首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
Progressive Image Transmission Using Significant Features and Linear Regression Prediction 基于显著特征和线性回归预测的渐进图像传输
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.146
Chinchen Chang, J. Chuang
Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.
渐进图像传输常用于低带宽通信或有限带宽环境中。当用户在网站上浏览图像时,网络服务器首先向接收者发送低质量的图像,然后通过随后的传输逐渐提高图像质量。由于图像尺寸越来越大,因此必须开发一种灵活有效的技术来帮助用户快速浏览或检索网站上的图像。为此,本文提出了利用显著特征和预测技术进行渐进图像传输。在我们的方法中,首先需要提取图像的重要特征。接下来,这些特征根据它们的优先级被发送给接收者。为了降低传输数据的编码成本,提出了采样、量化和线性回归预测三种方法。
{"title":"Progressive Image Transmission Using Significant Features and Linear Regression Prediction","authors":"Chinchen Chang, J. Chuang","doi":"10.1109/IIH-MSP.2006.146","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.146","url":null,"abstract":"Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors 多层陶瓷电容器缺陷检测的图像检测系统
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.111
Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee
In today¿s competitive passive components market, the quality and delivery time of products are the key factors to survive. The traditional quality control process is performed by human experts, which is slow and error prone. In recent years, automatic inspection becomes a mainstream and many works have been published. However, the industry still demands a faster and more accurate inspection method. In this paper, a novel image inspection algorithm to detect defects of Multilayer Ceramic Capacitor (MLCC) is proposed. A testing system is developed and integrated into a production line. In our experiment, the proposed algorithm is proved to be very effective. The inspection system speeds up the testing process 2.5 times as well as increases the yield rate considerably.
在当今竞争激烈的无源元件市场,产品的质量和交货时间是生存的关键因素。传统的质量控制过程由人工专家执行,速度慢且容易出错。近年来,自动检测已成为一种主流,并出版了许多相关著作。然而,该行业仍然需要一种更快、更准确的检测方法。提出了一种新的多层陶瓷电容器缺陷图像检测算法。开发了测试系统并将其集成到生产线中。在我们的实验中,该算法被证明是非常有效的。该检测系统将测试过程加快了2.5倍,并大大提高了成品率。
{"title":"Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors","authors":"Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee","doi":"10.1109/IIH-MSP.2006.111","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.111","url":null,"abstract":"In today¿s competitive passive components market, the quality and delivery time of products are the key factors to survive. The traditional quality control process is performed by human experts, which is slow and error prone. In recent years, automatic inspection becomes a mainstream and many works have been published. However, the industry still demands a faster and more accurate inspection method. In this paper, a novel image inspection algorithm to detect defects of Multilayer Ceramic Capacitor (MLCC) is proposed. A testing system is developed and integrated into a production line. In our experiment, the proposed algorithm is proved to be very effective. The inspection system speeds up the testing process 2.5 times as well as increases the yield rate considerably.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Real-Time Moving Target Detection from Infrared Video 红外视频自动实时运动目标检测
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.64
Shahryar Karimi-Ashtiani, C.-C. Jay Kuo
A novel progressive estimation scheme is proposed to detect moving targets in infrared video sequences in this work. The proposed algorithm does not place constraints on camera motions nor requires rigid backgrounds. The complexity of the algorithm is low so that it can be performed in real time. Computational results of the algorithm applied to a real-world infrared video sequence are given to demonstrate its superior detection performance.
本文提出了一种新的逐级估计方法来检测红外视频序列中的运动目标。该算法不受摄像机运动的限制,也不需要刚性背景。该算法的复杂度较低,可以实时执行。最后给出了实际红外视频序列的计算结果,证明了该算法具有良好的检测性能。
{"title":"Automatic Real-Time Moving Target Detection from Infrared Video","authors":"Shahryar Karimi-Ashtiani, C.-C. Jay Kuo","doi":"10.1109/IIH-MSP.2006.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.64","url":null,"abstract":"A novel progressive estimation scheme is proposed to detect moving targets in infrared video sequences in this work. The proposed algorithm does not place constraints on camera motions nor requires rigid backgrounds. The complexity of the algorithm is low so that it can be performed in real time. Computational results of the algorithm applied to a real-world infrared video sequence are given to demonstrate its superior detection performance.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2 MPEG-2转AVS-P2编码算法的性能评价
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.141
Zhenyu Wu, Hongyang Yu, B. Tang, H. Hu
The latest Chinese video coding standard AVS-P2 has been recently approved and is going to be adopted for numerous applications including HD-DVD and satellite broadcast. To allow interconnectivity between different video coding standards, transcoding will be a key factor. This paper assesses the performance of existing requantization techniques developed when applied to transcoding from MPEG-2 to AVS-P2 together with a new technique. The proposed transcoding algorithm is based on an improved mixed re-quantization technique, which gives a good compromise between complexity and quality.
最新的中国视频编码标准AVS-P2最近获得批准,并将用于包括HD-DVD和卫星广播在内的众多应用。为了实现不同视频编码标准之间的互联互通,转码将是一个关键因素。本文评估了现有的需求化技术在从MPEG-2转码到AVS-P2时的性能,以及一种新技术。本文提出的转码算法基于改进的混合重量化技术,在复杂度和质量之间取得了很好的平衡。
{"title":"Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2","authors":"Zhenyu Wu, Hongyang Yu, B. Tang, H. Hu","doi":"10.1109/IIH-MSP.2006.141","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.141","url":null,"abstract":"The latest Chinese video coding standard AVS-P2 has been recently approved and is going to be adopted for numerous applications including HD-DVD and satellite broadcast. To allow interconnectivity between different video coding standards, transcoding will be a key factor. This paper assesses the performance of existing requantization techniques developed when applied to transcoding from MPEG-2 to AVS-P2 together with a new technique. The proposed transcoding algorithm is based on an improved mixed re-quantization technique, which gives a good compromise between complexity and quality.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Log-WT Based Super-Resolution Algorithm 一种新的基于Log-WT的超分辨率算法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.30
Jianping Qiao, Ju Liu
Most learning-based super-resolution algorithms neglect the illumination problem such as shadows and illumination direction changes. In this paper we propose a logarithmic-wavelet transform (Log-WT) based method to combine super-resolution and shadow removing into a single operation. First intrinsic, illumination invariant features of the image are extracted by exploiting logarithmic-wavelet transform. Then an initial estimation of high resolution image is obtained based on the assumption that small patches in low resolution space and patches in high resolution space share the similar local manifold structure. Finally the target high resolution image is reconstructed by applying the reconstruction constraints in pixel domain. Experimental results demonstrate that the proposed method simultaneously achieves singleimage super-resolution and image enhancement especially shadow removing.
大多数基于学习的超分辨算法忽略了阴影和光照方向变化等光照问题。本文提出了一种基于对数小波变换(Log-WT)的方法,将超分辨率和阴影去除结合到一个单一的操作中。首先利用对数-小波变换提取图像的内在、光照不变性特征;然后,假设低分辨率空间的小块与高分辨率空间的小块具有相似的局部流形结构,得到高分辨率图像的初始估计;最后利用像素域重构约束对目标高分辨率图像进行重构。实验结果表明,该方法可以同时实现单幅图像的超分辨率和图像的增强,特别是去影。
{"title":"A Novel Log-WT Based Super-Resolution Algorithm","authors":"Jianping Qiao, Ju Liu","doi":"10.1109/IIH-MSP.2006.30","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.30","url":null,"abstract":"Most learning-based super-resolution algorithms neglect the illumination problem such as shadows and illumination direction changes. In this paper we propose a logarithmic-wavelet transform (Log-WT) based method to combine super-resolution and shadow removing into a single operation. First intrinsic, illumination invariant features of the image are extracted by exploiting logarithmic-wavelet transform. Then an initial estimation of high resolution image is obtained based on the assumption that small patches in low resolution space and patches in high resolution space share the similar local manifold structure. Finally the target high resolution image is reconstructed by applying the reconstruction constraints in pixel domain. Experimental results demonstrate that the proposed method simultaneously achieves singleimage super-resolution and image enhancement especially shadow removing.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Fast Facial Expression Recognition Method at Low-Resolution Images 一种低分辨率图像的快速面部表情识别方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.10
C. Lien, Yang-Kai Chang, Chih-Chiang Tien
In this paper, we propose a novel image-based facial expression recognition method called "expression transition" to identify six kinds of facial expressions (anger, fear, happiness, neutral, sadness, and surprise) at low-resolution images. Two approaches: direct mapping and singular value decomposition (SVD) are applied to calculate the expression transition matrices. The transformed images with a set of expression transition matrices are compared to identify the facial expressions. The experimental results show that the proposed facial expression recognition system can recognize 120 test images in the Chon-Kanade facial expression database with high accuracy and efficiency.
在本文中,我们提出了一种新的基于图像的面部表情识别方法,称为“表情转换”,以识别低分辨率图像中的六种面部表情(愤怒,恐惧,快乐,中性,悲伤和惊讶)。采用直接映射和奇异值分解(SVD)两种方法计算表达式转移矩阵。利用一组表情转换矩阵对变换后的图像进行对比,识别面部表情。实验结果表明,所提出的面部表情识别系统能够对Chon-Kanade面部表情数据库中的120幅测试图像进行高精度、高效率的识别。
{"title":"A Fast Facial Expression Recognition Method at Low-Resolution Images","authors":"C. Lien, Yang-Kai Chang, Chih-Chiang Tien","doi":"10.1109/IIH-MSP.2006.10","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.10","url":null,"abstract":"In this paper, we propose a novel image-based facial expression recognition method called \"expression transition\" to identify six kinds of facial expressions (anger, fear, happiness, neutral, sadness, and surprise) at low-resolution images. Two approaches: direct mapping and singular value decomposition (SVD) are applied to calculate the expression transition matrices. The transformed images with a set of expression transition matrices are compared to identify the facial expressions. The experimental results show that the proposed facial expression recognition system can recognize 120 test images in the Chon-Kanade facial expression database with high accuracy and efficiency.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis 一种基于独立分量分析的Contourlet域水印新方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.34
Zhao Xu, Ke Wang, Xiao-hua Qiao
In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing.
本文提出了一种基于ICA(独立分量分析)的Contourlet域水印算法。水印嵌入方案采用Contourlet变换。与小波变换相比,采用一种轮廓段基来逼近奇异曲线,实现了图像的灵活的多分辨率、局部和定向扩展。为了获得鲁棒性,将水印图像嵌入到最明显的子带中。水印检测方案采用ICA处理。在不考虑水印图像所遭受的攻击类型和攻击参数的情况下,可以正确检测水印。为了证明该方法的有效性,给出了实验结果,该算法对JPEG压缩和噪声攻击具有较强的鲁棒性,对几何攻击、滤波和图像处理具有较强的鲁棒性。
{"title":"A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.34","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.34","url":null,"abstract":"In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Blind Watermarking in Contourlet Domain with Improved Detection 基于改进检测的Contourlet域盲水印
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.65
M. Jayalakshmi, S. Merchant, U. Desai
This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects, further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions.
提出了一种基于contourlet域的图像盲水印方法。我们采用扩频技术进行加性水印嵌入。利用相关检测器检测嵌入的伪随机序列。由此检索到的二进制标志证明了图像的真实性。利用相关技术验证检索到的二进制标识与原始嵌入标识的相似度。对检索到的徽标进行后处理可以获得更好的视觉效果,进一步帮助检测的阈值选择。我们已经验证了该方法对包括StirMark攻击在内的当前攻击的鲁棒性。将该方法与基于小波的盲法进行了比较,结果表明,在相似的嵌入条件下,基于轮廓波的盲法具有更好的鲁棒性。
{"title":"Blind Watermarking in Contourlet Domain with Improved Detection","authors":"M. Jayalakshmi, S. Merchant, U. Desai","doi":"10.1109/IIH-MSP.2006.65","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.65","url":null,"abstract":"This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects, further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An Image Encryption Approach Based on a New Two-Dimensional Map 一种基于二维新映射的图像加密方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.49
F. Huang, Yong Feng
In this paper a new two-dimensional map is proposed. It is a process of stretch-and-fold. Firstly a square image is divide two parts according diagonal. Secondly each part of image is stretch respectively and joins a line. Lastly the line is fold over to a new square image of same size. The map divides into the left map and the right map. The process shuffles the positions of image pixels. Comparing the prevalent twodimensional map, Cat map and Baker map, the new map has simple formulation, big keys space which is fit for image encryption. An image encryption scheme based on the map is developed. The numbers of the left map and the right map are used as the key. The deciphering process is opposite using the same keys. The results of simulation show that it can be used in real-time image encryption applications.
本文提出了一种新的二维地图。这是一个拉伸和折叠的过程。首先根据对角线将正方形图像分成两部分。其次,将图像的各个部分分别拉伸并连接成一条线。最后,这条线被折叠成一个相同大小的正方形图像。地图分为左地图和右地图。这个过程会打乱图像像素的位置。与目前流行的二维映射、Cat映射和Baker映射相比,新映射具有公式简单、密钥空间大、适合图像加密的特点。提出了一种基于映射的图像加密方案。使用左映射和右映射的数字作为键。使用相同的密钥,解密过程是相反的。仿真结果表明,该算法可用于实时图像加密应用。
{"title":"An Image Encryption Approach Based on a New Two-Dimensional Map","authors":"F. Huang, Yong Feng","doi":"10.1109/IIH-MSP.2006.49","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.49","url":null,"abstract":"In this paper a new two-dimensional map is proposed. It is a process of stretch-and-fold. Firstly a square image is divide two parts according diagonal. Secondly each part of image is stretch respectively and joins a line. Lastly the line is fold over to a new square image of same size. The map divides into the left map and the right map. The process shuffles the positions of image pixels. Comparing the prevalent twodimensional map, Cat map and Baker map, the new map has simple formulation, big keys space which is fit for image encryption. An image encryption scheme based on the map is developed. The numbers of the left map and the right map are used as the key. The deciphering process is opposite using the same keys. The results of simulation show that it can be used in real-time image encryption applications.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125151916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems 基于MPEG-21 REL的数字内容保护方案及其在DVB系统中的应用
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.6
Ying-Tzu Shih, Feng-Cheng Chang, H. Hang
In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MPEG- 21 REL technology and integrates it into a DVB-T system. By extending the Service Information (SI) section of a DVB stream to include an REL license, the transmitted content can be conveniently consumed and legally protected. Our design is verified by an experimental hardware system. The results show that the proposed method can provide both the conditional access functionality and the usage control of broadcasted contents.
在数字电视系统中,条件访问(CA)系统是保护节目不受未经授权访问的关键。但是,仅靠加密技术不足以保护或控制解密后内容的使用。为了给数字视频广播(DVB)节目提供灵活、完整的数字版权管理(DRM)保护,我们提出了一种采用MPEG- 21 REL技术并将其集成到DVB- t系统中的方法。通过扩展DVB流的SI (Service Information)部分以包含REL许可,可以方便地使用传输的内容并对其进行法律保护。实验硬件系统验证了我们的设计。结果表明,该方法既能提供条件访问功能,又能对广播内容进行使用控制。
{"title":"A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems","authors":"Ying-Tzu Shih, Feng-Cheng Chang, H. Hang","doi":"10.1109/IIH-MSP.2006.6","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.6","url":null,"abstract":"In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MPEG- 21 REL technology and integrates it into a DVB-T system. By extending the Service Information (SI) section of a DVB stream to include an REL license, the transmitted content can be conveniently consumed and legally protected. Our design is verified by an experimental hardware system. The results show that the proposed method can provide both the conditional access functionality and the usage control of broadcasted contents.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1