首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
Complementary Steganography in Error-Diffused Block Truncation Coding Images 错误扩散块截断编码图像中的互补隐写
Jing-Ming Guo
Block truncation coding is an efficient compression technique while offering good image quality. Nonetheless, the blocking effect inherent in BTC causes severe perceptual artifact in high compression ratio applications. In this paper, an error-diffused block truncation coding (EDBTC) is proposed to solve this problem. According to the EDBTC, the error caused by the difference between the original grayscale pixel value and the correspondingly high or low mean substitute is diffused to the predefined neighborhood, and hence the average grayscale will be maintained invariably. In addition, since the compressed data are widely distributed in the Internet transmission, the extra message conveying in a secret way also highly raises attention recently. In this paper, we propose the complementary steganography in error- diffused block truncation coding (CSEDBTC), which cooperates with error diffusion to achieve the objective of secret communication in BTC images. As documented in the experimental results, a low complexity with good image quality is obtained.
块截断编码是一种有效的压缩技术,同时能提供良好的图像质量。然而,在高压缩比应用中,BTC固有的阻塞效应会导致严重的感知伪影。本文提出了一种错误扩散块截断编码(EDBTC)来解决这一问题。根据EDBTC,原始灰度像素值与相应的高或低均值代换值之间的差异所引起的误差被扩散到预定义的邻域,从而始终保持平均灰度。此外,由于压缩后的数据在互联网传输中广泛分布,以保密方式传输的额外信息也引起了人们的高度关注。本文提出了错误扩散块截断编码(CSEDBTC)中的互补隐写,该隐写与错误扩散相配合,实现了BTC图像的秘密通信。实验结果表明,该方法具有较低的复杂度和较好的图像质量。
{"title":"Complementary Steganography in Error-Diffused Block Truncation Coding Images","authors":"Jing-Ming Guo","doi":"10.1109/IIH-MSP.2007.369","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.369","url":null,"abstract":"Block truncation coding is an efficient compression technique while offering good image quality. Nonetheless, the blocking effect inherent in BTC causes severe perceptual artifact in high compression ratio applications. In this paper, an error-diffused block truncation coding (EDBTC) is proposed to solve this problem. According to the EDBTC, the error caused by the difference between the original grayscale pixel value and the correspondingly high or low mean substitute is diffused to the predefined neighborhood, and hence the average grayscale will be maintained invariably. In addition, since the compressed data are widely distributed in the Internet transmission, the extra message conveying in a secret way also highly raises attention recently. In this paper, we propose the complementary steganography in error- diffused block truncation coding (CSEDBTC), which cooperates with error diffusion to achieve the objective of secret communication in BTC images. As documented in the experimental results, a low complexity with good image quality is obtained.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hierarchical Grid-Based Indexing Method for Content-Based Image Retrieval 基于内容的图像检索的分层网格索引方法
Te-Wei Chiang, Tienwei Tsai, Mann-Jung Hsiao
In this paper, a hierarchical grid-based indexing method for content-based image retrieval (CBIR) is proposed to improve the retrieval performance. To develop a general retrieval scheme which is less dependent on domain-specific knowledge, the discrete cosine transform (DCT) is employed as a feature extraction method. In establishing database, quantization technique is applied to quantize the DCT coefficients of each database image, such that the feature space is partitioned into a finite number of grids, each of which corresponds to a grid code (GC). On querying an image, a reduced set of candidate images which have the same GC as that of the query image is obtained at varying levels of grid granularity. In the fine matching stage, only the remaining candidates need to be computed for the detailed similarity comparison. The experimental results show that the proposed method leads to a fast retrieval with good accuracy.
为了提高基于内容的图像检索(CBIR)的检索性能,提出了一种基于分层网格的索引方法。为了开发一种较少依赖于特定领域知识的通用检索方案,采用离散余弦变换(DCT)作为特征提取方法。在建立数据库时,采用量化技术对每个数据库图像的DCT系数进行量化,将特征空间划分为有限个网格,每个网格对应一个网格码(GC)。在查询图像时,在不同的网格粒度级别上获得与查询图像具有相同GC的候选图像的精简集。在精细匹配阶段,只需要计算剩余候选项进行详细的相似度比较。实验结果表明,该方法具有快速、准确的检索效果。
{"title":"A Hierarchical Grid-Based Indexing Method for Content-Based Image Retrieval","authors":"Te-Wei Chiang, Tienwei Tsai, Mann-Jung Hsiao","doi":"10.1109/IIH-MSP.2007.23","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.23","url":null,"abstract":"In this paper, a hierarchical grid-based indexing method for content-based image retrieval (CBIR) is proposed to improve the retrieval performance. To develop a general retrieval scheme which is less dependent on domain-specific knowledge, the discrete cosine transform (DCT) is employed as a feature extraction method. In establishing database, quantization technique is applied to quantize the DCT coefficients of each database image, such that the feature space is partitioned into a finite number of grids, each of which corresponds to a grid code (GC). On querying an image, a reduced set of candidate images which have the same GC as that of the query image is obtained at varying levels of grid granularity. In the fine matching stage, only the remaining candidates need to be computed for the detailed similarity comparison. The experimental results show that the proposed method leads to a fast retrieval with good accuracy.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129434374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dissolve Detection Scheme with Transition Duration Refinement 基于过渡时间细化的溶解检测方案
Guo-Shiang Lin, Min-Kuan Chang, Shien-Tang Chiu
In this article, an efficient dissolve transition detection scheme was proposed. The proposed scheme is composed of adaptive thresholding, parameter calculation, and transition duration refinement. After adaptive thresholding, we coarsely find dissolve transition candidates. To identify dissolve transitions, a useful feature, model parameter, is extracted. Final, a transition duration refinement algorithm is utilized to search the precision duration. The experimental results demonstrate our proposed scheme can not only detect dissolve transitions well but also accurately locate their durations. Comparing with [6], our proposed scheme can provide a better performance for dissolve detection.
本文提出了一种高效的溶解跃迁检测方法。该方案由自适应阈值分割、参数计算和过渡时间细化三部分组成。在自适应阈值化之后,我们粗略地找到溶解的过渡候选者。为了识别溶解转换,提取了一个有用的特征,即模型参数。最后,利用过渡持续时间细化算法搜索精度持续时间。实验结果表明,该方法不仅可以很好地检测溶解跃迁,而且可以准确地定位其持续时间。与[6]相比,我们提出的方案可以提供更好的溶解检测性能。
{"title":"Dissolve Detection Scheme with Transition Duration Refinement","authors":"Guo-Shiang Lin, Min-Kuan Chang, Shien-Tang Chiu","doi":"10.1109/IIH-MSP.2007.385","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.385","url":null,"abstract":"In this article, an efficient dissolve transition detection scheme was proposed. The proposed scheme is composed of adaptive thresholding, parameter calculation, and transition duration refinement. After adaptive thresholding, we coarsely find dissolve transition candidates. To identify dissolve transitions, a useful feature, model parameter, is extracted. Final, a transition duration refinement algorithm is utilized to search the precision duration. The experimental results demonstrate our proposed scheme can not only detect dissolve transitions well but also accurately locate their durations. Comparing with [6], our proposed scheme can provide a better performance for dissolve detection.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123872521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding 在视觉密码术中发现一种新的阈下通道及其在图像隐藏中的应用
Tzungher Chen, Chang-Sian Wu, Wei-Bin Lee
Visual cryptography techniques have been extensively investigated since the invention and extension to numerous applications such as image encryption, visual authentication, digital watermarking and image hiding. In this paper, a new subliminal channel found in visual cryptography (SCVC) is presented. This subliminal channel is a secure way to convey an extra secret message in the plain form of an ordinary visual cryptography mechanism. To show the superioritysuperiority of the new perspective, a SCVC-based application for image hiding is demonstrated as an example. In such a way, this discovery implies the possibility of enhancing hiding capacity to image hiding. It's worthwhile to note that the extra computational cost is extremely low upon increasing the extra hiding capacity.
视觉加密技术自从发明并扩展到图像加密、视觉认证、数字水印和图像隐藏等众多应用以来,已经得到了广泛的研究。本文提出了一种新的阈下信道在视觉密码学(SCVC)中的应用。这种潜意识通道是一种安全的方式,以普通视觉加密机制的普通形式传递额外的秘密消息。为了展示新视角的优越性,以基于scvc的图像隐藏应用为例进行了说明。通过这种方式,这一发现暗示了增强图像隐藏能力的可能性。值得注意的是,在增加额外隐藏容量时,额外的计算成本非常低。
{"title":"A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding","authors":"Tzungher Chen, Chang-Sian Wu, Wei-Bin Lee","doi":"10.1109/IIH-MSP.2007.51","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.51","url":null,"abstract":"Visual cryptography techniques have been extensively investigated since the invention and extension to numerous applications such as image encryption, visual authentication, digital watermarking and image hiding. In this paper, a new subliminal channel found in visual cryptography (SCVC) is presented. This subliminal channel is a secure way to convey an extra secret message in the plain form of an ordinary visual cryptography mechanism. To show the superioritysuperiority of the new perspective, a SCVC-based application for image hiding is demonstrated as an example. In such a way, this discovery implies the possibility of enhancing hiding capacity to image hiding. It's worthwhile to note that the extra computational cost is extremely low upon increasing the extra hiding capacity.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Face Detection and Authentication in a Large Space 大空间下的人脸检测与认证
Ying-Nong Chen, G. Ho, Kuo-Chin Fan, Chin-Chuan Han
Moving pedestrians are too small to grab the clear and recognizable face images in current surveillance systems. In this study, a face detection/indexing scheme has been developed using a dual-camera based capturing module in a large open space. Two cameras, a 'sense' camera and an 'object' one, are calibrated and cooperated. This device not only tracks multiple targets but also gets the close-up snapshot images. Face images with clear and high quality are grabbed and collected at the enrollment stage. A personal feature space and a threshold are constructed for effectively verifying the legality of an entrant. Some experimental results are given to show the validity of the proposed approach.
在当前的监控系统中,移动的行人太小,无法捕捉到清晰可识别的人脸图像。在本研究中,开发了一种基于双摄像头的大型开放空间人脸检测/索引方案。两个摄像头,一个“感知”摄像头和一个“物体”摄像头,进行校准和合作。该装置不仅可以对多个目标进行跟踪,而且可以获得近距离的快照图像。在注册阶段采集清晰、高质量的人脸图像。构造了个人特征空间和阈值,有效地验证了进入者的合法性。实验结果表明了该方法的有效性。
{"title":"Face Detection and Authentication in a Large Space","authors":"Ying-Nong Chen, G. Ho, Kuo-Chin Fan, Chin-Chuan Han","doi":"10.1109/IIH-MSP.2007.402","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.402","url":null,"abstract":"Moving pedestrians are too small to grab the clear and recognizable face images in current surveillance systems. In this study, a face detection/indexing scheme has been developed using a dual-camera based capturing module in a large open space. Two cameras, a 'sense' camera and an 'object' one, are calibrated and cooperated. This device not only tracks multiple targets but also gets the close-up snapshot images. Face images with clear and high quality are grabbed and collected at the enrollment stage. A personal feature space and a threshold are constructed for effectively verifying the legality of an entrant. Some experimental results are given to show the validity of the proposed approach.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Application of an Improved Genetic Algorithm on the Net Platform of “Digitized Party School” 一种改进遗传算法在“数字化党校”网络平台上的研究与应用
Shijue Zheng, Shiqiang Wu
The question of resource management and task scheduling are very complicated in CCNU-SZHDX-Grid computing environment, it is very difficult to test the rationality of resource management and equalization of task scheduling with a kind of specific network equipment in the net. This paper proposes a model for task scheduling on the basis of the net platform, the task scheduling adopts task scheduling genetic algorithm (TSGA), this model has given consideration to resources management and task scheduling, make the two reaching organic combination, and the experimental results are perfect.
在ccnu - szhdx -网格计算环境中,资源管理和任务调度问题非常复杂,在网络中使用一种特定的网络设备来检验资源管理的合理性和任务调度的均衡性是非常困难的。本文提出了一种基于网络平台的任务调度模型,任务调度采用任务调度遗传算法(TSGA),该模型兼顾了资源管理和任务调度,使两者达到有机结合,实验结果较好。
{"title":"Research and Application of an Improved Genetic Algorithm on the Net Platform of “Digitized Party School”","authors":"Shijue Zheng, Shiqiang Wu","doi":"10.1109/IIH-MSP.2007.257","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.257","url":null,"abstract":"The question of resource management and task scheduling are very complicated in CCNU-SZHDX-Grid computing environment, it is very difficult to test the rationality of resource management and equalization of task scheduling with a kind of specific network equipment in the net. This paper proposes a model for task scheduling on the basis of the net platform, the task scheduling adopts task scheduling genetic algorithm (TSGA), this model has given consideration to resources management and task scheduling, make the two reaching organic combination, and the experimental results are perfect.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128029824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework for Windows Password Function Security Enhancement Windows密码功能安全增强框架
Li Li, Jing Wu, Xiaowei Guo, Meng Li, X. Niu
The wide application of Windows operation system people is bringing higher request for the security of the system. Identification and authorization are the most basic means to protect the resources of the computer, which is improved in security level in this paper on the logon model of the Windows. We first discuss the advantages and disadvantages of several existing logon mechanisms. To overcome the weakness of these models, we propose a framework for password function security enhancement of Windows operation system via investigating the Windows logon authentication consisting of Winlogon and GINA, authentication package and password filter. The framework can provide flexible interfaces for various types of logon models, and the password stored in the SAM database can be changed automatically while the access operation is authenticated. In the framework design, we separate the logon credential collection and validation module, which makes the system more flexible and convenient for redevelopment.
人们对Windows操作系统的广泛应用对系统的安全性提出了更高的要求。识别和授权是保护计算机资源的最基本手段,本文在Windows的登录模型上提高了安全级别。我们首先讨论几种现有登录机制的优缺点。为了克服这些模型的不足,本文通过对Winlogon和GINA组成的Windows登录认证、认证包和密码过滤器的研究,提出了一个增强Windows操作系统密码功能安全性的框架。该框架可以为各种类型的登录模型提供灵活的接口,并且可以在对访问操作进行身份验证时自动更改存储在SAM数据库中的密码。在框架设计中,我们将登录凭证收集和验证模块分离,使系统更加灵活,便于再开发。
{"title":"Framework for Windows Password Function Security Enhancement","authors":"Li Li, Jing Wu, Xiaowei Guo, Meng Li, X. Niu","doi":"10.1109/IIH-MSP.2007.414","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.414","url":null,"abstract":"The wide application of Windows operation system people is bringing higher request for the security of the system. Identification and authorization are the most basic means to protect the resources of the computer, which is improved in security level in this paper on the logon model of the Windows. We first discuss the advantages and disadvantages of several existing logon mechanisms. To overcome the weakness of these models, we propose a framework for password function security enhancement of Windows operation system via investigating the Windows logon authentication consisting of Winlogon and GINA, authentication package and password filter. The framework can provide flexible interfaces for various types of logon models, and the password stored in the SAM database can be changed automatically while the access operation is authenticated. In the framework design, we separate the logon credential collection and validation module, which makes the system more flexible and convenient for redevelopment.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121914230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel and Fast Approach for Iris Location 一种新的快速虹膜定位方法
Jen-Chun Lee, P. Huang, Chien-Ping Chang, T. Tu
Iris recognition is regarded as the most reliable and accurate biometric identification system. Speed and accuracy of iris location are required to achieve the success of iris recognition. This paper presents a new iris location algorithm to improve speed and accuracy. The first step is to detect a point inside the pupil using the method of minimum local block mean. Then the specialized boundary detection mask (SBDM) is employed to locate three points along the inner and outer iris boundaries. Finally, Thales' theorem is applied to find the hypotenuse that is a diameter of their circumcircle and then the circle parameters can be calculated. Based on the CASIA iris image database, experiment results show that the proposed method is superior to the existing approaches on the speed and precision of iris location.
虹膜识别被认为是最可靠、最准确的生物特征识别系统。虹膜定位的速度和准确性是虹膜识别成功的关键。本文提出了一种新的虹膜定位算法,以提高速度和精度。第一步是用最小局部块均值法检测瞳孔内部的一个点。然后利用专用的边界检测掩模(SBDM)沿虹膜内外边界定位三个点;最后,利用泰勒斯定理求出其圆的直径的斜边,从而计算出圆的参数。基于CASIA虹膜图像数据库的实验结果表明,该方法在虹膜定位的速度和精度上都优于现有方法。
{"title":"Novel and Fast Approach for Iris Location","authors":"Jen-Chun Lee, P. Huang, Chien-Ping Chang, T. Tu","doi":"10.1109/IIH-MSP.2007.230","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.230","url":null,"abstract":"Iris recognition is regarded as the most reliable and accurate biometric identification system. Speed and accuracy of iris location are required to achieve the success of iris recognition. This paper presents a new iris location algorithm to improve speed and accuracy. The first step is to detect a point inside the pupil using the method of minimum local block mean. Then the specialized boundary detection mask (SBDM) is employed to locate three points along the inner and outer iris boundaries. Finally, Thales' theorem is applied to find the hypotenuse that is a diameter of their circumcircle and then the circle parameters can be calculated. Based on the CASIA iris image database, experiment results show that the proposed method is superior to the existing approaches on the speed and precision of iris location.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Punched Image Watermarking: A Novel Fast Fractal Coding Based Technique 穿孔图像水印:一种新的快速分形编码技术
S. El-Khamy, M. Khedr, A. Al-Kabbany
Fractal image coding has proved its efficiency as a compression technique for digital images. Recently, using fractal coding for digital image watermarking has gained considerable attention. In this paper, a novel fast image watermarking and data hiding technique is proposed. Watermark embedding is accomplished during region based fractal encoding process which confines the domain pool search space to a certain region according to the mean of the range block. Different domain blocks' regions are assigned to represent either 0 or 1. Depending on the value of the bit to be hidden, the search space is limited to the region assigned to it. In case of hiding in a range block that belongs to a region that does not represent the bit to be hidden in it, bit padding technique is used at the encoder while punching is used at the decoder. Furthermore, at the decoder extracting the watermark needs only checking the mean of the hiding range blocks rather than re-encoding the whole image which significantly enhances the time needed for watermark extraction. The proposed technique is robust against common noise signals such as additive white Gaussian noise AWGN and salt & pepper noise.
分形图像编码作为一种数字图像压缩技术,已被证明是有效的。近年来,利用分形编码进行数字图像水印得到了广泛的关注。本文提出了一种新的快速图像水印和数据隐藏技术。水印嵌入是在基于区域的分形编码过程中完成的,根据范围块的均值将域池搜索空间限制在一定的区域内。不同的域块的区域被分配来表示0或1。根据要隐藏的位的值,搜索空间被限制在分配给它的区域内。如果隐藏在属于不表示要隐藏的位的区域的范围块中,则在编码器处使用位填充技术,而在解码器处使用冲孔技术。此外,在解码器处提取水印只需要检查隐藏范围块的平均值,而不需要对整个图像进行重新编码,这大大提高了水印提取所需的时间。该方法对加性高斯白噪声、AWGN和椒盐噪声等常见噪声信号具有较强的鲁棒性。
{"title":"Punched Image Watermarking: A Novel Fast Fractal Coding Based Technique","authors":"S. El-Khamy, M. Khedr, A. Al-Kabbany","doi":"10.1109/IIH-MSP.2007.252","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.252","url":null,"abstract":"Fractal image coding has proved its efficiency as a compression technique for digital images. Recently, using fractal coding for digital image watermarking has gained considerable attention. In this paper, a novel fast image watermarking and data hiding technique is proposed. Watermark embedding is accomplished during region based fractal encoding process which confines the domain pool search space to a certain region according to the mean of the range block. Different domain blocks' regions are assigned to represent either 0 or 1. Depending on the value of the bit to be hidden, the search space is limited to the region assigned to it. In case of hiding in a range block that belongs to a region that does not represent the bit to be hidden in it, bit padding technique is used at the encoder while punching is used at the decoder. Furthermore, at the decoder extracting the watermark needs only checking the mean of the hiding range blocks rather than re-encoding the whole image which significantly enhances the time needed for watermark extraction. The proposed technique is robust against common noise signals such as additive white Gaussian noise AWGN and salt & pepper noise.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Unified Multilingual and Multimedia Data Mining Approach for Cancer Knowledge Discovery 一种用于癌症知识发现的统一多语言多媒体数据挖掘方法
Chung-Hong Lee, Chih-Hong Wu, Hsiang-Hang Chung, Hsin-Chang Yang
The functions of automatically identify relationships between cancer diseases and external factors from medical records for supporting cancer diagnosis would be a valuable contribution in public health fields. Unfortunately, so far little attention has been paid on providing effective solutions to such a problem domain. In this work, we propose a framework to automating the extraction of relationships between cancer diseases and potential factors from clinical records and medical literature. We describe a platform framework integrating cancer microarray and developed data mining techniques of multimedia and multilingual, covering clustering of multimedia as well as multilingual classifiers to carry out the system development. In the implementation, we extracted the associated genes of cancers by clustering microarray data, and then exploited the resulting gene clusters to classify cancer related documents. The experimental results show that the platform is capable of extracting the potential patterns to enhancing more effective solutions for cancer diseases.
从病历中自动识别癌症疾病与外部因素之间的关系,以支持癌症诊断的功能将是公共卫生领域的宝贵贡献。不幸的是,到目前为止,很少有人关注为这一问题领域提供有效的解决方案。在这项工作中,我们提出了一个框架,可以从临床记录和医学文献中自动提取癌症疾病与潜在因素之间的关系。我们描述了一个集成癌症微阵列的平台框架,并开发了多媒体和多语言数据挖掘技术,涵盖多媒体聚类和多语言分类器来进行系统开发。在实现中,我们通过聚类微阵列数据提取癌症的相关基因,然后利用得到的基因簇对癌症相关文档进行分类。实验结果表明,该平台能够提取潜在模式,以增强更有效的癌症疾病解决方案。
{"title":"A Unified Multilingual and Multimedia Data Mining Approach for Cancer Knowledge Discovery","authors":"Chung-Hong Lee, Chih-Hong Wu, Hsiang-Hang Chung, Hsin-Chang Yang","doi":"10.1109/IIH-MSP.2007.67","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.67","url":null,"abstract":"The functions of automatically identify relationships between cancer diseases and external factors from medical records for supporting cancer diagnosis would be a valuable contribution in public health fields. Unfortunately, so far little attention has been paid on providing effective solutions to such a problem domain. In this work, we propose a framework to automating the extraction of relationships between cancer diseases and potential factors from clinical records and medical literature. We describe a platform framework integrating cancer microarray and developed data mining techniques of multimedia and multilingual, covering clustering of multimedia as well as multilingual classifiers to carry out the system development. In the implementation, we extracted the associated genes of cancers by clustering microarray data, and then exploited the resulting gene clusters to classify cancer related documents. The experimental results show that the platform is capable of extracting the potential patterns to enhancing more effective solutions for cancer diseases.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1