The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Hongtao LU(2hit)

1-2hit
  • Attacking Subsampling-Based Watermarking

    Wei LU  Hongtao LU  Fu-Lai CHUNG  

     
    LETTER-Information Security

      Vol:
    E88-A No:11
      Page(s):
    3239-3240

    This letter describes a permutation attack (PA) to the subsampling-based watermarking scheme where the high correlations between subimages obtained by subsampling the original image are used for watermark embedding. We show that the correlations can also be easily used to attack the watermarking scheme through a simple permutation procedure, while the quality degradation of attacked watermarked image is visually acceptable. Experimental results show the efficiency of the proposed attack algorithm.

  • Blind Fake Image Detection Scheme Using SVD

    Wei LU  Fu-Lai CHUNG  Hongtao LU  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E89-B No:5
      Page(s):
    1726-1728

    The release of image processing techniques make image modification and fakery easier. Image fakery, here, is defined as a process to copy a region of source image and paste it onto the destination image, with some post processing methods applied, such as boundary smoothing, blurring, etc. to make it natural. The most important characteristic of image fakery is object copy and paste. In order to detect fake images, this letter introduces a blind detection scheme based on singular value decomposition (SVD). Experimental results also show the effectiveness of the proposed scheme.