Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chun-Hsiang Huang is active.

Publication


Featured researches published by Chun-Hsiang Huang.


IEEE Transactions on Multimedia | 2004

Attacking visible watermarking schemes

Chun-Hsiang Huang; Ja-Ling Wu

Visible watermarking schemes are important intellectual property rights (IPR) protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Visible watermarking techniques protect digital contents in a more active manner, which is quite different from the invisible watermarking techniques. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data should still exist. The embedded pattern of a useful visible watermarking scheme should be difficult or even impossible to be removed unless intensive and expensive human labors are involved. In this paper, we propose an attacking scheme against current visible image watermarking techniques. After manually selecting the watermarked areas, only few human interventions are required. For watermarks purely composed of thin patterns, basic image recovery techniques can completely remove the embedded patterns. For more general watermarks consisting of thick patterns, not only information in surrounding unmarked areas but also information within watermarked areas will be utilized to correctly recover the host image. Although the proposed scheme does not guarantee that the recovered images will be exactly identical to the unmarked originals, the structure of the embedded pattern will be seriously destroyed and a perceptually satisfying recovered image can be obtained. In other words, a general attacking scheme based on the contradictive requirements of current visible watermarking techniques is worked out. Thus, the robustness of current visible watermarking schemes for digital images is doubtful and needs to be improved.


electronic imaging | 2000

Watermark optimization technique based on genetic algorithms

Chun-Hsiang Huang; Ja-Ling Wu

In this paper, a genetic algorithm (GA) based watermark optimization technique for digital image watermarking is proposed. In our approach, watermark embedding positions are simulated by chromosomes, and several GA optimization operators such as reproduction, crossover, and mutation are used. The experimental result shows that the proposed approach can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks. By analyzing the distribution of embedding positions, we found that watermark embedding positions are highly correlated to the energy distribution of block-DCT coefficients.


Information Sciences | 2009

Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes

Chun-Hsiang Huang; Ja-Ling Wu

Watermarking performance enhancement has always been a difficult task since the performance metrics of watermarking systems, i.e., fidelity, robustness, and payload size, inherently conflict with each other. Nowadays, most watermarking schemes hide payloads according to predefined rules or empirical perceptual models. Therefore, the performance of digital watermarking schemes can be determined only passively. In this study, a genetic algorithm-based framework for watermarking performance enhancement is proposed. Watermarked results having better robustness, guaranteed fidelity, and fixed payload size can be obtained. Existing blind-detection watermarking schemes can be improved significantly by incorporating the proposed framework. In addition, the proposed framework has many desirable advantages such as asymmetric embedding/detection overhead, easy integration with existing data-hiding schemes, and direct control over fidelity and robustness.


IEEE Transactions on Information Forensics and Security | 2009

Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents

Chun-Hsiang Huang; Shang-Chih Chuang; Yen-Lin Huang; Ja-Ling Wu

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.


IEEE Photonics Journal | 2014

Parasitic Stimulated Amplification in High-Peak-Power and Diode-Seeded Nanosecond Fiber Amplifiers

Chia-Kai Chang; Po-Yen Lai; Yun-Li Li; Yi-Ping Lai; Chun-Hsiang Huang; S. H. Chen; Yong Wook Lee; Sheng-Lung Huang

The broadband parasitic amplification in a diode-seeded nanosecond ytterbium-doped fiber laser amplifier system is numerically and experimentally investigated. The amplification is originated from a weak and pulsed parasitic signal associated with the 1064-nm seed diode laser. Although the average power of the parasitic pulse is less than 5% of the total seed laser power, a significant transient spike is observed during the amplification. In agreement with the simulation, nonlinear effects caused by the transient spike limits the scaling of signal peak power in fiber preamplifiers. With the utilization of a narrow bandwidth filter to eliminate the parasitic pulse, the power and energy scalability of a multistage diode-seeded fiber amplifier laser system has been significantly improved. At 1064 nm, pulses with the peak power of 120 kW and energy of 1.2 mJ have been successfully generated in the multistage Yb3+-doped fiber amplifier with an energy gain of 63 dB and 56% conversion efficiency. In viewing of the parasitic pulses 8.8-nm bandwidth, it has the potential to become a novel seed source for high-peak-power fiber amplifiers.


IEEE Transactions on Multimedia | 2008

Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques

Chun-Hsiang Huang; Shang-Chih Chuang; Ja-Ling Wu

A novel data-hiding methodology, denoted as digital invisible ink (DII), is proposed to implement secure steganography systems. Like the real-world invisible ink, secret messages will be correctly revealed only after the marked works undergo certain prenegotiated manipulations, such as lossy compression and processing. Different from conventional data-hiding schemes where content processing or compression operations are undesirable, distortions caused by prenegotiated manipulations in DII-based schemes are indispensable steps for revealing genuine secrets. The proposed scheme is carried out based on two important data-hiding schemes: spread-spectrum watermarking and frequency-domain quantization watermarking. In some application scenarios, the DII-based steganography system can provide plausible deniability and enhance the secrecy by taking cover with other messages. We show that DII-based schemes are indeed superior to existing plausibly deniable steganography approaches in many aspects. Moreover, potential security holes caused by deniable steganography systems are discussed.


international conference on image processing | 2007

Unseen Visible Watermarking

Shang-Chih Chuang; Chun-Hsiang Huang; Ja-Ling Wu

A novel data-hiding methodology, denoted as unseen visible watermarking (UVW), is proposed. The proposed scheme is inspired by real-world watermarks and possesses advantages of both visible and invisible watermarking schemes. After watermark embedding, the differences between the original work and the stego work are imperceptible under normal viewing conditions. However, when the hidden message is to be extracted, no explicit watermark extracting module is required. Semantically-meaningful watermark patterns can be directly recognized from the stego work as long as common imaging-related functions, e.g. gamma-correction or even simply changing the user-viewing angle relative to the LCD monitor, are performed. The proposed scheme outperforms existing invisible watermarking methods in its capability to practically convey metadata to users of legacy display devices lacking renewal capability. On the other hand, it does not suffer from the annoying quality-degradation problem of visible watermarking schemes. Limitations and possible extensions of the proposed schemes are also addressed. We believe that many interesting new applications can be facilitated using such unseen visible watermarking schemes.


Proceedings of SPIE | 2001

Inpainting attacks against visible watermarking schemes

Chun-Hsiang Huang; Ja-Ling Wu

Visible watermarking schemes are common IPR protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data are supposed to exist. The embedded pattern of a useful visible watermarking scheme should be difficult or impossible to be removed unless exhaustive and expensive labors are involved. In this paper, we propose a general attacking scheme against current visible image watermarking techniques.


asilomar conference on signals, systems and computers | 2000

A blind watermarking algorithm with semantic meaningful watermarks

Chun-Hsiang Huang; Ja-Ling Wu; Ding-Yun Chen

Watermarking techniques that need no original information during watermark detection, the so-called blind (public) watermarking, are more desirable than others for practical usage and convenience in watermark extraction. We convert a non-blind (private) image watermarking algorithm into a blind one by carefully removing and changing some function units of the original approach. As compared to the original algorithm, these modifications result in little quality degradation but do extend the practical usage of it. As an example, we applied the revised watermarking algorithm to a panorama picture construction tool, the VideoVR system, in which only blind watermarking algorithms can be used. The experimental results show that almost no perceptible distortions are found in the embedded pictures, and the retrieved watermarks can clearly indicate the ownership of the system constructor.


IEEE Photonics Journal | 2012

Direct Side Pumping of Double-Clad Fiber Laser by Laser Diode Array Through the Use of Subwavelength Grating Coupler

Chun-Hsiang Huang; Chia-Kai Chang; Dong-Yo Jheng; Kuo-Jen Hsu; Sheng-Lung Huang; Ding-Wei Huang

An electron-beam-fabricated subwavelength grating coupler for direct side coupling of light emission from a high-power laser diode array (LDA) was studied theoretically and implemented experimentally. A gold-embedded silica-based design for grating coupler was employed to minimize the thermal expansion caused by the accumulated heat from light absorption by metal part of the grating coupler. In addition, with the consideration of the backward diffraction loss and the groove wall nonverticality caused by fabrication distortion, the grating pitch and groove width were optimized for the highest coupling efficiency. According to the experimental results, the grating coupler is capable of coupling light power up to 21 W from a 976-nm continuous-wave-operated LDA into the inner clad of a 400-μm-diameter double-clad fiber with an overall coupling efficiency of 50%. Furthermore, an LDA side-pumped ytterbium-doped DCF laser by using the grating coupler was demonstrated. By fine tuning the slow-axis collimation lens array, the laser-pumping scheme can easily be switched between bidirectional pumping and unidirectional pumping. Compared with the unidirectionally pumped fiber laser of the same gain fiber length, the laser slope efficiency of the bidirectionally pumped fiber laser was increased by 18% because of a better gain distribution over the fiber length. Finally, the signal output power of 10 W with a slope efficiency of 61% was achieved for the bidirectional side-pumped fiber laser.

Collaboration


Dive into the Chun-Hsiang Huang's collaboration.

Top Co-Authors

Avatar

Ja-Ling Wu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Shang-Chih Chuang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Sheng-Lung Huang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chia-Kai Chang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chih-Chieh Liu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Ding-Wei Huang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Ding-Yun Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Dong-Yo Jheng

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Kuo-Jen Hsu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Po-Wei Chen

National Taiwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge