Haila Wang
Orange S.A.
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Haila Wang.
Optical Engineering | 2006
Shiguo Lian; Zhongxuan Liu; Ren Zhen; Haila Wang
A commutative watermarking and encryption scheme is proposed for media data protection. In the scheme, the partial encryption algorithm is adopted to encrypt the significant part of media data, while some other part is watermarked. The commutative property brings conveniences to practical applications in secure media transmission or distribution.
international conference on image processing | 2006
Shiguo Lian; Zhongxuan Liu; Zhen Ren; Haila Wang
A secure distribution scheme is proposed for compressed videos, which is based on a compression domain watermarking algorithm. At the server end, the watermarking-based encryption algorithm is used to encrypt the compressed data stream. At the receiver end, the joint fingerprint embedding and decryption (JFD) algorithm is adopted to decrypt and fingerprint video data simultaneously. For the features of the watermarking algorithm, this scheme is easy to extract the fingerprint and detect the colluders, and is suitable for distributing compressed videos. Theoretical analysis and experimental results prove its practice.
international conference on multimedia and expo | 2007
Shiguo Lian; Zhongxuan Liu; Zhen Ren; Haila Wang
A secure video distribution scheme is proposed, which embeds a fingerprint code into the video content during decryption process. At the server side, the video content is scrambled by motion vector (MV) encryption. At the customer side, the video content is decrypted and fingerprinted simultaneously under the control of both the key and the fingerprint. For MV decryption and fingerprint embedding are both based on MV modification, they are combined into homogenous operations. Thus, it is difficult for attackers to get the clear video content from the gap between the decryption operation and the embedding operation. To counter collusion attacks, the fingerprint can be encoded with collusion-resistant codes before being embedded. Furthermore, by improving the watermarking strength, the colluded copys quality will be reduced greatly, which makes collusion attacks out of work.
advances in multimedia | 2010
Shiguo Lian; Yuan Dong; Haila Wang
In sports programs, there are many special cases making shot boundary detection difficult. Targeted for these special cases, not be considered by existing work, this paper presents a shot boundary detection scheme to detect both cuts and gradual transition efficiently. For shot detection, the algorithm is proposed to resist continuous flashes, camera occlusion or image blur that have not been considered before. For gradual transition detection, a unified method is presented to detect various transitions or special effects, together with an algorithm to reduce the false positives caused by fast camera or object motions. The cut detection and gradual transition detection are implemented serially to avoid repeated detection operations. Compared with existing typical works, the proposed scheme obtains higher correct detection rate and fast detection speed, and is more suitable for sports program analysis.
ieee internationalconference on network infrastructure and digital content | 2010
Guorui Xiao; Yuan Dong; Zhongxuan Liu; Haila Wang
In this paper a simple and practical technique for supervised TV logo detection based on support vector machines (SVMs) is shown. Specific TV logos are assumed to locate in static regions, usually four corners of one frame. Instead of sampling time averaged frames at frame level, we make use of information of shot boundary detection (SBD) to get three key-frames per shot. After extracting corners in every key-frame, we train several SVM classifiers for specific TV logos using color, edge, and key point features, and then detect logos in these regions of interest corners. At last, a two-step fusion strategy is performed to get optimum and robust performance at shot level. We tested more than 24 hours videos to detect logos of Eurosport TV station and achieved 99.98% of correct detection rate; and also more than 5 hours to detect logos of Cine Confidential, one program of Orange TV station with 99.99% of correct detection rate.
international conference on communications | 2009
Shiguo Lian; Yuan Dong; Haila Wang
Ubiquitous multimedia applications are becoming more and more popular. However, the solutions that confirm content and interaction security in these applications are still open issues because of various network convergences and device interconnections. This paper investigates a ubiquitous multimedia scheme and proposes a secure service solution. In the ubiquitous scheme, the multimedia content is encoded with scalable video coding and broadcasted via Digital Video Broadcasting for Handheld Terminals (DVB-H) to mobile terminals, the access right is transmitted by Global System for Mobile (GSM) channel, and the media content and access right can also be transmitted from mobile terminals to home TV through WiFi based Wireless Local Area Network. The proposed secure solution supports three kinds of business models by using various content encryption modes and secure interaction protocols. The solutions security is evaluated and discussed. Since few works have been done to solve this problem, this paper is expected to attract more researchers.
international conference on image processing | 2008
Zhongxuan Liu; Shiguo Lian; Yuan Dong; Haila Wang
Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.
international symposium on neural networks | 2007
Shiguo Lian; Zhongxuan Liu; Zhen Ren; Haila Wang
A secure media distribution scheme is proposed in this paper, which distributes different copy of media content to different customer in a secure manner. At the sender side, media content is encrypted with a chaotic neural network based cipher under the control of a secret key. At the receiver side, the encrypted media content is decrypted with the same cipher under the control of both a secret key and the customer information. Thus, the decrypted media copy containing customer information is slightly different from the original one. The difference can be detected and used to trace media contents illegal distribution. The schemes performances, including security, imperceptibility and robustness, are analyzed and tested. It is shown that the scheme is suitable for secure media distribution.
international conference on communications | 2010
Shiguo Lian; Xi Chen; Yuan Dong; Haila Wang
Some joint fingerprinting and decryption schemes were reported recently for secure multimedia distribution. However, most of them need to be investigated before practical applications. In this paper, the secure distribution scheme proposed by Lemma et al. is investigated and improved. Since this scheme aims to distribute multimedia content by encryption and watermarking, some important performances determine its practicability, including the perceptual security of the encryption operation, the imperceptibility of the embedded watermark and the robustness of the embedded watermark. Some flaws are found in the scheme, such as the low encryption strength, the data overflow caused by encryption/decryption and the low correlation value caused by collusion, which degrade its performances greatly. To improve the scheme, some means are proposed, including media preprocessing, media encryption based on module addition and collusion-resistant fingerprint encoding. Comparative experiments show that better performances are obtained by the improved means. The analysis method proposed in this paper can be used to investigate some other joint fingerprinting and decryption schemes.
international conference on multimedia and expo | 2008
Shiguo Lian; Zhongxuan Liu; Yuan Dong; Haila Wang
Some joint fingerprinting and decryption (JFD) schemes are recently reported. However, most of them need to be investigated before practical applications. In this paper, the audio JFD scheme proposed by Lemma et al. is investigated and evaluated. Some flaws are found in the scheme, such as the low encryption strength, the data overflow caused by encryption and the fragileness to collusion attacks. To improve the scheme, some means are proposed, such as the audio encryption without overflow and the collusion-resistant fingerprint encoding. Comparative experiments show that better performances are obtained by the improved means. The analysis method proposed in this paper can be used to investigate some other JFD schemes.