Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.158
Yuhua Jiao, Bian Yang, He Wang, X. Niu
In some image content retrieval applications, the query maybe some image processed, geometrically transformed, or noise contaminated versions of their original ones, and therefore requires robustness against these unmalicious modifications, while possessing good discrimination ability for different image contents. We investigate a robust way for image content retrieval based on singular value decomposition to improve the performance of content discrimination. The singular value is used to gain robustness against geometrical variance. To gain higher robustness against other signal processing modifications, an adaptive image thresholding method is used as a preprocessing to SVD. Our experiments are based on 1,000 original images (with different contents) and their 23,000 modified versions, showing improved results of discrimination ability for image contents.
{"title":"SVD Based Robust Image Content Retrieval","authors":"Yuhua Jiao, Bian Yang, He Wang, X. Niu","doi":"10.1109/IIH-MSP.2006.158","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.158","url":null,"abstract":"In some image content retrieval applications, the query maybe some image processed, geometrically transformed, or noise contaminated versions of their original ones, and therefore requires robustness against these unmalicious modifications, while possessing good discrimination ability for different image contents. We investigate a robust way for image content retrieval based on singular value decomposition to improve the performance of content discrimination. The singular value is used to gain robustness against geometrical variance. To gain higher robustness against other signal processing modifications, an adaptive image thresholding method is used as a preprocessing to SVD. Our experiments are based on 1,000 original images (with different contents) and their 23,000 modified versions, showing improved results of discrimination ability for image contents.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an improved algorithm to detect the beginning and end of the secret message during low frequency embedding in sequential steganography. Based on the fact that the statistics of stego signal have a higher jump after sequential embedding, the method effectively indicates the jump in low frequency embedding through adjusting the log likelihood estimator, namely, increasing the power of the standard deviations and introducing the modulating factors, and then develops a new cumulative sum detector. Experiments show that this method still can estimate the secret key in the low frequency embedding even though the message strength is as low as 0.3.
{"title":"An Improved Secret Key Estimation Method for Sequential Steganography","authors":"Ping Wang, Xiangyang Luo, Fenlin Liu","doi":"10.1109/IIH-MSP.2006.52","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.52","url":null,"abstract":"This paper presents an improved algorithm to detect the beginning and end of the secret message during low frequency embedding in sequential steganography. Based on the fact that the statistics of stego signal have a higher jump after sequential embedding, the method effectively indicates the jump in low frequency embedding through adjusting the log likelihood estimator, namely, increasing the power of the standard deviations and introducing the modulating factors, and then develops a new cumulative sum detector. Experiments show that this method still can estimate the secret key in the low frequency embedding even though the message strength is as low as 0.3.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121633435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A digital signature disallows alteration of the document. Appropriate alterations, however, should be allowed for some signed documents in practical use because of security requirements other than the integrity of the document. For example, when administrative documents are disclosed, based on the information disclosure law, in such documents, sensitive information, such as privacy information or national secrets is masked in advance. If this procedure is applied using existing digital signature technologies, the original digital signature becomes invalid when part of the document is sanitized. This problem is called the digital document sanitization problem and digital document sanitization schemes have been proposed as a solution to this problem. However, these schemes have disadvantages, such as a lack of flexibility in selecting sanitization blocks or inability to detect illegal sanitization by the sanitizer. In the present paper, we propose a digitally signed document flexible sanitizing scheme (DDFS) that can answer requests for flexible changes in the sanitized sections of a document without compromising security.
{"title":"A Digital Document Flexible Sanitizing Scheme","authors":"T. Masubuchi, Mitsuyuki Takatsuka, R. Sasaki","doi":"10.1109/IIH-MSP.2006.7","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.7","url":null,"abstract":"A digital signature disallows alteration of the document. Appropriate alterations, however, should be allowed for some signed documents in practical use because of security requirements other than the integrity of the document. For example, when administrative documents are disclosed, based on the information disclosure law, in such documents, sensitive information, such as privacy information or national secrets is masked in advance. If this procedure is applied using existing digital signature technologies, the original digital signature becomes invalid when part of the document is sanitized. This problem is called the digital document sanitization problem and digital document sanitization schemes have been proposed as a solution to this problem. However, these schemes have disadvantages, such as a lack of flexibility in selecting sanitization blocks or inability to detect illegal sanitization by the sanitizer. In the present paper, we propose a digitally signed document flexible sanitizing scheme (DDFS) that can answer requests for flexible changes in the sanitized sections of a document without compromising security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115861860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.170
Kai-Li Chiang, Wen-Hsiang Tsai
An approach to vehicle guidance using odometer and house corner location information is proposed for visionbased vehicle navigation in indoor environments. A small vehicle with wireless control and image grabbing capabilities is used as a test bed. A camera with the pantilt- zoom capability is equipped on the vehicle. The vehicle is guided to follow a path consisting of nodes learned in advance, which include the information of travel distances and turning angles provided by the odometer. A vehicle location method using house corners is proposed to estimate vehicle location which can be used to correct vehicle location, thus preventing mechanic error accumulation in long-distance navigation. Good experimental results show the feasibility of the proposed approach.
{"title":"Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information","authors":"Kai-Li Chiang, Wen-Hsiang Tsai","doi":"10.1109/IIH-MSP.2006.170","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.170","url":null,"abstract":"An approach to vehicle guidance using odometer and house corner location information is proposed for visionbased vehicle navigation in indoor environments. A small vehicle with wireless control and image grabbing capabilities is used as a test bed. A camera with the pantilt- zoom capability is equipped on the vehicle. The vehicle is guided to follow a path consisting of nodes learned in advance, which include the information of travel distances and turning angles provided by the odometer. A vehicle location method using house corners is proposed to estimate vehicle location which can be used to correct vehicle location, thus preventing mechanic error accumulation in long-distance navigation. Good experimental results show the feasibility of the proposed approach.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"54 30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131362735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.101
Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, X. Niu
Based on the deep understanding of the mechanism in the information hiding technology, the concept of the generalized information hiding and a new model are suggested in this paper. According to the new theory of information hiding, many ancient stego model and modern information hiding methods got the reasonable interpretation. An important conclusion that the cover message is not necessary was got, and the image vision redundancy can be quantificationally analyzed here.
{"title":"Focus on the Generalized Information Hiding Technology","authors":"Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, X. Niu","doi":"10.1109/IIH-MSP.2006.101","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.101","url":null,"abstract":"Based on the deep understanding of the mechanism in the information hiding technology, the concept of the generalized information hiding and a new model are suggested in this paper. According to the new theory of information hiding, many ancient stego model and modern information hiding methods got the reasonable interpretation. An important conclusion that the cover message is not necessary was got, and the image vision redundancy can be quantificationally analyzed here.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132072943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.135
H. Bai, Yao Zhao
Multiple description (MD) coding is a promising alternative for robust transmission of information over non-prioritized and unpredictable networks. In this paper, according to the geometrical structure and the spatial relationship of lattice vector quantizers, a technique called shifted lattice vector quantization (SLVQ) is employed in MD image coding to generate descriptions for unbalanced or balanced channels. Experimental results validate the effectiveness of the proposed technique with better performance than the popular MD lattice vector quantization proposed by Servetto, Vaishampayan and Sloane (known as SVS technique). Especially the presented technique can effectively alleviate the gap between the central and side distortions in SVS technique.
{"title":"Multiple Description Image Coding Using Shifted Lattice Vector Quantization","authors":"H. Bai, Yao Zhao","doi":"10.1109/IIH-MSP.2006.135","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.135","url":null,"abstract":"Multiple description (MD) coding is a promising alternative for robust transmission of information over non-prioritized and unpredictable networks. In this paper, according to the geometrical structure and the spatial relationship of lattice vector quantizers, a technique called shifted lattice vector quantization (SLVQ) is employed in MD image coding to generate descriptions for unbalanced or balanced channels. Experimental results validate the effectiveness of the proposed technique with better performance than the popular MD lattice vector quantization proposed by Servetto, Vaishampayan and Sloane (known as SVS technique). Especially the presented technique can effectively alleviate the gap between the central and side distortions in SVS technique.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134449986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.162
Yining Qi, M. Dai
Apparent motion discontinuities in the videos, such as frame freezing and frame skipping, are a common temporal degradation in the video transmission via Internet and Mobile channels. The end-user perceives a fluidity break of visual information having an impact on his quality assessment of the delivered video sequence. A video subjective test based on SAMVIQ (Subjective Assessment Methodology for VIdeo Quality) [1] has set up to estimate the effect of frame freeze and frame skip on video quality. In this paper, we will present the subjective test which has already set up for the estimation of video quality, then we can deduce the different situations of frame freeze and frame skip distortion has different impairments on video quality.
视频中明显的运动不连续,如帧冻结和帧跳变,是通过互联网和移动信道传输视频时常见的时间退化问题。最终用户感知到视觉信息的流动性中断,这影响了他对交付的视频序列的质量评估。建立了基于SAMVIQ (video Quality subjective Assessment Methodology for video Quality)[1]的视频主观测试,以评估帧冻结和帧跳过对视频质量的影响。在本文中,我们将给出已经建立的用于视频质量估计的主观测试,然后我们可以推断出帧冻结和帧跳变的不同情况对视频质量的不同损害。
{"title":"The Effect of Frame Freezing and Frame Skipping on Video Quality","authors":"Yining Qi, M. Dai","doi":"10.1109/IIH-MSP.2006.162","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.162","url":null,"abstract":"Apparent motion discontinuities in the videos, such as frame freezing and frame skipping, are a common temporal degradation in the video transmission via Internet and Mobile channels. The end-user perceives a fluidity break of visual information having an impact on his quality assessment of the delivered video sequence. A video subjective test based on SAMVIQ (Subjective Assessment Methodology for VIdeo Quality) [1] has set up to estimate the effect of frame freeze and frame skip on video quality. In this paper, we will present the subjective test which has already set up for the estimation of video quality, then we can deduce the different situations of frame freeze and frame skip distortion has different impairments on video quality.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131524860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acoustical signals in digital form can include additional information, this information is separate from the original signal even though they are both stored in a same file. Methods for storing additional information into the original acoustical signal itself have been investigated. Their bit-rate is at most several hundred bit per second. This paper proposes a new method for digital watermarking with higher bit-rate. Its information hiding and detection method is based on spline interpolation. As a result of listening experiment, bit-rate of above 1 kbps was achieved without audible deterioration.
{"title":"A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation","authors":"Ryuta Fujimoto, M. Iwaki, T. Kiryu","doi":"10.1109/IIH-MSP.2006.16","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.16","url":null,"abstract":"Acoustical signals in digital form can include additional information, this information is separate from the original signal even though they are both stored in a same file. Methods for storing additional information into the original acoustical signal itself have been investigated. Their bit-rate is at most several hundred bit per second. This paper proposes a new method for digital watermarking with higher bit-rate. Its information hiding and detection method is based on spline interpolation. As a result of listening experiment, bit-rate of above 1 kbps was achieved without audible deterioration.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel approach is proposed for robust audio water- marking in wavelet domain. It emphasizes on enhancing security by dynamically modifying embedding strategy. The modification is based on real-time changes of the water- mark information and host audio. Without using any secret key, informative watermark are embedded into audio with different strength. The distribution of watermarked audio in wavelet domain is relatively similar to clean audio, com- pared to existing watermarking schemes in wavelet domain. The analysis and experimental results are given to demon- strate that the proposed watermarking scheme is effective against common signal processing manipulations and at- tacks, such as Gaussian noise corruption, resampling, re- quantization, MP3 compression and D/A-A/D conversion.
{"title":"A Novel Audio Watermarking in Wavelet Domain","authors":"Ming Li, Yun Lei, Jian Liu, Yonghong Yan","doi":"10.1109/IIH-MSP.2006.27","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.27","url":null,"abstract":"A novel approach is proposed for robust audio water- marking in wavelet domain. It emphasizes on enhancing security by dynamically modifying embedding strategy. The modification is based on real-time changes of the water- mark information and host audio. Without using any secret key, informative watermark are embedded into audio with different strength. The distribution of watermarked audio in wavelet domain is relatively similar to clean audio, com- pared to existing watermarking schemes in wavelet domain. The analysis and experimental results are given to demon- strate that the proposed watermarking scheme is effective against common signal processing manipulations and at- tacks, such as Gaussian noise corruption, resampling, re- quantization, MP3 compression and D/A-A/D conversion.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125818843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junbao Li, S. Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan
An efficient fusion strategy called discriminant feature fusion strategy for supervised learning is proposed to seek the optimal fusion coefficients of feature fusion. Contributions of this paper lie in: 1) creating a constrained optimization problem based on maximum margin criterion for solving the optimal fusion coefficients, which causes that fused data has the largest class discriminant in the fused feature space; 2) keeping an unique solution of optimization problem by transforming the optimization problem to an eigenvalue problem, which causes the fusion strategy to reach a consistent performance. Besides of the detailed theory derivation, many experimental evaluations also are presented in this paper.
{"title":"Discriminant Feature Fusion Strategy for Supervised Learning","authors":"Junbao Li, S. Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan","doi":"10.1109/IIH-MSP.2006.88","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.88","url":null,"abstract":"An efficient fusion strategy called discriminant feature fusion strategy for supervised learning is proposed to seek the optimal fusion coefficients of feature fusion. Contributions of this paper lie in: 1) creating a constrained optimization problem based on maximum margin criterion for solving the optimal fusion coefficients, which causes that fused data has the largest class discriminant in the fused feature space; 2) keeping an unique solution of optimization problem by transforming the optimization problem to an eigenvalue problem, which causes the fusion strategy to reach a consistent performance. Besides of the detailed theory derivation, many experimental evaluations also are presented in this paper.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}