The search functionality is under construction.

Author Search Result

[Author] Jeng-Shyang PAN(23hit)

1-20hit(23hit)

  • A Subsampling-Based Digital Image Watermarking Scheme Resistant to Permutation Attack

    Chuang LIN  Jeng-Shyang PAN  Chia-An HUANG  

     
    LETTER-Image

      Vol:
    E91-A No:3
      Page(s):
    911-915

    The letter proposes a novel subsampling-based digital image watermarking scheme resisting the permutation attack. The subsampling-based watermarking schemes have drawn great attention for their convenience and effectiveness in recent years, but the traditional subsampling-based watermarking schemes are very vulnerable to the permutation attack. In this letter, the watermark information is embedded in the average values of the 1-level DWT coefficients to resist the permutation attack. The concrete embedding process is achieved by the quantization-based method. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.

  • Content Adaptive Visible Watermarking during Ordered Dithering

    Hao LUO  Jeng-Shyang PAN  Zhe-Ming LU  

     
    LETTER-Application Information Security

      Vol:
    E90-D No:7
      Page(s):
    1113-1116

    This letter presents an improved visible watermarking scheme for halftone images. It incorporates watermark embedding into ordered dither halftoning by threshold modulation. The input images include a continuous-tone host image (e.g. an 8-bit gray level image) and a binary watermark image, and the output is a halftone image with a visible watermark. Our method is content adaptive because it takes local intensity information of the host image into account. Experimental results demonstrate effectiveness of the proposed technique. It can be used in practical applications for halftone images, such as commercial advertisement, content annotation, copyright announcement, etc.

  • A Fast K Nearest Neighbors Classification Algorithm

    Jeng-Shyang PAN  Yu-Long QIAO  Sheng-He SUN  

     
    LETTER-Image

      Vol:
    E87-A No:4
      Page(s):
    961-963

    A novel fast KNN classification algorithm is proposed for pattern recognition. The technique uses one important feature, mean of the vector, to reduce the search space in the wavelet domain. Since the proposed algorithm rejects those vectors that are impossible to be the k closest vectors in the design set, it largely reduces the classification time and holds the classification performance as that of the original classification algorithm. The simulation on texture image classification confirms the efficiency of the proposed algorithm.

  • Image Coding Based on Classified Side-Match Vector Quantization

    Zhe-Ming LU  Jeng-Shyang PAN  Sheng-He SUN  

     
    LETTER-Image Processing, Image Pattern Recognition

      Vol:
    E83-D No:12
      Page(s):
    2189-2192

    The classified side-match vector quantizer, CSMVQ, has already been presented for low-bit-rate image encoding. It exploits a block classifier to decide which class the input vector belongs to using the variances of the upper and left codewords. However, this block classifier doesn't take the variance of the current input vector itself into account. This letter presents a new CSMVQ in which a two-level block classifier is used to classify input vectors and two different master codebooks are used for generating the state codebook according to the variance of the input vector. Experimental results prove the effectiveness of the proposed CSMVQ.

  • Self Embedding Watermarking Scheme Using Halftone Image

    Hao LUO  Zhe-Ming LU  Shu-Chuan CHU  Jeng-Shyang PAN  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:1
      Page(s):
    148-152

    Self embedding watermarking is a technique used for tamper detection, localization and recovery. This letter proposes a novel self embedding scheme, in which the halftone version of the host image is exploited as a watermark, instead of a JPEG-compressed version used in most existing methods. Our scheme employs a pixel-wise permuted and embedded mechanism and thus overcomes some common drawbacks of the previous methods. Experimental results demonstrate our technique is effective and practical.

  • A VQ-Based Robust Multi-Watermarking Algorithm

    Hsiang-Cheh HUANG  Feng-Hsing WANG  Jeng-Shyang PAN  

     
    PAPER-Information Security

      Vol:
    E85-A No:7
      Page(s):
    1719-1726

    New methods for digital image watermarking based on the characteristics of vector quantization (VQ) are proposed. In contrast with conventional watermark embedding algorithms to embed only one watermark at a time into the original source, we present one algorithm to embed multiple watermarks for copyright protection. The embedding and extraction processes are efficient for implementing with conventional VQ techniques, and they can be accomplished in parallel to shorten the processing time. After embedding, embedder would output one watermarked reconstruction image and several secret keys associated with the embedded watermarks. These secret keys are then registered to the third party to preserve the ownership of the original source in order to prevent the attackers from inserting counterfeit watermarks. Simulation results show that under no attacks, the embedded watermarks could be perfectly extracted. If there are some intentional attacks in our simulation, all the watermarks could survive to protect the copyrights. Therefore, we are able to claim the robustness, usefulness, and ease of implementation of our algorithm.

  • A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm

    Shu-Chuan CHU  John F. RODDICK  Zhe-Ming LU  Jeng-Shyang PAN  

     
    LETTER-Information Security

      Vol:
    E87-A No:1
      Page(s):
    282-285

    This paper presents a novel digital image watermarking algorithm based on the labeled bisecting clustering technique. Each cluster is labeled either '0' or '1' based on the labeling key. Each input image block is then assigned to the nearest codeword or cluster centre whose label is equal to the watermark bit. The watermark extraction can be performed blindly. The proposed method is robust to JPEG compression and some spatial-domain processing operations. Simulation results demonstrate the effectiveness of the proposed algorithm.

  • Texture Segmentation Using Separable and Non-Separable Wavelet Frames

    Jeng-Shyang PAN  Jing-Wein WANG  

     
    PAPER

      Vol:
    E82-A No:8
      Page(s):
    1463-1474

    In this paper, a new feature which is characterized by the extrema density of 2-D wavelet frames estimated at the output of the corresponding filter bank is proposed for texture segmentation. With and without feature selection, the discrimination ability of features based on pyramidal and tree-structured decompositions are comparatively studied using the extrema density, energy, and entropy as features, respectively. These comparisons are demonstrated with separable and non-separable wavelets. With the three-, four-, and five-category textured images from Brodatz album, it is observed that most performances with feature selection improve significantly than those without feature selection. In addition, the experimental results show that the extrema density-based measure performs best among the three types of features investigated. A Min-Min method based on genetic algorithms, which is a novel approach with the spatial separation criterion (SPC) as the evaluation function is presented to evaluate the segmentation performance of each subset of selected features. In this work, the SPC is defined as the Euclidean distance within class divided by the Euclidean distance between classes in the spatial domain. It is shown that with feature selection the tree-structured wavelet decomposition based on non-separable wavelet frames has better performances than the tree-structured wavelet decomposition based on separable wavelet frames and pyramidal decomposition based on separable and non-separable wavelet frames in the experiments. Finally, we compare to the segmentation results evaluated with the templates of the textured images and verify the effectiveness of the proposed criterion. Moreover, it is proved that the discriminatory characteristics of features do spread over all subbands from the feature selection vector.

  • No-Reference Quality Metric of Blocking Artifacts Based on Color Discontinuity Analysis

    Leida LI  Hancheng ZHU  Jiansheng QIAN  Jeng-Shyang PAN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:4
      Page(s):
    993-997

    This letter presents a no-reference blocking artifact measure based on analysis of color discontinuities in YUV color space. Color shift and color disappearance are first analyzed in JPEG images. For color-shifting and color-disappearing areas, the blocking artifact scores are obtained by computing the gradient differences across the block boundaries in U component and Y component, respectively. An overall quality score is then produced as the average of the local ones. Extensive simulations and comparisons demonstrate the efficiency of the proposed method.

  • Genetic Feature Selection for Texture Classification Using 2-D Non-Separable Wavelet Bases

    Jing-Wein WANG  Chin-Hsing CHEN  Jeng-Shyang PAN  

     
    PAPER

      Vol:
    E81-A No:8
      Page(s):
    1635-1644

    In this paper, the performances of texture classification based on pyramidal and uniform decomposition are comparatively studied with and without feature selection. This comparison using the subband variance as feature explores the dependence among features. It is shown that the main problem when employing 2-D non-separable wavelet transforms for texture classification is the determination of the suitable features that yields the best classification results. A Max-Max algorithm which is a novel evaluation function based on genetic algorithms is presented to evaluate the classification performance of each subset of selected features. It is shown that the performance with feature selection in which only about half of features are selected is comparable to that without feature selection. Moreover, the discriminatory characteristics of texture spread more in low-pass bands and the features extracted from the pyramidal decomposition are more representative than those from the uniform decomposition. Experimental results have verified the selectivity of the proposed approach and its texture capturing characteristics.

  • Manage the Tradeoff in Data Sanitization

    Peng CHENG  Chun-Wei LIN  Jeng-Shyang PAN  Ivan LEE  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/07/14
      Vol:
    E98-D No:10
      Page(s):
    1856-1860

    Sharing data might bring the risk of disclosing the sensitive knowledge in it. Usually, the data owner may choose to sanitize data by modifying some items in it to hide sensitive knowledge prior to sharing. This paper focuses on protecting sensitive knowledge in the form of frequent itemsets by data sanitization. The sanitization process may result in side effects, i.e., the data distortion and the damage to the non-sensitive frequent itemsets. How to minimize these side effects is a challenging problem faced by the research community. Actually, there is a trade-off when trying to minimize both side effects simultaneously. In view of this, we propose a data sanitization method based on evolutionary multi-objective optimization (EMO). This method can hide specified sensitive itemsets completely while minimizing the accompanying side effects. Experiments on real datasets show that the proposed approach is very effective in performing the hiding task with fewer damage to the original data and non-sensitive knowledge.

  • Robust VQ-Based Digital Watermarking for the Memoryless Binary Symmetric Channel

    Jeng-Shyang PAN  Min-Tsang SUNG  Hsiang-Cheh HUANG  Bin-Yih LIAO  

     
    LETTER-Image

      Vol:
    E87-A No:7
      Page(s):
    1839-1841

    A new scheme for watermarking based on vector quantization (VQ) over a binary symmetric channel is proposed. By optimizing VQ indices with genetic algorithm, simulation results not only demonstrate effective transmission of watermarked image, but also reveal the robustness of the extracted watermark.

  • Novel Watermarked MDC System Based on SFQ Algorithm

    Lin-Lin TANG  Jeng-Shyang PAN  Hao LUO  Junbao LI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2922-2925

    A novel watermarked MDC system based on the SFQ algorithm and the sub-sampling method is proposed in this paper. Sub-sampling algorithm is applied onto the transformed image to introduce some redundancy between different channels. Secret information is embedded into the preprocessed sub-images. Good performance of the new system to defense the noise and the compression attacks is shown in the experimental results.

  • Visible Watermarking for Halftone Images

    Jeng-Shyang PAN  Hao LUO  Zhe-Ming LU  

     
    LETTER-Information Security

      Vol:
    E90-A No:7
      Page(s):
    1487-1490

    This letter proposes a visible watermarking scheme for halftone images. It exploits HVS filtering to transform the image in binary domain into continuous-tone domain for watermark embedding. Then a codeword search operation converts the watermarked continuous-tone image into binary domain. The scheme is flexible for two weighting factors are involved to adjust the watermark embedding strength and the average intensity of the watermarked image. Moreover, it can be used in some applications where original continuous-tone images are not available and the halftoning method is unknown.

  • Video Watermarking by Space-Time Interest Points

    Lei-Da LI  Bao-Long GUO  Jeng-Shyang PAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2252-2256

    This letter presents a novel robust video watermarking scheme based on space-time interest points. These points correspond to inherent structures of the video so that they can be used as synchronization signals for watermark embedding and extraction. In the proposed scheme, local regions are generated using the space-time interest points, and the watermark is embedded into all the regions by quantization. It is a blind scheme and the watermark can be extracted from any position of the video. Experimental results show that the watermark is invisible and it can robustly survive traditional signal processing attacks and video-oriented attacks.

  • High Capacity Watermark Embedding Based on Invariant Regions of Visual Saliency

    Leida LI  Jeng-Shyang PAN  Xiaoping YUAN  

     
    LETTER-Image

      Vol:
    E94-A No:2
      Page(s):
    889-893

    A new image watermarking scheme is presented to achieve high capacity information hiding and geometric invariance simultaneously. Visually salient region is introduced into watermark synchronization. The saliency value of a region is used as the quantitative measure of robustness, based on which the idea of locally most salient region (LMSR) is proposed to generate the disjoint invariant regions. A meaningful binary watermark is then encoded using Chinese Remainder Theorem (CRT) in transform domain. Simulation results and comparisons demonstrate the effectiveness of the proposed scheme.

  • Attacking Phase Shift Keying Based Watermarking

    Jeng-Shyang PAN  Chuang LIN  

     
    LETTER-Image

      Vol:
    E90-A No:1
      Page(s):
    305-306

    The letter describes a phase perturbation attack to the Discrete Fourier Transform (DFT) and Phase Shift Keying (PSK) based watermarking scheme which is proposed in [3]. In that paper the watermark information is embedded in the phase of the DFT coefficients. But this kind of PSK based watermarking scheme is very vulnerable to the phase perturbation attack, when some noise is added on the phase of the DFT coefficients, the watermark can't be correctly extracted anymore, while the quality degradation of the attacked watermarked image is visually acceptable.

  • A More Robust Subsampling-Based Image Watermarking

    Chih-Cheng LO  Pao-Tung WANG  Jeng-Shyang PAN  Bin-Yih LIAO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E90-D No:5
      Page(s):
    877-878

    In this letter, we propose a novel subsampling based image watermark sequentially embedding scheme to reduce the risk of common permutation attack. The image is still perceptual after watermarking, and experimental results also show its effectiveness and robustness.

  • Lossless Data Hiding Based on Companding Technique and Difference Expansion of Triplets

    ShaoWei WENG  Yao ZHAO  Jeng-Shyang PAN  

     
    LETTER-Image

      Vol:
    E90-A No:8
      Page(s):
    1717-1718

    A reversible data hiding scheme based on the companding technique and the difference expansion (DE) of triplets is proposed in this paper. The companding technique is employed to increase the number of the expandable triplets. The capacity consumed by the location map recording the expanded positions is largely decreased. As a result, the hiding capacity is considerably increased. The experimental results reveal that high hiding capacity can be achieved at low embedding distortion.

  • Automation Power Energy Management Strategy for Mobile Telecom Industry

    Jong-Ching HWANG  Jung-Chin CHEN  Jeng-Shyang PAN  Yi-Chao HUANG  

     
    PAPER

      Vol:
    E93-B No:9
      Page(s):
    2232-2238

    The aim of this research is to study the power energy cost reduction of the mobile telecom industry through the supervisor control and data acquisition (SCADA) system application during globalization and liberalization competition. Yet this management system can be proposed functions: operating monitors, the analysis on load characteristics and dropping the cost of management.

1-20hit(23hit)