首页 > 最新文献

2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

英文 中文
Security Analysis on Cyber-physical System Using Attack Tree 基于攻击树的网络物理系统安全分析
Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao
Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.
信息物理系统(cyber - physical System, CPS)是为了提高物理性能而将物理系统与网络能力相结合的系统的系统。在与国计民生密切相关的领域得到了广泛的应用,因此CPS的安全问题已经引起了全球的关注,迫切需要对CPS进行适当的风险评估。现有的CPS风险评估多侧重于可靠性评估,多采用概率风险评估(PRA)。这样,由于PRA难以量化来自网络世界的风险,因此对物理部分和网络部分的评估是孤立的。考虑到这个集成系统在物理层和网络层之间具有高度耦合,应该开发方法来评估这两个部分作为一个整体系统。本文提出了一种基于攻击树的CPS风险评估思想。首先,对攻击树中每个叶子的威胁和漏洞属性进行详细描述,并对其威胁和漏洞向量进行赋值;然后利用叶向量值计算攻击路径的威胁向量和漏洞向量。最后,在考虑损伤的基础上,提出了一种计算整个攻击路径风险值的思路。
{"title":"Security Analysis on Cyber-physical System Using Attack Tree","authors":"Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao","doi":"10.1109/IIH-MSP.2013.113","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.113","url":null,"abstract":"Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
License Plate Recognition for Moving Vehicles Using a Moving Camera 基于移动摄像头的移动车辆车牌识别
Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu
This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.
本文研究了一种基于车载摄像机的移动车辆车牌识别系统。本文提出的LPR方法主要包括预处理、车牌定位和字符分割与识别。首先,利用所提出的边缘检测方法和基于梯度的二值化方法,从采集的车牌图像中增强车牌可能存在的区域;然后,通过分析水平投影和角点分布,选择正确的板区;首先对分割后的车牌区域进行垂直索贝尔处理,然后利用所提出的加权二值化方法对车牌的每个字符进行分割,然后进行偏态校正。最后,应用概率神经网络(PNN)技术对每个被分割的字符进行识别。实验结果表明,车牌定位和车牌识别的准确率分别可达到91.7%和88.5%。
{"title":"License Plate Recognition for Moving Vehicles Using a Moving Camera","authors":"Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu","doi":"10.1109/IIH-MSP.2013.129","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.129","url":null,"abstract":"This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"88 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Facial Expression Recognition under Partial Occlusion Based on Gabor Multi-orientation Features Fusion and Local Gabor Binary Pattern Histogram Sequence 基于Gabor多方向特征融合和局部Gabor二值模式直方图序列的局部遮挡下面部表情识别
Shuai Liu, Yan Zhang, Ke-Ping Liu, Yan Li
In this paper, we propose a novel facial expression recognition method under partial occlusion based on Gabor multi-orientation features fusion and local Gabor binary pattern histogram sequence (LGBPHS). Firstly, the Gabor filter is adopted to extract multi-scale and multi-orientation features. Secondly, the Gabor magnitudes of different orientations in the same scale will be fused according to the fusion rule in this paper and then the fusion features are further encoded by using the LBP operator. Finally, the fused image is divided into several non-overlapping rectangle units with equal size, and the histogram of each unit is computed and combined as facial expression features. The proposed method is robust to partial occlusion and better recognition rates are achieved in JAFFE database with eyes occlusion and mouth occlusion. Experimental results show that the method is effective to facial expression recognition under partial occlusion.
本文提出了一种基于Gabor多方向特征融合和局部Gabor二值模式直方图序列(LGBPHS)的局部遮挡下面部表情识别方法。首先,采用Gabor滤波器提取多尺度、多方向特征;其次,根据本文提出的融合规则对同一尺度下不同方向的Gabor震级进行融合,然后利用LBP算子对融合特征进行编码;最后,将融合后的图像分割为几个大小相等且不重叠的矩形单元,计算每个单元的直方图并组合为面部表情特征。该方法对部分遮挡具有较强的鲁棒性,在JAFFE数据库中对眼遮挡和口遮挡均有较好的识别率。实验结果表明,该方法对局部遮挡下的面部表情识别是有效的。
{"title":"Facial Expression Recognition under Partial Occlusion Based on Gabor Multi-orientation Features Fusion and Local Gabor Binary Pattern Histogram Sequence","authors":"Shuai Liu, Yan Zhang, Ke-Ping Liu, Yan Li","doi":"10.1109/IIH-MSP.2013.63","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.63","url":null,"abstract":"In this paper, we propose a novel facial expression recognition method under partial occlusion based on Gabor multi-orientation features fusion and local Gabor binary pattern histogram sequence (LGBPHS). Firstly, the Gabor filter is adopted to extract multi-scale and multi-orientation features. Secondly, the Gabor magnitudes of different orientations in the same scale will be fused according to the fusion rule in this paper and then the fusion features are further encoded by using the LBP operator. Finally, the fused image is divided into several non-overlapping rectangle units with equal size, and the histogram of each unit is computed and combined as facial expression features. The proposed method is robust to partial occlusion and better recognition rates are achieved in JAFFE database with eyes occlusion and mouth occlusion. Experimental results show that the method is effective to facial expression recognition under partial occlusion.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
High-Payload Digital Watermarking Using Radius-Weighted Mean Based on IWT Domain 基于IWT域的半径加权均值高载荷数字水印
Ching-Yu Yang
Based on integer wavelet transform (IWT), the author uses the idea of radius-weighted mean (RWM) and present a high-capacity color image watermarking scheme. More specifically, the Euclidean distance of RWM and centroid is used as the embedding criterion, a watermark is hidden in the low-low (LL) subbnad of IWT domain. To further promote payload size, the criterion of Euclidean norm of RWM is employed in the low-high (LH) and high-low (HL) subbnads of IWT domain. Simulations confirm that the marked images generated by the proposed method are robust against manipulations such as JPEG, JPEG2000, color quantization, cropping, (edge) sharpening, noise additions, blurring, and inversion. In addition, the resultant perceived quality is good while our peak signal-to-noise ratio outperforms existing techniques.
在整数小波变换(IWT)的基础上,利用半径加权均值(RWM)的思想,提出了一种高容量彩色图像水印方案。具体地说,以RWM与质心的欧氏距离作为嵌入准则,将水印隐藏在IWT域的low-low (LL)子带中。为了进一步提高载荷大小,在IWT域的低-高(LH)和高-低(HL)子波段采用了RWM的欧几里得范数准则。仿真验证了该方法生成的标记图像对JPEG、JPEG2000、颜色量化、裁剪、(边缘)锐化、噪声添加、模糊和反演等操作具有鲁棒性。此外,所得的感知质量很好,而我们的峰值信噪比优于现有技术。
{"title":"High-Payload Digital Watermarking Using Radius-Weighted Mean Based on IWT Domain","authors":"Ching-Yu Yang","doi":"10.1109/IIH-MSP.2013.26","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.26","url":null,"abstract":"Based on integer wavelet transform (IWT), the author uses the idea of radius-weighted mean (RWM) and present a high-capacity color image watermarking scheme. More specifically, the Euclidean distance of RWM and centroid is used as the embedding criterion, a watermark is hidden in the low-low (LL) subbnad of IWT domain. To further promote payload size, the criterion of Euclidean norm of RWM is employed in the low-high (LH) and high-low (HL) subbnads of IWT domain. Simulations confirm that the marked images generated by the proposed method are robust against manipulations such as JPEG, JPEG2000, color quantization, cropping, (edge) sharpening, noise additions, blurring, and inversion. In addition, the resultant perceived quality is good while our peak signal-to-noise ratio outperforms existing techniques.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of High Gain Planar Dipole Array Antenna for WLAN Application 无线局域网高增益平面偶极子阵列天线设计
Yuh-Yih Lu, Jhih-Jie Jhu, Hsiang-Cheh Huang
This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band.
提出了一种新的平面偶极子阵列天线(PDAA)设计方案。将辐射片蚀刻在双面印刷电路板(FR4)的金属层上,形成PDAA。在印刷电路板的两侧设计两个带梯形贴片的对称标志,形成基本的偶极子元件。采用IE3D软件对PDAA进行设计。选择了较好的参数来制作所提出的阵列天线。制作的4×8-element平面偶极子阵列天线可以成功地工作在5.2/5.8 GHz。选择合适的偶极子元件尺寸参数,制备了PDAA。根据实测结果,得到了约1.97GHz的宽带。带反射镜的PDAA在5.2GHz和5.8GHz时的峰值增益分别为15.55dBi和17.53dBi。该高增益平面偶极子阵列天线可用于WLAN频段。
{"title":"Design of High Gain Planar Dipole Array Antenna for WLAN Application","authors":"Yuh-Yih Lu, Jhih-Jie Jhu, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.9","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.9","url":null,"abstract":"This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Personal Auditory Tele-existence System Using a TeleHead 使用TeleHead的个人听觉远程存在系统
T. Hirahara, D. Morikawa, Y. Iwaya
A TeleHead is a steerable dummy head that tracks a listener's head movement quickly and quietly. We made a personal auditory tele-existence system connecting Toyama Prefectural University and Research Institute of Electrical Communication Tohoku University by using a TeleHead over the Internet. The remote TeleHead can provide dynamic binaural signals associated with the head-movement data input, and the local listener can hear the sounds represented by them. The listener perceives the three-dimensional sound image as if he were at the remote place even when the system has a total latency of 223 ms.
TeleHead是一种可操纵的假头,它可以快速而安静地跟踪听者的头部运动。我们利用互联网上的TeleHead,制作了一个连接富山县立大学和东北大学电子通信研究所的个人听觉远程存在系统。远程TeleHead可以提供与头部运动数据输入相关联的动态双耳信号,并且本地听者可以听到它们所代表的声音。即使系统的总延迟时间为223毫秒,听众也能感知到三维声音图像,就好像他在遥远的地方一样。
{"title":"Personal Auditory Tele-existence System Using a TeleHead","authors":"T. Hirahara, D. Morikawa, Y. Iwaya","doi":"10.1109/IIH-MSP.2013.88","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.88","url":null,"abstract":"A TeleHead is a steerable dummy head that tracks a listener's head movement quickly and quietly. We made a personal auditory tele-existence system connecting Toyama Prefectural University and Research Institute of Electrical Communication Tohoku University by using a TeleHead over the Internet. The remote TeleHead can provide dynamic binaural signals associated with the head-movement data input, and the local listener can hear the sounds represented by them. The listener perceives the three-dimensional sound image as if he were at the remote place even when the system has a total latency of 223 ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"52 Pt 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Creative 3D Game Platform Interacted with Laser Beam 一个与激光束互动的创意3D游戏平台
Sheng-Hsiung Chang, Chien-Yue Chen, B. Lin, Pei-Jung Wu
In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform.
本研究将三维显示技术与交互式激光技术相结合,开发了一个具有虚拟触摸的界面系统,并构建了一个激光交互式三维游戏平台。
{"title":"A Creative 3D Game Platform Interacted with Laser Beam","authors":"Sheng-Hsiung Chang, Chien-Yue Chen, B. Lin, Pei-Jung Wu","doi":"10.1109/IIH-MSP.2013.22","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.22","url":null,"abstract":"In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Watermarking Method Based on STFT Histogram 基于STFT直方图的数字水印方法
K. Sonoda, A. Sęk
This paper presents a digital audio watermarking method. In the method, watermark has been represented by a form of the histogram for sound power level's distribution in time domain in certain frequency band(s). The relation of four numbers of selected bins in a histogram are changed by a rule of watermark bits assignment. To evaluate the performance of the embedding procedure in each frequency band, the robustness test against several kinds of manipulations or attacks were conducted for some instrumental music sources and harmonic complex tone. Considering the results of robustness test, the performance of multi-band embedding is discussed. Promising results of hearing tests are also presented.
提出了一种数字音频水印方法。该方法用声功率级在一定频带的时域分布直方图的形式来表示水印。通过水印位分配规则来改变直方图中所选择的4个箱数之间的关系。为了评估嵌入过程在各个频带的性能,对一些器乐源和谐波复音进行了对几种操纵或攻击的鲁棒性检验。结合鲁棒性测试结果,讨论了多波段嵌入的性能。还介绍了听力测试的令人鼓舞的结果。
{"title":"Digital Watermarking Method Based on STFT Histogram","authors":"K. Sonoda, A. Sęk","doi":"10.1109/IIH-MSP.2013.80","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.80","url":null,"abstract":"This paper presents a digital audio watermarking method. In the method, watermark has been represented by a form of the histogram for sound power level's distribution in time domain in certain frequency band(s). The relation of four numbers of selected bins in a histogram are changed by a rule of watermark bits assignment. To evaluate the performance of the embedding procedure in each frequency band, the robustness test against several kinds of manipulations or attacks were conducted for some instrumental music sources and harmonic complex tone. Considering the results of robustness test, the performance of multi-band embedding is discussed. Promising results of hearing tests are also presented.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Steganalysis in the Presence of Watermarked Images 存在水印图像的隐写分析
Pham Hai Dang Le, D. Graf, M. Franz
Watermarked images are increasingly prevalent in the internet. Hence, any practical steganalyzer has to take the presence of watermarked images into account, particularly as potential source of false alarms due to similar embedding algorithms. In this study, we investigate the impact of watermarked images on the performance of a standard steganalyzer using two recent watermarking schemes: JPEG Compression Resistance Watermarking (JCRW) in the DCT domain [1] and Controllable Secure Watermarking (CSW) [2] in the pixel domain. Our findings show that JCRW and CSW do interfere with steganalysis. In particular, CSW-watermarked images were mostly classified as stego images thus rendering the investigated steganalyzer useless because of the excessively high false alarm rate. We propose a two-step classifier to handle this problem which achieves the same performance as the original steganalyzer, but in the presence of watermarking.
水印图像在互联网上越来越普遍。因此,任何实际的隐写分析仪都必须考虑到水印图像的存在,特别是由于类似的嵌入算法而成为假警报的潜在来源。在本研究中,我们使用两种最新的水印方案研究了水印图像对标准隐写分析器性能的影响:DCT域的JPEG抗压缩水印(JCRW)[1]和像素域的可控安全水印(CSW)[2]。我们的研究结果表明,JCRW和CSW确实干扰了隐写分析。特别是,csw水印图像大多被归类为隐写图像,从而使所研究的隐写分析仪由于虚警率过高而失效。我们提出了一种两步分类器来处理这个问题,该分类器达到了与原始隐写分析器相同的性能,但存在水印。
{"title":"Steganalysis in the Presence of Watermarked Images","authors":"Pham Hai Dang Le, D. Graf, M. Franz","doi":"10.1109/IIH-MSP.2013.133","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.133","url":null,"abstract":"Watermarked images are increasingly prevalent in the internet. Hence, any practical steganalyzer has to take the presence of watermarked images into account, particularly as potential source of false alarms due to similar embedding algorithms. In this study, we investigate the impact of watermarked images on the performance of a standard steganalyzer using two recent watermarking schemes: JPEG Compression Resistance Watermarking (JCRW) in the DCT domain [1] and Controllable Secure Watermarking (CSW) [2] in the pixel domain. Our findings show that JCRW and CSW do interfere with steganalysis. In particular, CSW-watermarked images were mostly classified as stego images thus rendering the investigated steganalyzer useless because of the excessively high false alarm rate. We propose a two-step classifier to handle this problem which achieves the same performance as the original steganalyzer, but in the presence of watermarking.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131056765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction 基于消息提取的不可见混沌水印方案的质量研究
J. Bahi, Jean-François Couchot, Nicolas Friot, C. Guyeux, Kamel Mazouzi
This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this process is fitted for practical use.
本文研究的是基于不可见混沌的水印方案。它通过关注三类属性来解决已经完成的算法的质量研究。实验证明了该算法对大量图像实例和图像变换的经典攻击具有鲁棒性。它的正确性和完整性被正式证明。由于这些主要优点,该工艺适合实际应用。
{"title":"Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction","authors":"J. Bahi, Jean-François Couchot, Nicolas Friot, C. Guyeux, Kamel Mazouzi","doi":"10.1109/IIH-MSP.2013.141","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.141","url":null,"abstract":"This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this process is fitted for practical use.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1