書報討論 Fall 2004

Post on 14-Jan-2016

46 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

書報討論 Fall 2004. 蘇柏齊 助理教授. 書報討論概要. 地點 : 視聽教室 (E6-207) 碩一與博一必修 時間 : 每週三下午三時至五時 邀請對象 ( 產官學界 ) 產業界 : 了解實業界運用資訊科技情況 官方 : 資訊產業政策 學界 : 其他學校研究機構之專家研究情形. 書報討論參與. 請大家踴躍參加 專家學者聘請不易 增廣學習領域 與實業界應用發展情形接軌. 演講排程. 09/29 中山科學研究院 系統晶片中心 張誠博士 10/06 IBM Senior Consultant 王鎮志資深顧問 - PowerPoint PPT Presentation

Transcript

書報討論Fall 2004

蘇柏齊 助理教授

書報討論概要 地點 : 視聽教室 (E6-207) 碩一與博一必修 時間 : 每週三下午三時至五時 邀請對象 ( 產官學界 )

– 產業界 : 了解實業界運用資訊科技情況– 官方 : 資訊產業政策– 學界 : 其他學校研究機構之專家研究情形

書報討論參與 請大家踴躍參加 專家學者聘請不易 增廣學習領域 與實業界應用發展情形接軌

演講排程 09/29

中山科學研究院 系統晶片中心張誠博士

10/06IBM Senior Consultant 王鎮志資深顧問

10/13宏廣創新動畫公司顧問

演講排程 10/20

中山大學資工系張玉盈教授 10/27

中原大學資管系廖慶榮教授 11/03

微軟技術中心副總經理 Christopher H. Short

工研院 , 資策會 , 國科會專家… 交大 , 成大教授 , 北科大…

My Research Experience and Plan

蘇柏齊 Po-Chyi Su

大綱 自我簡介 資料隱藏的研究 未來研究方向

學歷 學士 (1995)

– 國立台灣大學電機工程學系 碩士、博士 (1998, 2003)

– 美國南加州大學電機工程學系University of Southern CaliforniaDept. of Electrical Engineering – Systems

– 指導教授 : 郭宗杰博士 (Dr. C.-C. Jay Kuo)

– Dissertation: “Information Hiding in Digital Images: Watermarking and Steganography”

經歷 Engineer – ITRI

– Developed DTV software/hardware Research assistant – Univ. of Southern California

– Information hiding & media content protection Engineer – InterVideo Inc.

– Image-processing/text filters of a video editing software Engineer – Media Fair Inc.

– Developed digital watermarking techniques for multimedia content protection

– Assisted in performance evaluation of digital watermarking schemes for DVD

Member of U.S. National Delegates to MPEG-7 International Standard

資料隱藏的研究

Info. Hiding in Digital Images: Watermarking & Steganography Digital Watermarking

– The hidden information is related with the host content

Steganography– The hidden information is unrelated with the host content

Steganography

Watermarking

HiddenInformation

Host Image CompositeImage

- Ownership- User info.- Date/Time- Index

Watermarking and Encryption

Digital Watermarking– A digital watermark is a signal that is embedded in

a digital media – Embedded information and data are inseparable

Encryption– Protect content information during the

transmission of the data– After receipt and subsequent decryption, the data

is no longer protected

Applications of Info. Hiding

Proof of Ownership Copy Protection Fingerprinting Authentication Broadcast Monitoring Covert Communication

Design Issues of Information Hiding

Robustness

Capacity

SecurityComplexity

False Detection

Rate

Unobtrusive

My Dissertation (Part I) Information Hiding in JPEG2000 The earliest work on information-hiding in

JPEG2000 compressed images– Robust digital watermark:

• “An Integrated Approach to Image Watermarking and JPEG-2000 Compression” in Journal of VLSI Signal Processing, 2001

– Steganography for covert communication• “Steganography in JPEG2000 Compressed Images”

accepted by IEEE Trans. on Consumer Electronics Special Issue on JPEG2000: Implementations & Applications

My Dissertation [PART II] Towards Affine-Invariant Digital Image Watermarking Synchronization problem in watermark

detection because of geometrical attacks??

Cropping Rotation/Cropping

Scaling Change ofaspect ratio

Shearing/Cropping

JPEG2000 Watermarking Compression and watermarking share some

characteristics Spread-spectrum watermarking

– Selecting coefficients (quantization indices) by examining bit-planes.

– Correlation detector Features

– Efficiency– Progressive watermarking detection– Region of interest watermarking– False positive detection rate estimation

Invisibility Test

Original Image Marked Image (38.20 dB) Spatial Difference

Original Image Spatial DifferenceMarked Image (38.31 dB)

Invisibility Test (cont.)

Original Image Marked Image (39.16 dB) Spatial Difference

Original Image Marked Image (39.26 dB) Spatial Difference

Invisibility Test (cont.)

Original Image Marked Image (40.65 dB) Spatial Difference

Original Image Marked Image (41.13 dB) Spatial Difference

JPEG2000 Watermarking Robustness against Attacks (1)

Cropping Sharpening Edge EnhancingNo Attack

GIF conversionBlurring Halftoning Noise Adding

JPEG2000 Watermarking Robustness against Attacks (2)

OthersDilation Eroding Mosaic

DCT-based compression

Wavelet-based compression

Hot Wax Coating

HistogramEqualization

ROI Watermarking

Original Imagewith two ROI’s(circular shape)

Decompressed watermarked image with lowbit rate

Spatial Difference

Bitmap Embedding & RetrievalPSNR: 37.02dB

PSNR: 36.94dB

No Attack100%

No Attack100%

JPEG 75%98.07%

JPEG 60%96.99%

JPEG50%93.90%

JPEG 75%98.69%

JPEG 60%97.84%

JPEG 50%95.37%

JPEG2000 Steganography

Covert communication– Transmitting sensitive information– Military usage

Requirements– Transparency– Reliability– Capacity– Security

Steganographic Scheme under the JPEG2000 Framework Reliable & secret transmission Controllable rate-distortion trade-off Progressive transmission

JPEG2K bit-streamof the host image

JPEG2K bit-streamof the hidden image

Grid Signal Embedding/Detection with Autocorrelation

Rotatedwatermarked

image

Scaledwatermarked

image

Unattackedwatermarked

image

Proposed Affine-Invariant Digital Image Watermarking Schemes Spatial-frequency composite watermarking

– “An Image Watermarking Scheme to Resist Generalized Geometrical Transformations” in SPIE Photonics East, Boston, MA, 2000

Affine-invariant Block-based watermarking– “Synchronized Detection of the Block-based

Watermark with Invisible Grid Embedding” in SPIE Photonics West, San Jose, CA, 2001

未來研究方向

Multimedia Security Multimedia Database Multimedia Coding

Multimedia Security

Digital Watermarking– High capacity/Robustness/Security

Digital Rights Management (DRM)– Technology– Legal issues– Business model

Surveillance System– Security– Content authentication– Event notification

Multimedia Database

Video Analysis/Indexing/Skimming/Mining– Apply audiovisual data– More specific types of videos

• Old movie, TV News, Sport…

• Constraints

Multimedia Coding

JPEG2000– Application oriented

• ROI coding

• Volumetric images

H.264/MPEG4 Part10– Simplified implementation– Trade-off between performance & complexity

top related