研究生: |
裴哈利 Heri - Prasetyo |
---|---|
論文名稱: |
In-depth Exploration on Image Features and Characteristics Modeling and Excavating for Various Applications In-depth Exploration on Image Features and Characteristics Modeling and Excavating for Various Applications |
指導教授: |
郭景明
Jing-Ming Guo |
口試委員: |
王乃堅
Nai-Jian Wang 李宗南 Chung-Nan Lee 范國清 Kuo-Chin Fan 貝蘇章 Soo-Chang Pei 蔡文祥 Wen-Hsiang Tsai 鍾國亮 Kuo-Liang Chung 蘇順豐 Shun-Feng Su |
學位類別: |
博士 Doctor |
系所名稱: |
電資學院 - 電機工程系 Department of Electrical Engineering |
論文出版年: | 2015 |
畢業學年度: | 103 |
語文別: | 英文 |
論文頁數: | 276 |
外文關鍵詞: | halftoning-based BTC, vehicle verification |
相關次數: | 點閱:191 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
This dissertation presents some techniques on image feature excavating and image characteristic modeling for several applications. The image feature can be simply constructed and generated by considering the underlying statistical property of an image as well as image content and characteristic. Based on this premise, four various research topics are included: 1) Singular Value Decomposition (SVD)-based image watermarking, 2) statistical-based vehicle verification, 3) image retrieval using halftoning-based Block Truncation Coding (BTC), and 4) halftoning-based BTC image restoration. Among these, the vehicle verification employs the statistical modeling of an image to generate an image feature descriptor, and the other methods extract the image feature descriptor by considering the image content and characteristics.
Some security attacks and ambiguity issues on the SVD-based image watermarking are explored and discussed in this dissertation. These attacks are delivered with the demonstration on the former published SVD-based image watermarking scheme, and the solutions are provided in this dissertation. Some methods with the statistical modeling on feature descriptor generation are also presented in this dissertation for the vehicle verification task. An effective approach is presented in this dissertation to generate the image descriptor from the halftoning-based BTC compressed data stream for image retrieval and classification. An additional approach on image restoration of halftoning-based BTC is also presented in this dissertation. The performance of the proposed feature descriptors are extensively investigated and tested for their suitability on the image watermarking, vehicle verification, image retrieval, and image restoration applications. As documented in the experimental results. The proposed methods can be effectively applied to these domains, and thus they can be very competitive candidates to the practical usages.
[1] Jing-Ming Guo, Heri Prasetyo, and Nai-Jian Wang “Effective image retrieval system using dot-diffused block truncation coding features,” IEEE Transaction on Multimedia, 2015. DOI:10.1109/TMM.2015.2449234.
[2] Jing-Ming Guo, and Heri Prasetyo, “Content-based image retrieval using feature extracted from halftoning-based block truncation coding,” IEEE Transactions on Image Processing, vol. 24, no. 3, pp. 1010-1024, March 2015.
[3] Jing-Ming Guo, Heri Prasetyo, and Jen-Ho Chen, “Content-based image retrieval using error diffusion block truncation coding features,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 3, pp. 466-481, March 2015.
[4] Jing-Ming Guo, Heri Prasetyo, Mahmoud E. Farfoura, and Hua Lee, “Vehicle verification using features from curvelet transform and generalized Gaussian distribution modelling,” IEEE Transactions on Intelligent Transportation Systems, 2015. DOI: 10.1109/TITS.2014.2386535.
[5] Jing-Ming Guo, and Heri Prasetyo, “Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, Sep. 2014.
[6] Jing-Ming Guo, and Heri Prasetyo, “False-positive-free SVD-based image watermarking,” Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1149-1163, Jul. 2014.
[7] Jing-Ming Guo, Heri Prasetyo, and KokSheik Wong, “Vehicle verification using Gabor Filter Magnitude with Gamma distribution modeling,” IEEE Signal Processing Letters, vol. 21, no. 5, pp. 600-604, May 2014.
[8] Jing-Ming Guo, Heri Prasetyo, and Huai-Sheng Su, “Image indexing using the color and bit pattern feature fusion,” Journal of Visual Communication and Image Representation, vol. 24, no. 8, pp. 1360-1379, Nov. 2013.
[9] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, 1997.
[10] A. Ranade, S. S. Mahabalarao, and S. Kale, “A variation on SVD based image compression,” Image and Vision Computing, vol. 25., no. 6, pp. 771-777, 2007.
[11] R. Z. Liu, T. N. Tan. “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121-128, 2002.
[12] X. P. Zhang, K. Li. “Comments on an SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 7, no. 3, pp. 593-594, 2005.
[13] R. Rykaczewski. “Comments on SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 9, no. 2, pp. 421-423, 2007.
[14] X. Changzhen, G. Fenhong, L. Zhengxi. “Weakness analysis of singular value based watermarking,” Int. Conf. Mechantronics and Automation, pp. 2596-2601, 2009.
[15] X. Changzhen, R. K. Ward, J. Xu. “On the security of singular value based watermarking,” IEEE Int. Conf. Image Proc., pp. 437-440, 2008.
[16] R. A. Sadek. “Blind synthesis attack on SVD based watermarking techniques,” Int. Conf. Computational Intelligence for Modeling Control and Automation, pp. 140-145, 2008.
[17] J. M. Guo, and H. Prasetyo, “Security attack on the wavelet transform and singular value decomposition image watermarking,” IEEE Int. Symp. Cons. Electron., pp. 217-218, 2013.
[18] C. Jain, S. Arora, and P.K. Panigrahi, “A reliable SVD based watermarking scheme,” 2008, http:// adsabs.harvard.edu/abs/2008arXiv0808.0309J.
[19] N. M. Makbol, B. E. Khoo. “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-Int. J. Electron. Commun., vol. 67, no.2, pp. 102-112, 2013.
[20] V. Aslantas. “A singular-value decomposition-based image watermarking using genetic algorithm,” AEU-Int. J. Electron. Commun., vol. 62, no. 5,pp. 386-394, 2008.
[21] O. S. Faragallah. “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU-Int. J. Electron. Commun., vol. 67, no. 3, pp. 189-196, 2013.
[22] C. C. Lai. “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,” Digital Signal Processing, vol. 21, no. 4,pp. 522-527, 2011.
[23] C. C. Lai, C. C. Tsai. “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Trans. Inst. Measure., vol. 59, no. 11, pp. 3060-3063, 2010.
[24] V. Aslantas. “An optimal robust digital image watermarking based on SVD using differential evolution algorithm,” Optics Communications, vol. 282, no. 5, pp. 769-777, 2009.
[25] S. Dogan, T. Tuncer, E. Avci, A. Gulten. “A robust color image watermarking with singular value decomposition method,” Advances in Engineering Software, vol. 42, no. 6, pp. 336-346, 2011.
[26] W. Al-Nuaimyet. al. “An SVD audio watermarking approach using chaotic encrypted images,” Digital Signal Processing, vol. 21,pp. 764-779, 2011.
[27] M. Ali, C. W. Ahn, and M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik - Int. J. Light Electron. Opt., 2013, http://dx.doi.org/10.1016/j.ijleo.2013.06.082.
[28] M. Ali, C. W. Ahn, and P. Siarry, “Differential evolution algorithm for the selection of optimal scaling factors in image watermarking,” Eng. Appl. Artif. Intel., 2013, http://dx.doi.org/10.1016/j.engappai.2013.07.009.
[29] S. Rastegar, F. Namazi, K. Yaghmaie, A. Aliabadian. “Hybrid watermarking based on singular value decomposition and Radon transform,” AEU-Int. J. Electron. Commun., vol. 65, no. 7, pp. 658-663, 2011.
[30] E. Ganic, A. M. Eskicioglu. “Robust Embedding of Visual Watermarks using DWT-SVD,” J. Electron. Imaging, vol. 14, no. 4, pp. 043004, 2005.
[31] G. Bhatnagar. “A new facet in robust digital watermarking framework,” AEU-Int. J. Electron. Commun., vol. 66, no. 4, pp. 275-285, 2012.
[32] G. Bhatnagar, Q. M. J. Wu. “Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform,” Future Generation Computer Systems, vol. 29, no. 1, pp. 182-195, 2013.
[33] C. Song, S. Sudirman, M. Merabti. “A robust region-adaptive dual image watermarking technique,” J. Visual Comm. and Image Representation, vol. 23, no. 3, pp. 549-568, 2012.
[34] G. Bhatnagar, Q. M. J. Wu, B. Raman. “A new robust adjustable logo watermarking scheme,” Computer and Security, vol. 31, no. 1, pp. 40-58, 2012.
[35] G. Bhatnagar, Q. M. J. Wu. “A new logo watermarking based on redundant fractional wavelet transform,” Mathematical and Computer Modeling, vol. 58, no. 1-2, pp. 204-218, 2013.
[36] S. Lagzian, M. Soryani, M. Fathy. “Robust watermarking scheme based in RDWT-SVD: embedding data in all subbands,” Int. Symp. Artificial Inteligent and Signal Processing, pp. 48-52, 2011.
[37] M. Ouhsain, and A. B. Hamza, “Image watermarking scheme using nonnegative matrix factorization and wavelet transform,” Expert Systems with Applications, vol. 36. no. 2, pp. 2123-2129, 2009.
[38] G. Bhatnagar, B. Raman, and Q. M. J. Wu, “Robust watermarking using fractional wavelet packet transform,” IET Image Processing, vol. 6, no. 4, pp. 386-397, 2012.
[39] E. Yen, and L. H. Lin, “Rubik’s cube watermarking technology for grayscale images,” Expert Systems with Applications, vol. 37, no. 6, pp. 4033-4039, 2010.
[40] J. M. Guo and Y. F. Liu, “Hiding Multitone Watermarks in Halftone Images,” IEEE Multimedia, vol. 17, issue 1, pp. 34-43, March 2010.
[41] J. M. Guo and Y. F. Liu, “Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding,” IEEE Trans. Image Processing, vol. 19, no. 8, pp. 2056-2069, Aug. 2010.
[42] J. M. Guo, M. F. Wu, and Y. C. Kang, “Watermarking in conjugate ordered dither block truncation coding images,” Signal Processing, vol. 89, issue 10, pp. 1864-1882, October 2009.
[43] J. M. Guo, “A new model-based digital halftoning and data hiding designed with LMS optimization,” IEEE Trans. Multimedia, vol. 9, no. 4, pp. 687-700, July 2007.
[44] M. Narwaria, and W. Lin, “SVD-based quality metric for image and video using machine learning,” IEEE Trans. Syst., Man, Cybern., B, Cybern., vol. 42, no.2, pp. 347-364, 2012.
[45] S. Yang, J. Xu, and M. H. Wang, “Onboard vehicle detection and tracking using boosted Gabor descriptor and sparse representation,” Electron. Lett., vol. 48, no. 16, Aug. 2012.
[46] Z. Sun, G. Bebis, and R. Miller, “On-road vehicle detection: a review,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 5, pp. 694-711, May 2006.
[47] T. S. Lee, “Image representation using 2D Gabor wavelets,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 18, no. 10, pp. 959-971, Oct. 1996.
[48] J. Ma, and G. Plonka, “The Curvelet transform,” IEEE Signal Process. Mag., vol. 27, no. 2, pp. 118-133, 2010.
[49] GTI Vehicle Image Database, (2011), [Online] Available: http://www.gti.ssr.upm.es/data/.
[50] J. Arrospide, and L. Salgado, “Log-Gabor filters for image-based vehicle verification,” IEEE. Trans. Image Process., vol. 22, no. 6, pp. 2286-2295, Jun. 2013.
[51] J. Zhou, D. Gao, and D. Zhang, “Moving vehicle detection for automatic traffic monitoring,” IEEE. Trans. Veh. Tech., vol. 56., no. 1, pp. 51-59, Jan. 2007.
[52] N. Dalal, and B. Triggs, “Histograms of oriented gradients for human detection,” in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 1, pp. 886-893, 2005.
[53] S. Ruping, “mySVM-Manual,” Dept. Lehrstuhl Informatik, Univ. Dortmund, Dortmund, Germany, Tech. Rep., 2000.
[54] E. J. Delp and O. R. Mitchell, “Image coding using block truncation coding,” IEEE Trans. Commun., vol. 27, pp. 1335–1342, Sept. 1979.
[55] V. R. Udpikar and J. P. Raina, “BTC image coding using vector quantization,” IEEE Trans Commun., vol. COMM-35, pp. 352–256, Sep. 1987.
[56] Y. Wu and D. Coll, “BTC-VQ-DCT hybrid coding of digital images,” IEEE Trans. Commun., vol. 39, pp. 1283–1287, Sep. 1991.
[57] Y. G. Wu and S. C. Tai, “An efficient BTC image compression technique,” IEEE Trans. Cons. Electron., vol. 44, no. 2, pp. 317–325, May 1998.
[58] J. M. Guo, and M. F. Wu, “Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach,” IEEE Trans. Image Process., vol. 18, no. 1, pp. 211-213, Jan. 2009.
[59] J. M. Guo, “High efficiency ordered dither block truncation with dither array LUT and its scalable coding application,” Digit. Signal Process., vol. 20, no. 1, pp. 97-110, Jan. 2010.
[60] J. M. Guo, “Improved block truncation coding using modified error diffusion,” Electron. Lett., vol. 44, no. 7, Mar. 2008.
[61] J. M. Guo, C. C. Su, and H. J. Kim, “Blocking effect and halftoning impulse suppression in an ED/OD BTC image with optimized texture-dependent filter sets,” Int. Conf. Syst. Scie. Engineer. (ICSSE 2011), Macau, China, pp. 593-596, Jun. 2011.
[62] Z. Zhang, Y. Xu, J. Yang, X. Li, and D. Zhang, “A survey of sparse representation: algorithms and applications,” IEEE Access, vol. 3, pp. 490-530, 2015.