簡易檢索 / 詳目顯示

研究生: 裴哈利
Heri - Prasetyo
論文名稱: In-depth Exploration on Image Features and Characteristics Modeling and Excavating for Various Applications
In-depth Exploration on Image Features and Characteristics Modeling and Excavating for Various Applications
指導教授: 郭景明
Jing-Ming Guo
口試委員: 王乃堅
Nai-Jian Wang
李宗南
Chung-Nan Lee
范國清
Kuo-Chin Fan
貝蘇章
Soo-Chang Pei
蔡文祥
Wen-Hsiang Tsai
鍾國亮
Kuo-Liang Chung
蘇順豐
Shun-Feng Su
學位類別: 博士
Doctor
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2015
畢業學年度: 103
語文別: 英文
論文頁數: 276
外文關鍵詞: halftoning-based BTC, vehicle verification
相關次數: 點閱:191下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • This dissertation presents some techniques on image feature excavating and image characteristic modeling for several applications. The image feature can be simply constructed and generated by considering the underlying statistical property of an image as well as image content and characteristic. Based on this premise, four various research topics are included: 1) Singular Value Decomposition (SVD)-based image watermarking, 2) statistical-based vehicle verification, 3) image retrieval using halftoning-based Block Truncation Coding (BTC), and 4) halftoning-based BTC image restoration. Among these, the vehicle verification employs the statistical modeling of an image to generate an image feature descriptor, and the other methods extract the image feature descriptor by considering the image content and characteristics.
    Some security attacks and ambiguity issues on the SVD-based image watermarking are explored and discussed in this dissertation. These attacks are delivered with the demonstration on the former published SVD-based image watermarking scheme, and the solutions are provided in this dissertation. Some methods with the statistical modeling on feature descriptor generation are also presented in this dissertation for the vehicle verification task. An effective approach is presented in this dissertation to generate the image descriptor from the halftoning-based BTC compressed data stream for image retrieval and classification. An additional approach on image restoration of halftoning-based BTC is also presented in this dissertation. The performance of the proposed feature descriptors are extensively investigated and tested for their suitability on the image watermarking, vehicle verification, image retrieval, and image restoration applications. As documented in the experimental results. The proposed methods can be effectively applied to these domains, and thus they can be very competitive candidates to the practical usages.

    Acknowledgements iii Abstract iv Contents v List of Figures ix List of Tables xiii Chapter 1. Introduction 1 1.1. Motivation 1 1.2. Contribution 5 1.3. Organization 12 Chapter 2. Image Characteristic Excavating on Watermarking Application 14 2.1. Prior Works on SVD-based Image Watermarking 17 2.2. Singular Value Decomposition 20 2.2.1. Singular Value Decomposition 20 2.2.2. Shuffled Singular Value Decomposition 22 2.2.3. Generalized Singular Value Decomposition 24 2.2.4. Principal Component 25 2.3. Inserting Whole Image into Host Image 27 2.3.1. SVD-Based Image Watermarking on Redundant Discrete Wavelet Transform 28 2.3.2. Watermark Embedding on RDWT-SVD Image Watermarking 29 2.3.3. Watermark Extraction on RDWT-SVD Image Watermarking 32 2.3.4. Security Attack I on RDWT-SVD Image Watermarking 38 2.3.5. Security Attack II on RDWT-SVD Image Watermarking 42 2.3.6. Security Attack III on RDWT-SVD Image Watermarking 47 2.3.7. Analysis of RDWT-SVD Image Watermarking 53 2.3.8. Secure RDWT-SVD Image Watermarking 56 2.3.9. Watermark Embedding on S-RDWT-SVD Image Watermarking 56 2.3.10. Watermark Extraction on S-RDWT-SVD Image Watermarking 59 2.3.11. Performance Evaluation of S-RDWT-SVD Image Watermarking 61 2.3.12. Security Attacks on S-RDWT-SVD Image Watermarking 64 2.4. Inserting Singular Value Matrix of Watermark into Host Image 69 2.4.1. SVD-Based Image Watermarking on Discrete Wavelet Transform 70 2.4.2. Security Attacks on DWT-SVD Image Watermarking 74 2.4.3. Security Analysis of SVD-DWT Image Watermarking 76 2.4.4. False-Positive-Free SVD Image Watermarking 79 2.4.5. Watermark Embedding on FPF-SVD Image Watermarking 80 2.4.6. Watermark Extraction on FPF-SVD Image Watermarking 83 2.4.7. Performance Evaluation of FPF-SVD Image Watermarking 85 2.4.8. Security Attacks on FPF-SVD Image Watermarking 91 2.5. GSVD-Based Image Watermarking 93 2.5.1. GSVD-Based Image Watermarking 93 2.5.2. Security Attacks on GSVD Image Watermarking 96 2.5.3. False-Positive-Free GSVD Image Watermarking 99 2.5.4. Watermark Embedding of FPF-GSVD Image Watermarking 99 2.5.5. Watermark Extraction of FPF-GSVD Image Watermarking 103 2.5.6. Performance Evaluation of FPF-GSVD Image Watermarking 105 2.5.7. Security Attack on FPF-GSVD Image Watermarking 109 2.6. Preliminary Summaries 111 Chapter 3. Image Feature Modeling on Vehicle Verification Application 118 3.1. Introduction and Prior Works 121 3.2. Gabor Filter and Curvelet Transform 123 3.3. Maximum Likelihood Estimation 127 3.3.1. Under Gamma Distribution Assumption 128 3.3.2. Under Gaussian Distribution Assumption 130 3.3.3. Under Laplace Distribution Assumption 132 3.3.4. Under Generalized Gaussian Distribution Assumption 133 3.3.5. Statistical Goodness-of-Fit 135 3.4. Vehicle Verification 138 3.4.1. Gamma Feature Descriptor 139 3.4.2. Gaussian, Laplace, and Generalized Gaussian Feature Descriptor 140 3.5. Experimental Result 142 3.5.1. Effectiveness of Gamma Feature Descriptor 144 3.5.2. Effectiveness of Gaussian Feature Descriptor 144 3.5.3. Effectiveness of Laplace Feature Descriptor 145 3.5.4. Effectiveness of Generalized Gaussian Distribution Feature Descriptor 146 3.5.5. Performance Comparison 147 3.6. Preliminary Summary 150 Chapter 4. Image Characteristic Excavating on Retrieval Application 152 4.1. Introduction and Prior Works 155 4.2. Halftoning-Based Block Truncation Coding for Color Image 157 4.2.1. Bitmap Image Generation for ODBTC 157 4.2.2. Bitmap Image Generation for EDBTC 160 4.2.3. Bitmap Image Generation for DDBTC 161 4.2.4. Color Quantizer Determination 165 4.2.5. Halftoning-Based BTC Image Decoding 165 4.3. Image Feature from Color Quantizer 167 4.3.1. Color Co-occurrence 1 167 4.3.2. Color Co-occurrence 2 170 4.3.3. Color Histogram Feature 174 4.4. Image Feature from Bitmap Image 177 4.5. Image Retrieval Using Halftoning-Based BTC Feature 179 4.5.1. Similarity Distance Computation Using ODBTC Feature 1 180 4.5.2. Similarity Distance Computation Using ODBTC Feature 2 183 4.5.3. Similarity Distance Computation Using EDBTC Feature 184 4.5.4. Similarity Distance Computation Using DDBTC Feature 184 4.6. Performance Evaluation 185 4.7. Experimental Result Using ODBTC Feature 1 186 4.8. Experimental Result Using ODBTC Feature 2 195 4.9. Experimental Result Using EDBTC Feature 200 4.10. Experimental Result Using DDBTC Feature 205 4.11. Preliminary Summary 214 Chapter 5. Image Characteristic Excavating on Restoration Application 218 5.1. Introduction and Prior Works 220 5.1.1. Halftoning-Based Block Truncation Coding for Grayscale Image 223 5.1.2. Lowpass Filtering Image Restoration 226 5.1.3. Variance Classified Image Restoration 227 5.2. Halftoning-Based BTC Image Restoration 228 5.2.1. Vector Quantization-Based Image Restoration 229 5.2.2. Sparsity-Based Image Restoration 231 5.2.3. Adding Border Constraint on VQ-Based Image Restoration 233 5.2.4. Adding Border Constraint on Sparsity-Based Image Restoration 236 5.3. Experimental Result 240 5.4. Preliminary Summary 246 Chapter 6. Conclusions and Future Works 249 References 255

    [1] Jing-Ming Guo, Heri Prasetyo, and Nai-Jian Wang “Effective image retrieval system using dot-diffused block truncation coding features,” IEEE Transaction on Multimedia, 2015. DOI:10.1109/TMM.2015.2449234.
    [2] Jing-Ming Guo, and Heri Prasetyo, “Content-based image retrieval using feature extracted from halftoning-based block truncation coding,” IEEE Transactions on Image Processing, vol. 24, no. 3, pp. 1010-1024, March 2015.
    [3] Jing-Ming Guo, Heri Prasetyo, and Jen-Ho Chen, “Content-based image retrieval using error diffusion block truncation coding features,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 3, pp. 466-481, March 2015.
    [4] Jing-Ming Guo, Heri Prasetyo, Mahmoud E. Farfoura, and Hua Lee, “Vehicle verification using features from curvelet transform and generalized Gaussian distribution modelling,” IEEE Transactions on Intelligent Transportation Systems, 2015. DOI: 10.1109/TITS.2014.2386535.
    [5] Jing-Ming Guo, and Heri Prasetyo, “Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, Sep. 2014.
    [6] Jing-Ming Guo, and Heri Prasetyo, “False-positive-free SVD-based image watermarking,” Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1149-1163, Jul. 2014.
    [7] Jing-Ming Guo, Heri Prasetyo, and KokSheik Wong, “Vehicle verification using Gabor Filter Magnitude with Gamma distribution modeling,” IEEE Signal Processing Letters, vol. 21, no. 5, pp. 600-604, May 2014.
    [8] Jing-Ming Guo, Heri Prasetyo, and Huai-Sheng Su, “Image indexing using the color and bit pattern feature fusion,” Journal of Visual Communication and Image Representation, vol. 24, no. 8, pp. 1360-1379, Nov. 2013.
    [9] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, 1997.
    [10] A. Ranade, S. S. Mahabalarao, and S. Kale, “A variation on SVD based image compression,” Image and Vision Computing, vol. 25., no. 6, pp. 771-777, 2007.
    [11] R. Z. Liu, T. N. Tan. “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121-128, 2002.
    [12] X. P. Zhang, K. Li. “Comments on an SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 7, no. 3, pp. 593-594, 2005.
    [13] R. Rykaczewski. “Comments on SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 9, no. 2, pp. 421-423, 2007.
    [14] X. Changzhen, G. Fenhong, L. Zhengxi. “Weakness analysis of singular value based watermarking,” Int. Conf. Mechantronics and Automation, pp. 2596-2601, 2009.
    [15] X. Changzhen, R. K. Ward, J. Xu. “On the security of singular value based watermarking,” IEEE Int. Conf. Image Proc., pp. 437-440, 2008.
    [16] R. A. Sadek. “Blind synthesis attack on SVD based watermarking techniques,” Int. Conf. Computational Intelligence for Modeling Control and Automation, pp. 140-145, 2008.
    [17] J. M. Guo, and H. Prasetyo, “Security attack on the wavelet transform and singular value decomposition image watermarking,” IEEE Int. Symp. Cons. Electron., pp. 217-218, 2013.
    [18] C. Jain, S. Arora, and P.K. Panigrahi, “A reliable SVD based watermarking scheme,” 2008, http:// adsabs.harvard.edu/abs/2008arXiv0808.0309J.
    [19] N. M. Makbol, B. E. Khoo. “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-Int. J. Electron. Commun., vol. 67, no.2, pp. 102-112, 2013.
    [20] V. Aslantas. “A singular-value decomposition-based image watermarking using genetic algorithm,” AEU-Int. J. Electron. Commun., vol. 62, no. 5,pp. 386-394, 2008.
    [21] O. S. Faragallah. “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU-Int. J. Electron. Commun., vol. 67, no. 3, pp. 189-196, 2013.
    [22] C. C. Lai. “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,” Digital Signal Processing, vol. 21, no. 4,pp. 522-527, 2011.
    [23] C. C. Lai, C. C. Tsai. “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Trans. Inst. Measure., vol. 59, no. 11, pp. 3060-3063, 2010.
    [24] V. Aslantas. “An optimal robust digital image watermarking based on SVD using differential evolution algorithm,” Optics Communications, vol. 282, no. 5, pp. 769-777, 2009.
    [25] S. Dogan, T. Tuncer, E. Avci, A. Gulten. “A robust color image watermarking with singular value decomposition method,” Advances in Engineering Software, vol. 42, no. 6, pp. 336-346, 2011.
    [26] W. Al-Nuaimyet. al. “An SVD audio watermarking approach using chaotic encrypted images,” Digital Signal Processing, vol. 21,pp. 764-779, 2011.
    [27] M. Ali, C. W. Ahn, and M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik - Int. J. Light Electron. Opt., 2013, http://dx.doi.org/10.1016/j.ijleo.2013.06.082.
    [28] M. Ali, C. W. Ahn, and P. Siarry, “Differential evolution algorithm for the selection of optimal scaling factors in image watermarking,” Eng. Appl. Artif. Intel., 2013, http://dx.doi.org/10.1016/j.engappai.2013.07.009.
    [29] S. Rastegar, F. Namazi, K. Yaghmaie, A. Aliabadian. “Hybrid watermarking based on singular value decomposition and Radon transform,” AEU-Int. J. Electron. Commun., vol. 65, no. 7, pp. 658-663, 2011.
    [30] E. Ganic, A. M. Eskicioglu. “Robust Embedding of Visual Watermarks using DWT-SVD,” J. Electron. Imaging, vol. 14, no. 4, pp. 043004, 2005.
    [31] G. Bhatnagar. “A new facet in robust digital watermarking framework,” AEU-Int. J. Electron. Commun., vol. 66, no. 4, pp. 275-285, 2012.
    [32] G. Bhatnagar, Q. M. J. Wu. “Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform,” Future Generation Computer Systems, vol. 29, no. 1, pp. 182-195, 2013.
    [33] C. Song, S. Sudirman, M. Merabti. “A robust region-adaptive dual image watermarking technique,” J. Visual Comm. and Image Representation, vol. 23, no. 3, pp. 549-568, 2012.
    [34] G. Bhatnagar, Q. M. J. Wu, B. Raman. “A new robust adjustable logo watermarking scheme,” Computer and Security, vol. 31, no. 1, pp. 40-58, 2012.
    [35] G. Bhatnagar, Q. M. J. Wu. “A new logo watermarking based on redundant fractional wavelet transform,” Mathematical and Computer Modeling, vol. 58, no. 1-2, pp. 204-218, 2013.
    [36] S. Lagzian, M. Soryani, M. Fathy. “Robust watermarking scheme based in RDWT-SVD: embedding data in all subbands,” Int. Symp. Artificial Inteligent and Signal Processing, pp. 48-52, 2011.
    [37] M. Ouhsain, and A. B. Hamza, “Image watermarking scheme using nonnegative matrix factorization and wavelet transform,” Expert Systems with Applications, vol. 36. no. 2, pp. 2123-2129, 2009.
    [38] G. Bhatnagar, B. Raman, and Q. M. J. Wu, “Robust watermarking using fractional wavelet packet transform,” IET Image Processing, vol. 6, no. 4, pp. 386-397, 2012.
    [39] E. Yen, and L. H. Lin, “Rubik’s cube watermarking technology for grayscale images,” Expert Systems with Applications, vol. 37, no. 6, pp. 4033-4039, 2010.
    [40] J. M. Guo and Y. F. Liu, “Hiding Multitone Watermarks in Halftone Images,” IEEE Multimedia, vol. 17, issue 1, pp. 34-43, March 2010.
    [41] J. M. Guo and Y. F. Liu, “Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding,” IEEE Trans. Image Processing, vol. 19, no. 8, pp. 2056-2069, Aug. 2010.
    [42] J. M. Guo, M. F. Wu, and Y. C. Kang, “Watermarking in conjugate ordered dither block truncation coding images,” Signal Processing, vol. 89, issue 10, pp. 1864-1882, October 2009.
    [43] J. M. Guo, “A new model-based digital halftoning and data hiding designed with LMS optimization,” IEEE Trans. Multimedia, vol. 9, no. 4, pp. 687-700, July 2007.
    [44] M. Narwaria, and W. Lin, “SVD-based quality metric for image and video using machine learning,” IEEE Trans. Syst., Man, Cybern., B, Cybern., vol. 42, no.2, pp. 347-364, 2012.
    [45] S. Yang, J. Xu, and M. H. Wang, “Onboard vehicle detection and tracking using boosted Gabor descriptor and sparse representation,” Electron. Lett., vol. 48, no. 16, Aug. 2012.
    [46] Z. Sun, G. Bebis, and R. Miller, “On-road vehicle detection: a review,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 5, pp. 694-711, May 2006.
    [47] T. S. Lee, “Image representation using 2D Gabor wavelets,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 18, no. 10, pp. 959-971, Oct. 1996.
    [48] J. Ma, and G. Plonka, “The Curvelet transform,” IEEE Signal Process. Mag., vol. 27, no. 2, pp. 118-133, 2010.
    [49] GTI Vehicle Image Database, (2011), [Online] Available: http://www.gti.ssr.upm.es/data/.
    [50] J. Arrospide, and L. Salgado, “Log-Gabor filters for image-based vehicle verification,” IEEE. Trans. Image Process., vol. 22, no. 6, pp. 2286-2295, Jun. 2013.
    [51] J. Zhou, D. Gao, and D. Zhang, “Moving vehicle detection for automatic traffic monitoring,” IEEE. Trans. Veh. Tech., vol. 56., no. 1, pp. 51-59, Jan. 2007.
    [52] N. Dalal, and B. Triggs, “Histograms of oriented gradients for human detection,” in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 1, pp. 886-893, 2005.
    [53] S. Ruping, “mySVM-Manual,” Dept. Lehrstuhl Informatik, Univ. Dortmund, Dortmund, Germany, Tech. Rep., 2000.
    [54] E. J. Delp and O. R. Mitchell, “Image coding using block truncation coding,” IEEE Trans. Commun., vol. 27, pp. 1335–1342, Sept. 1979.
    [55] V. R. Udpikar and J. P. Raina, “BTC image coding using vector quantization,” IEEE Trans Commun., vol. COMM-35, pp. 352–256, Sep. 1987.
    [56] Y. Wu and D. Coll, “BTC-VQ-DCT hybrid coding of digital images,” IEEE Trans. Commun., vol. 39, pp. 1283–1287, Sep. 1991.
    [57] Y. G. Wu and S. C. Tai, “An efficient BTC image compression technique,” IEEE Trans. Cons. Electron., vol. 44, no. 2, pp. 317–325, May 1998.
    [58] J. M. Guo, and M. F. Wu, “Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach,” IEEE Trans. Image Process., vol. 18, no. 1, pp. 211-213, Jan. 2009.
    [59] J. M. Guo, “High efficiency ordered dither block truncation with dither array LUT and its scalable coding application,” Digit. Signal Process., vol. 20, no. 1, pp. 97-110, Jan. 2010.
    [60] J. M. Guo, “Improved block truncation coding using modified error diffusion,” Electron. Lett., vol. 44, no. 7, Mar. 2008.
    [61] J. M. Guo, C. C. Su, and H. J. Kim, “Blocking effect and halftoning impulse suppression in an ED/OD BTC image with optimized texture-dependent filter sets,” Int. Conf. Syst. Scie. Engineer. (ICSSE 2011), Macau, China, pp. 593-596, Jun. 2011.
    [62] Z. Zhang, Y. Xu, J. Yang, X. Li, and D. Zhang, “A survey of sparse representation: algorithms and applications,” IEEE Access, vol. 3, pp. 490-530, 2015.

    QR CODE