Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Korea Multimedia Society
Journal Basic Information
Journal DOI :
Korea Multimedia Society
Editor in Chief :
Volume & Issues
Volume 8, Issue 12 - Dec 2005
Volume 8, Issue 11 - Nov 2005
Volume 8, Issue 10 - Oct 2005
Volume 8, Issue 9 - Sep 2005
Volume 8, Issue 8 - Aug 2005
Volume 8, Issue 7 - Jul 2005
Volume 8, Issue 6 - Jun 2005
Volume 8, Issue 5 - May 2005
Volume 8, Issue 4 - Apr 2005
Volume 8, Issue 3 - Mar 2005
Volume 8, Issue 2 - Feb 2005
Volume 8, Issue 1 - Jan 2005
Selecting the target year
A Tracking of Head Movement for Stereophonic 3-D Sound
Kim Hyun-Tae ; Lee Kwang-Eui ; Park Jang-Sik ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1421~1431
There are two methods in 3-D sound reproduction: a surround system, like 3.1 channel method and a binaural system using 2-channel method. The binaural system utilizes the sound localization principle of a human using two ears. Generally, a crosstalk between each channel of 2-channel loudspeaker system should be canceled to produce a natural 3-D sound. To solve this problem, it is necessary to trace a head movement. In this paper, we propose a new algorithm to correctly trace the head movement of a listener. The Proposed algorithm is based on the detection of face and eye. The face detection uses the intensity of an image and the position of eyes is detected by a mathematical morphology. When the head of the listener moves, length of borderline between face area and eyes may change. We use this information to the tracking of head movement. A computer simulation results show That head movement is effectively estimated within +10 margin of error using the proposed algorithm.
Design of Audio Watermarks by Noise Shaping
Lee, Jin-Geol ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1432~1438
A psychoacoustic model based noise shaping method is proposed. The method shapes the noise in the frequency domain such that its presence with a host signal will not be perceptually noticeable. The derivation of imperceptible noise levels from the masking thresholds of the signal involves deconvolution associated with the spreading function in the psychoacoustic model. It has been known as an ill-conditioned Problem. In this paper, a constrained optimization is applied such that the noise excitation level conforms to the masking thresholds of the signal. Thus, the noises embedded in the signal will not be perceived by human ear, and its performance is demonstrated experimentally.
A User Authentication System Using Face Analysis and Similarity Comparison
Ryu Dong-Yeop ; Yim Young-Whan ; Yoon Sunnhee ; Seo Jeong Min ; Lee Chang Hoon ; Lee Keunsoo ; Lee Sang Moon ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1439~1448
In this paper, after similarity of color information in above toro and geometry position analysis of important characteristic information in face and abstraction object that is inputted detects face area using comparison, describe about method to do user certification using ratio information and hair spring degree. Face abstraction algorithm that use color information has comparative advantages than face abstraction algorithm that use form information because have advantage that is not influenced facial degree or site etc. that tip. Because is based on color information, change of lighting or to keep correct performance because is sensitive about color such as background similar to complexion is difficult. Therefore, can be used more efficiently than method to use color information as that detect characteristic information of eye and lips etc. that is facial importance characteristic element except color information and similarity for each object achieves comparison. This paper proposes system that eye and mouth's similarity that calculate characteristic that is ratio red of each individual after divide face by each individual and is segmentalized giving weight in specification calculation recognize user confirming similarity through search. Could experiment method to propose and know that the awareness rate through analysis with the wave rises.
Vehicle Recognition with Recognition of Vehicle Identification Mark and License Plate
Lee Eung-Joo ; Kim Sung-Jin ; Kwon Ki-Ryong ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1449~1461
In this paper, we propose a vehicle recognition system based on the classification of vehicle identification mark and recognition of vehicle license plate. In the proposed algorithm, From the input vehicle image, we first simulate preprocessing procedures such as noise reduction, thinning etc., and detect vehicle identification mark and license plate region using the frequency distribution of intensity variation. And then, we classify extracted vehicle candidate region into identification mark, character and number of vehicle by using structural feature informations of vehicle. Lastly, we recognize vehicle informations with recognition of identification mark, character and number of vehicle using hybrid and vertical/horizontal pattern vector method. In the proposed algorithm, we used three properties of vehicle informations such as Independency property, discriminance property and frequency distribution of intensity variation property. In the vehicle images, identification mark is generally independent of the types of vehicle and vehicle identification mark. And also, the license plate region between character and background as well as horizontal/vertical intensity variations are more noticeable than other regions. To show the efficiency of the propofed algorithm, we tested it on 350 vehicle images and found that the propofed method shows good Performance regardless of irregular environment conditions as well as noise, size, and location of vehicles.
Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI
Lee Hyung-Kyo ; Kim Hee-Jung ; Seong Tack-Young ; Kwon Ki-Ryong ; Lee Jong-Keuk ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1462~1471
Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.
An Implementation of Socket Interface for TOEs
Son, Sung-Hoon ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1472~1482
In this paper, we propose a socket interface layer for large-scale multimedia servers that adopt TCP/IP Offload Engines (TOE). In order to provide legacy network applications with binary level compatibility, the socket interface layer intercepts all socket-related system calls to forward to either TOE or legacy TCP/IP Protocol stack. The layer is designed and implemented as a kernel module in Linux. The layer is located between BSD socket layer and INET socket layer, and passes the application's socket requests to INET socket layer or TOE. The layer provides multimedia servers and web servers with the following features: (1) All standard socket APIs and file I/O APIs that are supported (2) Support for binary level compatibility of existing socket programs (3) Support for TOE and legacy Ethernet NICs at the same time.
Design and Implementation of TOE Module Supporting Binary Compatibility for Standard Socket Interfaces
Kang Dong-Jae ; Kim Chei-Yeol ; Kim Kang-Ho ; Jung Sung-In ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1483~1495
TCP/IP is the most commonly used protocol to communicate among servers, and is used in a wide range of applications. Unfortunately, Data transmission through TCP/IP places a very heavy burden on host CPUs. And it hardly makes another job to be processed. So, TOE(TCP/IP Offload Engine) is considered in many servers. But, most of TOE modules tends to not support binary compatibility for standard socket interfaces. So, it has problems that existing applications should be modified and recompiled to get advantage of TOE device. In this paper, to resolve upper problems, we suppose design and implementation of TOE module supporting binary compatibility for standard socket interfaces. Also, it can make a usage of multiple TOEs and NICs simultaneously.
Adaptive Vehicle License Plate Recognition System Using Projected Plane Convolution and Decision Tree Classifier
Lee Eung-Joo ; Lee Su Hyun ; Kim Sung-Jin ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1496~1509
In this paper, an adaptive license plate recognition system which detects and recognizes license plate at real-time by using projected plane convolution and Decision Tree Classifier is proposed. And it was tested in circumstances which presence of complex background. Generally, in expressway tollgate or gateway of parking lots, it is very difficult to detect and segment license plate because of size, entry angle and noisy problem of vehicles due to CCD camera and road environment. In the proposed algorithm, we suggested to extract license plate candidate region after going through image acquisition process with inputted real-time image, and then to compensate license size as well as gradient of vehicle with change of vehicle entry position. The proposed algorithm can exactly detect license plate using accumulated edge, projected convolution and chain code labeling method. And it also segments letter of license plate using adaptive binary method. And then, it recognizes license plate letter by applying hybrid pattern vector method. Experimental results show that the proposed algorithm can recognize the front and rear direction license plate at real-time in the presence of complex background environments. Accordingly license plate detection rate displayed
successive rate respectively. And also, from the segmented letters, it shows
successive recognition rate respectively.
LPM-Based Digital Watermarking for Forgery Protection in Printed Materials
Bae Jong-Wook ; Lee Sin-Joo ; Jung Sung-Hwan ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1510~1519
We proposed a digital watermarking method that it is possible to identify the copyright because the watermark is detected in the first print-scan and to protect a forgery because the watermark is not detected in the second print-scan. The proposed algorithm uses LPM and DFT transform for the robustness to the distortion of pixel value and geometrical distortion. This methods could improve watermark detection performance and image quality by selecting maximum sampling radius in LPM transform. After analyzing the characteristics of print-scan process, we inserted the watermark in the experimentally selected frequency bands that survives robustly to the first print-scan and is not detected in the second print-scan, using the characteristic of relatively large distortion in high frequency bands of DFT As the experimental result, the original proof is possible because average similarity degree 5.13 is more than the critical value 4.0 in the first print-scan. And the detection of forgery image is also possible because average similarity degree 2.76 is less than the critical value 4.0 in the second print-scan.
Access Control to XML Documents Based on Hierarchical Key Assignment Scheme
Ban, Yong-Ho ; Kim, Jong-Hun ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1520~1530
As XML is recognized as a prevalent standard for document representation and exchange in the Internet, the need for security of XML becomes very important issue. Until now researches on XML security have been focused on confidentiality or integrity like encryption and digital signature technology. But, as XML data becomes more massive and complicated, it requires managerial security that decided access permit or deny by the authority oi user who is using the XML data. Thus it requires models and mechanisms enabling the specification and enforcement of access control policies for XML documents. In this paper, we suggest the new access control model and mechanism that separate XML documents by access level, assign roles to each user by applying Role Based Access Control (RBAC) and perform access control to specific documents by encrypting each section with roles. The method, we suggested, has an advantage that it does not need to update the whole keys used in encryption process by updating only the relations between appropriate secure layers.
User-Oriented Multimedia Service in the Ubiquitous Home Environment
Park Jong-Hyuk ; Lee Sang-Jin ; Koh Byoung-Soo ; Lee Sang-Won ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1531~1542
In multimedia service of Ubiquitous Home Environment(UHE), the requirements such as intelligent service that is executed automatically without direct order of user and fitted service compatible for each user and comfortable of user, interoperability of multimedia contents between incompatible devices will increase. Multimedia protection and management, authentication and authority administration methods that are suitable for above demands are also required. In this paper, we suggest authentication method suited for UHE and propose user oriented multimedia service(UHMS: Ubiquitous Home Multimedia Service) that provides the interoperability of multimedia between incompatible devices, conducts intelligently the context information (preference information, device information etc.) using sensor module and home server, provides and secure services.
Computerizing Production and Distribution of Academic Resources Using KISTI-ACOMS 2.0
Jeong Hee-Seok ; Kim Byeong-Kyu ; Kang Mu-Yeong ; Park Jae-Won ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1543~1555
In this paper, we design and implement KISTI-ACOMS 2.0, extended from its previous version, applicable to all the academic societies by integrating new concepts, functions and services. KISTI-ACOMS 2.0 provides membership management, paper review management, replaces most extensive customizing with configuration, and supports a variety of unique features such as English service for foreign authors and reviewers, similar article search for preventing piracy and user access control, which are difficult to be implemented in the existing systems being used by Korean societies. Therefore, many academic societies can configure KISTI-ACOMS 2.0 more easily and promptly, and manage their own business such as society administration and journal publication online more effectively.
Code Optimization Using Pattern Table
Yun Sung-Lim ; Oh Se-Man ;
Journal of Korea Multimedia Society, volume 8, issue 11, 2005, Pages 1556~1564
Various optimization techniques are deployed in the compilation process of a source program for improving the program's execution speed and reducing the size of the source code. Of the optimization pattern matching techniques, the string pattern matching technique involves finding an optimal pattern that corresponds to the intermediate code. However, it is deemed inefficient due to excessive time required for optimized pattern search. The tree matching pattern technique can result in many redundant comparisons for pattern determination, and there is also the disadvantage of high cost involved in constructing a code tree. The objective of this paper is to propose a table-driven code optimizer using the DFA(Deterministic Finite Automata) optimization table to overcome the shortcomings of existing optimization techniques. Unlike other techniques, this is an efficient method of implementing an optimizer that is constructed with the deterministic automata, which determines the final pattern, refuting the pattern selection cost and expediting the pattern search process.