The search functionality is under construction.

Author Search Result

[Author] Masaaki FUJIYOSHI(18hit)

1-18hit
  • A Reversible Image Authentication Method without Memorization of Hiding Parameters

    Seungwu HAN  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:10
      Page(s):
    2572-2579

    This paper proposes a novel reversible image authentication method that does not memorize the parameters for extracting embedded authentication data from an image. The proposed method once distorts an image to hide data for authentication into the image, it recovers the original image from the distorted image unless tamper is applied to the image, i.e., reversible. By comparing extracted data and data generated from the restored image, this method detects image tampering and further localizes tampered regions by the unit of block. The proposed method extracts hidden data without memorization of parameters used in its algorithm. This feature makes the proposed method practical. Whereas any method memorizing parameters faces severe problems with storage and management of parameters, according to the increase in the number of memorized parameters that is caused by serving accurate tamper localization and/or by applying itself to a huge number of image collection, e.g., video sequences. Simulation results show the effectiveness of the proposed method.

  • A Novel Individual Identification System Using a Watermarking Method Based on the Parallel Combinatorial Spread Spectrum Scheme

    Masaaki FUJIYOSHI  Takaaki HASEGAWA  

     
    PAPER

      Vol:
    E83-A No:11
      Page(s):
    2129-2137

    This paper describes a new individual identification system employing a novel application of the PC/SS scheme. Since the proposed system requires no magnetic information, it is robust to various changes in environment. Moreover, it is applicable to contemporary identification systems as an officer identifies one's face with the card's portrait at immigration. In addition, cooperation with existing identification systems using magnetic information and this proposed system provides more secure identification. The proposed system embeds a cardholder-related information that forms a watermark generated by the modulating manner of the PC/SS scheme into cardholder's portrait printed on the card using a simple watermarking scheme also proposed in this paper. Experimental results show that the proposed system extracts embedded information correctly as its fundamental ability. Furthermore, various properties of this system have been investigated, and it has been found that the spatial resolution of scanners is the most dominant to the performance of the proposed system.

  • Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP

    Khairul MUNADI  Masaaki FUJIYOSHI  Kiyoshi NISHIKAWA  Hitoshi KIYA  

     
    PAPER-Digital Signal Processing

      Vol:
    E90-A No:2
      Page(s):
    429-438

    JPEG2000 compression standard considers a block of wavelet coefficients, called codeblock, as the smallest coding unit that being independently entropy-coded. In this paper, we propose a codeblock-based concealment technique for JPEG2000 images to mitigate missing codeblock due to packet loss in network transmission. The proposed method creates a single JPEG2000 codestream from an image that composed of several subsampled versions of the original image and transmit the codestream over a single channel.The technique then substitutes the affected codeblock in a subsampled image with a copy of the corresponding codeblock obtained from other subsampled images. Thus, it does not require an iterative processing, which is time consuming, to construct an estimated version of the lost data. Moreover, it is applicable for a large codeblock size and can be implemented either in wavelet or codestream domain. Simulation results confirm the effectiveness of the proposed method.

  • On the Amount of Embedded Information of Watermarking Methods Based on the Parallel Combinatorial Spread Spectrum Scheme

    Masaaki FUJIYOSHI  Takaaki HASEGAWA  

     
    PAPER

      Vol:
    E84-A No:4
      Page(s):
    941-948

    The maximum amounts of embedded information that is important in practical system design of two watermarking methods based on the parallel combinatorial spread spectrum (PC/SS) scheme are discussed in this paper. One is a private watermarking method proposed in this paper and has a practical strong point to make the quality of the watermarked image to be constant in any images. The other is a public watermarking method that was previously proposed by the authors. Through this study, the minimum number of orthogonal sequences for embedding the required amount of information under the condition that quantization noise is only assumed is found in each watermarking method.

  • Fast Image Identification Methods for JPEG Images with Different Compression Ratios

    Fitri ARNIA  Ikue IIZUKA  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E89-A No:6
      Page(s):
    1585-1593

    Two schemes for fast identification of JPEG coded images are proposed in this paper. The aim is to identify the JPEG images that are generated from the same original image and have equivalent or different compression ratios. Fast identification can be achieved since the schemes work on the quantized Discrete Cosine Transform (DCT) domain. It is not required to inverse the quantization and the DCT. Moreover, only a few coefficients are commonly required for identification. The first approach can avoid identification leakage or false negative (FN), and probably result in a few false positives (FP). The second approach can avoid both FN and FP, with a slightly higher processing time. By combining the two schemes, a faster and a more perfect identification can be achieved, in which FN and FP can be avoided.

  • An Efficient Reversible Image Authentication Method

    Seungwu HAN  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1907-1914

    This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.

  • Encryption of Composite Multimedia Contents for Access Control

    Masaaki FUJIYOSHI  Shoko IMAIZUMI  Hitoshi KIYA  

     
    PAPER-Image

      Vol:
    E90-A No:3
      Page(s):
    590-596

    An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular composite multimedia content, and an user who is permitted to access a reserved content entities in the composite content receives only one key that is subordinately generated from the master key. Another key generated from the identical master key is delivered to another user, and this permits the user to access different entities. This scheme introduces a new key concept, namely "unusable key," to keep all entities encrypted in a particular medium and to simultaneously decrypt several entities in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with a scalable coding technology. Simulation results show the effectiveness of the proposed scheme; in particular, the length of the managed master key and that of keys to be delivered to users are small.

  • Lossless Data Hiding in the Spatial Domain for High Quality Images

    Hong Lin JIN  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E90-A No:4
      Page(s):
    771-777

    A lossless data embedding method that inserts data in images in the spatial domain is proposed in this paper. Though a lossless data embedding method once distorts an original image to embed data into the image, the method restores the original image as well as extracts hidden data from the image in which the data are embedded. To guarantee the losslessness of data embedding, all pixel values after embedding must be in the dynamic range of pixels. Because the proposed method modifies some pixels to embed data and leaves other pixels as their original values in the spatial domain, it can easily keep all pixel values after embedding in the dynamic range of pixels. Thus, both the capacity and the image quality of generated images are simultaneously improved. Moreover, the proposed method uses only one parameter based on the statistics of pixel blocks to embed and extract data. By using this parameter, this method does not require any reference images to extract embedded data nor any memorization of the positions of pixels in which data are hidden to extract embedded data. In addition, the proposed method can control the capacity for hidden data and the quality of images conveying hidden data by controlling the only one parameter. Simulation results show the effectiveness of the proposed method; in particular, it offers images with superior image quality to conventional methods.

  • An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection

    Shenchuan LIU  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1245-1252

    This paper introduces amplitude-only images to image trading systems in which not only the copyright of images but also the privacy of consumers are protected. In the latest framework for image trading systems, an image is divided into an unrecognizable piece and a recognizable but distorted piece to simultaneously protect the privacy of a consumer and the copyright of the image. The proposed scheme uses amplitude-only images which are completely unrecognizable as the former piece, whereas the conventional schemes leave recognizable parts to the piece which degrades privacy protection performance. Moreover, the proposed scheme improves the robustness against copyright violation regardless of the used digital fingerprinting technique, because an amplitude-only image is larger than the piece in the conventional scheme. In addition, phase-only image is used as the second piece in the proposed scheme, the consumer can confirm what he/she bought. Experimental results show the effectiveness of the proposed scheme.

  • A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000

    Wannida SAE-TANG  Shenchuan LIU  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E97-A No:11
      Page(s):
    2107-2113

    In this paper, a compression-friendly copyright- and privacy-protected image trading system is proposed. In the image trading system, the copyright of the image and the consumer's privacy is important. In addition, it should preserve existing image compression standards. In the proposed method, for privacy protection, the content provider (CP) multiplies random signs to the discrete wavelet transformed (DWTed) coefficients of an image to generate the visually encrypted image. The proposed visually protected images can be efficiently compressed by using JPEG 2000 which compresses the image in the DWTed domain as well. For copyright protection, the trusted third party (TTP) applies digital fingerprinting to the image in the encrypted domain. While in the conventional system, the amplitude-only image (AOI) which is the inversely transformed amplitude spectra of an image is used for privacy protection. Since, the AOI consists of real numbers, to store and transmit the AOI, it has to be quantized before compression. Therefore, quantization errors cannot be avoided in the conventional system. On the other hand, the proposed method applies the digital fingerprint in the DWTed domain, so clipping errors in decoding the image by the TTP is avoided. In addition, only a seed number which is input to a pseudo random number generator is shared between the CP and the consumer, whereas an extra image is shared in the conventional systems. Experimental results show that the proposed system is efficient in terms of privacy protection, compression performance, quality of fingerprinted images, and correct fingerprint extracting performance.

  • A Generation Method of Amplitude-Only Images with Low Intensity Ranges

    Wannida SAE-TANG  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1323-1330

    In this paper, 1) it is shown that amplitude-only images (AOIs) have quite wide intensity ranges (IRs), and 2) an IR reduction method for AOIs is proposed. An AOI is the inversely transformed amplitude spectra of an image, and it is used in the privacy- and copyright-protected image trading system because of its invisibility. Since an AOI is the coherent summation of cosine waves with the same phase, the IR of the AOI is too large to be stored and/or transmitted. In the proposed method, random signs are applied to discrete Fourier transformed amplitude coefficients to obtained AOIs with significantly lower IRs without distortion while keeping the invisibility of images. With reasonable processing time, high correct watermark extracting rates, inversely quantized AOIs with low mean squared errors, and reconstructed images with high peak signal-to-noise ratios are obtained by a linear quantizer in the proposed method.

  • A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion

    Shenchuan LIU  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:11
      Page(s):
    2134-2141

    This paper proposes a visual secret sharing (VSS) scheme with efficient pixel expansion which prevents malicious share holders from deceiving an honest share holder. A VSS scheme encrypts a secret image into pieces referred to as shares where each party keeps a share so that stacking a sufficient number of shares recovers the secret image. A cheat prevention VSS scheme gives another piece to each party for verifying whether the share presented by another party is genuine. The proposed scheme improves the contrast of the recovered image and cheat-prevention functionality by introducing randomness in producing pieces for verification. Experimental results show the effectiveness of the proposed scheme.

  • DCT Sign-Based Similarity Measure for JPEG Image Retrieval

    Fitri ARNIA  Ikue IIZUKA  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER-Image

      Vol:
    E90-A No:9
      Page(s):
    1976-1985

    We propose a method to retrieve similar and duplicate images from a JPEG (Joint Photographic Image Group) image database. Similarity level is decided based on the DCT (Discrete Cosine Transform) coefficients signs. The method is simple and fast because it uses the DCT coefficients signs as features, which can be obtained directly after partial decoding of JPEG bitstream. The method is robust to JPEG compression, in which similarity level of duplicate images, i.e., images that are compressed from the same original images with different compression ratios, is not disguised due to JPEG compression. Simulation results showed the superiority of the method compared to previous methods in terms of computational complexity and robustness to JPEG compression.

  • An Efficient Compression of Amplitude-Only Images for the Image Trading System

    Shenchuan LIU  Wannida SAE-TANG  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:2
      Page(s):
    378-379

    This letter proposes an efficient compression scheme for the copyright- and privacy-protected image trading system. The proposed scheme multiplies pseudo random signs to amplitude components of discrete cosine transformed coefficients before the inverse transformation is applied. The proposed scheme efficiently compresses amplitude-only image which is the inversely transformed amplitude components, and the scheme simultaneously improves the compression efficiency of phase-only image which is the inversely transformed phase components, in comparison with the conventional systems.

  • An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format

    Taku ODAKA  Wannida SAE-TANG  Masaaki FUJIYOSHI  Hiroyuki KOBAYASHI  Masahiro IWAHASHI  Hitoshi KIYA  

     
    LETTER

      Vol:
    E97-A No:11
      Page(s):
    2181-2183

    This letter proposes an efficient lossless compression method for high dynamic range (HDR) images in OpenEXR format. The proposed method transforms an HDR image to an indexed image and packs the histogram of the indexed image. Finally the packed image is losslessly compressed by using any existing lossless compression algorithm such as JPEG 2000. Experimental results show that the proposed method reduces the bit rate of compressed OpenEXR images compared with equipped lossless compression methods of OpenEXR format.

  • A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System

    Masaaki FUJIYOSHI  Ruifeng LI  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2020/10/21
      Vol:
    E104-D No:1
      Page(s):
    43-50

    This paper proposes an encryption-then-compression (EtC) system-friendly data hiding scheme for images, where an EtC system compresses images after they are encrypted. The EtC system divides an image into non-overlapping blocks and applies four block-based processes independently and randomly to the image for visual encryption of the image. The proposed scheme hides data to a plain, i.e., unencrypted image and the scheme can take hidden data out from the image encrypted by the EtC system. Furthermore, the scheme serves reversible data hiding, so it can perfectly recover the unmarked image from the marked image whereas the scheme once distorts unmarked image for hiding data to the image. The proposed scheme copes with the three of four processes in the EtC system, namely, block permutation, rotation/flipping of blocks, and inverting brightness in blocks, whereas the conventional schemes for the system do not cope with the last one. In addition, these conventional schemes have to identify the encrypted image so that image-dependent side information can be used to extract embedded data and to restore the unmarked image, but the proposed scheme does not need such identification. Moreover, whereas the data hiding process must know the block size of encryption in conventional schemes, the proposed scheme needs no prior knowledge of the block size for encryption. Experimental results show the effectiveness of the proposed scheme.

  • A Data Embedding Method Considering the Finite Word-Length for High Quality Images

    Masaaki FUJIYOSHI  Takashi TACHIBANA  Hitoshi KIYA  

     
    PAPER

      Vol:
    E85-A No:12
      Page(s):
    2830-2838

    A novel data embedding method for high-quality images, e.g., an image with a peak signal-to-noise ratio of better than 60 [dB] is proposed in this paper. The proposed method precisely generates a watermarked image of the desired and high quality for any images. To do this, this method considers the finite word-length of a luminance value of pixels, i.e., both quantization errors and the range limitation of luminance. The proposed method embeds a watermark sequence, modulated by the mechanism of a spread spectrum scheme, into the dc values of an image in the spatial domain. By employing spread spectrum technology as well as embedding a watermark into the dc values, this method guarantees the high image quality and, simultaneously, provides adequate JPEG tolerance.

  • A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation

    Masaaki FUJIYOSHI  Osamu WATANABE  Hitoshi KIYA  

     
    PAPER

      Vol:
    E88-A No:6
      Page(s):
    1434-1442

    This paper proposes a quantization-based image-quality guaranteed watermarking (IQGW) method using a nonorthogonal discrete wavelet transformation. An IQGW method generates watermarked images of a desired image quality for any image, neither with trial and error nor with image-dependent parameters. To guarantee the image-quality, the proposed method adjusts the energy of the watermark sequence to be embedded based on the relationship between a nonorthogonally transformed domain and the spatial domain for the signal energy. This proposed method extracts the embedded watermark by quantization of watermarked coefficients, no reference image, thus, is required. In addition, it is capable of controlling the objective and subjective image-quality of a watermarked image independently. With features mentioned above, the proposed method is suitable for real-time embedding of Motion JPEG 2000 videos. Moreover, it is able to fuse quantization- and correlation-based watermarking.