RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Review on Digital Image Watermarking Based on Singular Value Decomposition

        Chengyou Wang,Yunpeng Zhang,Xiao Zhou 한국정보처리학회 2017 Journal of information processing systems Vol.13 No.6

        With the rapid development of computer technologies, a number of image modification methods haveemerged, which have great impacts on the security of image information. Therefore, it is necessary to protectthe integrity and authenticity of digital images, and digital watermarking technique consequently becomes aresearch hotspot. An effort is made to survey and analyze advancements of image watermarking algorithmsbased on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarkingtechniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model,features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well ashybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamperdetection, location, and recovery are reviewed in the last part.

      • KCI등재

        APBT-JPEG Image Coding Based on GPU

        ( Chengyou Wang ),( Rongyang Shan ),( Xiao Zhou ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.4

        In wireless multimedia sensor networks (WMSN), the latency of transmission is an increasingly problem. With the improvement of resolution, the time cost in image and video compression is more and more, which seriously affects the real-time of WMSN. In JPEG system, the core of the system is DCT, but DCT-JPEG is not the best choice. Block-based DCT transform coding has serious blocking artifacts when the image is highly compressed at low bit rates. APBT is used in this paper to solve that problem, but APBT does not have a fast algorithm. In this paper, we analyze the structure in JPEG and propose a parallel framework to speed up the algorithm of JPEG on GPU. And we use all phase biorthogonal transform (APBT) to replace the discrete cosine transform (DCT) for the better performance of reconstructed image. Therefore, parallel APBT-JPEG is proposed to solve the real-time of WMSN and the blocking artifacts in DCT-JPEG in this paper. We use the CUDA toolkit based on GPU which is released by NVIDIA to design the parallel algorithm of APBT-JPEG. Experimental results show that the maximum speedup ratio of parallel algorithm of APBT-JPEG can reach more than 100 times with a very low version GPU, compared with conventional serial APBT-JPEG. And the reconstructed image using the proposed algorithm has better performance than the DCT-JPEG in terms of objective quality and subjective effect. The proposed parallel algorithm based on GPU of APBT also can be used in image compression, video compression, the edge detection and some other fields of image processing.

      • KCI등재

        Video Coding Algorithm Based on High Efficiency Video Coding (HEVC) and Hybrid Transforms

        ( Chengyou Wang ),( Rongyang Shan ),( Xiao Zhou ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.9

        In recent years, due to its high efficiency and better performance, the high efficiency video coding (HEVC) has become the most common compression standard in the field of video coding. In this paper, the framework of HEVC is deeply analyzed, and an improved HEVC video coding algorithm based on all phase biorthogonal transform (APBT) is proposed, where APBT is utilized to replace the discrete cosine transform (DCT) and discrete sine transform (DST) in original HEVC standard. Based on the relationship between APBT and DCT, the integer APBT is deduced. To further improve the coding performance, an optimal HEVC video coding algorithm based on hybrid APBT is proposed. The coding performance of the proposed HEVC coding algorithm is improved without increasing the complexity. Experimental results show that compared with HEVC standard algorithm, the improved HEVC video coding algorithm based on hybrid APBT can improve the coding performance of chrominance components by about 0.3%.

      • KCI등재

        LBP and DWT Based Fragile Watermarking for Image Authentication

        Chengyou Wang,Heng Zhang,Xiao Zhou 한국정보처리학회 2018 Journal of information processing systems Vol.14 No.3

        The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its lowfrequency component contains the basic information of an image. Based on this, a fragile watermarking usingthe local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBPpattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the leastsignificant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of theproposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of themaximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that theproposed algorithm not only has lower watermark payloads, but also achieves good performance in tamperidentification and localization for various attacks.

      • Bayer Patterned Image Compression Based on Structure Conversion and APBT

        Chengyou Wang,Songzhao Xie,Xiao Zhou 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.2

        The color filter array (CFA) captures only one-third of the necessary color intensities and the full color image is generated from the captured data by interpolation. In recent years, the algorithm of Bayer patterned image compression based on “structure conversion” has achieved better image quality. On the basis of previous work, a new algorithm based on the all phase biorthogonal transform (APBT) and all phase IDCT (APIDCT) interpolation is proposed in this paper. Instead of the conventional JPEG compression, APBT is applied to the JPEG image compression (APBT-JPEG), which significantly reduces complex multiplications and makes the quantization table easier. In the interpolation step, APIDCT interpolation method is introduced. Experimental results show that the proposed algorithm outperforms the one based on “structure conversion”; and the APIDCT interpolation performs close to the conventional interpolation methods. Therefore, the algorithm proposed in this paper is more suitable for Bayer image compression.

      • KCI등재

        Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

        ( Chengyou Wang ),( Heng Zhang ),( Xiao Zhou ) 한국정보처리학회 2018 Journal of information processing systems Vol.14 No.2

        As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.

      • SCOPUSKCI등재

        LBP and DWT Based Fragile Watermarking for Image Authentication

        Wang, Chengyou,Zhang, Heng,Zhou, Xiao Korea Information Processing Society 2018 Journal of information processing systems Vol.14 No.3

        The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

      • SCOPUSKCI등재

        Review on Digital Image Watermarking Based on Singular Value Decomposition

        Wang, Chengyou,Zhang, Yunpeng,Zhou, Xiao Korea Information Processing Society 2017 Journal of information processing systems Vol.13 No.6

        With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼