• 沒有找到結果。

子計畫二:植基於數位浮水印技術之無線網路安全資訊連結

Tabu Search PSNR

Calculation

Fitness Evalution

Final Iteration?

Tabu Search Selection

Original image

Visible Watermark Original image

+ Visible watermark

Invisible Watermark Original image

+ Visible watermark

+

圖 2 末嵌入浮水印之半色調轉換影像。

圖 3 欲嵌入之浮水印。

提提出在無損失半色調浮水印方法中,找出漢明距離為1的最相似區塊,利用候選區塊及替換區 塊,來完成浮水印嵌入的動作。雖然在嵌入後的半色調影像中,會有一些影像品質下降的趨勢,

但是在可接受的範圍內。而且當浮水印從已嵌入浮水印的影像中粹取出來後,能夠成功的還原 出原影像。因此,在本方法中,最大的貢獻就是,在影像中加入浮水印,保護影像的著作權外,

在浮水印粹取出來的同時,能夠將影像完整無失真的還原,讓影像能夠另做他用。圖 2, 圖3 及 圖 4 為末嵌入浮水印之半色調轉換影像, 欲嵌入之浮水印及嵌入浮水印後之後半色調影像。

圖 4 嵌入浮水印後之後半色調影像。

3. 人臉偵測系統

提出一個新穎、快速、又有效的人臉偵測定位演算法,除了可以偵測靜態影像外,亦可 於實境及時地偵測出人臉之位置, 實驗結果如圖5所示。

適用於單一人臉或多張人臉 (最大允許側偏角度 < 2/3張人臉)、複雜、且未經光線控制 的背景,不受人員髮型、眼鏡、表情、及妝飾之影響。

人臉偵測之應用: 人臉辨識、門禁安全、差勤管控、數位內容、環境感知、資料檢索、

及 H.264 等需兼具低成本、及時的相關設備。

圖 5人臉偵測系統實驗結果

4. 人臉辨識

結合以上的人臉偵測定位演算法,在現階段我們已設計出可適用於十人以下的人臉辨識 演算法。針對固定環境的現況測試,可以有效的確認已授權者之身份外,同時可以排除 外來人員之入侵。於 Pentium 3.0 GHz PC 執行,從輸入取像到人臉辨識完成,每張測試 影像 (size: 160120) 平均耗時 0.5 sec。

二、目前已申請三個專利如下:

1. 專利名稱:隱藏資料於二進位影像的方法 專利發明人:潘正祥、廖炳松、陳彥宏

2. 專利名稱:數位浮水印方法 1. 書名:INTELLIGENTMULTIMEDIADATAHIDING

作者: Jeng-Shyaug Pan Wai-Chi Fan

Lakhmi Jain Hsiang-Cheh Huang

出版社: Springer Verlag, Series of Advanced Information and Knowledge Processing

2. 書名:Multimedia Data Compression 作者: Jeng-Shyaug Pan

Feng Pan

Hsiang-Cheh Huang

四、發表與本計畫相關論文如下(2004 年六月起)

[1] Jeng-Shyang Pan, Yi-Chih Hsin, Hsiang-Cheh Huang and Kuang-Chih Huang, 2004,

"Robust Image Watermarking Based on Multiple Description Vector Quantization", Electronics Letters, Vol. 40, No. 22, pp. 1409-1410 (SCI, EI)

[2] Jeng-Shyang Pan, Min-Tsang Sung, Hsiang-Cheh Huang and Bin-Yih Liao, 2004, "Robust VQ-based Digital Watermarking for Memoryless Binary Symmetric Channel", IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences, vol.

E-87-A, no. 7, pp. 1839- 1841(SCI, EI)

[3] Feng-Hsing Wang, Lakhmi C. Jain, and Jeng-Shyang Pan, 2004, “A novel VQ-based watermarking scheme with genetic codebook partition”, Journal of Network and Computer Applications, Elsevier, (SCI Expanded, EI) (Accepted)

[4] Hao-Xian Wang, Zhe-Ming Lu, Jeng-Shyang Pan and Sheng-He Sun, “Robust Blind Video Watermarking with Adaptive Embedding Mechanism”, International Journal for Innovative Computing, Information, and Control, (Accepted)

[5] Bin Yan, Zhe-Ming Lu, Sheng-He Sun and Jeng-Shyang Pan, 2005,“Speech authentication by semi-fragile watermarking”, International Workshop on Intelligent Information Hiding

and Multimedia Signal Processing, LNAI , (SCI expanded) (Accepted)

[6] Meiying Wang, Yao Zhao, Jeng-Shyang Pan and Shaowei Weng, 2005, “A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression”, International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, LNAI, (SCI expanded) (Accepted)

[7] Feng-Hsing Wang, Kang K. Yen, Jeng-Shyang Pan, Lakhmi C. Jain, 2005, “Shadow Watermark Extraction System”, International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, LNAI , (SCI expanded) (Accepted)

[8] Ping-Sung Liao, Jeng-Shyang Pan, Yen-Hung Chen and Bin-Yih Liao, “A Lossless Watermarking Technique for Halftone Images”, International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, LNAI, (SCI expanded) (Accepted)

[9] Fan Gu, Zhe-Ming Lu and Jeng-Shyang Pan, 2005, “Multipurpose image watermarking in DCT domain using subsampling”, IEEE International Symposium on Circuits and Systems, pp. 4417-4420

[10] Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan, 2005, “Hiding watermark in watermark”,IEEE International Symposium on Circuits and Systems, pp. 4018-4021 [11] Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain, 2005, “Shadow watermark

embedding scheme”, IEEE International Symposium on Circuits and Systems, pp.

4975-4978

[12] Shu-Chuan Chu, Yi-Chih Hsin, Hsiang-Cheh Huang and Kuang-Chih Huang and Jeng-Shyang Pan, 2005, “Multiple description watermarking for lossy network”, IEEE International Symposium on Circuits and Systems, pp. 3990-3993

[13] Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan, 2004, “Genetic watermark modification for watermarking schemes”, International Conference on Artificial Intelligence in Science and Technology, pp. 196-1999

[14] Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi Jain and Hsiang-Cheh Huang, 2004,

"VQ-based Gray Watermark Hiding Scheme and Genetic Index Assignment," IEEE Pacific-Rim Conference on Multimedia, LNCS 3332, pp. 73-80 (SCI Expanded)

[15] Shu-Chuan Chu, Zhe-Ming Lu, Jeng-Shyang Pan and Kuang-Chih Huang, 2004,

“Hadamard Transform Based FastCodeword Search Algorithm forHigh-Dimensional VQ Encoding”,IEEE Asia-Pacific Conference on Circuits and Systems, pp. 85-88

[16] Yu-Long Qiao, Jeng-Shyang Pan and Sheng-He Sun, 2004, “Improved K Nearest Neighbor Classification Algorithm”, IEEE Asia-Pacific Conference on Circuits and Systems, pp. 1101-1104

[17] Jeng-Shyang Pan, Chia-Sung Cheng, Bin-Yih Liao, Chao-Hsing Hsu and Kuang-Chih Huang, 2004, "Optimization of Multi-Purpose Watermarking Algorithm", IEEE Asia-Pacific Conference on Circuits and Systems, pp. 601-604

[18] Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan and Hsiang-Cheh Huang, 2004,

“DigitalImageWatermarking Approach Based on Lapped OrthogonalTransform”,IEEE Asia-Pacific Conference on Circuits and Systems, pp. 1133-1136

[19] S. C. Chu, John F. Roddick, Z. M. Lu and J. S. Pan, 2004,‘Hadamard Transform Based Equal-average Equal-variance Equal-norm Nearest Neighbor Codeword Search Algorithm’, IEEE International Conference on Multimedia and Expo, pp. 671-674

[20] Yu-Long Qiao, J. S. Pan and S. H. Sun, 2004,‘Improved Partial Distance Search for K Nearest-neighbor Classification’,IEEE International Conference on Multimedia and Expo, pp. 1275-1278

[21] Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain and Hsiang-Cheh Huang, 2004,‘A VQ-Based Image-in-Image Data Hiding Scheme’,IEEE International Conference on Multimedia and Expo, pp. 2191-2194

[22] Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan, 2004,‘Design of Hierarchical Keys for A Multi-user-based Watermarking System’, IEEE International Conference on Multimedia and Expo, pp. 919-922

[23] J. W. Wang and Chin-Chun Kuo,“A RobustTwo Stage Approach forEyeDetection,” To beappeared in the13th International Conference on Image Analysis and Processing (ICIAP 2005), Oral Session, Cagliari, Italy,Sep. 6-8 2005.

[24] J. W. Wang, “Wavelet-Based Face Localization in Unconstrained Scenes,”The Irish MachineVision & Image Processing Conference 2004 (IMVIP2004), Trinity College, Dublin, Ireland, pp. 92-97, Sep. 1-3 2004.

[25] B. T. Lim and J. W. Wang, “Head Contour-Based FaceDetection in Unconstrained Scenes,”CVGIP2004,Hualien,Taiwan, Oral Session B4, Biometrics (II), http://cvgip04.csie.ndhu.edu.tw/, Aug. 15-17 2004.

五、產學合作案

1. 潘正祥(主持人),陳聰毅,93.11~94.10,無損浮水印儲存技術,威視科技委託研發 計劃.

2. 王敬文(主持人),人臉影像特徵偵測應用於數位浮水印, 93-08-01 ~ 94-07-31, 友聲 電子公司委託研發計劃.

六、邀請研究及演講

[1] Florida International University 邀請 潘正祥 參與研究計畫, 並提供研究費壹 萬美金

題目:“DigitalWatermarking”,94.1.18 ~ 94.2.18

[2] IEEE Society, Miami Section 邀請 潘正祥 演講, 94 年 2 月 題目: Intelligent Digital Watermarking

[3] 中研院資訊所, 邀請 潘正祥 演講, 94 年 4 月

題目: Parallel Ant Colony System and Parallel Particle Swarm Optimization [4] 立德管理學院 資管系, 邀請 潘正祥 演講, 94 年 5 月

題目: Intelligent Digital Watermarking

[5] 工研院 51 館 電腦與通訊研究所邀請王敬文演講, 93 年 10 月 14 日 題目: Face detection in unconstrained scenes

[6] 高應科大產學中心, 邀請王敬文演講, 94 年 5 月 17 日 七、舉辦國際會議

International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, 網址如下:

http://bit.kuas.edu.tw/~iihmsp/

八、成立國際期刊

International Journal on Innovative Computing, Information and Control, 網址如下:

http://www.ktokai-u.ac.jp/~shi/ijicic.htm

九. 參加競賽

林木德 與 王敬文, "應用於複雜背景之人臉偵測", 教育部九十三年度全國技專院校學生 專 題 製 作 競 賽 電 子 類 ( 獲 入 圍 決 賽 , 108 件 作 品 取 10 名 ), pp. C-28 - C-36, http://140.124.60.206/criep/index-1.htm.