Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chun-Shien Lu is active.

Publication


Featured researches published by Chun-Shien Lu.


IEEE Transactions on Image Processing | 2001

Multipurpose watermarking for image authentication and protection

Chun-Shien Lu; Hong-Yuan Mark Liao

We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host images wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are embedded using cocktail watermarking and they can be blindly extracted without access to the host image. For the purpose of image protection, the new scheme guarantees that, no matter what kind of attack is encountered, at least one watermark can survive well. On the other hand, for the purpose of image authentication, our approach can locate the part of the image that has been tampered with and tolerate some incidental processes that have been executed. Experimental results show that the performance of our multipurpose watermarking scheme is indeed superb in terms of robustness and fragility.


international conference on acoustics, speech, and signal processing | 2009

Distributed compressive video sensing

Li-Wei Kang; Chun-Shien Lu

Low-complexity video encoding has been applicable to several emerging applications. Recently, distributed video coding (DVC) has been proposed to reduce encoding complexity to the order of that for still image encoding. In addition, compressive sensing (CS) has been applicable to directly capture compressed image data efficiently. In this paper, by integrating the respective characteristics of DVC and CS, a distributed compressive video sensing (DCVS) framework is proposed to simultaneously capture and compress video data, where almost all computation burdens can be shifted to the decoder, resulting in a very low-complexity encoder. At the decoder, compressed video can be efficiently reconstructed using the modified GPSR (gradient projection for sparse reconstruction) algorithm. With the assistance of the proposed initialization and stopping criteria for GRSR, derived from statistical dependencies among successive video frames, our modified GPSR algorithm can terminate faster and reconstruct better video quality. The performance of our DCVS method is demonstrated via simulations to outperform three known CS reconstruction algorithms.


Pattern Recognition | 1997

Unsupervised texture segmentation via wavelet transform

Chun-Shien Lu; Pau-Choo Chung; Chih F. Chen

Abstract In this paper, a mechanism for unsupervised texture segmentation is presented. The approach is based on the multiscale representation of the discrete (dyadic) wavelet transform which can be implemented by a fast iterative algorithm. For unsupervised segmentation it is generally difficult to determine the number of classes to be identified. The proposed approach offers an approach to circumvent this problem. Our method utilizes a set of high-frequency channel energies to characterize texture features, followed by a multi-thresholding technique for coarse segmentation. The coarsely segmented results at the same scale are incorporated by an intea-scale fusion procedure. A fine segmentation technique is then used to reclassify the ambiguously labeled pixels generated from the intea-scale fusion step. Finally, the number of texture classes is determined by an inter-scale fusion in which the segmentation results at multiple scales are integrated. The performance of this method is demonstrated by several experiments on synthetic images, natural textures from Brodatzs album and real-world textured images. Since the choice of wavelets is very extensive and open, we further explore various types of wavelets for texture segmentation. The time cost of the proposed method is also measured.


Archive | 2004

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property

Chun-Shien Lu

This work explores the myriad of issues regarding multimedia security. It covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, and error detection (authentication) and concealment.


information hiding | 1999

Cocktail Watermarking on Images

Chun-Shien Lu; Hong-Yuan Mark Liao; Shih-Kun Huang; Chwen-Jye Sze

A novel image protection scheme named “cocktail watermarking” improves over current spread-spectrum watermarking approaches. Two watermarks, which play complementary roles, are simultaneously embedded into an original image. The new watermarking scheme has the characteristic that, no matter what an attack is, at least one watermark typically survives well and can be detected. Results of extensive experiments indicate that our cocktail watermarking scheme is effective in resisting various attacks.


IEEE Transactions on Image Processing | 2012

Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT

Chao-Yung Hsu; Chun-Shien Lu; Soo-Chang Pei

Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preserving SIFT (PPSIFT) and to address the problem of secure SIFT feature extraction and representation in the encrypted domain. As all of the operations in SIFT must be moved to the encrypted domain, we propose a privacy-preserving realization of the SIFT method based on homomorphic encryption. We show through the security analysis based on the discrete logarithm problem and RSA that PPSIFT is secure against ciphertext only attack and known plaintext attack. Experimental results obtained from different case studies demonstrate that the proposed homomorphic encryption-based privacy-preserving SIFT performs comparably to the original SIFT and that our method is useful in SIFT-based privacy-preserving applications.


Multimedia Systems | 2005

Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication

Chun-Shien Lu; Chao Yong Hsu

Media hashing is an alternative approach to many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their limited resistance to geometric attacks. In this paper, a novel geometric distortion-invariant image hashing scheme, which can be employed to perform copy detection and content authentication of digital images, is proposed. Our major contributions are threefold: (i) a mesh-based robust hashing function is proposed; (ii) a sophisticated hash database for error-resilient and fast matching is constructed; and (iii) the application scalability of our scheme for content copy tracing and authentication is studied. In addition, we further investigate several media hashing issues, including robustness and discrimination, error analysis, and complexity, with respect to the proposed image hashing system. Exhaustive experimental results obtained from benchmark attacks confirm the excellent performance of the proposed method.


Optical Engineering | 2001

Mean-quantization-based fragile watermarking for image authentication

Gwo-Jong Yu; Chun-Shien Lu; Hong-Yuan Mark Liao

The authors propose an image authentication scheme, which is able to detect malicious tampering while tolerating some incidental distortions. By modeling the magnitude changes caused by incidental distortion and malicious tampering as Gaussian distributions with small and large variances, respectively, they propose to embed a watermark by using a mean-quantization technique in the wavelet domain. The pro- posed scheme is superior to the conventional quantization-based ap- proaches in credibility of authentication. Statistical analysis is conducted to show that the probabilities of watermark errors caused by malicious tampering and incidental distortion will be, respectively, maximized and minimized when the new scheme is applied. Experimental results dem- onstrate that the credibility of the method is superior to that of the con- ventional quantization-based methods under malicious attack followed by an incidental modification, such as JPEG compression, sharpening or blurring.


international conference on pattern recognition | 2000

Multipurpose audio watermarking

Chun-Shien Lu; Hong-Yuan Mark Liao; Liang-Hua Chen

An audio protection and authentication scheme is proposed. By quantizing a host audios FFT-coefficients as masking threshold units (MTUs), two complementary watermarks are designed and embedded using our cocktail watermarking method. For audio protection, high robustness can be achieved; whereas for audio authentication, tampered regions can be detected. Both of the above mentioned goals are accomplished in an oblivious manner. Experimental results indicate that our multipurpose audio watermarking scheme is remarkably effective.


IEEE Transactions on Multimedia | 2005

Fragile watermarking for authenticating 3-D polygonal meshes

Hsueh-Yi Sean Lin; Hong-Yuan Mark Liao; Chun-Shien Lu; Ja-Chen Lin

Designing a powerful fragile watermarking technique for authenticating three-dimensional (3-D) polygonal meshes is a very difficult task. Yeo and Yeung were first to propose a fragile watermarking method to perform authentication of 3-D polygonal meshes. Although their method can authenticate the integrity of 3-D polygonal meshes, it cannot be used for localization of changes. In addition, it is unable to distinguish malicious attacks from incidental data processings. In this paper, we trade off the causality problem in Yeo and Yeungs method for a new fragile watermarking scheme. The proposed scheme can not only achieve localization of malicious modifications in visual inspection, but also is immune to certain incidental data processings (such as quantization of vertex coordinates and vertex reordering). During the process of watermark embedding, a local mesh parameterization approach is employed to perturb the coordinates of invalid vertices while cautiously maintaining the visual appearance of the original model. Since the proposed embedding method is independent of the order of vertices, the hidden watermark is immune to some attacks, such as vertex reordering. In addition, the proposed method can be used to perform region-based tampering detection. The experimental results have shown that the proposed fragile watermarking scheme is indeed powerful.

Collaboration


Dive into the Chun-Shien Lu's collaboration.

Top Co-Authors

Avatar

Soo-Chang Pei

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sy-Yen Kuo

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chia-Mu Yu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Li-Wei Kang

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pao-Chi Chang

National Central University

View shared research outputs
Top Co-Authors

Avatar

Shih-Wei Sun

Taipei National University of the Arts

View shared research outputs
Researchain Logo
Decentralizing Knowledge