• 沒有找到結果。

Suggestions for Future Studies

Chapter 7 Conclusions and Suggestions for Future Studies

7.2 Suggestions for Future Studies

In the future, the following topics may be considered for further studies.

(1) Creating more types of message-rich multimedia —

It is desired to create more types of message-rich multimedia like video and speech to broaden the applications of pervasive communication. For example, we can extend the ideas of message-rich chatacter images and message-rich code images in Chapters 5 and 6, respectively, to videos for different applications. In this way, people can interact with a video, such as to obtain some related information about the video, while they watch it.

(2) Enabling more types of smart devices —

In addition to computers and smart phones, more type of smart devices, such as Google Glasses and smart watches, may be designed to “understand”

message-rich multimedia for pervasive communication. For example, people can wear Google Glasses and use the cameras extisting on Google Glasses to capture images, create message-rich images, and extract the embedded information in the created images by the techniques proposed in Chapters 5 and 6.

(3) Designing more efficient data hiding methods —

It is desired to design more efficient data hiding methods for uses in the above two topics. For example, for the proposed method in Chapter 3, future works may be directed to analyzing more characteristics of collaborative writing works

or establishing appropriate language models [57]-[59] for more effective data hiding or other applications.

(4) Creating more types of hard copies of message-rich multimedia —

Other than papers or monitor or TV displays, like LED panels, advertisement paintings, etc., may be considered for use in pervasive communication. For example, a company can embed advertisements into its advertisement paintings, and customers can later use mobile devices to obtain the embedded information from the catupred versions of the advertisement paintings.

References

[1] M. Wieser, “The computer for the 21st century,” Scientific American Special Issue on Communications, Computers, and Networks, pp. 78–89, 1991.

[2] S. Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions,” Wiley, 2009.

[3] B. Davis, “Signal rich art: enabling the vision of ubiquitous computing,” Proc.

SPIE 7880: Media Watermarking, Security, and Forensics III, N. D. Memon, J.

Dittmann, A. M. Alattar, and E. J. Delp III, Eds., vol. 788002, Feb. 2011.

[4] F.A.P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, July 1999.

[5] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,”

IBM Syst. J., vol. 35, no. 3, 4, pp. 313–336, 1996.

[6] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recog., vol. 37, pp. 469–474, March 2004.

[7] Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible Data Hiding,” IEEE Trans.

Circuits Syst. & Video Technol., vol. 16, no. 3, pp. 354–362, March 2006.

[8] C. W. Lee and W. H. Tsai, “A lossless large-volume data hiding method based on histogram shifting using an optimal hierarchical block division scheme,” J. of Inform. Sci. & Eng., vol. 27, no. 4, pp. 1265–1282, 2011.

[9] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans.

Circuits Syst. & Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.

[10] Y. Hu, H. K. Lee, K. Chen, and J. Li, “Difference expansion based reversible data hiding using two embedding directions,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500–1512, 2008.

[11] J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” Proc. SPIE, vol.

3971, pp. 197–208, 2001.

[12] C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, vol. 177, pp. 2768–2786, 2007.

[13] S. Lee, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integer-to-integer wavelet transform,” IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 321–330, 2007.

[14] W. H. Lin , S. J. Horng , T. W. Kao , P. Fan , C. L. Lee and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Trans. Multimedia, vol. 10, no. 5, pp.746–757, 2008.

[15] D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1623–1636, 2003.

[16] C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive data hiding in palette images by color ordering and mapping with security protection,” IEEE Transactions on Communications, vol. 52, no. 4, pp. 791–800, 2004.

[17] O. Bulan, G. Sharma, and V. Monga, “Orientation modulation for data hiding in clustered-dot halftone prints,” IEEE Trans. Image Processing, vol. 19, no. 8, pp.

2070–2084, 2010.

[18] O. Bulan, and G. Sharma, “High capacity color barcodes: per channel data encoding via orientation modulation in elliptical dot arrays,” IEEE Trans. Image Processing, vol. 20, no. 5, pp. 1337–1350, 2011.

[19] N. Damera-Venkata, J. Yen, V. Monga, and B. L. Evans, “Hardcopy image barcodes via block-error diffusion,” IEEE Trans. Image Processing, vol. 14, no.

12, pp. 1977–1989, 2005.

[20] BS ISO/IEC 16388: Information Technology-Automatic Identification and Data Capture Techniques-Code39 Bar Code Symbology Specification, BS ISO/IEC 16388, 2007.

[21] BS ISO/IEC 15438: Information Technology-Automatic Identification and Data Capture Techniques-PDF417 Barcode Symbology Specification, BS ISO/IEC 15438, 2006.

[22] BS ISO/IEC 18004: Information Technology-Automatic Identification and Data Capture Techniques-QR Code 2005 Bar Code Symbology Specification, BS ISO/IEC 18004, 2006.

[23] BS ISO/IEC 16022: Information Technology-Automatic Identification and Data Capture Techniques-Data Matrix Bar Code Symbology Specification, BS ISO/IEC 16022, 2006.

[24] E. Ouaviani, A. Pavan, M. Bottazzi, E. Brunclli, F. Caselli, and M. Guerrero, “A common image processing framework for 2D barcode reading,” in 7th Int. Conf.

on Image Process. and Its Appl., vol. 2, no. 465, pp. 652–655, Jul. 1999.

[25] C. Zhang, J. Wang, S. Han, M. Yi and Z. Zhang, “Automatic real-time barcode

IEEE Trans. Image Processing, vol. 21, no. 1, pp. 418–425, 2012.

[28] K. Bennett, “Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text,” Purdue Univ., West Lafayette, IN, CERIAS Tech.

Rep. 2004–13, May 2004.

[29] A. M. Alattar and O. M. Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” Proc. SPIE, vol. 5306, Jun. 2004.

[30] Y. Kim, K. Moon, and I. Oh, “A text watermarking algorithm based on word classification and inter-word space statistics”, Proc. 7th Int. Conf. Document Analysis & Recognition, Edinburgh, Scotland, UK, pp. 775–779, 2003.

[31] I. S. Lee and W. H. Tsai, “A new approach to covert communication via PDF files,” Signal Processing, vol. 90, no. 2, pp. 557–565, 2010.

[32] P. Wayner, “Mimic functions,” Crypt., vol. XVI, no. 3, pp. 193–214, 1992.

[33] P. Wayner, Disappearing Cryptography: Information Hiding: Steganography and Watermarking, 2nd ed. San Mateo, CA: Morgan-Kaufmann, pp. 81–128, 2002.

[34] Spam Mimic, [Online]. Available: http://www.spammimic.com.

[35] M. Chapman, I. D. George, and R. Marc, “A practical and effective approach to large-scale automated linguistic steganography,” Proc. Information Security Conf., Malaga, Spain, pp. 156–165, Oct. 2001.

[36] I. A. Bolshakov, “A method of linguistic steganography based on collocationally-verified synonymy,” Proc. 6th Information Hiding Workshop, Toronto, ON, Canada, pp. 180–191, May 2004.

[37] M. H. Shirali-Shahreza and M. Shirali-Shahreza, “A new synonym text steganography,” Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, pp. 1524–1526, Aug. 2008.

[38] R. Stutsman, C. Grothoff, M. Attallah, and K. Grothoff, “Lost in just the translation,” Proc. ACM Symp. Applied Computing, Dijon, France, pp. 338–345, 2006.

[39] I. J. Lai and W. H. Tsai, “Secret-fragment-visible mosaic image - a new computer art and its application to information hiding,” IEEE Trans. Information Forensics and Security, vol. 6, no. 3, pp. 936–945, 2011.

[40] A. Furness, “Machine-readable data carriers - a brief introduction to automatic identification and data capture,” Assembly Automation, vol. 20, pp. 28–34, 2000.

[41] X. Hu, W. Zhang, X. Hu, N. Yu, X. Zhao, and F. Li, “Fast estimation of optimal marked-signal distribution for reversible data hiding,” IEEE Trans. Information Forensics and Security, vol. 8, no. 5, pp. 187–193, May 2013.

[42] W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard. New York: Van Nostrand Reinhold, pp. 34–38, 1993.

[43] E. Reinhard, M. Ashikhmin, B. Gooch, and P. Shirley, “Color transfer between images,” IEEE Computer Graphics and Applications, vol. 21, no. 5, 2001.

[44] D. Coltuc and J.-M. Chassery, “Very fast watermarking by reversible contrast mapping,” IEEE Signal Processing Letters, vol. 14, no. 4, pp. 255–258, 2007.

[45] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recog., vol. 34, no. 3, pp. 671–683, 2001.

[46] C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recog., vol. 41, no. 8, pp. 2674–2683, 2008.

[47] Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Trans. Image Processing, vol. 13, no. 4, pp. 600–612, 2004.

[48] T. R. Nielsen, P. Drewsen, and K. Hansen, “Solving jigsaw puzzles using image features,” Pattern Recog. Letters, vol. 29, no. 14, pp. 1924–1933, 2008.

[49] T. S. Cho, S. Avidan, and W. T. Freeman, “A probabilistic image jigsaw puzzle solver,” Proc. IEEE CVPR, San Francisco, CA, USA, pp. 183–190, 2010.

[50] D. Pomeranz, M. Shemesh, and O. Ben-Shahar, “A fully automated greedy square jigsaw puzzle solver,” Proc. IEEE CVPR, Providence, RI, USA, pp. 9–16, 2011.

[51] E. Demaine and M. Demaine, “Jigsaw puzzles, edge matching, and polyomino packing: Connections and complexity,” Graphs and Combinatorics, vol. 23, pp.

195–208, 2007.

[52] D. Kundur and K. Karthik, “Video fingerprinting and encryption principles for digital rights management,” Proc. IEEE, vol. 92, no. 6, pp. 918–932, 2004.

[53] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, 2007.

[54] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, “A commutative digital image watermarking and encryption method in the tree structured Haar transform domain,” Signal Process.: Image Commun., vol. 26, no. 1, pp. 1–12, 2011.

[55] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process.

Lett., vol. 18, no. 4, pp. 255–258, 2011.

[56] W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, 2012.

[57] A. Bronner and C. Monz, “User edits classification using document revision histories,” Proc. 13th Conf. of the European Chapter of the Association for Computational Linguistics, Avignon, France, pp. 356–366, 2012.

[58] A. Bronner, M. Negri, Y. Mehdad, A. Fahrni, and C. Monz, “CoSyne:

synchronizing multilingual wiki content,” Proc. 8th Annual Int. Symp. on Wikis and Open Collaboration (WikiSym), Linz, Austria, Article 33, pp. 1–4, 2012.

[59] C. Dutrey, D. Bernhard, H. Bouamor, and A. Max, “Local modifications and paraphrases in Wikipedia's revision history,” Procesamiento de Lenguaje Natural, vol. 46, pp. 51–58, 2010.

[60] M. Erdmann, K. Nakayama, T. Hara, and S. Nishio, “Improving the extraction of bilingual terminology from Wikipedia,” ACM Trans. Multimedia Comput.

Commun. Appl., vol. 5, no. 4, Article 31, 17 pages, 2009.

[61] A. Max and G. Wisniewski, “Mining naturally-occurring corrections and paraphrases from Wikipedia’s revision history,” Proc. LREC 2010, Valletta, Malta, pp. 3143–3148, 2010.

[62] R. Nelken and E. Yamangil, “Mining Wikipedia’s article revision history for training computational linguistics algorithms,” Proc. AAAI Workshop on Wikipedia & Artificial Intell.: An Evolving Synergy, Chicago, Illinois, USA, pp.

31–36, 2008.

[63] F. B. Viégas, M. Wattenberg, and K. Dave, “Studying cooperation and conflict between authors with history flow visualizations,” Proc. SIGCHI Conf. on Human Factors in Computing Systems, Vienna, Austria, pp. 575–582, 2004.

[64] T. Y. Liu and W. H. Tsai, “A new steganographic method for data hiding in Microsoft word documents by a change tracking technique,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 1, pp. 24–30, 2007.

[65] L. Bergroth, H. Hakonen, and T. Raita, “A survey of longest common subsequence algorithms,” Proc. 7th Int. Symp. on String Process. Inf. Retrieval (SPIRE), A Curuna, Spain, pp. 39–48, 2000.

[66] A. Kerckhoffs, “La cryptographie militaire,” J. Sciences Militaires, vol. 9, pp.

5–38, 1883.

[67] A. Biryukov and D. Khovratovich, “Related-key cryptanalysis of the full AES-192 and AES-256,” Proc. 15th Int. Conf. on The Theory and Application of Cryptology and Information Security (ASIACRYPT), Tokyo, Japan, pp. 1–18, 2009.

[68] A. Bogdanov, D. Khovratovich, and C. Rechberger, “Biclique cryptanalysis of the full AES,” Proc. 17th Int. Conf. on The Theory and Application of Cryptology and Information Security (ASIACRYPT), Seoul, Korea, pp. 344–371, 2011.

[69] N. Madnani B. J. and Dorr, “Generating phrasal and sentential paraphrases: a survey of data-driven methods,” Computational Linguistics, vol. 3, no. 3, pp.

341–387, 2010.

[70] C. Lin, “Face detection in complicated backgrounds and different illumination conditions by using YCbCr color space and neural network,” Pattern Recognition Letters, vol. 28, pp.2190–2200, 2007.

[71] J. Illingworth and J. Kittler, “A survey of the Hough transform,” Computer Vision, Graphics, and Image Processing, vol. 44, no. 1, pp. 87–116, 1998.

[72] R. C. Gonzales and R. E. Woods, Digital Image Processing, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, pp. 572–580, 2002.

[73] W. H. Tsai, “Moment-preserving thresholding: a new approach,” Computer Vision, Graphics, and Image Processing, vol. 29, no. 3, pp. 377–393, 1985.

[74] V. Guruswami and M. Sudan, “Improved decoding of Reed-Solomon and algebraic-geometric codes,” IEEE Trans. Inform. Theory, vol. 45, pp.1757–1767, 1999.

Vitae

Ya-Lin Lee was born in Changhua, Taiwan, R.O.C. on February 2, 1987. She received the B.S. degree in computer science from National Chiao Tung University, Taiwan, in 2009, and works toward her Ph.D. degree at the College of Computer Science, National Chiao Tung University. She has been a research assistant at the Computer Vision Laboratory in the Department of Computer Science at National Chiao Tung University from August 2009. Her current research interests include information hiding, image processing, pattern recognition, machine learning, and data mining.

List of Publications of Ya-Lin Lee

Journal Papers and Book Chapters

(1) Y. L. Lee and W. H. Tsai, “A new secure image transmission technique via secret-fragment-visible mosaic images by nearly-reversible color transformations,” IEEE Transactions on Circuits and Systems for Video Technology, accepted and to appear.

(2) Y. L. Lee and W. H. Tsai, “A new data hiding method via revision history records on collaborative writing platforms,” ACM Transactions on Multimedia Computing, Communications and Applications, accepted and to appear.

(3) Y. L. Lee and W. H. Tsai, “Reversible data hiding by image encryptions and spatial correlation comparisons,” Journal of Information Science and Engineering, accepted and to appear.

(4) Y. L. Lee and W. H. Tsai, “New image steganography via secret-fragment-visible mosaic images by nearly-reversible color transformation,” Advances in Computing - Lecture Notes in Computer Science (LNCS), Vol. 6939, G. Bebis, et al. (eds.), Springer, Berlin/Heidelberg, Germany, pp. 64–74, Sep. 2011.

(5) Y. L. Lee and W. H. Tsai, “A new data transfer method via signal-rich-art code images captured by mobile devices,” IEEE Transactions on Circuits and Systems for Video Technology, submitted.

Conference Papers

(1) Y. L. Lee and W. H. Tsai, “New image steganography via secret-fragment-visible mosaic images by nearly-reversible color transformation,” Proceedings of 2011 International Symposium on Visual Computing, Las Vegas, Nevada, USA, pp. 64–74, Sep. 2011.

(2) Y. L. Lee and W. H. Tsai, “Signal rich art image — a new tool for automatic identification and data capture applications using mobile phones,” Proceedings of 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013), Vancouver, Canada, pp. 1942–1946, May 2013.

Patents

(1) Y. L. Lee and W. H. Tsai, “LM code — a tool for data transfer applications using mobile devices,” Republic of China Patent (pending).

(2) Y. L. Lee and W. H. Tsai, “LM code — a tool for data transfer applications using mobile devices,” USA Patent (pending).

(3) Y. L. Lee and W. H. Tsai, “A data hiding method via revision history records on collaborative writing platforms,” Republic of China Patent (pending).

(4) Y. L. Lee and W. H. Tsai, “A data hiding method via revision history records on collaborative writing platforms,” USA Patent (pending).