首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
The Watermarking Model for Relational Database Based on Watermarking Sharing 基于水印共享的关系数据库水印模型
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.165
C. Jin, Yu Fu, Feng Tao
In this paper we propose a conceptual framework for relational database based on secret sharing technology. We offer a technique to break the main secret into multiple parts and hide them individually in a relational database. The Lagrange Interpolating Polynomial method is used to recover the shared secret. The (k, n) threshold scheme is used to decide the minimum number of parts required to recover the secret data completely. Through deep data analysis, experimental results show how the proposed scheme can offer robust mechanism to protect data loss especially for the tuples deleting.
本文提出了一个基于秘密共享技术的关系数据库概念框架。我们提供了一种技术,将主秘密分解为多个部分,并将它们单独隐藏在关系数据库中。采用拉格朗日插值多项式方法恢复共享密钥。(k, n)阈值方案用于确定完全恢复秘密数据所需的最小部件数。通过深入的数据分析,实验结果表明,该方案能够提供可靠的数据丢失保护机制,特别是在元组删除时。
{"title":"The Watermarking Model for Relational Database Based on Watermarking Sharing","authors":"C. Jin, Yu Fu, Feng Tao","doi":"10.1109/IIH-MSP.2006.165","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.165","url":null,"abstract":"In this paper we propose a conceptual framework for relational database based on secret sharing technology. We offer a technique to break the main secret into multiple parts and hide them individually in a relational database. The Lagrange Interpolating Polynomial method is used to recover the shared secret. The (k, n) threshold scheme is used to decide the minimum number of parts required to recover the secret data completely. Through deep data analysis, experimental results show how the proposed scheme can offer robust mechanism to protect data loss especially for the tuples deleting.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127170893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm 基于改进遗传算法的移动机器人非完整运动规划
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.137
Jinfei Wu, DongXing Qin, Hongping Yu
The optimal motion planning problem of mobile robot system with nonholonomic constraints amounts to the optimal control problem of nonlinear system. The kinematic and dynamic equations of the mobile robot can be set up according mechanical and control theory. After stepping into the problem, some shortcomings in choosing the specific genetic operator for the current used Genetic Algorithm (abbreviated as GA) have turned up. In this paper, a new method of mobile robot path planning based on the Ameliorated Genetic Algorithm (abbreviated as AGA) is presented. Compared with GA, the ameliorated one can improve system¿s motion precision with specific crossover operator of AGA operations. The effectiveness of the optimal motion planning problem of mobile robot system is demonstrated by the numerical simulation. And AGA has also been proven to have good convergence, higher operative speed and improved accuracy.
具有非完整约束的移动机器人系统的最优运动规划问题相当于非线性系统的最优控制问题。根据力学和控制理论,建立了移动机器人的运动学和动力学方程。在深入研究这一问题后,目前使用的遗传算法(简称GA)在选择特定遗传算子方面存在一些不足。提出了一种基于改进遗传算法(AGA)的移动机器人路径规划新方法。与遗传算法相比,改进后的遗传算法通过特定的交叉算子提高了系统的运动精度。通过数值仿真验证了移动机器人系统最优运动规划问题的有效性。实践证明,该算法收敛性好,运算速度快,精度高。
{"title":"Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm","authors":"Jinfei Wu, DongXing Qin, Hongping Yu","doi":"10.1109/IIH-MSP.2006.137","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.137","url":null,"abstract":"The optimal motion planning problem of mobile robot system with nonholonomic constraints amounts to the optimal control problem of nonlinear system. The kinematic and dynamic equations of the mobile robot can be set up according mechanical and control theory. After stepping into the problem, some shortcomings in choosing the specific genetic operator for the current used Genetic Algorithm (abbreviated as GA) have turned up. In this paper, a new method of mobile robot path planning based on the Ameliorated Genetic Algorithm (abbreviated as AGA) is presented. Compared with GA, the ameliorated one can improve system¿s motion precision with specific crossover operator of AGA operations. The effectiveness of the optimal motion planning problem of mobile robot system is demonstrated by the numerical simulation. And AGA has also been proven to have good convergence, higher operative speed and improved accuracy.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129922926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment 瓶颈带宽约束下TCP流量的自相似特性
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.156
T. Nakashima
The scale-invariant burstiness or self-similarity has been found in real network. Relation between self-similarity and network and/or system parameter is mainly discussed in the context of application layer, and this self-similarity is caused by the file size of Web servers or the duration of user sessions. In addition, self-similar burstiness has been characterized by the transport layer protocol. Traffic dynamics, however, are mainly generated by physical conditions such as the resource restrainment. In this paper, we have investigated self-similar property for TCP traffic under the bandwidth restrainment to make the network parameter vary using the network simulator. After analyzing the simulated results, following properties were extracted. Firstly, the packet loss rate at the boundary of releasing the restriction of bottleneck bandwidth suddenly drops from 10% to 1%. Secondly, estimated Hurst parameter depicts unstable fluctuation at over 4% packet loss rate, with linear slope at under 4% packet loss rate.
在实际网络中发现了尺度不变的突发性或自相似性。自相似度与网络和/或系统参数的关系主要在应用层上下文中讨论,这种自相似度是由Web服务器的文件大小或用户会话的持续时间引起的。此外,传输层协议还对自相似突发性进行了表征。而流量动态主要是由资源约束等物理条件产生的。本文利用网络模拟器研究了TCP流量在带宽限制下的自相似特性,使网络参数发生变化。通过对模拟结果的分析,提取了以下属性:首先,在瓶颈带宽限制解除的边界处丢包率突然从10%下降到1%。其次,估计的Hurst参数在丢包率超过4%时呈现不稳定波动,在丢包率低于4%时呈现线性斜率。
{"title":"Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment","authors":"T. Nakashima","doi":"10.1109/IIH-MSP.2006.156","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.156","url":null,"abstract":"The scale-invariant burstiness or self-similarity has been found in real network. Relation between self-similarity and network and/or system parameter is mainly discussed in the context of application layer, and this self-similarity is caused by the file size of Web servers or the duration of user sessions. In addition, self-similar burstiness has been characterized by the transport layer protocol. Traffic dynamics, however, are mainly generated by physical conditions such as the resource restrainment. In this paper, we have investigated self-similar property for TCP traffic under the bandwidth restrainment to make the network parameter vary using the network simulator. After analyzing the simulated results, following properties were extracted. Firstly, the packet loss rate at the boundary of releasing the restriction of bottleneck bandwidth suddenly drops from 10% to 1%. Secondly, estimated Hurst parameter depicts unstable fluctuation at over 4% packet loss rate, with linear slope at under 4% packet loss rate.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130630957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting the Theft of Natural Language Text Using Birthmark 利用胎记检测自然语言文本的盗窃
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.85
Jianlong Yang, Jianmin Wang, Deyi Li
To detect the theft of natural language text effectively, we present a novel scheme to derive birthmark from the text. Since birthmark is a unique and native characteristic of every text, a text with the same birthmark of another can be easily suspected of a copy. Ideally, birthmark should satisfy two properties: (a) credibility - independent texts must be distinguished by completely different birthmarks, and (b) resilience - birthmark should be tolerant against meaningpreserving attacks. To evaluate the effectiveness of the proposed birthmark, we conduct two experiments. The first one shows that birthmark successfully distinguishes non-copied files. In the second one, it shows that birthmark has quite good a tolerance against meaning-preserving attacks.
为了有效地检测自然语言文本的盗窃,我们提出了一种从文本中提取胎记的新方案。由于胎记是每个文本的独特和固有特征,因此具有相同胎记的文本很容易被怀疑是副本。理想情况下,胎记应该满足两个属性:(a)可信度——独立文本必须由完全不同的胎记区分;(b)复原力——胎记应该能够容忍保留意义的攻击。为了评估所提出的胎记的有效性,我们进行了两个实验。第一个显示胎记成功区分非复制文件。在第二个实验中,它表明胎记对保留意义的攻击有很好的容忍度。
{"title":"Detecting the Theft of Natural Language Text Using Birthmark","authors":"Jianlong Yang, Jianmin Wang, Deyi Li","doi":"10.1109/IIH-MSP.2006.85","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.85","url":null,"abstract":"To detect the theft of natural language text effectively, we present a novel scheme to derive birthmark from the text. Since birthmark is a unique and native characteristic of every text, a text with the same birthmark of another can be easily suspected of a copy. Ideally, birthmark should satisfy two properties: (a) credibility - independent texts must be distinguished by completely different birthmarks, and (b) resilience - birthmark should be tolerant against meaningpreserving attacks. To evaluate the effectiveness of the proposed birthmark, we conduct two experiments. The first one shows that birthmark successfully distinguishes non-copied files. In the second one, it shows that birthmark has quite good a tolerance against meaning-preserving attacks.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130244724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences 一种基于正交混沌序列的大容量图像隐藏方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.29
Yaqin Zhao, Nan Zhao, Guanghui Ren, Bo Zhang
In this paper, a new scheme of hiding multiple secret images into the same cover image is proposed based on the orthogonal chaotic sequences and wavelet transform. Firstly, the secret images are spreaded spectrum with orthogonal pseudo-random chaotic sequences into the spreaded spectrum signals, where chaotic sequences are filtered according to their self-correlation and mutual-correlation characteristics, and they are also utilized as the keys while recovering the secret images because of their sensitivity to the initial values. Then, the secret images can be embedded into the same cover image in wavelet domain simultaneously because all the spreaded secret images are orthogonal. Different from the traditional methods, this method can not only be better in terms of imperceptibility, security and robustness, but also improve the information hidden capacity of a cover image. The experimental results show that the proposed method is able to achieve robustness, imperceptibility and authenticity in image hiding.
基于正交混沌序列和小波变换,提出了一种将多幅秘密图像隐藏到同一张封面图像中的新方案。首先,将秘密图像的扩频正交伪随机混沌序列转化为扩频信号,根据混沌序列的自相关和互相关特性对其进行滤波,并利用混沌序列对初始值的敏感性作为秘密图像恢复的密钥。然后,在小波域内,由于所扩散的秘密图像是正交的,可以将秘密图像同时嵌入到同一幅封面图像中。与传统方法相比,该方法不仅在隐蔽性、安全性和鲁棒性方面具有更好的性能,而且提高了封面图像的信息隐藏能力。实验结果表明,该方法能够实现图像隐藏的鲁棒性、不可感知性和真实性。
{"title":"A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences","authors":"Yaqin Zhao, Nan Zhao, Guanghui Ren, Bo Zhang","doi":"10.1109/IIH-MSP.2006.29","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.29","url":null,"abstract":"In this paper, a new scheme of hiding multiple secret images into the same cover image is proposed based on the orthogonal chaotic sequences and wavelet transform. Firstly, the secret images are spreaded spectrum with orthogonal pseudo-random chaotic sequences into the spreaded spectrum signals, where chaotic sequences are filtered according to their self-correlation and mutual-correlation characteristics, and they are also utilized as the keys while recovering the secret images because of their sensitivity to the initial values. Then, the secret images can be embedded into the same cover image in wavelet domain simultaneously because all the spreaded secret images are orthogonal. Different from the traditional methods, this method can not only be better in terms of imperceptibility, security and robustness, but also improve the information hidden capacity of a cover image. The experimental results show that the proposed method is able to achieve robustness, imperceptibility and authenticity in image hiding.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Information Hiding Scheme for OFDM Wireless Networks OFDM无线网络的一种信息隐藏方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.54
Chuan-Feng Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi
The traditional information hiding schemes embed the information into the image, audio and video etc, for the purposes of copyright protection, authentication, and authorized access control etc. In this paper, we propose to embed the data into the physical layer of the baseband Orthogonal Frequency Division Multiplexing (OFDM) wireless networks. We test the information hiding scheme in an additive white Gaussian noise (AWGN) channel. The experimental results indicate that when the number of carriers is limited and the channel SNR is high enough, the proposed information hiding scheme can work effectively, while the OFDM system can also work well as it used to be.
传统的信息隐藏方案是将信息嵌入到图像、音频、视频等信息中,以达到版权保护、身份验证、授权访问控制等目的。在本文中,我们提出将数据嵌入基带正交频分复用(OFDM)无线网络的物理层。我们在加性高斯白噪声(AWGN)信道中测试了信息隐藏方案。实验结果表明,在载波数量有限且信道信噪比足够高的情况下,所提出的信息隐藏方案可以有效地工作,同时OFDM系统也能保持原来的工作状态。
{"title":"An Information Hiding Scheme for OFDM Wireless Networks","authors":"Chuan-Feng Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi","doi":"10.1109/IIH-MSP.2006.54","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.54","url":null,"abstract":"The traditional information hiding schemes embed the information into the image, audio and video etc, for the purposes of copyright protection, authentication, and authorized access control etc. In this paper, we propose to embed the data into the physical layer of the baseband Orthogonal Frequency Division Multiplexing (OFDM) wireless networks. We test the information hiding scheme in an additive white Gaussian noise (AWGN) channel. The experimental results indicate that when the number of carriers is limited and the channel SNR is high enough, the proposed information hiding scheme can work effectively, while the OFDM system can also work well as it used to be.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework 基于时空概率框架的原子人类动作分割
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.59
Duan-Yu Chen, S. Shih, H. Liao
In this paper, a framework for automatic atomic human action segmentation in continuous action sequences is proposed A star figure enclosed by a bounding convex polygon is used to effectively and uniquely represent the extremities of the silhouette of a human body. Thus, human actions are recorded as a sequence of the starJigure 's parameters, which is then used for action modeling. To model human actions in a compact manner while characterizing their spatiotemporal distributions, star $@re parameters are represented by Gaussian mixture models (GMM). Experiments to evaluate the performance of the proposed framework show that it can segment continuous human actions in an eficient and effective manner.
本文提出了一种连续动作序列中原子人体动作自动分割的框架,该框架采用边界凸多边形包围的星形图形来有效、唯一地表示人体轮廓的末端。因此,人类的动作被记录为starJigure的参数序列,然后用于动作建模。为了以紧凑的方式模拟人类行为,同时表征其时空分布,star $@re参数由高斯混合模型(GMM)表示。实验结果表明,该框架能够高效地分割连续的人类行为。
{"title":"Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework","authors":"Duan-Yu Chen, S. Shih, H. Liao","doi":"10.1109/IIH-MSP.2006.59","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.59","url":null,"abstract":"In this paper, a framework for automatic atomic human action segmentation in continuous action sequences is proposed A star figure enclosed by a bounding convex polygon is used to effectively and uniquely represent the extremities of the silhouette of a human body. Thus, human actions are recorded as a sequence of the starJigure 's parameters, which is then used for action modeling. To model human actions in a compact manner while characterizing their spatiotemporal distributions, star $@re parameters are represented by Gaussian mixture models (GMM). Experiments to evaluate the performance of the proposed framework show that it can segment continuous human actions in an eficient and effective manner.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel Steganographic Schemes Based on Row-Major Mapping Relation 基于行-主映射关系的新型隐写方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.138
Chung-Chuan Wang, Chinchen Chang, J. Jan, Jieh-Shan Yeh
This paper presents two concise novel steganographic schemes of strings comparing and formats converting based on the Row-Major Mapping Relation (RMMR). In general, the number of concealed secret bits( m) is far smaller than that of available host bits(n). Based on the property, we proved that if n underline{underline > } 2^m -1, the alteration rates of our proposed schemes are independent of n, and the alteration rates are close to m-1 when m is large. Even in the worst case that the amount of the secret bits is equal to that of the host bits and over half of the host bits are altered, our proposed scheme based on the Row-Major Mapping Relation with complement (RMMRwC) can decrease the alteration rate. From practical analyses and theoretical inductions, all results show that our novel schemes have advantages over steganography.
本文提出了基于行主映射关系(RMMR)的两种简洁新颖的字符串比较和格式转换隐写方案。一般来说,隐藏的秘密比特数(m)远远小于可用主机比特数(n)。基于这一性质,我们证明了当n underline{underline >} 2^m -1时,我们提出的方案的变化率与n无关,并且当m较大时变化率接近m-1。即使在最坏的情况下,秘密比特的数量与主机比特的数量相等,并且超过一半的主机比特被篡改,我们提出的基于行主补映射关系(RMMRwC)的方案也可以降低篡改率。从实际分析和理论归纳的结果来看,我们的方案比隐写技术具有优势。
{"title":"Novel Steganographic Schemes Based on Row-Major Mapping Relation","authors":"Chung-Chuan Wang, Chinchen Chang, J. Jan, Jieh-Shan Yeh","doi":"10.1109/IIH-MSP.2006.138","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.138","url":null,"abstract":"This paper presents two concise novel steganographic schemes of strings comparing and formats converting based on the Row-Major Mapping Relation (RMMR). In general, the number of concealed secret bits( m) is far smaller than that of available host bits(n). Based on the property, we proved that if n underline{underline > } 2^m -1, the alteration rates of our proposed schemes are independent of n, and the alteration rates are close to m-1 when m is large. Even in the worst case that the amount of the secret bits is equal to that of the host bits and over half of the host bits are altered, our proposed scheme based on the Row-Major Mapping Relation with complement (RMMRwC) can decrease the alteration rate. From practical analyses and theoretical inductions, all results show that our novel schemes have advantages over steganography.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images 一种启发式数字图像增强水印提取方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.13
Chinchen Chang, Yung-Chen Chang, Jau-Ji Shen
The visual quality of the extracted watermark is an important criterion when judging the power of watermarking scheme to protect the ownership of an image. The extracted watermark is usually damaged by the rounding operations that come in during the transformation between spatial and frequency domains. A solution for reducing the damage is not to use the rounding operations but rather some other criteria to guide each pixel value calculation through either carrying or truncation. In this article, we propose a heuristic method to enhance the quality of the extracted watermark. The image is divided into nonoverlapping blocks, and the reference coefficient data are used to modify the pixel values. Extensive experimental results show our proposed method can easily reduce the damage to the extracted watermark.
提取的水印的视觉质量是判断水印方案保护图像所有权能力的重要标准。在空间域和频域的变换过程中,通常会对提取出来的水印进行舍入运算。减少损坏的一种解决方案不是使用舍入操作,而是使用一些其他标准来指导每个像素值的计算,通过进位或截断。在本文中,我们提出了一种启发式方法来提高提取水印的质量。将图像划分为不重叠的块,利用参考系数数据修改像素值。大量的实验结果表明,该方法可以很容易地减少对提取水印的破坏。
{"title":"A Heuristic Method for Extracting Enhanced Watermarks from Digital Images","authors":"Chinchen Chang, Yung-Chen Chang, Jau-Ji Shen","doi":"10.1109/IIH-MSP.2006.13","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.13","url":null,"abstract":"The visual quality of the extracted watermark is an important criterion when judging the power of watermarking scheme to protect the ownership of an image. The extracted watermark is usually damaged by the rounding operations that come in during the transformation between spatial and frequency domains. A solution for reducing the damage is not to use the rounding operations but rather some other criteria to guide each pixel value calculation through either carrying or truncation. In this article, we propose a heuristic method to enhance the quality of the extracted watermark. The image is divided into nonoverlapping blocks, and the reference coefficient data are used to modify the pixel values. Extensive experimental results show our proposed method can easily reduce the damage to the extracted watermark.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Watermarking Protocol of Copyright Protection 一种新的版权保护水印协议
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.23
Ru Zhang, Xiaohui Yu, Linna Zhou, Hong-peng Li
Most existing watermarking protocols deal with the copyright protection as a transaction between the seller and the buyer. However, these protocols don.t appropriately resolve the copyright problem of copyright authority, copyrighter, ICP and customer. To address this issue, a new watermarking protocol proposed in this article uses three watermarks in structure. By introducing the CA, the signature and the timestamp, the protocol sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem. Because ICP and customer cannot remove the watermark from watermarked digital content, and neither the copyrighter nor the ICP can fabricate piracy, the proposed protocol can trace piracy. With the proxy signature, the digital content transaction without the Third party is performed in which there are only two participants, the seller and the buyer.
大多数现有的水印协议将版权保护作为买卖双方之间的交易来处理。然而,这些协议不需要。妥善解决版权局、版权人、ICP和客户之间的版权问题。为了解决这个问题,本文提出了一种新的水印协议,在结构上使用三个水印。该协议通过引入CA、签名和时间戳,建立了数字版权机构的层次结构,实现了版权保护,防御了模糊攻击和串通攻击,解决了不可抵赖性问题和CS过载问题。由于ICP和客户无法从带水印的数字内容中去除水印,而且版权方和ICP都无法伪造盗版,因此所提出的协议具有追踪盗版的能力。通过代理签名,进行没有第三方的数字内容交易,只有买卖双方参与。
{"title":"A New Watermarking Protocol of Copyright Protection","authors":"Ru Zhang, Xiaohui Yu, Linna Zhou, Hong-peng Li","doi":"10.1109/IIH-MSP.2006.23","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.23","url":null,"abstract":"Most existing watermarking protocols deal with the copyright protection as a transaction between the seller and the buyer. However, these protocols don.t appropriately resolve the copyright problem of copyright authority, copyrighter, ICP and customer. To address this issue, a new watermarking protocol proposed in this article uses three watermarks in structure. By introducing the CA, the signature and the timestamp, the protocol sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem. Because ICP and customer cannot remove the watermark from watermarked digital content, and neither the copyrighter nor the ICP can fabricate piracy, the proposed protocol can trace piracy. With the proxy signature, the digital content transaction without the Third party is performed in which there are only two participants, the seller and the buyer.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1