Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.437
Ko-Chin Chang, P. Huang, T. Tu, Chien-Ping Chang
A novel steganographic approach based on tri-way pixel-value differencing (TPVD) is presented in this paper. This approach uses three different directional edges to design the tri-way differencing scheme and to remove the capacity limitation of the original PVD method using only one direction. In addition, we propose an optimal selection approach for the reference point and adaptive rules to reduce distortion from setting larger embedding capacity. The theoretical estimation and experimental results demonstrate that our scheme can provide a superior embedding capacity and the embedded confidential information can be extracted from stego-images without the assistance of original images.
{"title":"Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules","authors":"Ko-Chin Chang, P. Huang, T. Tu, Chien-Ping Chang","doi":"10.1109/IIH-MSP.2007.437","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.437","url":null,"abstract":"A novel steganographic approach based on tri-way pixel-value differencing (TPVD) is presented in this paper. This approach uses three different directional edges to design the tri-way differencing scheme and to remove the capacity limitation of the original PVD method using only one direction. In addition, we propose an optimal selection approach for the reference point and adaptive rules to reduce distortion from setting larger embedding capacity. The theoretical estimation and experimental results demonstrate that our scheme can provide a superior embedding capacity and the embedded confidential information can be extracted from stego-images without the assistance of original images.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.434
I. Echizen, Yusuke Atomori, Shinta Nakayama, H. Yoshiura
This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable than the robust watermarking scheme we previously proposed. An experimental evaluation using actual video samples demonstrated that the method can embed more watermarks while keeping the same picture quality and can detect them reliably in watermarked pictures that had gone through all four types of transformations. The method can be used in various watermarking schemes.
{"title":"HVS-Based Robust Video Watermarking with Dual-plane Correlation","authors":"I. Echizen, Yusuke Atomori, Shinta Nakayama, H. Yoshiura","doi":"10.1109/IIH-MSP.2007.434","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.434","url":null,"abstract":"This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable than the robust watermarking scheme we previously proposed. An experimental evaluation using actual video samples demonstrated that the method can embed more watermarks while keeping the same picture quality and can detect them reliably in watermarked pictures that had gone through all four types of transformations. The method can be used in various watermarking schemes.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a study of image watermarking using robust singular value decomposition in L1-norm sub-space. The watermarked image attacked by noise is greatly degraded. This results in the effects of transparency and robustness of the watermarked image. Although the watermarking in SVD domain is sensitive to noise and outliers, incorporating L1-norm regression to the watermarking algorithm can help handling the missing data caused by noise and help increasing the robustness of the proposed algorithm. Experimental results show that the proposed algorithm can not only excellently reduce the bit error rates of the recovered watermark but also retain the transparency property of the watermarked image.
{"title":"A Study of using L1-norm with Image Watermarking on SVD Domain","authors":"A. Khawne, O. Chitsobhuk, T. Nakamiya","doi":"10.1109/IIH-MSP.2007.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.64","url":null,"abstract":"This paper presents a study of image watermarking using robust singular value decomposition in L1-norm sub-space. The watermarked image attacked by noise is greatly degraded. This results in the effects of transparency and robustness of the watermarked image. Although the watermarking in SVD domain is sensitive to noise and outliers, incorporating L1-norm regression to the watermarking algorithm can help handling the missing data caused by noise and help increasing the robustness of the proposed algorithm. Experimental results show that the proposed algorithm can not only excellently reduce the bit error rates of the recovered watermark but also retain the transparency property of the watermarked image.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129032224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu
Bandwidth, energy consumption and delay are always bottlenecks of visual sensor network. In this paper a hierarchical multi-quality image fusion method based on region-mapping is proposed to improve above condition. Camera view is divided into regions according to mapping relation and the structured deployment of nodes. The methods of motion attention analysis and nearest neighbor sampling are also adopted to optimize the local attention region of the image. The proposed fusion method is analyzed and verified to be effective to improve the quality of the monitor image with no need for more energy and bandwidth.
{"title":"A New Multi-quality Image Fusion Method in Visual Sensor Network","authors":"Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu","doi":"10.1109/IIH-MSP.2007.42","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.42","url":null,"abstract":"Bandwidth, energy consumption and delay are always bottlenecks of visual sensor network. In this paper a hierarchical multi-quality image fusion method based on region-mapping is proposed to improve above condition. Camera view is divided into regions according to mapping relation and the structured deployment of nodes. The methods of motion attention analysis and nearest neighbor sampling are also adopted to optimize the local attention region of the image. The proposed fusion method is analyzed and verified to be effective to improve the quality of the monitor image with no need for more energy and bandwidth.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.294
Chao-Wen Chan, Chung-Chih Lin
The presented paper points out some security weaknesses of the authentication scheme proposed by Lee and Chiu in 2005. Based on our analysis of the scheme, we present a scheme which can improve the security of Lee-Chiu's scheme.
{"title":"The Improvement of Lee-Chiu's Remote User Authentication Scheme","authors":"Chao-Wen Chan, Chung-Chih Lin","doi":"10.1109/IIH-MSP.2007.294","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.294","url":null,"abstract":"The presented paper points out some security weaknesses of the authentication scheme proposed by Lee and Chiu in 2005. Based on our analysis of the scheme, we present a scheme which can improve the security of Lee-Chiu's scheme.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.247
Chou-Wen Wang, Chia-Chien Chang
We first derive the closed-form solutions of the CLNs issued by an SPV or the protection buyer both the with reference and counter party risk under the consideration of default events correlated with the short-term interest rate. We derive the fair fees that are paid by a protection buyer to an SPV for the purpose of issuing the CLNs. From numerical analyses, we find that the values of CLNs are negatively correlated with the interest rate volatility and the default intensity of reference obligation. Further, if the short-term interest rate changes dramatically or the credit qualities of the reference entity and the protection buyer get worse, it is a better timing for the CLNs issued through an SPV.
{"title":"Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV","authors":"Chou-Wen Wang, Chia-Chien Chang","doi":"10.1109/IIH-MSP.2007.247","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.247","url":null,"abstract":"We first derive the closed-form solutions of the CLNs issued by an SPV or the protection buyer both the with reference and counter party risk under the consideration of default events correlated with the short-term interest rate. We derive the fair fees that are paid by a protection buyer to an SPV for the purpose of issuing the CLNs. From numerical analyses, we find that the values of CLNs are negatively correlated with the interest rate volatility and the default intensity of reference obligation. Further, if the short-term interest rate changes dramatically or the credit qualities of the reference entity and the protection buyer get worse, it is a better timing for the CLNs issued through an SPV.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.397
Jian Xiang, Hongli Zhu
As commercial motion capture systems are widely used , more and more 3D motion database become available. In this paper, we presented a motion retrieval system based on ensemble HMM learning. First, 3D features are extracted. Due to high dimensionality of motion's features, then non-linear PCA and radial basis function (RBF) neural network for dimensionality reduction are used. At last each action class is learned with one HMM for motion analysis. Since ensemble learning can effectively enhance supervised learners, ensembles of weak HMM learners are built. Some experimental examples are given to demonstrate the effectiveness and efficiency of our methods.
{"title":"Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction","authors":"Jian Xiang, Hongli Zhu","doi":"10.1109/IIH-MSP.2007.397","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.397","url":null,"abstract":"As commercial motion capture systems are widely used , more and more 3D motion database become available. In this paper, we presented a motion retrieval system based on ensemble HMM learning. First, 3D features are extracted. Due to high dimensionality of motion's features, then non-linear PCA and radial basis function (RBF) neural network for dimensionality reduction are used. At last each action class is learned with one HMM for motion analysis. Since ensemble learning can effectively enhance supervised learners, ensembles of weak HMM learners are built. Some experimental examples are given to demonstrate the effectiveness and efficiency of our methods.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a robust method of audio watermarking in the wavelet domain. In this method, the watermarked data is encrypted, then combined with a synchronization code and embedded in low- frequency coefficients of wavelet transform. In this paper two techniques of quantization are employed for data embedding process. The magnitude of quantization step and embedding strength is adaptively determined according to the characteristics of the human auditory system (HAS). Therefore data embedding distortion is imperceptible for human ears. The experimental results show that the proposed watermarking scheme is transparence and very robust against common attacks such as additive Gaussian noise, low-pass filtering, resampling, requantization, shifting, cropping and MPEG compression.
{"title":"Adaptive and Robust Audio watermarking in Wavelet Domain","authors":"M. Pooyan, A. Delforouzi","doi":"10.1109/IIH-MSP.2007.68","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.68","url":null,"abstract":"This paper presents a robust method of audio watermarking in the wavelet domain. In this method, the watermarked data is encrypted, then combined with a synchronization code and embedded in low- frequency coefficients of wavelet transform. In this paper two techniques of quantization are employed for data embedding process. The magnitude of quantization step and embedding strength is adaptively determined according to the characteristics of the human auditory system (HAS). Therefore data embedding distortion is imperceptible for human ears. The experimental results show that the proposed watermarking scheme is transparence and very robust against common attacks such as additive Gaussian noise, low-pass filtering, resampling, requantization, shifting, cropping and MPEG compression.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.269
F. Yeh, Greg C. Lee, Cheng-Chieh Chiang
The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.
{"title":"Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image","authors":"F. Yeh, Greg C. Lee, Cheng-Chieh Chiang","doi":"10.1109/IIH-MSP.2007.269","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.269","url":null,"abstract":"The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127479874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H.264/AVC uses multi-reference frames to enhance the coding efficiency; the quantity of increased computation is linearly proportional to the number of reference frames. On the study of the multi-macro-block motion estimation of H.264 standard, a low-complexity and fast multi-frame selection method is proposed. The experimental results show that the speed of the proposed method is over two times faster than that of the original scheme adopted in JVT reference software JM10.2 while keeping the similar video quality and bit-rate.
{"title":"A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC","authors":"Hongjun Wang, Lili Wang, Hua Li","doi":"10.1109/IIH-MSP.2007.17","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.17","url":null,"abstract":"H.264/AVC uses multi-reference frames to enhance the coding efficiency; the quantity of increased computation is linearly proportional to the number of reference frames. On the study of the multi-macro-block motion estimation of H.264 standard, a low-complexity and fast multi-frame selection method is proposed. The experimental results show that the speed of the proposed method is over two times faster than that of the original scheme adopted in JVT reference software JM10.2 while keeping the similar video quality and bit-rate.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}