Tzong-Wann Kao
National Taiwan University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Tzong-Wann Kao.
Expert Systems With Applications | 2011
Shi-Jinn Horng; Ming-Yang Su; Yuan-Hsin Chen; Tzong-Wann Kao; Rong-Jian Chen; Jui-Lin Lai; Citra Dwi Perkasa
This study proposed an SVM-based intrusion detection system, which combines a hierarchical clustering algorithm, a simple feature selection procedure, and the SVM technique. The hierarchical clustering algorithm provided the SVM with fewer, abstracted, and higher-qualified training instances that are derived from the KDD Cup 1999 training set. It was able to greatly shorten the training time, but also improve the performance of resultant SVM. The simple feature selection procedure was applied to eliminate unimportant features from the training set so the obtained SVM model could classify the network traffic data more accurately. The famous KDD Cup 1999 dataset was used to evaluate the proposed system. Compared with other intrusion detection systems that are based on the same dataset, this system showed better performance in the detection of DoS and Probe attacks, and the beset performance in overall accuracy.
IEEE Transactions on Multimedia | 2008
Wei-Hung Lin; Shi-Jinn Horng; Tzong-Wann Kao; Pingzhi Fan; Cheng-Ling Lee; Yi Pan
This paper proposes a blind watermarking algorithm based on the significant difference of wavelet coefficient quantization for copyright protection. Every seven nonoverlap wavelet coefficients of the host image are grouped into a block. The largest two coefficients in a block are called significant coefficients in this paper and their difference is called significant difference. We quantized the local maximum wavelet coefficient in a block by comparing the significant difference value in a block with the average significant difference value in all blocks. The maximum wavelet coefficients are so quantized that their significant difference between watermark bit 0 and watermark bit 1 exhibits a large energy difference which can be used for watermark extraction. During the extraction, an adaptive threshold value is designed to extract the watermark from the watermarked image under different attacks. We compare the adaptive threshold value to the significant difference which was quantized in a block to determine the watermark bit. The experimental results show that the proposed method is quite effective against JPEG compression, low-pass filtering, and Gaussian noise; the PSNR value of a watermarked image is greater than 40 dB.
Expert Systems With Applications | 2009
I-Hong Kuo; Shi-Jinn Horng; Tzong-Wann Kao; Tsung-Lieh Lin; Cheng-Ling Lee; Yi Pan
Many forecasting models based on the concept of fuzzy time series have been proposed in the past decades. Two main factors, which are the lengths of intervals and the content of forecast rules, impact the forecasted accuracy of the models. How to find the proper content of the main factors to improve the forecasted accuracy has become an interesting research topic. Some forecasting models, which combined heuristic methods or evolutionary algorithms (such as genetic algorithms and simulated annealing) with the fuzzy time series, have been proposed but their results are not satisfied. In this paper, we use the particle swarm optimization to find the proper content of the main factors. A new hybrid forecasting model which combined particle swarm optimization with fuzzy time series is proposed to improve the forecasted accuracy. The experimental results of forecasting enrollments of students of the University of Alabama show that the new model is better than any existing models, and it can get better quality solutions based on the first-order and the high-order fuzzy time series, respectively.
Expert Systems With Applications | 2009
Wei-Hung Lin; Yuh-Rau Wang; Shi-Jinn Horng; Tzong-Wann Kao; Yi Pan
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.
Expert Systems With Applications | 2009
I-Hong Kuo; Shi-Jinn Horng; Tzong-Wann Kao; Tsung-Lieh Lin; Cheng-Ling Lee; Takao Terano; Yi Pan
In this paper, a new hybrid particle swarm optimization model named HPSO that combines random-key (RK) encoding scheme, individual enhancement (IE) scheme, and particle swarm optimization (PSO) is presented and used to solve the flow-shop scheduling problem (FSSP). The objective of FSSP is to find an appropriate sequence of jobs in order to minimize makespan. Makespan means the maximum completion time of a sequence of jobs running on the same machines in flow-shops. By the RK encoding scheme, we can exploit the global search ability of PSO thoroughly. By the IE scheme, we can enhance the local search ability of particles. The experimental results show that the solution quality of FSSP based on the proposed HPSO is far better than those based on GA [Lian, Z., Gu, X., & Jiao, B. (2008). A novel particle swarm optimization algorithm for permutation flow-shop scheduling to minimize makespan. Chaos, Solitons and Fractals, 35, 851-861.] and NPSO [Lian, Z., Gu, X., & Jiao, B. (2008). A novel particle swarm optimization algorithm for permutation flow-shop scheduling to minimize makespan. Chaos, Solitons and Fractals, 35, 851-861.], respectively.
Expert Systems With Applications | 2010
Ling-Yuan Hsu; Shi-Jinn Horng; Tzong-Wann Kao; Yuan-Hsin Chen; Ray-Shine Run; Rong-Jian Chen; Jui-Lin Lai; I-Hong Kuo
In this paper, we proposed a modified turbulent particle swarm optimization (named MTPSO) method for the temperature prediction and the Taiwan Futures Exchange (TAIFEX) forecasting, based on the two-factor fuzzy time series and particle swarm optimization. The MTPSO model can be dealt with two main factors easily and accurately, which are the lengths of intervals and the content of forecast rules. The experimental results of the temperature prediction and the TAIFEX forecasting show that the proposed model is better than any existing models and it can get better quality solutions based on the high-order fuzzy time series, respectively.
Computer Vision and Image Understanding | 1997
Yu-Hua Lee; Shi-Jinn Horng; Tzong-Wann Kao; Yuung-Jih Chen
Abstract Thestance transformis an operation that converts an image consisting of black and white pixels to an image where each pixel has a value or coordinate that represents the distance or location to the nearest black pixel. It is a basic operation in image processing and computer vision fields, used for expanding, shrinking, thinning, segmentation, clustering, computing shape, object reconstruction, etc. There are manyapproximateEuclidean distance transform algorithms in the literature, but finding the distance transform with respect to the Euclidean metric is rather time consuming. So, it is important to increase the computing speed. The parallel algorithms discussed are for the computation of exactEuclidean distance transformfor all pixels with respect to black pixels in anN×Nbinary image. The object of this paper is to develop the time-optimal algorithms.O(logN) time-optimal algorithms are proposed for both mesh of trees and hypercube computer. The number of processors used to solve this problem for the former isN×N×N/logNand that for the latter isN2.5, respectively. A generalized algorithm is also proposed for a reduced three-dimensional mesh of trees and it can be computed inO(mlogN) time usingN×N×N/mlogNprocessors, wheremis a constant and 1 ≤m≤ N /logN. Compared to the previous result, the time complexity of the generalized algorithm is inversely proportional to the number of processors used by a factor ofmtimes.
Expert Systems With Applications | 2011
Yao-Lin Huang; Shi-Jinn Horng; Mingxing He; Pingzhi Fan; Tzong-Wann Kao; Muhammad Khurram Khan; Jui-Lin Lai; I-Hong Kuo
In this paper, a new forecasting model based on two computational methods, fuzzy time series and particle swarm optimization, is presented for academic enrollments. Most of fuzzy time series forecasting methods are based on modeling the global nature of the series behavior in the past data. To improve forecasting accuracy of fuzzy time series, the global information of fuzzy logical relationships is aggregated with the local information of latest fuzzy fluctuation to find the forecasting value in fuzzy time series. After that, a new forecasting model based on fuzzy time series and particle swarm optimization is developed to adjust the lengths of intervals in the universe of discourse. From the empirical study of forecasting enrollments of students of the University of Alabama, the experimental results show that the proposed model gets lower forecasting errors than those of other existing models including both training and testing phases.
Expert Systems With Applications | 2010
Tsung-Lieh Lin; Shi-Jinn Horng; Kai-Hui Lee; Pei-Ling Chiu; Tzong-Wann Kao; Yuan-Hsin Chen; Ray-Shine Run; Jui-Lin Lai; Rong-Jian Chen
The main concept of the original visual secret sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be revealed by printing the share images on transparencies and stacking the transparencies directly, so that the human visual system can recognize the shared secret image without using any devices. The visual secrets sharing scheme for multiple secrets (called VSSM scheme) is intended to encrypt more than one secret image into the same quantity of share images to increase the encryption capacity compared with the original VSS scheme. However, all presented VSSM schemes utilize a pre-defined pattern book with pixel expansion to encrypt secret images into share images. In general, it leads to at least 2x times pixel expansion on the share images by any one of the VSSM schemes. Thus, the pixel expansion problem becomes more serious for sharing multiple secrets. This is neither a practical nor the best solution for increasing the number of secret sharing images. In this paper, we propose a novel VSSM scheme that can share two binary secret images on two rectangular share images with no pixel expansion. The experimental results show that the proposed approach not only has no pixel expansion, but also has an excellent recovery quality for the secret images. As our best knowledge, this is the first approach that can share multiple visual secret images without pixel expansion.
Expert Systems With Applications | 2009
Wei-Hung Lin; Shi-Jinn Horng; Tzong-Wann Kao; Rong-Jian Chen; Yuan-Hsin Chen; Cheng-Ling Lee; Takao Terano
A copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed in this paper. In this method, the original image is lossless and the watermark is robust to malicious attacks including geometric attacks such as scaling, rotation, cropping, print-photocopy-scan, and scaling-cropping attacks and nongeometric attacks such as low-pass filtering, sharpening, JPEG compression attacks. The watermark logo is fused with noise bits to improve the security, and later XORed with the feature value of the image by 1/T rate FEC. During extraction, the watermark bits are determined by majority voting, and the extraction procedure needs neither the original image nor the watermark logo. Experimental results show that not only the image is lossless but also the proposed method can effectively resist the common malicious attacks. Since the proposed method is based on spatial domain and there is no need to do frequency transform, the embedding and extraction performances are quite improved.