已为您找到该学者10条结果 成果回收站
【期刊论文】A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression
黄继武, Xiangui Kang, Jiwu Huang, Senior Member, IEEE, Yun Q. Shi, and Yan Lin
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO.8, AUGUST 2003,-0001,():
-1年11月30日
Robustness is one of the crucial important issues in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. In this paper, a blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. This algorithm improves the robustness via using new embedding strategy, watermark structure, 2-D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence are embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of affine transform and convert the image back to its original shape. Then we perform translation registration by using the training sequence embedded in the DWT domain and finally extract the informative watermark. Experimental works have demonstrated that the watermark generated by the proposed algorithm is more robust than other watermarking algorithms reported in the literature. Specifically it is robust against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10 simultaneously. While the approach is presented for gray-level images, it can also be applied to color images and video sequences.
Affine transformation,, geometric attacks,, image watermarking,, robustness,, template matching.,
-
59浏览
-
0点赞
-
0收藏
-
0分享
-
169下载
-
0
-
引用
【期刊论文】An Efficient Revocation Algorithm in Group Signatures
黄继武, Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, and Daren Huang
J.I. Lim and D.H. Lee (Eds.): ICISC 2003, LNCS 2971, pp. 339-351, 2004.,-0001,():
-1年11月30日
The problem of secure and efficient revocation of membership without incurring big costs has been considered, but no satisfactory solution was reported. In this paper, we propose a new revocation method of membership based on the ACJT group scheme. Our solution is efficient in that it only needs one multiplication and one exponentiation, which the length of exponent is fixed, to update the public key for the group manager to exclude a group member, and the signing and verifying procedure are independent of the number of current group members and excluded group members. To the best of our knowledge, the signing and verifying procedures in prior revocation schemes are dependent of the number either current group members or excluded group members, and thus the group manager needs a heavy computation load to update the public key.
-
57浏览
-
0点赞
-
0收藏
-
0分享
-
63下载
-
0
-
引用
【期刊论文】Robust Watermarking with Adaptive Receiving
黄继武, Xiangui Kang, , Jiwu Huang, Yun Q. Shi, and Jianxiang Zhu
T. Kalker et al. (Eds.): IWDW 2003, LNCS 2939, pp. 86-100, 2004.,-0001,():
-1年11月30日
This paper presents a watermarking scheme with enhanced robustness owing to adaptive receiving and turbo code in addition to other measures. We embed a training sequence with informative watermark in the original image. A new adaptive receiver is developed, which is adjusted adaptively according to the responsive distribution of the training sequence. Together with carefully designed data embedding techniques, concatenated coding of direct sequence spread spectrum (DSSS) and Turbo code, 2-D interleaving, our newly developed resynchronization technique and incorporated with the registration technique based on motion estimation technique developed by Loo and Kinsbury, our proposed algorithm can successfully resist almost all the StirMark testing functions including both common signal processing, such as JPEG compression and median filtering, and geometric distortions. The watermarking is robust against the combination of geometric distortion and JPEG_10, the combination of large global distortion and arbitrary local small distortion. To our best knowledge, we use adaptive receiving to combat the fading of host media feature (watermark carrier) for the first time.
-
55浏览
-
0点赞
-
0收藏
-
0分享
-
99下载
-
0
-
引用
【期刊论文】Image fragile watermarking based on fusion of multi-resolution tamper detection
黄继武, Junquan Hu, Jiwu Huang, Daren Huang and Yun Q. Shi
ELECTRONICS LETTERS 21st November 2002 Vol. 38 No.24,-0001,():
-1年11月30日
A new discrete wavelet transform-based image fragile watermarking scheme exploiting the features of the human visual system is presented. Fusion of multi-resolution tamper detections, and mathe-matical morphology operations are developed for accurate tamper detection. As a result, malicious tamper and the tampered regions can be deteeted, while toleration towards high quality Iossy image compression is achieved.
-
55浏览
-
0点赞
-
0收藏
-
0分享
-
83下载
-
0
-
引用
【期刊论文】Segmentation-based hybrid coding using luminance masking
黄继武, Jiwu Huang and Yun Q. Shi
ELECTRONICS LETTERS 16th April 1998 Vol. 34 No.8,-0001,():
-1年11月30日
The authors propose a segmentation-based hybrid image coding algorithm taking the features of the human visual system into account. A novel segmentation criterion based on luminance masking is presented. The image is segmented into blocks of different sizes and different properties. Block mean, polynomial approximation and discrete cosine transform coding are then applied to the blocks accordingly.
-
50浏览
-
0点赞
-
0收藏
-
0分享
-
63下载
-
0
-
引用