黄继武
多媒体信息安全
个性化签名
- 姓名:黄继武
- 目前身份:
- 担任导师情况:
- 学位:
-
学术头衔:
博士生导师
- 职称:-
-
学科领域:
计算机应用
- 研究兴趣:多媒体信息安全
黄继武,工学博士。男,1962年10月出生。中山大学信息科学与技术学院院长、教授、博士导师。兼中山大学信息安全技术研究所所长。国家杰出青年基金、教育部跨世纪优秀人才基金获得者。目前研究方向为多媒体信息安全。教育:分别毕业于西安电子科技大学(本科)、清华大学(硕士)、中国科学院自动化所(博士)。美国新泽西理工学院访问学者。学术兼职:IEEE 高级会员、IEEE电路与系统学会多媒体系统与应用技术委员会委员。担任过IEEE ISCAS(IEEE电路与系统学会年会)等重要国际学术会议分会主席或程序委员会成员。担任包括多种IEEE Transactions 在内的多种国际著名刊物审稿人。在多届IEEE ISCAS上建议并组织了涉及信息隐藏和信息保障等多个特邀分会。近年主持国家杰出青年基金、国家自然科学基金、国家“863”项目在内的一批科研项目。近5年在国内外共发表(录用)论文60多篇,收录SCI/EI 近40篇。国外出版著作章节2章。近5年申请发明专利7项。已获发明专利授权2项,已公开发明专利3项。论文近3年被国内外同行引用约160次。
-
主页访问
2750
-
关注数
0
-
成果阅读
617
-
成果数
10
【期刊论文】A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression
黄继武, Xiangui Kang, Jiwu Huang, Senior Member, IEEE, Yun Q. Shi, and Yan Lin
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO.8, AUGUST 2003,-0001,():
-1年11月30日
Robustness is one of the crucial important issues in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. In this paper, a blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. This algorithm improves the robustness via using new embedding strategy, watermark structure, 2-D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence are embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of affine transform and convert the image back to its original shape. Then we perform translation registration by using the training sequence embedded in the DWT domain and finally extract the informative watermark. Experimental works have demonstrated that the watermark generated by the proposed algorithm is more robust than other watermarking algorithms reported in the literature. Specifically it is robust against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10 simultaneously. While the approach is presented for gray-level images, it can also be applied to color images and video sequences.
Affine transformation,, geometric attacks,, image watermarking,, robustness,, template matching.,
-
59浏览
-
0点赞
-
0收藏
-
0分享
-
169下载
-
0评论
-
引用
【期刊论文】Reliable Information Bit Hiding
黄继武, Jiwu Huang and Yun Q. Shi
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 12, NO.10, OCTOBER 2002,-0001,():
-1年11月30日
One of challenges encountered in information bit hiding is the reliability of information bit detection. This paper addresses the issue and presents an algorithm in the discrete cosing transform (DCT) domain with a communication theory approach. It embeds information bits (first) in the DC and (then in the) low-frequency AC coefficients. To extract the hidden information bits from a possibly corrupted marked image with a low error probability, we model information hiding as a digital communication problem and apply Bose-Chaudhuri-Hocquenghen channel coding with soft-decision decoding based on matched filtering. The robustness of the hidden bits has been tested with StirMark. The experimental results demonstrate that the embedded information bits are perceptually transparent and can successfully resist common signal processing procedures, jitter attack, aspect ratio variation, scaling change, small angle rotation, small amount cropping, and JPEG compression with quality factor as low as 10. Compared with some information hiding algorithms reported in the literature, it appears that the hidden information bits with the proposed approach are relatively more robust. While the approach is presented for gray level images, it can also be applied to color images and video sequences.
BCH,, channel coding,, information hiding,, matched filtering,, soft-decision decoding,, StirMark.,
-
76浏览
-
0点赞
-
0收藏
-
0分享
-
152下载
-
0评论
-
引用
【期刊论文】Embedding Image Watermarks in DC Components
黄继武, Jiwu Huang, Yun Q. Shi, and Yi Shi
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO.6, SEPTEMBER 2000,-0001,():
-1年11月30日
Both watermark structure and embedding strategy affect robustness of image watermarks. Where should watermarks be embedded in discrete cosing transform (DCT) domain in order for the invisible image watermarks to be robust? Though many papers in the literature agree that watermarks should be embedded in perceptually significant components, dc components are explicitly excluded from watermark embedding. In this letter, a new embedding strategy for watermarking is proposed based on a quantitative analysis on the magnitudes of DCT components of host images. We argue that more robustness can be achieved if watermarks are embedded in dc components since dc components have much larger perceptual capacity than any ac components. Based on this idea, an adaptive watermarking algorithm is presented.We incorporate the feature of texture masking and luminance masking of the human visual system into watermarking. Experimental results demonstrate that the invisible watermarks embedded with the proposed watermark algorithm are very robust.
components,, embedding strategy,, image watermarking,, robustness,, visual masking.,
-
61浏览
-
0点赞
-
0收藏
-
0分享
-
224下载
-
0评论
-
引用
【期刊论文】Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform
黄继武, Yongjian Hu, , Jiwu Huang, Sam Kwong, and Y.K. Chan
T. Kalker et al. (Eds.): IWDW 2003, LNCS 2939, pp. 396-407, 2004.,-0001,():
-1年11月30日
Digital watermarking has been researched extensively due to its potential use for data security and copyright protection. Much of the literature has focused on developing invisible watermarking algorithms. However, not much has been done on visible watermarking. A visible watermark is apparently needed for copyright notification. This work proposes a new framework of visible watermarking based on image fusion, a common technique used in combining images acquired from different modalities. To better protect the host features and increase the robustness of the watermark, the dual-tree complex wavelet transform (DT-CWT) is used. A new classification strategy is proposed to classify complex wavelet coefficients into 6 classes with different perceptual significance. The embedding decision can be made based on the classification information. Small watermark coefficients are prohibited from embedding. In the host edges, the insertion of watermark energy is controlled by using the inversely proportional embedding scheme to better preserve the sensitive region, while in other regions, the embedding strength becomes stronger as texture activity increases. This work also addresses the problem of low-pass subband watermark embedding, which is a special issue of visible watermarking. Experimental results show that the proposed algorithm yields significantly superior image quality than the current DCT-based method.
visible watermark,, image watermarking,, image fusion,, complex wavelet,, adaptive watermarking.,
-
67浏览
-
0点赞
-
0收藏
-
0分享
-
229下载
-
0评论
-
引用
【期刊论文】Robust Watermarking with Adaptive Receiving
黄继武, Xiangui Kang, , Jiwu Huang, Yun Q. Shi, and Jianxiang Zhu
T. Kalker et al. (Eds.): IWDW 2003, LNCS 2939, pp. 86-100, 2004.,-0001,():
-1年11月30日
This paper presents a watermarking scheme with enhanced robustness owing to adaptive receiving and turbo code in addition to other measures. We embed a training sequence with informative watermark in the original image. A new adaptive receiver is developed, which is adjusted adaptively according to the responsive distribution of the training sequence. Together with carefully designed data embedding techniques, concatenated coding of direct sequence spread spectrum (DSSS) and Turbo code, 2-D interleaving, our newly developed resynchronization technique and incorporated with the registration technique based on motion estimation technique developed by Loo and Kinsbury, our proposed algorithm can successfully resist almost all the StirMark testing functions including both common signal processing, such as JPEG compression and median filtering, and geometric distortions. The watermarking is robust against the combination of geometric distortion and JPEG_10, the combination of large global distortion and arbitrary local small distortion. To our best knowledge, we use adaptive receiving to combat the fading of host media feature (watermark carrier) for the first time.
-
55浏览
-
0点赞
-
0收藏
-
0分享
-
99下载
-
0评论
-
引用
【期刊论文】An Efficient Revocation Algorithm in Group Signatures
黄继武, Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, and Daren Huang
J.I. Lim and D.H. Lee (Eds.): ICISC 2003, LNCS 2971, pp. 339-351, 2004.,-0001,():
-1年11月30日
The problem of secure and efficient revocation of membership without incurring big costs has been considered, but no satisfactory solution was reported. In this paper, we propose a new revocation method of membership based on the ACJT group scheme. Our solution is efficient in that it only needs one multiplication and one exponentiation, which the length of exponent is fixed, to update the public key for the group manager to exclude a group member, and the signing and verifying procedure are independent of the number of current group members and excluded group members. To the best of our knowledge, the signing and verifying procedures in prior revocation schemes are dependent of the number either current group members or excluded group members, and thus the group manager needs a heavy computation load to update the public key.
-
57浏览
-
0点赞
-
0收藏
-
0分享
-
63下载
-
0评论
-
引用
【期刊论文】Image fragile watermarking based on fusion of multi-resolution tamper detection
黄继武, Junquan Hu, Jiwu Huang, Daren Huang and Yun Q. Shi
ELECTRONICS LETTERS 21st November 2002 Vol. 38 No.24,-0001,():
-1年11月30日
A new discrete wavelet transform-based image fragile watermarking scheme exploiting the features of the human visual system is presented. Fusion of multi-resolution tamper detections, and mathe-matical morphology operations are developed for accurate tamper detection. As a result, malicious tamper and the tampered regions can be deteeted, while toleration towards high quality Iossy image compression is achieved.
-
55浏览
-
0点赞
-
0收藏
-
0分享
-
83下载
-
0评论
-
引用
【期刊论文】Segmentation-based hybrid coding using luminance masking
黄继武, Jiwu Huang and Yun Q. Shi
ELECTRONICS LETTERS 16th April 1998 Vol. 34 No.8,-0001,():
-1年11月30日
The authors propose a segmentation-based hybrid image coding algorithm taking the features of the human visual system into account. A novel segmentation criterion based on luminance masking is presented. The image is segmented into blocks of different sizes and different properties. Block mean, polynomial approximation and discrete cosine transform coding are then applied to the blocks accordingly.
-
50浏览
-
0点赞
-
0收藏
-
0分享
-
63下载
-
0评论
-
引用
【期刊论文】Blocking artefact removal based on frequency analysis
黄继武, Jiwu Huang, Yun Q. Shi and Xianhua Dai
ELECTRONICS LETTERS 26th November 1998 Vol. 34 No.24,-0001,():
-1年11月30日
An adaptive filtering algorithm for artefact removal in block coded images is presented. Based on an analysis of block artefacts in the frequency domain, the edge image is notch filtered and then used for a neighbourhood analysis. A space-variant filter is applied to the coded image adaptively, dependent on a frequency analysis.
-
64浏览
-
0点赞
-
0收藏
-
0分享
-
68下载
-
0评论
-
引用
【期刊论文】Adaptive image watermarking scheme based on visual masking
黄继武, Jiwu Huang and Yun Q. Shi
ELECTRONICS LETTERS 16th April 1998 Vol. 34 No.8,-0001,():
-1年11月30日
An image watermarking scheme in a DCT domain is proposed, it is adaptive in that a different strength of watermark is applied to different blocks according to their block classification. For the classification, visual masking (both luminance and texture masking) is taken into account. Consequently, the watermarks thus generated are robust and invisible.
-
73浏览
-
0点赞
-
0收藏
-
0分享
-
104下载
-
0评论
-
引用