Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

筛选
英文 中文
Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules 基于三向像素值差分和自适应规则的图像隐写方案
Ko-Chin Chang, P. Huang, T. Tu, Chien-Ping Chang
{"title":"Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules","authors":"Ko-Chin Chang, P. Huang, T. Tu, Chien-Ping Chang","doi":"10.1109/IIH-MSP.2007.437","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.437","url":null,"abstract":"A novel steganographic approach based on tri-way pixel-value differencing (TPVD) is presented in this paper. This approach uses three different directional edges to design the tri-way differencing scheme and to remove the capacity limitation of the original PVD method using only one direction. In addition, we propose an optimal selection approach for the reference point and adaptive rules to reduce distortion from setting larger embedding capacity. The theoretical estimation and experimental results demonstrate that our scheme can provide a superior embedding capacity and the embedded confidential information can be extracted from stego-images without the assistance of original images.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
HVS-Based Robust Video Watermarking with Dual-plane Correlation 基于hvs的双平面相关鲁棒视频水印
I. Echizen, Yusuke Atomori, Shinta Nakayama, H. Yoshiura
{"title":"HVS-Based Robust Video Watermarking with Dual-plane Correlation","authors":"I. Echizen, Yusuke Atomori, Shinta Nakayama, H. Yoshiura","doi":"10.1109/IIH-MSP.2007.434","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.434","url":null,"abstract":"This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable than the robust watermarking scheme we previously proposed. An experimental evaluation using actual video samples demonstrated that the method can embed more watermarks while keeping the same picture quality and can detect them reliably in watermarked pictures that had gone through all four types of transformations. The method can be used in various watermarking schemes.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of using L1-norm with Image Watermarking on SVD Domain 基于SVD域的l1范数图像水印研究
A. Khawne, O. Chitsobhuk, T. Nakamiya
{"title":"A Study of using L1-norm with Image Watermarking on SVD Domain","authors":"A. Khawne, O. Chitsobhuk, T. Nakamiya","doi":"10.1109/IIH-MSP.2007.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.64","url":null,"abstract":"This paper presents a study of image watermarking using robust singular value decomposition in L1-norm sub-space. The watermarked image attacked by noise is greatly degraded. This results in the effects of transparency and robustness of the watermarked image. Although the watermarking in SVD domain is sensitive to noise and outliers, incorporating L1-norm regression to the watermarking algorithm can help handling the missing data caused by noise and help increasing the robustness of the proposed algorithm. Experimental results show that the proposed algorithm can not only excellently reduce the bit error rates of the recovered watermark but also retain the transparency property of the watermarked image.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129032224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Multi-quality Image Fusion Method in Visual Sensor Network 视觉传感器网络中一种新的多质量图像融合方法
Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu
{"title":"A New Multi-quality Image Fusion Method in Visual Sensor Network","authors":"Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu","doi":"10.1109/IIH-MSP.2007.42","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.42","url":null,"abstract":"Bandwidth, energy consumption and delay are always bottlenecks of visual sensor network. In this paper a hierarchical multi-quality image fusion method based on region-mapping is proposed to improve above condition. Camera view is divided into regions according to mapping relation and the structured deployment of nodes. The methods of motion attention analysis and nearest neighbor sampling are also adopted to optimize the local attention region of the image. The proposed fusion method is analyzed and verified to be effective to improve the quality of the monitor image with no need for more energy and bandwidth.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Improvement of Lee-Chiu's Remote User Authentication Scheme 李超远程用户认证方案的改进
Chao-Wen Chan, Chung-Chih Lin
{"title":"The Improvement of Lee-Chiu's Remote User Authentication Scheme","authors":"Chao-Wen Chan, Chung-Chih Lin","doi":"10.1109/IIH-MSP.2007.294","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.294","url":null,"abstract":"The presented paper points out some security weaknesses of the authentication scheme proposed by Lee and Chiu in 2005. Based on our analysis of the scheme, we present a scheme which can improve the security of Lee-Chiu's scheme.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV 由担保买方和特殊目的机构发行的信用联系票据定价
Chou-Wen Wang, Chia-Chien Chang
{"title":"Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV","authors":"Chou-Wen Wang, Chia-Chien Chang","doi":"10.1109/IIH-MSP.2007.247","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.247","url":null,"abstract":"We first derive the closed-form solutions of the CLNs issued by an SPV or the protection buyer both the with reference and counter party risk under the consideration of default events correlated with the short-term interest rate. We derive the fair fees that are paid by a protection buyer to an SPV for the purpose of issuing the CLNs. From numerical analyses, we find that the values of CLNs are negatively correlated with the interest rate volatility and the default intensity of reference obligation. Further, if the short-term interest rate changes dramatically or the credit qualities of the reference entity and the protection buyer get worse, it is a better timing for the CLNs issued through an SPV.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction 非线性主成分降维运动检索的集成HMM学习
Jian Xiang, Hongli Zhu
{"title":"Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction","authors":"Jian Xiang, Hongli Zhu","doi":"10.1109/IIH-MSP.2007.397","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.397","url":null,"abstract":"As commercial motion capture systems are widely used , more and more 3D motion database become available. In this paper, we presented a motion retrieval system based on ensemble HMM learning. First, 3D features are extracted. Due to high dimensionality of motion's features, then non-linear PCA and radial basis function (RBF) neural network for dimensionality reduction are used. At last each action class is learned with one HMM for motion analysis. Since ensemble learning can effectively enhance supervised learners, ensembles of weak HMM learners are built. Some experimental examples are given to demonstrate the effectiveness and efficiency of our methods.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive and Robust Audio watermarking in Wavelet Domain 小波域自适应鲁棒音频水印
M. Pooyan, A. Delforouzi
{"title":"Adaptive and Robust Audio watermarking in Wavelet Domain","authors":"M. Pooyan, A. Delforouzi","doi":"10.1109/IIH-MSP.2007.68","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.68","url":null,"abstract":"This paper presents a robust method of audio watermarking in the wavelet domain. In this method, the watermarked data is encrypted, then combined with a synchronization code and embedded in low- frequency coefficients of wavelet transform. In this paper two techniques of quantization are employed for data embedding process. The magnitude of quantization step and embedding strength is adaptively determined according to the characteristics of the human auditory system (HAS). Therefore data embedding distortion is imperceptible for human ears. The experimental results show that the proposed watermarking scheme is transparence and very robust against common attacks such as additive Gaussian noise, low-pass filtering, resampling, requantization, shifting, cropping and MPEG compression.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image 基于金字塔结构和梯度预测图像的可逆脆弱水印
F. Yeh, Greg C. Lee, Cheng-Chieh Chiang
{"title":"Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image","authors":"F. Yeh, Greg C. Lee, Cheng-Chieh Chiang","doi":"10.1109/IIH-MSP.2007.269","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.269","url":null,"abstract":"The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127479874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC 基于H.264/AVC的快速多参考帧选择算法
Hongjun Wang, Lili Wang, Hua Li
{"title":"A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC","authors":"Hongjun Wang, Lili Wang, Hua Li","doi":"10.1109/IIH-MSP.2007.17","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.17","url":null,"abstract":"H.264/AVC uses multi-reference frames to enhance the coding efficiency; the quantity of increased computation is linearly proportional to the number of reference frames. On the study of the multi-macro-block motion estimation of H.264 standard, a low-complexity and fast multi-frame selection method is proposed. The experimental results show that the speed of the proposed method is over two times faster than that of the original scheme adopted in JVT reference software JM10.2 while keeping the similar video quality and bit-rate.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信