• Title/Summary/Keyword: Camouflage Image

Search Result 15, Processing Time 0.022 seconds

Infrared Image Simulation for Estimating the Effectiveness of Camouflage Measures (표적은폐도구의 유용도 평가를 위한 적외선화상 모사)

  • Jung, Jinsoo;Kauh, S. Ken;Yoo, Hoseon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.8
    • /
    • pp.1010-1021
    • /
    • 1999
  • Camouflage measures in military purpose utilize the apparent temperature difference between target and background, so it is essential to develop a thermal analysis program for apparent temperature predictions and to apply some camouflage measures to real military targets for camouflage purpose. In this study, a thermal analysis program including conduction, convection and radiation is developed and the validity of radiation heat transfer terms is examined. The results show that longwave radiation along with solar radiation should be included in order to predict the apparent temperature as well as the physical temperature precisely. Longwave emissivity variation as an effective camouflage measures is applied to a real M2 tank. From the simulation results, it is found that an effective surface treatment, such as painting of a less emissive material or camouflage clothing, may provide a temperature similarity or a spatial similarity, resulting in an effective camouflage.

Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance

  • Liu, Qiang;Xiang, Xuyu;Qin, Jiaohua;Tan, Yun;Zhang, Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1078-1099
    • /
    • 2021
  • Traditional image steganography hides secret information by embedding, which inevitably leaves modification traces and is easy to be detected by steganography analysis tools. Since coverless steganography can effectively resist steganalysis, it has become a hotspot in information hiding research recently. Most coverless image steganography (CIS) methods are based on mapping rules, which not only exposes the vulnerability to geometric attacks, but also are less secure due to the revelation of mapping rules. To address the above issues, we introduced camouflage images for steganography instead of directly sending stego-image, which further improves the security performance and information hiding ability of steganography scheme. In particular, based on the different sub-features of stego-image and potential camouflage images, we try to find a larger similarity between them so as to achieve the reversible steganography. Specifically, based on the existing CIS mapping algorithm, we first can establish the correlation between stego-image and secret information and then transmit the camouflage images, which are obtained by reversible sub-feature retrieval algorithm. The received camouflage image can be used to reverse retrieve the stego-image in a public image database. Finally, we can use the same mapping rules to restore secret information. Extensive experimental results demonstrate the better robustness and security of the proposed approach in comparison to state-of-art CIS methods, especially in the robustness of geometric attacks.

Characteristics of Contemporary Fashion using Camouflage Patterns (카무플라주 문양을 활용한 현대패션의 특성)

  • Kim, Sun-Young
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.4
    • /
    • pp.661-673
    • /
    • 2011
  • This study aimed to identify the intrinsic characteristics of camouflage patterns by reviewing their origin, transitions and types from a theoretical background and analyzing their forms of expression in contemporary fashion. For a literature review and an empirical analysis of the camouflage patterns used in contemporary fashion, the study referred to domestic and foreign fashion magazines published between 2000 S/S and 2010 S/S, including Gap Press, Fashion News, Vogue and Harper's Bazaar, and other related data available on the internet. The findings of this study show that the forms of camouflage patterns used in contemporary fashion can be divided into four types: abstract patterns, plant patterns of flowers or leaves, animal patterns and dotted patterns. In terms of coloration, the camouflage patterns work to refresh the design, breaking from the image of military uniforms through the use of a wide range of color variation and combinations as well as the traditional camouflage colors based on khaki and beige. In terms of expression, most of them utilize printing. However, other techniques of expression, such as embroidery, beading, knitting, and collages are used to emphasize the beauty of handcrafted decorations along with the aesthetic value of reliefs. Through these tendencies of expression, the characteristics of contemporary fashion using camouflage are explained with an emphasis on feminine beauty, the expression of neutrality, and the use as decorative factors.

Performance Improvement of a Deep Learning-based Object Recognition using Imitated Red-green Color Blindness of Camouflaged Soldier Images (적록색맹 모사 영상 데이터를 이용한 딥러닝 기반의 위장군인 객체 인식 성능 향상)

  • Choi, Keun Ha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.139-146
    • /
    • 2020
  • The camouflage pattern was difficult to distinguish from the surrounding background, so it was difficult to classify the object and the background image when the color image is used as the training data of deep-learning. In this paper, we proposed a red-green color blindness image transformation method using the principle that people of red-green blindness distinguish green color better than ordinary people. Experimental results show that the camouflage soldier's recognition performance improved by proposed a deep learning model of the ensemble technique using the imitated red-green-blind image data and the original color image data.

Camouflage Pattern Evaluation based on Environment and Camouflage Pattern Similarity Analysis (작전환경 및 위장무늬 유사도 분석 기반 위장무늬 평가)

  • Yun, Jeongrok;Kim, Hoemin;Kim, Un Yong;Chun, Sungkuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.671-672
    • /
    • 2021
  • 본 논문에서는 작전환경과 위장무늬 디자인 영상 간의 색상 및 구조 분석 기반의 새로운 정량적 위장무늬 평가 방법을 제안한다. 작전환경 및 위장무늬 디자인 영상 간 RGB, Lab 색상 공간에서의 화소간 평균 오차 및 색상 히스토그램 비교를 통해 색상 유사도를 계산한다. 또한, PSNR(Peak Signal-to-Noise Ratio), MSSIM(Mean Structural Similarity Index), UIQI, GMSD 및 딥러닝 기반 영상 간 구조 유사도를 계산한다. Random Forest Regressor를 통해 각각 계산된 색상 및 구조 유사도 파라미터를 회기 분석하여 최종 위장무늬 평가 결과를 계산한다. 20명의 피실험자를 대상으로 제안한 위장무늬 평가 방법과 기존 평가 방법을 비교함을 통해 제안한 방법의 성능을 검증하였다.

  • PDF

Discriminatory Projection of Camouflaged Texture Through Line Masks

  • Bhajantri, Nagappa;Pradeep, Kumar R.;Nagabhushan, P.
    • Journal of Information Processing Systems
    • /
    • v.9 no.4
    • /
    • pp.660-677
    • /
    • 2013
  • The blending of defective texture with the ambience texture results in camouflage. The gray value or color distribution pattern of the camouflaged images fails to reflect considerable deviations between the camouflaged object and the sublimating background demands improved strategies for texture analysis. In this research, we propose the implementation of an initial enhancement of the image that employs line masks, which could result in a better discrimination of the camouflaged portion. Finally, the gray value distribution patterns are analyzed in the enhanced image, to fix the camouflaged portions.

A Study on the Visual Characteristics of Camouflage Patterns in Fashion Design (패션에 나타난 카무플라주 패턴의 시각적 표현특성)

  • Choi, Jung-Hwa
    • Fashion & Textile Research Journal
    • /
    • v.15 no.5
    • /
    • pp.682-693
    • /
    • 2013
  • Camouflage is evaluated by scientific principle in the fields of biology, military science, and art. It has a strong influence on contemporary fashion and means exposure with concealment. This study analyzed the visual characteristics of camouflage patterns in fashion design through documentaries and fashion photos. The fashion design results areas follow. The simple blending of a disruptive motif indicated an inaccurate repetition of a disruptive motif, the discontinuous or continuous connection of disruptive motif, the irregular repetition of a disruptive animal silhouette, the collage of a different disruptive motif, the craft of a disruptive motif and the intensive color match of a disruptive motif. It represented the maximization of complication, fantastic and fanciness. The overlap of a disruptive motif showed the overlap of disruptive print patterns with transparency and an overlap of different fabrics with a disruptive pattern. It represented spatial relationships of three dimensions as well as the maximization of visual illusion and the reinforcement of attractiveness. The blurring of a disruptive motif showed the pointage of disruptive motif, the pointage of image, value gradation, the whole blurring of a disruptive pattern cluster and stained appearance. It represented the obscurity of motif form, the uncertainty of object and double meaning. The trompe l'oeil of a partial background object showed the realistic and the painterly imitation of color and texture for partial objects through a close-up. It represented amazement and pleasure by illusion, scarcity and the decoration of surface and synecdochical remind. In conclusion, camouflage in fashion was weakened and modified from a classical military context by a unique expression of various motifs.

The Measurement of Mealy Bug Population Using Image Processing Techniques

  • Ruchanurucks, Miti;Areekul, Vutipong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1232-1235
    • /
    • 2002
  • An experiment on the automatic population measurement of brown Mealy Bugs is first reported in this article. Several image processing techniques are employed along with mapping function and neural network. Though brown Mealy Bugs are difficult to detect because of their camouflage, the experimental results showed that approximately 74% of them were correctly detected.

  • PDF

An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis

  • Nag, Amitava;Choudhary, Soni;Basu, Suryadip;Dawn, Subham
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.250-255
    • /
    • 2016
  • Steganography is the art and science of secure communication. It focuses on both security and camouflage. Steganographic techniques must produce the resultant stego-image with less distortion and high resistance to steganalysis attack. This paper is mainly concerned with two steganographic techniques-least significant bit (LSB)++ and the reversible histogram transformation function (RHTF). LSB++ is likely to produce less distortion in the output image to avoid suspicion, but it is vulnerable to steganalysis attacks. RHTF using a mod function technique is capable of resisting the most popular and efficient steganalysis attacks, such as the regular-singular pair attack and chi-squared detection steganalysis, but it produces a lot of distortion in the output image. In this paper, we propose a new steganographic technique by combining both methods. The experimental results show that the proposed technique overcomes the respective drawbacks of each method.

Shift and Noise Tolerance Encryption System Using a Joint Transform Correlator (결합 변환 상관기를 이용한 잡음 및 변이에 강한 암호화 시스템)

  • 서동환;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.7
    • /
    • pp.499-506
    • /
    • 2003
  • In this paper, we propose the shift and noise tolerance method using a virtual phase image and a joint transform correlator (JTC) architecture that can alleviate the need for an accurate optical axis alignment. An encrypted image is obtained by the Fourier transform of the product of a phase- encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, we can prevent the possibility of counterfeiting from unauthorized people using virtual image which dose not contain any information from the original image. We demonstrate the robustness to noise, to data loss and to shift of the encrypted image using a JTC in the proposed description technique.