首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
An adjustable multipath flatted-hexagon search algorithm for block motion estimation 块运动估计的可调多径平面六边形搜索算法
Pub Date : 2006-12-26 DOI: 10.1109/IIH-MSP.2006.47
Tsong-Yi Chen, Chao-Ho Chen, Shi-Feng Huang, Yi-Fan Li
A novel and simple speed/accuracy adjustable block-matching algorithm (BMA) based on multipath flatted-hexagon search (MFHS) is developed for motion estimation. In the proposed method, an adaptive threshold of BDM is introduced to determine the required search directions in order to escape from being trapped into a local minimum BDM for the purpose of adjusting the search speed and matching probability. The estimated motion vector will be refined at each search step until the searching process is stopped. Experimental results show that the proposed MFHS algorithm can achieve an average matching probability up to 98% near to that of FS and about 10 times of checking points faster than FS in most of real-world sequences, especially for horizontal-motion-biased image sequences.
提出了一种基于多路径平面六边形搜索(MFHS)的速度/精度可调块匹配算法(BMA)。该方法引入自适应阈值来确定所需的搜索方向,避免陷入局部最小BDM,以调整搜索速度和匹配概率。估计的运动向量将在每个搜索步骤中进行细化,直到搜索过程停止。实验结果表明,在大多数真实序列中,特别是在水平运动偏置图像序列中,所提出的MFHS算法的平均匹配概率接近FS的98%,检测点速度比FS快10倍左右。
{"title":"An adjustable multipath flatted-hexagon search algorithm for block motion estimation","authors":"Tsong-Yi Chen, Chao-Ho Chen, Shi-Feng Huang, Yi-Fan Li","doi":"10.1109/IIH-MSP.2006.47","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.47","url":null,"abstract":"A novel and simple speed/accuracy adjustable block-matching algorithm (BMA) based on multipath flatted-hexagon search (MFHS) is developed for motion estimation. In the proposed method, an adaptive threshold of BDM is introduced to determine the required search directions in order to escape from being trapped into a local minimum BDM for the purpose of adjusting the search speed and matching probability. The estimated motion vector will be refined at each search step until the searching process is stopped. Experimental results show that the proposed MFHS algorithm can achieve an average matching probability up to 98% near to that of FS and about 10 times of checking points faster than FS in most of real-world sequences, especially for horizontal-motion-biased image sequences.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127986362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree 基于混淆交叉支持向量机树的面部表情识别方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.9
Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He
A hybrid learning approach named confusioncrossed support vector machine tree (CSVMT) has been proposed in our current work. It is developed to achieve a better performance for complex distribution problems even when the two parameters of SVM are not appropriately selected. In this paper a facial expression recognition approach based on CSVMT is proposed. Pseudo-Zernike moments are applied in the feature extraction phase, and then CSVMT learning model is performed during the facial expression recognition phase. The compared results on Cohn- Kanade facial expression database show that the proposed approach appeared higher recognition accuracy than the other approaches.
本文提出了一种混合学习方法——混淆交叉支持向量机树(CSVMT)。它的发展是为了在支持向量机的两个参数选择不合适的情况下,在复杂的分布问题中获得更好的性能。本文提出了一种基于CSVMT的面部表情识别方法。在特征提取阶段应用伪泽尼克矩,在面部表情识别阶段进行CSVMT学习模型。在Cohn- Kanade面部表情数据库上的对比结果表明,该方法的识别准确率高于其他方法。
{"title":"A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree","authors":"Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He","doi":"10.1109/IIH-MSP.2006.9","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.9","url":null,"abstract":"A hybrid learning approach named confusioncrossed support vector machine tree (CSVMT) has been proposed in our current work. It is developed to achieve a better performance for complex distribution problems even when the two parameters of SVM are not appropriately selected. In this paper a facial expression recognition approach based on CSVMT is proposed. Pseudo-Zernike moments are applied in the feature extraction phase, and then CSVMT learning model is performed during the facial expression recognition phase. The compared results on Cohn- Kanade facial expression database show that the proposed approach appeared higher recognition accuracy than the other approaches.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127203895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking 一种基于子采样和量化的抗排列攻击水印方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.43
Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuan-Feng Lin
The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness recently, but this kind of watermarking schemes is very vulnerable to the permutation attack. In this paper, the watermark information is embedded into the average values of the 3-level DWT coefficients to resist the permutation attack. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.
提出了一种基于子采样和量化的抗排列攻击的水印方案。近年来,基于子采样的水印方案以其简便、有效的特点受到了广泛的关注,但这种水印方案极易受到排列攻击的攻击。本文将水印信息嵌入到3级DWT系数的平均值中,以抵抗排列攻击。实验结果表明,该算法不仅能抵抗排列攻击,还能抵抗一些常见的图像处理攻击。
{"title":"A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking","authors":"Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuan-Feng Lin","doi":"10.1109/IIH-MSP.2006.43","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.43","url":null,"abstract":"The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness recently, but this kind of watermarking schemes is very vulnerable to the permutation attack. In this paper, the watermark information is embedded into the average values of the 3-level DWT coefficients to resist the permutation attack. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Steganalysis Method for Adaptive Spread Spectrum Steganography 一种新的自适应扩频隐写分析方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.22
R. Ji, H. Yao, Shaohui Liu, Liang Wang, Jianchao Sun
In this paper we focus on the detection of spread spectrum steganography, especially in the case that the scaling parameters are adaptive to image content. Our contribution is two folds. Firstly, we present a new steganalysis method for adaptive spread spectrum steganography: block-based scatter difference detection. Our algorithm first restores cover image by restoring filter. Then the embedding process is simulated in both test and cover images for certain times and the statistic in local DCT block is calculated as a criterion for classification. Secondly, we propose a region estimation algorithm to estimate the most likely stego regions. Our experiment result is promising by showing hits over 90% and false alarm lower than 10%. Its simplicity and extensibility indicate its further application in watermark detection.
本文主要研究扩频隐写的检测问题,特别是在缩放参数与图像内容自适应的情况下。我们的贡献是双重的。首先,我们提出了一种新的自适应扩频隐写分析方法:基于分块的散点差分检测。我们的算法首先通过恢复过滤器来恢复覆盖图像。然后在测试图像和覆盖图像上模拟一定次数的嵌入过程,并计算局部DCT块的统计量作为分类标准。其次,我们提出了一种区域估计算法来估计最可能的隐去区域。我们的实验结果很有希望,命中率超过90%,误报率低于10%。它的简单性和可扩展性表明了它在水印检测中的应用前景。
{"title":"A New Steganalysis Method for Adaptive Spread Spectrum Steganography","authors":"R. Ji, H. Yao, Shaohui Liu, Liang Wang, Jianchao Sun","doi":"10.1109/IIH-MSP.2006.22","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.22","url":null,"abstract":"In this paper we focus on the detection of spread spectrum steganography, especially in the case that the scaling parameters are adaptive to image content. Our contribution is two folds. Firstly, we present a new steganalysis method for adaptive spread spectrum steganography: block-based scatter difference detection. Our algorithm first restores cover image by restoring filter. Then the embedding process is simulated in both test and cover images for certain times and the statistic in local DCT block is calculated as a criterion for classification. Secondly, we propose a region estimation algorithm to estimate the most likely stego regions. Our experiment result is promising by showing hits over 90% and false alarm lower than 10%. Its simplicity and extensibility indicate its further application in watermark detection.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123788376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Research on Steganography Method Based on Error-Correcting Codes 基于纠错码的隐写方法研究
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.37
Cui-Qing Liu, X. Ping, Tao Zhang, Linna Zhou, Yun-He Wang
With the encoding redundancy of Error-Correcting codes a new steganography method is proposed. A mapping code between secret information and codeword error map is built. By modifying the part of the codeword of the error-correcting codes according to the error map secret information is embedded. Theoretical analysis and experimental results show that this method has better security.
利用纠错码的编码冗余性,提出了一种新的隐写方法。建立了秘密信息与码字错误映射之间的映射码。通过根据错误图修改纠错码的码字部分,嵌入秘密信息。理论分析和实验结果表明,该方法具有较好的安全性。
{"title":"A Research on Steganography Method Based on Error-Correcting Codes","authors":"Cui-Qing Liu, X. Ping, Tao Zhang, Linna Zhou, Yun-He Wang","doi":"10.1109/IIH-MSP.2006.37","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.37","url":null,"abstract":"With the encoding redundancy of Error-Correcting codes a new steganography method is proposed. A mapping code between secret information and codeword error map is built. By modifying the part of the codeword of the error-correcting codes according to the error map secret information is embedded. Theoretical analysis and experimental results show that this method has better security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115200351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improved SMVQ Scheme with Edge-Directed Prediction 基于边缘定向预测的改进SMVQ方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.121
Chinchen Chang, Yi-Hui Chen, Kuan-Ming Li
The side-match vector quantization (SMVQ) technique has been widely used in various image compression and hiding techniques. It effectively decreases the bit rates of image with a great compressed quality. However, the prediction is not precise while the variation between the encoded block and its neighboring upper and left blocks is large. Due to the imprecision will cause derailment problem, to solve this problem, this paper proposed an EDPSMVQ scheme which is based on edge-directed prediction (EDP) to precisely predict the side-match pixels avoiding the derailment problem. The experimental results showed that the scheme achieves a high compression ratio with an acceptable image quality.
侧匹配矢量量化(SMVQ)技术已广泛应用于各种图像压缩和隐藏技术中。它有效地降低了图像的比特率,并具有良好的压缩质量。然而,当编码块与其相邻的上、左块之间的差异较大时,预测并不精确。针对不精确会导致脱轨的问题,本文提出了一种基于边缘定向预测(EDP)的EDPSMVQ方案来精确预测侧面匹配像素,避免脱轨问题。实验结果表明,该方案具有较高的压缩比和较好的图像质量。
{"title":"Improved SMVQ Scheme with Edge-Directed Prediction","authors":"Chinchen Chang, Yi-Hui Chen, Kuan-Ming Li","doi":"10.1109/IIH-MSP.2006.121","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.121","url":null,"abstract":"The side-match vector quantization (SMVQ) technique has been widely used in various image compression and hiding techniques. It effectively decreases the bit rates of image with a great compressed quality. However, the prediction is not precise while the variation between the encoded block and its neighboring upper and left blocks is large. Due to the imprecision will cause derailment problem, to solve this problem, this paper proposed an EDPSMVQ scheme which is based on edge-directed prediction (EDP) to precisely predict the side-match pixels avoiding the derailment problem. The experimental results showed that the scheme achieves a high compression ratio with an acceptable image quality.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication 基于对象的文本文档认证中最大数据隐藏容量的利用
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.167
I. Awan, S. Gilani, S. Shah
Although data hiding in text document images is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. In this paper, a new enhanced embedding method is proposed for object-based text document authentication, in which the maximum data hiding capacity of the document is utilized for watermark embedding. Due to which maximum information that a document can contain is embedded within the entire document. Experimental results show that the proposed method utilizes the maximum data hiding capacity as watermark size to ensure the authenticity and integrity of the document much better as compared with the compared technique in which embedding and temper detection fails in some cases.
虽然由于文本文档图像的二值性和背景与前景的明确区分,使得数据隐藏变得困难,但在许多应用中对数据隐藏的要求越来越高。本文提出了一种新的基于对象文本文档认证的增强嵌入方法,该方法利用文档的最大数据隐藏能力进行水印嵌入。因此,文档可以包含的最大信息被嵌入到整个文档中。实验结果表明,该方法利用最大的数据隐藏容量作为水印大小,可以更好地保证文档的真实性和完整性,而传统的嵌入和篡改检测方法在某些情况下会失败。
{"title":"Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication","authors":"I. Awan, S. Gilani, S. Shah","doi":"10.1109/IIH-MSP.2006.167","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.167","url":null,"abstract":"Although data hiding in text document images is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. In this paper, a new enhanced embedding method is proposed for object-based text document authentication, in which the maximum data hiding capacity of the document is utilized for watermark embedding. Due to which maximum information that a document can contain is embedded within the entire document. Experimental results show that the proposed method utilizes the maximum data hiding capacity as watermark size to ensure the authenticity and integrity of the document much better as compared with the compared technique in which embedding and temper detection fails in some cases.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122860998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fast H.264/AVC Inter-Mode Decision with RDC Optimization 基于RDC优化的H.264/AVC模式间快速决策
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.100
Yu Hu, Qing Li, Siwei Ma, C.-C. Jay Kuo
A complexity-constrained inter-mode decision algorithm for H.264/AVC video coding is developed using a rate-distortioncomplexity (RDC) optimization framework in this work. The proposed algorithm consists of two main steps. At the first step, we use the number of DCT coefficients of prediction errors quantized to zeros to predict whether the underlying block modes should be skipped. At the second step, a joint RDC cost function is adopted to control the mode decision process to manage motion search complexity. It is demonstrated by computer simulation that significant complexity saving can be achieved with negligible R-D performance degradation.
本文采用速率失真复杂度(RDC)优化框架,提出了一种复杂度约束的H.264/AVC视频编码模式间决策算法。该算法包括两个主要步骤。在第一步,我们使用量化为零的预测误差的DCT系数数来预测是否应该跳过底层块模式。第二步,采用联合RDC代价函数控制模式决策过程,管理运动搜索复杂度。计算机仿真表明,在忽略R-D性能下降的情况下,可以实现显著的复杂性节约。
{"title":"Fast H.264/AVC Inter-Mode Decision with RDC Optimization","authors":"Yu Hu, Qing Li, Siwei Ma, C.-C. Jay Kuo","doi":"10.1109/IIH-MSP.2006.100","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.100","url":null,"abstract":"A complexity-constrained inter-mode decision algorithm for H.264/AVC video coding is developed using a rate-distortioncomplexity (RDC) optimization framework in this work. The proposed algorithm consists of two main steps. At the first step, we use the number of DCT coefficients of prediction errors quantized to zeros to predict whether the underlying block modes should be skipped. At the second step, a joint RDC cost function is adopted to control the mode decision process to manage motion search complexity. It is demonstrated by computer simulation that significant complexity saving can be achieved with negligible R-D performance degradation.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"54 98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces 基于感知冗余信号空间的彩色图像水印方案性能分析
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.140
Chun-Hsien Chou, Kuo-Cheng Liu
In this paper, the performance analysis of color image watermarking schemes employing perceptually redundant signal spaces is undertaken. A watermarking scheme that searches for perceptually redundant signal space for embedding transparent watermarks in color images is presented. The search is performed in the wavelet domain of the host color image. A color visual model based on the uniform color metric of the CIEDE2000 color difference equation is used to measure the perceptual redundancy inherent in each wavelet coefficient of various color spaces. Binary watermark signals are repeatedly embedded in qualified wavelet coefficients by the way of quantization index modulation. The watermarking schemes using the uniform and non-uniform color spaces for hiding watermarks are conducted to compare the robustness of the embedded watermark. Experimental results of the analysis show that the non-uniform color space can provide a certain part of color signals a large amount of perceptual redundancy for hiding high-strength watermark signals. The watermark embedded in the non-uniform space is always robust than that embedded in the uniform space.
本文对采用感知冗余信号空间的彩色图像水印方案进行了性能分析。提出了一种搜索感知冗余信号空间的彩色图像透明水印嵌入方案。在主彩色图像的小波域中进行搜索。基于CIEDE2000色差方程的均匀颜色度量,建立了一种颜色视觉模型,用于测量各种颜色空间的每个小波系数所固有的感知冗余度。采用量化指标调制的方法,将二值水印信号重复嵌入到合格的小波系数中。采用均匀色空间和非均匀色空间隐藏水印,比较了嵌入水印的鲁棒性。实验分析结果表明,非均匀色彩空间可以为隐藏高强度水印信号提供部分色彩信号的大量感知冗余。嵌入在非均匀空间中的水印始终比嵌入在均匀空间中的水印具有更强的鲁棒性。
{"title":"Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces","authors":"Chun-Hsien Chou, Kuo-Cheng Liu","doi":"10.1109/IIH-MSP.2006.140","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.140","url":null,"abstract":"In this paper, the performance analysis of color image watermarking schemes employing perceptually redundant signal spaces is undertaken. A watermarking scheme that searches for perceptually redundant signal space for embedding transparent watermarks in color images is presented. The search is performed in the wavelet domain of the host color image. A color visual model based on the uniform color metric of the CIEDE2000 color difference equation is used to measure the perceptual redundancy inherent in each wavelet coefficient of various color spaces. Binary watermark signals are repeatedly embedded in qualified wavelet coefficients by the way of quantization index modulation. The watermarking schemes using the uniform and non-uniform color spaces for hiding watermarks are conducted to compare the robustness of the embedded watermark. Experimental results of the analysis show that the non-uniform color space can provide a certain part of color signals a large amount of perceptual redundancy for hiding high-strength watermark signals. The watermark embedded in the non-uniform space is always robust than that embedded in the uniform space.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effects on Statistical Features for Image by Quantization 量化对图像统计特征的影响
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.91
Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong
The changes of statistical features can be used to detect the existence of secret messages in images. In this paper, it is indicated that statistical distribution of the whole AC coefficients, such as Generalized Gaussian, Laplacian, Cauchy, etc. can be greatly affected by JPEG quantization process. Furthermore, a constraint condition concerned with quantization step is presented under which the coefficients of individual channel can be fit Laplacian distribution. Based on the constraint condition above, a new steganalytic method, which can achieve a high degree of detection reliability, is also proposed.
统计特征的变化可以用来检测图像中是否存在秘密信息。本文指出,JPEG量化处理对整个AC系数(如广义高斯、拉普拉斯、柯西等)的统计分布有很大影响。在此基础上,提出了一个与量化步长有关的约束条件,在此条件下,各个信道的系数可以拟合拉普拉斯分布。基于上述约束条件,提出了一种新的隐写分析方法,该方法具有较高的检测可靠性。
{"title":"Effects on Statistical Features for Image by Quantization","authors":"Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong","doi":"10.1109/IIH-MSP.2006.91","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.91","url":null,"abstract":"The changes of statistical features can be used to detect the existence of secret messages in images. In this paper, it is indicated that statistical distribution of the whole AC coefficients, such as Generalized Gaussian, Laplacian, Cauchy, etc. can be greatly affected by JPEG quantization process. Furthermore, a constraint condition concerned with quantization step is presented under which the coefficients of individual channel can be fit Laplacian distribution. Based on the constraint condition above, a new steganalytic method, which can achieve a high degree of detection reliability, is also proposed.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123964522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1