8.946
Mobility prediction is one of hot topics using location history information. It is useful for not only user-level applications such as people finder and recommendation sharing service but also for system-level applications such as hand-off management, resource allocation, and quality of service of wireless services. Most of current prediction techniques often use a set of significant locations without taking into account possible location information changes for prediction. Markov-based, LZ-based and Prediction by Pattern Matching techniques consider interesting locations to enhance the prediction accuracy, but they do not consider interesting location changes. In our paper, we propose an algorithm which integrates the changing or emerging new location information. This approach is based on Active LeZi algorithm, but both of new location and all possible location contexts will be updated in the tree with the fixed depth. Furthermore, the tree will also be updated even when there is no new location detected but the expected route is changed. We find that our algorithm is adaptive to predict next location. We evaluate our proposed system on a part of Dartmouth dataset consisting of 1026 users. An accuracy rate of more than 84% is achieved.
Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure
Hyun, Suhng-Ill ; Shin, Sang-Ho ; Yoo, Kee-Young ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 953~960
DOI : 10.9717/kmms.2014.17.8.953
In Shamir's (t,n)-threshold based secret image sharing schemes, there exists a problem that the secret image can be reconstructed when an arbitrary attacker becomes aware of t secret image pieces, or t participants are malicious collusion. It is because that utilizes linear combination polynomial arithmetic operation. In order to overcome the problem, we propose a secret image sharing scheme using matrix decomposition and adversary structure. In the proposed scheme, there is no reconstruction of the secret image even when an arbitrary attacker become aware of t secret image pieces. Also, we utilize a simple matrix decomposition operation in order to improve the security of the secret image. In experiments, we show that performances of embedding capacity and image distortion ratio of the proposed scheme are superior to previous schemes.
Formulation of Joint Iterative Decoding for Raptor Codes
Zhang, Meixiang ; Kim, Sooyoung ; Kim, Won-Yong ; Cho, Yong-Hoon ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 961~967
DOI : 10.9717/kmms.2014.17.8.961
Raptor codes are a class of rateless codes originally designed for binary erasure channels. This paper presents a compact set of mathematical expressions for iterative soft decoding of raptor codes. In addition, an early termination scheme is employed, and it is embedded in a single algorithm with the formula. In the proposed algorithm, the performance is enhanced by adopting iterative decoding, both in each inner and outer code and in the concatenated code itself between the inner and outer codes. At the same time, the complexity is reduced by applying an efficient early termination scheme. Simulation results show that our proposed method can achieve better performance with reduced decoding complexity compared to the conventional schemes.
Using Keystroke Dynamics for Implicit Authentication on Smartphone
Do, Son ; Hoang, Thang ; Luong, Chuyen ; Choi, Seungchan ; Lee, Dokyeong ; Bang, Kihyun ; Choi, Deokjai ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 968~976
DOI : 10.9717/kmms.2014.17.8.968
Authentication methods on smartphone are demanded to be implicit to users with minimum users' interaction. Existing authentication methods (e.g. PINs, passwords, visual patterns, etc.) are not effectively considering remembrance and privacy issues. Behavioral biometrics such as keystroke dynamics and gait biometrics can be acquired easily and implicitly by using integrated sensors on smartphone. We propose a biometric model involving keystroke dynamics for implicit authentication on smartphone. We first design a feature extraction method for keystroke dynamics. And then, we build a fusion model of keystroke dynamics and gait to improve the authentication performance of single behavioral biometric on smartphone. We operate the fusion at both feature extraction level and matching score level. Experiment using linear Support Vector Machines (SVM) classifier reveals that the best results are achieved with score fusion: a recognition rate approximately 97.86% under identification mode and an error rate approximately 1.11% under authentication mode.
Impact of Sink Node Location in Sensor Networks: Performance Evaluation
Choi, Dongmin ; Kim, Seongyeol ; Chung, Ilyong ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 977~987
DOI : 10.9717/kmms.2014.17.8.977
Many of the recent performance evaluation of clustering schemes in wireless sensor networks considered one sink node operation and fixed sink node location without mentioning about any network application requirements. However, application environments have variable requirements about their networks. In addition, network performance is sufficiently influenced by different sink node location scenarios in multi-hop based network. We also know that sink location can influence to the sensor network performance evaluation because of changed multipath of sensor nodes and changed overload spots in multipath based wireless sensor network environment. Thus, the performance evaluation results are hard to trust because sensor network is easily changed their network connection through their routing algorithms. Therefore, we suggest that these schemes need to evaluate with different sink node location scenarios to show fair evaluation result. Under the results of that, network performance evaluation results are acknowledged by researchers. In this paper, we measured several clustering scheme's performance variations in accordance with various types of sink node location scenarios. As a result, in the case of the clustering scheme that did not consider various types of sink location scenarios, fair evaluation cannot be expected.
Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack
Nugraha, Muhammad ; Paramita, Isyana ; Musa, Ardiansyah ; Choi, Deokjai ; Cho, Buseung ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 988~994
DOI : 10.9717/kmms.2014.17.8.988
Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.
Social network analysis on consumers' seeking behavior of health information via the Internet and mobile phones
An, Ji-Young ; Jang, Haeran ; Paik, Jinkyung ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 995~1011
DOI : 10.9717/kmms.2014.17.8.995
In consideration of the rapid changes in the so-called information society of the
century, about 80% of a total population in Korea has used the Internet. However, the social effect of the Internet and related devices has not been yet systematically studied in the literature. In healthcare as well, consumers' efficient use of the Internet for their positive health outcomes is becoming an issue. The purpose of this study was to analyze the medical subject headings keywords of the selected studies on consumers' use of Internet and mobile health information. For the analysis, social network analysis was used to provide basic information to present directions for future research on the field of interest.
Bandwidth-Efficient Precoding Scheme for Downlink Smart Utility Networks
Kim, Byung Wook ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 1012~1019
DOI : 10.9717/kmms.2014.17.8.1012
The emerging smart utility networks (SUN) provide two-way communications between smart meters and smart appliances for purpose of low power usage, low cost, and high reliability. This paper deals with a bandwidth-efficient communication method based on the hidden pilot-aided scheme using a precoder in downlink SUN suitable for high-rate multimedia applications. With the aid of the design of a precoder and a superimposed hidden pilot, it is possible to estimate the channel without loss of bandwidth. In the channel estimation procedure, the inevitable data interference, which degrades the performance of channel estimation, can be reduced by the precoder design with an iterative scheme. Computer simulations show that the proposed scheme outperforms the conventional method in terms of achievable data rate, especially when a large number of subcarriers are employed.
Implementation of Mobile Multi-sensor System for Measuring an Environment
Ju, Ji-Dong ; Kim, Jin-Seoung ; Kang, Bong-Gu ; Shim, Jeachang ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 1020~1024
DOI : 10.9717/kmms.2014.17.8.1020
The environment information such as dust, temperature, humidity, illumination and gas are very important in daily life. We implemented multi-sensor system which made for measuring an environment by using Arduino, ZigBee, and Appinventor. We also designed a packet for transmitting environment data. The data are sent to the server via ZigBee and then it communicates to a smart phone via WI-Fi. In this study, we added divers sensors, designed a protocol which made for transfer several kinds of data and improve mobility for real time monitoring by using smart phones. The system was worked well and the data was transmitted correctly to the smart phone.
A Study on Phased Reading Techniques of Mathematical Expression in the Digital Talking Book
Hwang, Jungsoo ; Lim, Soon-Bum ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 1025~1032
DOI : 10.9717/kmms.2014.17.8.1025
Until now, there were few supports on reading the mathematical expressions except text based expressions, so it is important to provide the reading of the mathematical expressions. Also, there are various of obstacles for people who are not visually impaired when reading the mathematical expressions such as the situation of presbyopia, reading the mathematical expressions in the vehicles, and so on. Therefore, supports for people to read mathematical expressions in various situations are needed. In the previous research, the main goal was to transform the mathematical expressions into Korean text based on Content MathML. In this paper, we expanded the range of the research from a reading disabilities to people who are not reading disabilities. We tested appropriacy of the rules we made to convert the MathML based expressions into speech and defined 3 math-to-speech rules in korean based on levels. We implemented the mathematical expressions by using 3 math-to-speech rules. We took comprehension test to find out whether our math to speech rules are well-defined or not.
A Bridge Technique of Heterogeneous Smart Platform supporting Social Immersive Game
Jang, S.E. ; Tang, J.M. ; Kim, Sangwook ;
Journal of Korea Multimedia Society, volume 17, issue 8, 2014, Pages 1033~1040
DOI : 10.9717/kmms.2014.17.8.1033
Recently, the concept of mobile content service has changed from providing unilaterally contents for single-device to providing same contents for multi-device. This service should be able to provide diverse contents for multi-devices without platform and specification of multi-device. In this study, we propose a bridge technique of heterogeneous smart platform supporting social immersive game. It is possible to access social immersive game by using a multi-platform bridge. To achieve this, we explain techniques of device connection and data transmission between heterogeneous devices using server-client structure and UPnP. It provides an immersive game environment for multi-user, which is able to play in a public place using big screen.