Research Experience & Plan of Po-Chyi Su
Download
Report
Transcript Research Experience & Plan of Po-Chyi Su
書報討論
Fall 2004
蘇柏齊 助理教授
書報討論概要
地點: 視聽教室 (E6-207)
碩一與博一必修
時間: 每週三下午三時至五時
邀請對象 (產官學界)
– 產業界: 了解實業界運用資訊科技情況
– 官方: 資訊產業政策
– 學界: 其他學校研究機構之專家研究情形
書報討論參與
請大家踴躍參加
專家學者聘請不易
增廣學習領域
與實業界應用發展情形接軌
演講排程
09/29
中山科學研究院 系統晶片中心
張誠博士
10/06
IBM Senior Consultant 王鎮志資深顧問
10/13
宏廣創新動畫公司顧問
演講排程
10/20
中山大學資工系張玉盈教授
10/27
中原大學資管系廖慶榮教授
11/03
微軟技術中心副總經理 Christopher H.
Short
工研院, 資策會, 國科會專家…
交大, 成大教授, 北科大…
My Research Experience
and Plan
蘇柏齊 Po-Chyi Su
大綱
自我簡介
資料隱藏的研究
未來研究方向
學歷
學士 (1995)
– 國立台灣大學電機工程學系
碩士、博士 (1998, 2003)
– 美國南加州大學電機工程學系
University of Southern California
Dept. of Electrical Engineering – Systems
– 指導教授: 郭宗杰博士 (Dr. C.-C. Jay Kuo)
– Dissertation: “Information Hiding in Digital
Images: Watermarking and Steganography”
經歷
Engineer – ITRI
– Developed DTV software/hardware
Research assistant – Univ. of Southern California
– Information hiding & media content protection
Engineer – InterVideo Inc.
– Image-processing/text filters of a video editing software
Engineer – Media Fair Inc.
– Developed digital watermarking techniques for
multimedia content protection
– Assisted in performance evaluation of digital
watermarking schemes for DVD
Member of U.S. National Delegates to MPEG-7
International Standard
資料隱藏的研究
Info. Hiding in Digital Images:
Watermarking & Steganography
Digital Watermarking
– The hidden information is related with the host content
Steganography
– The hidden information is unrelated with the host content
- Ownership
- User info.
- Date/Time
- Index
Watermarking
Host Image
Hidden
Information
Steganography
Composite
Image
Watermarking and Encryption
Digital Watermarking
– A digital watermark is a signal that is embedded in
a digital media
– Embedded information and data are inseparable
Encryption
– Protect content information during the
transmission of the data
– After receipt and subsequent decryption, the data
is no longer protected
Applications of Info. Hiding
Proof of Ownership
Copy Protection
Fingerprinting
Authentication
Broadcast Monitoring
Covert Communication
Design Issues of Information
Hiding
Robustness
Capacity
Unobtrusive
Security
Complexity
False
Detection
Rate
My Dissertation (Part I)
Information Hiding in JPEG2000
The earliest work on information-hiding in
JPEG2000 compressed images
– Robust digital watermark:
• “An Integrated Approach to Image Watermarking
and JPEG-2000 Compression”
in Journal of VLSI Signal Processing, 2001
– Steganography for covert communication
• “Steganography in JPEG2000 Compressed Images”
accepted by IEEE Trans. on Consumer Electronics
Special Issue on JPEG2000: Implementations &
Applications
My Dissertation [PART II]
Towards Affine-Invariant Digital
Image Watermarking
Synchronization problem in watermark
detection because of geometrical attacks
??
Cropping
Scaling
Rotation/
Cropping
Change of Shearing/Cropping
aspect ratio
JPEG2000 Watermarking
Compression and watermarking share some
characteristics
Spread-spectrum watermarking
– Selecting coefficients (quantization indices) by
examining bit-planes.
– Correlation detector
Features
– Efficiency
– Progressive watermarking detection
– Region of interest watermarking
– False positive detection rate estimation
Invisibility Test
Original Image
Marked Image (38.20 dB)
Spatial Difference
Original Image
Marked Image (38.31 dB)
Spatial Difference
Invisibility Test (cont.)
Original Image
Marked Image (39.16 dB)
Spatial Difference
Original Image
Marked Image (39.26 dB)
Spatial Difference
Invisibility Test (cont.)
Original Image
Marked Image (40.65 dB)
Spatial Difference
Original Image
Marked Image (41.13 dB)
Spatial Difference
JPEG2000 Watermarking
Robustness against Attacks (1)
No Attack
Cropping
Blurring
GIF conversion
Sharpening Edge Enhancing
Halftoning
Noise Adding
JPEG2000 Watermarking
Robustness against Attacks (2)
Histogram
Equalization
DCT-based
compression
Wavelet-based
compression
Hot Wax
Coating
Dilation
Eroding
Mosaic
Others
ROI Watermarking
Original Image
with two ROI’s
(circular shape)
Decompressed
watermarked
image with low
bit rate
Spatial Difference
Bitmap Embedding & Retrieval
PSNR: 37.02dB
No Attack JPEG 75% JPEG 60% JPEG50%
100%
98.07%
96.99%
93.90%
PSNR: 36.94dB
No Attack JPEG 75% JPEG 60% JPEG 50%
100%
98.69%
97.84%
95.37%
JPEG2000 Steganography
Covert communication
– Transmitting sensitive information
– Military usage
Requirements
– Transparency
– Reliability
– Capacity
– Security
Steganographic Scheme under
the JPEG2000 Framework
Reliable & secret transmission
Controllable rate-distortion trade-off
Progressive transmission
JPEG2K bit-stream
of the host image
JPEG2K bit-stream
of the hidden image
Grid Signal Embedding/Detection
with Autocorrelation
Unattacked
watermarked
image
Rotated
watermarked
image
Scaled
watermarked
image
Proposed Affine-Invariant Digital
Image Watermarking Schemes
Spatial-frequency composite watermarking
– “An Image Watermarking Scheme to Resist
Generalized Geometrical Transformations”
in SPIE Photonics East, Boston, MA, 2000
Affine-invariant Block-based watermarking
– “Synchronized Detection of the Block-based
Watermark with Invisible Grid Embedding”
in SPIE Photonics West, San Jose, CA, 2001
未來研究方向
Multimedia Security
Multimedia Database
Multimedia Coding
Multimedia Security
Digital Watermarking
– High capacity/Robustness/Security
Digital Rights Management (DRM)
– Technology
– Legal issues
– Business model
Surveillance System
– Security
– Content authentication
– Event notification
Multimedia Database
Video Analysis/Indexing/Skimming/Mining
– Apply audiovisual data
– More specific types of videos
• Old movie, TV News, Sport…
• Constraints
Multimedia Coding
JPEG2000
– Application oriented
• ROI coding
• Volumetric images
H.264/MPEG4 Part10
– Simplified implementation
– Trade-off between performance & complexity