Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 18, Issue 12 - Dec 2015
Volume 18, Issue 11 - Nov 2015
Volume 18, Issue 10 - Oct 2015
Volume 18, Issue 9 - Sep 2015
Volume 18, Issue 8 - Aug 2015
Volume 18, Issue 7 - Jul 2015
Volume 18, Issue 6 - Jun 2015
Volume 18, Issue 5 - May 2015
Volume 18, Issue 4 - Apr 2015
Volume 18, Issue 3 - Mar 2015
Volume 18, Issue 2 - Feb 2015
Volume 18, Issue 1 - Jan 2015
Selecting the target year
Salvage System Using Location Based Services
Kwon, Seong-Geun ; Kim, Haesoo ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1427~1431
DOI : 10.9717/kmms.2015.18.12.1427
In the salvage area, the location of the incident vessel and diver to rescue the victim are very important. But there are no ways but to rely on the GPS satellites to obtain the location in the salvage sites. Because the positioning using GPS satellites has a measurement error of up to 50 meters caused by the status of the atmosphere, a new positioning method with more accuracy should be devised. So if studies on measuring the position of the ships and divers accurately in the sea are performed, it will be helpful in the field of the salvage positioning. In this paper, a high precision positioning system in salvage using DGPS signal through mobile broadcasting is proposed with positioning error of up to 1 meter.
Moving Shadow Detection using Deep Learning and Markov Random Field
Lee, Jong Taek ; Kang, Hyunwoo ; Lim, Kil-Taek ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1432~1438
DOI : 10.9717/kmms.2015.18.12.1432
We present a methodology to detect moving shadows in video sequences, which is considered as a challenging and critical problem in the most visual surveillance systems since 1980s. While most previous moving shadow detection methods used hand-crafted features such as chromaticity, physical properties, geometry, or combination thereof, our method can automatically learn features to classify whether image segments are shadow or foreground by using a deep learning architecture. Furthermore, applying Markov Random Field enables our system to refine our shadow detection results to improve its performance. Our algorithm is applied to five different challenging datasets of moving shadow detection, and its performance is comparable to that of state-of-the-art approaches.
Efficient Method for Recovering Spectral Reflectance Using Spectrum Characteristic Matrix
Sim, Kyudong ; Park, Jong-Il ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1439~1444
DOI : 10.9717/kmms.2015.18.12.1439
Measuring spectral reflectance can be regarded as obtaining inherent color parameters, and spectral reflectance has been used in image processing. Model-based spectrum recovering, one of the method for obtaining spectral reflectance, uses ordinary camera with multiple illuminations. Conventional model-based methods allow to recover spectral reflectance efficiently by using only a few parameters, however it requires some parameters such as power spectrum of illuminations and spectrum sensitivity of camera. In this paper, we propose an enhanced model-based spectrum recovering method without pre-measured parameters: power spectrum of illuminations and spectrum sensitivity of camera. Instead of measuring each parameters, spectral reflectance can be efficiently recovered by estimating and using the spectrum characteristic matrix which contains spectrum parameters: basis function, power spectrum of illumination, and spectrum sensitivity of camera. The spectrum characteristic matrix can be easily estimated using captured images from scenes with color checker under multiple illuminations. Additionally, we suggest fast recovering method preserving positive constraint of spectrum by nonnegative basis function of spectral reflectance. Results of our method showed accurately reconstructed spectral reflectance and fast constrained estimation with unmeasured camera and illumination. As our method could be conducted conveniently, measuring spectral reflectance is expected to be widely used.
Development of Image-based System for Multiple Fluorescence Imaging Study
Yoon, WoongBae ; Kim, Hong Rae ; Lee, Hyun Min ; Kim, Young Jae ; Kim, Kwang Gi ; Yoo, Heon ; Lee, Seung Hoon ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1445~1452
DOI : 10.9717/kmms.2015.18.12.1445
In these days, fluorescent materials such as ICG or 5-ALA is used for the brain surgery. The patients who underwent brain tumor surgery has been increased during last 30 years and the survivorship rate increased 22∼33% in 5 years. Recently, the Fluorescence induction surgery is developed for more safety and improved the resection rate for the glioma in the neurosurgery field. In this study, we proposed fluorescence area detection method for ICG and 5-ALA fluorescence induced surgery using acquired images from image processing. Accuracy was 99.21% from ICG images, and 99.51% from 5-ALA images. Matthews correlation coefficient was 88.67% from ICG images, and 90.49% from 5-ALA images.
Image Retrieval Using Histogram Refinement Based on Local Color Difference
Kim, Min-KI ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1453~1461
DOI : 10.9717/kmms.2015.18.12.1453
Since digital images and videos are rapidly increasing in the internet with the spread of mobile computers and smartphones, research on image retrieval has gained tremendous momentum. Color, shape, and texture are major features used in image retrieval. Especially, color information has been widely used in image retrieval, because it is robust in translation, rotation, and a small change of camera view. This paper proposes a new method for histogram refinement based on local color difference. Firstly, the proposed method converts a RGB color image into a HSV color image. Secondly, it reduces the size of color space from 256
to 32. It classifies pixels in the 32-color image into three groups according to the color difference between a central pixel and its neighbors in a 3x3 local region. Finally, it makes a color difference vector(CDV) representing three refined color histograms, then image retrieval is performed by the CDV matching. The experimental results using public image database show that the proposed method has higher retrieval accuracy than other conventional ones. They also show that the proposed method can be effectively applied to search low resolution images such as thumbnail images.
Image Encryption Based on One Dimensional Nonlinear Group Cellular Automata
Choi, Un-Sook ; Cho, Sung-Jin ; Kim, Tae-Hong ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1462~1467
DOI : 10.9717/kmms.2015.18.12.1462
Pixel values of original image can be changed by XORing pixel values of original image and pixel values of the basis image obtained by pseudo random sequences. This is a simple method for image encryption. This method is an effect method for easy hardware implementation and image encryption with high speed. In this paper we propose a method to obtain basis image with pseudo random sequences with large nonlinearity using nonlinear cellular automata and maximum length linear cellular automata. And experimental results showed that the proposed image encryption scheme has large key space and low correlation of adjacent cipher pixel values.
Resource Allocation for Device-to-Device Communications Reusing Uplink in Cellular Networks
Radwan, Amr ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1468~1474
DOI : 10.9717/kmms.2015.18.12.1468
Efficient spectrum sharing is an important issue in Device-to-Device (D2D) communications underlaying cellular networks as it can mitigate the interference to cellular users and improve the performance of the systems. In this paper, we formulate the radio resource allocation in D2D communications as a mixed nonlinear integer programing. We show the formulated problem is NP-hard and thus a polynomial time algorithm to solve is not possible. Since such a problem is very hard to obtain the optimal solution within a short running time, we instead propose a fast heuristic suboptimal algorithm to mitigate the interference caused to cellular users and improve the performance of the systems. Simulation results are provided to evaluate the performance of the proposed algorithm.
Queue Management using Optimal Margin method to Improve Bottleneck Link Performance
Radwa, Amr ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1475~1482
DOI : 10.9717/kmms.2015.18.12.1475
In network routers, buffers are used to resolve congestion and reduce packet loss rate whenever congestion occurs at bottleneck link. Most of the existing methods to manage such buffers focus only on queue-length-based control as one loop which have some issues of low link utilization and system stability. In this paper, we propose a novel framework which exploits two-loop control method, e.g. queue-length and congestion window size, combined with optimal margin method to facilitate parameter choices. Simulation results in ns-2 demonstrate that bottleneck link performance can be improved with higher link utilization (85%) and shorter queue length (22%) than the current deployed scheme in commercial routers (RED and DropTail).
An ID-Based Remote User Authentication Scheme in IoT
Park, KiSung ; Lee, SungYup ; Park, YoHan ; Park, YoungHo ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1483~1491
DOI : 10.9717/kmms.2015.18.12.1483
Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.
Recovery Corrupted Video Files using Time Information
Na, Gihyun ; Shim, Kyu-Sun ; Byun, Jun-Seok ; Kim, Eun-Soo ; Lee, Joong ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1492~1500
DOI : 10.9717/kmms.2015.18.12.1492
In recent crime scene, there is the captured crime scene video at least one. So video files recorded on storage media often provide important evidence. Criminals often attempt to destroy storage saved crime scene video. For this reason recovery of a damaged or deleted video file is important to resolve criminal cases in aspects of digital forensic. In the recent, there is a study to recover video file based on video frames, but it is very poor time efficiency when the connecting video frames. This paper proposed advanced frame-based recovery technique of a damaged video files using time information. We suggest a new connecting algorithm to connect video frames using recorded time information in front of video frame. We also evaluate performance in aspects of time and experiment result shows that proposed method improves performance.
A Case Study for Improving Performance of A Banking System Using Load Test
Kim, Tai Suk ; Lee, Jong Yun ; Kim, Jong Soo ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1501~1508
DOI : 10.9717/kmms.2015.18.12.1501
In this paper, we describe a case study to improve performance through the load testing of multi-tired system for financial accounts before the system opening. The load test was conducted after the data collection tools(Performance Monitor, DB PSSDiag) were installed. By analyzing the collected log, we were able to identify the main sector requiring performance improvements among the presentation tier, web tier, business logic tier and data tier. The ASP.NET server-down on the web tier could be improved by modifying the parameter values in the configuration file. Some server downs occurred on the business logic tier when a large number of users access at the same time, were more difficult to be solved. By analyzing the hang-dump at the server-down time, we were able to find a process that caused the problem. and we had to modify the relevant codes. For major performance improvements of the data-tier, indices of some queries was optimized by using the built-in DBMS query analyzer, after analyzing the log of long-response-time queries. The problems and solutions considered in this case study will be a reference for the performance improvement of a multi-layer system with the similar structure.
A New Method for Measurement and Prediction of Memorability from Logo Images using Characteristics of Color and Shape
Oh, Sang-Il ; Kang, Hang-Bong ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1509~1518
DOI : 10.9717/kmms.2015.18.12.1509
Because a logo is a medium that connects between consumers and corporations or brands, designing memorable logo images is vital. Although predicting logo's memorability for brand marketing is essential, there have been only few researches that deal with memorability of logo images. In this paper, we analyze the memorability characteristics in logo images by performing experiments based upon our proposed prediction method for logo image's memorability. Our proposed research consists of three phases: crowdsourcing for memorability computing, computational phase for logo image's memorability, and development of a prediction model. Using computed memorability of logo images by "Visual Memory Game," we analyze the different characteristics of logo's memorability. We first developed a novel computational method that reflects logo image's color and shape. Each computational method on color and shape are selected by comparing the correlations between result values and ground truth memorability. Selected computational value is then converged with generic image feature descriptors such as SIFT and HoG to make a prediction model of logo's memorability. Using our method, we obtain reasonable performances in predicting logo image's memorability.
TFT-LCD Defect Detection based on Histogram Distribution Modeling
Gu, Eunhye ; Park, Kil-Houm ; Lee, Jong-Hak ; Ryu, Gang-Soo ; Kim, Jungjoon ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1519~1527
DOI : 10.9717/kmms.2015.18.12.1519
TFT-LCD automatic defect inspection system for detecting defects in place of the visual tester does pre-processing, candidate defect pixel detection, and recognition and classification through a blob analysis. An over-detection result of defects acts as an undue burden of blob analysis for recognition and classification. In this paper, we propose defect detection method based on the histogram distribution modeling of TFT-LCD image to minimize over-detection of candidate defective pixels. Primary defect candidate pixels are detected estimating the skewness of the luminance distribution histogram of the background pixels. Based on the detected defect pixels, the defective pixels other than noise pixels are detected using the distribution histogram model of the local area. Experimental results confirm that the proposed method shows an excellent defect detection result on the image containing the various types of defects and the reduction of the degree of over-detection as well.
Outlining Tool as an Easy-to-Use Designing Tool for a Novice Programmer
Park, Se Myung ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1528~1537
DOI : 10.9717/kmms.2015.18.12.1528
In this research, we show that constructing a specific job-processing-sequences like a OPL paragraph in OPM (we call it int a new terminology 'program', which just means plan) is essential step in programming, just like a blueprint for a wood furniture or a house. As a result of our research on how to produce a specific job-processing-sequences without OPM, we found that outlining tool is the most easy-to-use tool for the required job. We show that the MS-word outlining function can be used easily as a good programming supporting tool with Visual Studio C/C++.
Virtual Sleep Sensor with PSQI for Sleep Therapy Service
Lee, Byung Mun ; Hwang, Hee Joung ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1538~1546
DOI : 10.9717/kmms.2015.18.12.1538
This paper proposes a virtual sleep sensor in order to monitor sleep disorder for an individual, and presents a therapy service model for the sleep management. PSQI score is usually used clinically to evaluate the levels of sleep disorder. However, The PSQI score which was only gleaned through an interview on a questionnaire can not be accurate because it is difficult to remember something about sleep during the last month. In order to resolve this problem, This paper presented the virtual sleep sensor that has a protocol to receive sleep information through physical sensors and smart algorithm. In addition, the virtual sleep sensor can be contributed to a service model for sleep therapy when it is combined with light therapy and aromatherapy. Finally, based on the findings of the experiment, its effectiveness was confirmed in the proposed model.
Design of an NFC Baseband Modem for Software Overhead Minimization
Jun, Jaeyung ; Kim, Seon Wook ; Han, Youngsun ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1547~1554
DOI : 10.9717/kmms.2015.18.12.1547
Because there are numerous near field communication (NFC) technical standards and each standard has an independent communication protocol, an NFC software for controlling the protocols are significantly complicated. Especially, the anticollision algorithm for establishing the initial communication connection is classified into bit-oriented or time slot method according to the technical standards. Moreover, the anticollision algorithm is generally manipulated in software because of its complexity. In addition, since one host processor is shared by multiple modems in a connectivity SoC, embedding several communication modems with an NFC modem, the spare computing resources can be utilized for other modems by reducing the software cost to control the NFC modem. In this paper, we propose new design methods of the NFC modem for supporting anticollision, framing and bit rate detection in the hardware to reduce the software overhead. Therefore, the utilization of the NFC technology is enhanced in the connectivity SoC by minimizing the cost of software.
A Study on Anamorphosis variable Images Using Mobile Device
Choi, Byongsu ; Um, Jongseok ; Cho, Youl ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1555~1561
DOI : 10.9717/kmms.2015.18.12.1555
This paper tries to converge computer and art by applying anamorphosis principle in drawing technique to mobile application. As comparing to current anamorphosis which shows one image at the round cup, we focus on the variability which shows several variable images at the mobile device according to the color board. The usage of the proposed algorithm is able to extended to various areas such as souvenir and public relation.
Implementation of Interactive 3D Aquaium from 2D Images Using 3D Model Conversion Algorithm
Choi, Tea Jun ; Lee, Heeman ; Kim, Jeong Ho ; Kim, Eung Soo ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1562~1568
DOI : 10.9717/kmms.2015.18.12.1562
The 3D contents are getting more attentions in various areas, such as in movies, advertising, games and exhibition contents. There are many authoring tools for making 3D Models and contents. However, those authoring tools take considerable amount of time to learn and to make 3D contents. In this paper, we propose the 3D model conversion algorithm to make 3D models from 2D pictures drawn on the touch screens or papers. The vertex animation method also proposed for the interactive 3D aquarium. The proposed vertex animation algorithm was tested for virtual 3D water creatures and compared with human-made animation. An Interactive 3D aquarium was implemented by using those proposed algorithms. Thus the simplicity and effectiveness of the algorithms can be applied to diverse industries.
Development of Edutainment Contents using the Multi-touch Table Top Display
Bak, Seon Hui ; Lee, Jeong Bae ; Kim, Eung Soo ; Lee, Chang Jo ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1569~1577
DOI : 10.9717/kmms.2015.18.12.1569
Recently, the development of IT technology, utilization of smart devices 3-5-year-old infants Upon smart device penetration rate per household increases has also sharply increased. In this paper, the educational contents for kid are considered and implemented by reflecting this trend. Content that has been produced in this paper are based on learning theory of constructivism, was to be performed naturally learn the content of the table-top display of applying the NUI technology. Also, the content creation that can help you learn infants through experiments crafted tabletop display interface content, it is believed to be the basis for the improvement of usability.
Development and Proposal of Korean Character Based on the Story of Shim Cheong as a Motif
Lee, Young-suk ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1578~1585
DOI : 10.9717/kmms.2015.18.12.1578
This study aimed to develop and propose a Korean character group with the story of Shim Cheong applied as a motif. By borrowing the four stories (a dream of the birth of a child, filial behavior, regeneration and eyesight-gaining) presented in the story of Shim Cheong which has been passed on orally, the study designed the Korean character group and set up types of characters' roles to visualize these other characters seen in the content such as Shim Cheong the heroine, goblins, a baby dragon, Mr. Shim the blind and others. As a next step, the study applied the types to the seven essential types of Vogler's original characters. A process of how to visualize the group of those characters appearing in the story including Shim Cheong the heroine was offered. In particular, the study concentrates on figuring out how to expand and develop the Shim Cheong character to be this image of one of the most popular Korean princess characters. What this study had discussed will contribute to the field of character production when they try to commercialize characters and develop Korean characters with unique Korean features included.
Design of Bi-directional Recommend Calligraphy Contents Open-market Platform
So, Kyoungyoung ; Lee, Yoonhan ; Moon, Kyounghee ; Ko, Kwangman ;
Journal of Korea Multimedia Society, volume 18, issue 12, 2015, Pages 1586~1593
DOI : 10.9717/kmms.2015.18.12.1586
Calligraphy contents(shortly called, CalliContents) depict the feature of communication media with artistic sentences or drawings before being processed into digital contents to become printed advertisement, visual design and entertainment products. As a fast growing business model, they can be applied to every single scope of all fields these days and each application case presented excellent effects to grab consumers' attention immediately. In this paper, we designed and produced an emotional bi-directional recommendation DIY calligraphy contents platform to consume created cultural contents and boost personalized contents industry that meets consumer's needs through both wired and wireless-based software with convergence of artistic and emotional calligraphy contents and ICT. For this works, we established for DIY calligraphy consumers a foundation of a virtuous circle of the CalliContents where various CalliContents are provided in on and offline environment and a third party target is opened at the CalliContents platform