Yi-Chong Zeng

National Taiwan University, Taipei, Taipei, Taiwan

Are you Yi-Chong Zeng?

Claim your profile

Publications (10)5.09 Total impact

  • Yi-Chong Zeng, Soo-Chang Pei
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper proposes a novel automatic video diagnosing method. The purpose of this study is to detect the attack added on the authorized video and identify the attack category. The video is added with the crypto-watermarks using dual-domain quaternary watermarking algorithm in advance. The crypto-watermarks, which are generated using visual cryptography, have different capabilities against the various attacks. We extract the watermarks from the suspected video, measure the bit-error-rate between the extracted and specified crypto-watermarks, and then analyze bit-error-rates to determine what kind of attack added on the video. The experimental results demonstrate that the proposed method not only can identify the single attack, but it can identify the composite attack and detect the corrupted frames. Even if the video is not embedded with crypto-watermarks, we can differentiate it from the authorized videos.
    International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA; 01/2008
  • Source
    Soo-Chang Pei, Yi-Chong Zeng
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a method to localize and to recover the tampered areas in the watermarked image simultaneously. First, the proposed watermarking algorithm aims to embed a bi-watermark, which is the binary halftone of the downscaled host image, into the host image. While the watermarked image is tampered unauthorizedly, the extracted bi-watermark can be exploited to localize the tampered areas automatically without initial bi-watermark. Subsequently, Gaussian lowpass filter and quadratic programming are used to restore the bi-watermark to gray-scale image for inverse halftoning procedure. Eventually, the restored gray-scale image is used to recover the tampered areas.
    Image Processing, 2007. ICIP 2007. IEEE International Conference on; 01/2007
  • Yi-Chong Zeng, Soo-Chang Pei
    [Show abstract] [Hide abstract]
    ABSTRACT: A 2.5-domain tri-watermarking algorithm (2.5D-TW) is presented in this paper. The proposed algorithm is the integration of dual domain bi-watermarking algorithm and visual cryptography, and the embedded tri-watermark is composed of three binary watermarks. The tri-watermark is embedded into the encoded blocks in discrete cosine transform (DCT) domain, however, the tri-watermark can be extracted from the DCT blocks and the decoded frames in spatial domain. Moreover, two types of third binary watermark of the tri-watermark are developed namely the intra-watermark and inter-watermark, those binary watermarks reveal the different robustness against various attacks. The proposed method attempts to localize the tampered areas and to detect the temporal attack.
    Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China; 01/2007
  • Source
    Soo-Chang Pei, Yi-Chong Zeng
    [Show abstract] [Hide abstract]
    ABSTRACT: A novel image recovery algorithm for removing visible watermarks is presented. Independent component analysis (ICA) is utilized to separate source images from watermarked and reference images. Three independent component analysis approaches are examined in the proposed algorithm, which includes joint approximate diagonalization of eigenmatrices, second-order blind identification, and FastICA. Moreover, five different visible watermarking methods to embed uniform and linear-gradient watermarks are implemented. The experimental results show that visible watermarks are successfully removed, and that the proposed algorithm is independent of both the adopted ICA approach and the visible watermarking method. In the final experiment, several public domain images sourced from various websites are tested. The results of this study demonstrate that the proposed algorithm can blindly and successfully remove the visible watermarks without knowing the watermarking methods in advance
    IEEE Transactions on Information Forensics and Security 01/2007; · 1.90 Impact Factor
  • Yi-Chong Zeng, Soo-Chang Pei, Jian-Jiun Ding
    [Show abstract] [Hide abstract]
    ABSTRACT: A dual-domain bi-watermarking algorithm is proposed in this paper. This algorithm embeds bi-watermark in DCT domain, but bi-watermark can be extracted in both spatial and DCT domains. Therefore, it can implement on the DCT-based compressed image/frame. The dual-domain bi-watermarking algorithm is the extension of the spatial-domain bi-watermarking algorithm, which implements quantization index modulation with two quantization stepsizes. These quantization stepsizes construct the non-uniform quantization intervals. Additionally, the luminance quantization table of JPEG compression is considered in the algorithm. In the experimental result, two extracted watermarks show the capability for various compression rates, and the watermarks also reveal the different robustness against the global and the regional attacks. Index Terms—discrete cosine transform, dual-domain bi-watermarking
    Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA; 01/2006
  • Soo-Chang Pei, Yi-Chong Zeng
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a novel semi-fragile multiple-watermarking algorithm based on quantization index modulation. This algorithm utilizes two quantization steps to yield the non-uniform intervals in the real-number axis. Each interval corresponds to one binary symbol, includes stable-zero (S0), unstable-zero (U0), stable-one (S1), and unstable-one (U1). In addition, visual cryptography is integrated with the watermarking algorithm to increase the watermark capacity. Therefore, the host image is embedded the multiple watermarks, and then we extract the watermarks from the corrupted image. According to the extracted watermarks, the algorithm achieves the tamper proofing and attack identification. From the experimental result, it shows single and multiple tampered areas are detected and demonstrates that the amount of test images will not influence the accuracy of attack identification.
    Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006; 01/2006
  • Source
    Soo-Chang Pei, Yi-Chong Zeng, Jian-Jiun Ding
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a modified approach to the successive mean quantization transform, which is called as the Weighted Histogram Separation (WHS) for enhancement of color images. Property of WHS situates between the successive mean quantization transform and the histogram equalization. In addition, this approach is further applied to the local enhancement, which is similar to the adaptive histogram equalization, and it is termed as the Adaptive Weighted Histogram Separation (AWHS). A comparison with successive mean quantization transform and histogram equalization has been performed in the experiments.
    Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA; 01/2006
  • Source
    Soo-Chang Pei, Yi-Chong Zeng, Ching-Hua Chang
    [Show abstract] [Hide abstract]
    ABSTRACT: This work presents a novel algorithm using color contrast enhancement and lacuna texture synthesis is proposed for the virtual restoration of ancient Chinese paintings. Color contrast enhancement based on saturation and de-saturation is performed in the u'v'Y color space, to change the saturation value in the chromaticity diagram, and adaptive histogram equalization then is adopted to adjust the luminance component. Additionally, this work presents a new patching method using the Markov Random Field (MRF) model of texture synthesis. Eliminating undesirable aged painting patterns, such as stains, crevices, and artifacts, and then filling the lacuna regions with the appropriate textures is simple and efficient. The synthesization procedure integrates three key approaches, weighted mask, annular scan and auxiliary, with neighborhood searching. These approaches can maintain a complete shape and prevent edge disconnection in the final results. Moreover, the boundary between original and synthesized paintings is seamless, and unable to distinguish in which the undesirable pattern appears.
    IEEE Transactions on Image Processing 04/2004; 13(3):416-29. · 3.20 Impact Factor
  • Source
    Soo-Chang Pei, Yi-Chong Zeng
    [Show abstract] [Hide abstract]
    ABSTRACT: We present a new histogram-based data-hiding algorithm that secret data is embedded in the least significant bit of the histogram value. To change the pixel value, it alters the histogram to accomplish data-hiding work. In the proposed algorithm, it is able to perform data hiding on the one-dimension histogram, two-dimension histogram map and three-dimension histogram cube. Besides, the multiple secret data hiding in various combinations of histogram spaces are successfully demonstrated in our experimental results. In addition, the natural and limited color images are tested in our experiments.
    Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on; 01/2004
  • Source
    Soo-Chang Pei, Yi-Chong Zeng, Chiao-Fen Hung
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper we propose a moving object segmentation algorithm, and the segmented results are applied to the various applications, including: object elimination, object supplement, background estimation, moving and static objects discrimination, video editing, etc. The important issue is to segment the moving object accurately. In the proposed algorithm, the conventional 3D spatial-temporal data set is instead of 2D spatial-temporal one. According to the x-y-t video sequence, we slice it to a series of x-t image along with y-axis, and then separate the object and background. The advantage of our algorithm is simple, fast and efficient to achieve the moving object segmentation. The experimental results will show the various video editing by using the segmented results.

Publication Stats

93 Citations
5.09 Total Impact Points

Institutions

  • 2006–2007
    • National Taiwan University
      • • Department of Electrical Engineering
      • • Graduate Institute of Communication Engineering
      Taipei, Taipei, Taiwan