- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Educational Systems and Policies
- Technology and Data Analysis
- Education and Learning Interventions
- Teaching and Learning Programming
- Image Processing Techniques and Applications
- Diverse Approaches in Healthcare and Education Studies
- Video Analysis and Summarization
- Diverse Topics in Contemporary Research
- Psychosocial Factors Impacting Youth
- Online Learning and Analytics
- Intelligent Tutoring Systems and Adaptive Learning
- Video Coding and Compression Technologies
- Interactive and Immersive Displays
- Fashion and Cultural Textiles
- Microbial Inactivation Methods
- Listeria monocytogenes in Food Safety
- Food Safety and Hygiene
- Educational Technology and Assessment
- Cell Image Analysis Techniques
- Food Quality and Safety Studies
- Crafts, Textile, and Design
- Image and Video Stabilization
Daegu University
2023-2024
Korea University
2021-2024
Chung-Ang University
2009-2023
Korea Advanced Institute of Science and Technology
2007-2012
SK Group (South Korea)
2012
Kyungpook National University
2011
LG (South Korea)
2002
This paper proposes a forensic technique to localize duplicated image regions based on Zernike moments of small blocks. We exploit rotation invariance properties reliably unveil after arbitrary rotations. devise novel block matching procedure locality sensitive hashing and reduce false positives by examining the moments' phase. A massive experimental test setup benchmarks our algorithm against state-of-the-art methods under various perspectives, both pixel-level localization image-level...
Three dimensional (3D) video technologies have made noticeable progress and become common. The 3D videos using depth image based rendering (DIBR) technique are getting the spotlight due to its visual reality, however, they exposed illegal distribution. To protect contents from copyright infringement, a watermarking scheme can be employed. Since display itself may give rise unnatural artifacts arouse fatigue audiences, imperceptibility is considered as most significant factor. In this paper,...
Many illegal copies of digital video productions for cinema release can be found on the Internet before their official release. During copying footage, composite geometric distortions commonly occur due to angle camcorder relative screen. We propose a novel watermarking based spread spectrum way that satisfies requirements protecting cinema. It enables detector not only extract embedded message but also estimate position where recording is made. sure proposed estimating model (PEM) judge...
The aim of this study was to identify the effect organization culture perceived by nurses on customer orientation. participants in were 442 and data collected from October 1 15, 2014. Data analyzed using SPSS 21.0 programs. nursing organizational positively correlated with nurses' amount orientation had interrelation relationship orientated culture, rank task charge nurse, non-shift work as a working type significant variables which allowed expect Therefore, hospital managers should put...
As screenshots of copyrighted video content are spreading through the Internet without any regulation, cases copyright infringement have been observed. Further, it is difficult to use existing forensic techniques for determining whether or not a given image was captured from screen. Thus, we propose screenshot identification scheme using trace screen capture. Since most television systems and camcorders interlaced scanning, many taken videos. Consequently, these contain videos, combing...
Reversible data hiding technique guarantees that the original cover image is completely recovered from marked after hidden are extracted. This can be applied in some applications such as medical imaging and law enforcement where any distortion to not acceptable. In this paper, we present a reversible algorithm shifts histogram of differences between subimages obtained through subsampling embeds secret by modifying pixel value. Since highly correlated have strong spatial correlations, it...
As digital images have been propagated all over the world, identification techniques for image sources become more important. In this paper, we analyze properties of scanner and find spectral noise appeared in frequency domain. Based on observation, propose a new method identifying models from scanned images. To enhance characteristics noise, refining process is proposed employed to We make reference patterns with refined each scanner. The uses Euclidean distance calculate similarity between...
As screenshots of copyrighted video contents are spreading through the Internet without any regulation, copyright infringement arises gradually. However, there still no techniques that prevent illegal from out. Since most television systems use interlaced scanning mode and camcorders offer recording, many interlaced. In this paper, we propose a screenshot identification scheme using unique characteristic video, combing artifact. To do this, several blocks input image selected for significant...
The development of computer graphics and Internet technology has created a 3D Web-based virtual world that transformed the global fashion industry environment. In this study, application cases education were analyzed to discuss necessity apparel CAD curriculum as part special for talent at Korean fashion-related colleges. Prior studies, literature, photo data (in out Korea) used study. demonstration case studies conducted ``SLCC 2007`` Buffalo State College (U.S.), ``Ratava`s Line (2004)``...
As people have become accustomed to non-face-to-face education because of the COVID-19 pandemic, adaptive and personalized learning is being emphasized in field education. Learning paths suitable for each student may differ from those normally provided by teachers. To support coaching based on concept learning, first step discover relationships among concepts curriculum form a knowledge graph. In this study, feature reduction target knowledge-concept was performed using Elastic Net Random...
Discrete Wavelet Transform (DWT) is widely applied to image watermarking applications because it decomposes a cover into spatial domain as well frequency simultaneously. Also, Singular Value Decomposition (SVD) suitable for since some largest singular values are sufficient embed watermarks instead of using all values. We propose hybrid blind scheme based on DWT and SVD data. The proposed embeds by modifying log-scaled value selected coefficients sub-bands. have found two properties be robust...
ABSTRACT The synergistic bactericidal effects of vitamin B 1 (thiamine dilauryl sulfate) and the efficacy commercial sanitizers for minimization Bacillus cereus contamination in cooked rice were investigated. Sanitizer‐treated exhibited a greater reduction than water‐treated rice, while sanitizer‐treated with Vitamin produced an even reduction. treatments B. included (1) 100 ppm hydrogen peroxide 500 ; (2) 200 (3) 400 peroxide; (4) 50 chlorine (5) 60 300 (6) 70 (7) 80 chlorine; (8) 100,000...
In this paper, we propose a blind watermark detection scheme for digital cinema which is robust against D-A/A-D conversion attack. attack commonly happens during capturing with camera and composed of various geometrical distortions as well signal processing distortions. many video applications, geometric have been compensated by utilizing auto-correlation function (ACF). Since the ACF cannot resist projective transform but affine transform, present local (LACF) mathematical model. Also,...
In the field of imaging device identification, unique property Photo-Response Non-Uniformity (PRNU) is widely employed. One disadvantages PRNU based methods sensitive to de-synchronization attacks. this paper, we propose an improved camcorder identification method which performs well with simultaneously cropped and scaled videos. The proposed solves out-of-sync problems by achieving downscale-tolerance Minimum Average Correlation Energy Mellin Radial Harmonic (MACE-MRH) filter. experimental...