Hsiang-Cheh Huang

Hsiang-Cheh Huang
National University of Kaohsiung · Department of Electrical Engineering

PhD

About

213
Publications
9,218
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,616
Citations
Additional affiliations
August 2012 - present
National University of Kaohsiung
Position
  • Professor (Full)

Publications

Publications (213)
Article
Full-text available
This paper presents a two-stage genetic mechanism for the migration-based load balance of virtual machine hosts (VMHs) in cloud computing. Previous methods usually assume this issue as a job-assignment optimization problem and only consider the current VMHs’ loads; however, without considering loads of VMHs after balancing, these methods can only g...
Chapter
In this paper, we proposed a quantization-based watermarking scheme for image data. To increase the robustness of the watermark, each bit of a binary watermark string is embedded into a vector composed of several wavelet coefficients selected from low and middle frequency do- main of an image. The proposed scheme is based on quantization technique,...
Chapter
Compressed sensing is one of the developing techniques with superior compression performances over existing schemes in the field of lossy data compression. Due to the observations that compressed signals are vulnerable to channel errors during transmission, data protection techniques may also be applied to the compressed signals at the encoder befo...
Chapter
A coplanar symmetric dipole slot antenna is proposed for dual band wireless communication applications. The rectangular slot with T tuning stub is etched on the metallic layer of a single sided printed circuit board to form the coplanar dipole slot antenna. The dimensions of T stub are changed to design and fabricate the antenna which can be operat...
Chapter
Genetic programming (GP) is inspired by the popular genetic algorithm (GA). The searching result of GP is a program that includes both opera-tors and operands. The operators are the obstacle to the crossover and mutation process because invalid programs would be generated. In this paper, the concepts of VLIW is incorporated in the design of a GP sc...
Conference Paper
Compressed sensing is famous for its compression performances over existing schemes in this field. We apply compressed sensing to digital images for error-controlled transmission in this paper. For assessing the compression performances, researches assume to have the error-free transmission between the encoder and the decoder. For transmitting comp...
Book
This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology...
Book
This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology...
Article
In this paper, we propose a simple structure of coplanar dipole antenna with a tuning stub. The antenna which exhibits dual band is designed and fabricated respectively. The influences of stub length parameter of coplanar dipole antennas on the resonant frequency, return loss and bandwidth are also discussed. We use IE3D software to design coplanar...
Article
Progressive transmission of multimedia can be commonly encountered in multimedia communications. In this paper, we develop the reversible data hiding and visual secret sharing schemes for ownership protection of digital images, which is suitable for meeting the characteristics of progressive image transmission (PIT). With progressive transmission,...
Article
Reversible data hiding, also known as lossless data hiding, is a newly developed research field and relating applications in digital rights management (DRM). With the widespread use of tablets or smart phones, digital images are captured and shared online instantly. Therefore, the ownership of the images taken has become an important issue in this...
Article
In this paper, we propose a new algorithm in reversible data hiding, with the applications of privacy protection for digital images. Information security has long been an important topic in research and practical applications, and reversible data hiding has attracted more and more attention recently. In order to look for better performances, unlike...
Conference Paper
In this paper, a self-oscillating antenna is presented. The proposed circuit consists of an amplifier with positive feedback. In the feedback path, a two-way power divider is utilized for power splitting. One output of the power divider is electromagnetically coupled to the antenna for radiation, and the other is connected to the input of the ampli...
Conference Paper
A stereoscopic video frame contains two images, which are taken in different positions at the same time, and an attacker may make use of the similarity of these two images to remove the embedded watermark. Therefore, a stereoscopic video frame watermarking scheme based on wavelet packet transform was proposed in this paper. Genetic algorithm is use...
Conference Paper
Compressive sensing is a potential technology for lossy image compression. With a given quality, we may represent an image with a few significant coefficients in the sparse domain. According to the sparse modeling theories, we may randomly sense a few number of measurements in a transform domain and later reconstruct the sparse representation. Typi...
Conference Paper
Reversible data hiding has become an important research topic in recent years due to the characteristics of 'reversibility'. At the encoder, we embed the secret information into original image, and deliver the marked image to the decoder. At the decoder, with the aid of side information, both the secret information and original image should be sepa...
Article
In this paper, we propose a new algorithm in reversible data hiding, with the characteristics of ease of implementation, based on the alteration of difference values relating to original image. Three major categories can make reversible data hiding possible, one is to modify the histogram of original images, the second is to alter the difference be...
Article
The future classroom emerges as an approach to enhance pedagogy. Class- room participants can become more involved in their learning by interaction and collab- oration. This becomes practical due to the extensive availability of modern electronic devices and networks. To implement an environment that supports the future classroom, an integration me...
Article
Full-text available
Compressed sensing, a newly developed scheme in data compression, has at- tracted much attention in researches due to its new concepts and superior performances over conventional techniques. Besides looking for compression performances, it would be practical to aim at data transmission of compressed information, and few papers in this field can be...
Article
This study presents a dual-band 180° hybrid coupler with a filter response. The hybrid coupler consisting of four coupled stepped-impedance resonators has a second-order Chebyshev filter response. A 2.45/5.8-GHz filtering 180° hybrid coupler has been designed and fabricated on a Rogers RO4003C substrate for WLAN applications. The insertion loss 1/=...
Article
A ring-resonator branch-line coupler with unequal power division is proposed in this paper. The branch-line coupler with four coupled ring resonators at ports has the equivalent coupled-resonator filter network. The coupler therefore exhibits good stopband rejection. By carefully designing the coupling coefficients between resonators, the required...
Article
In this paper, we performed surveys of bio-inspired techniques for information hiding. The applications of bio-inspired optimization for information hiding or watermarking have emerged in early 2000’s. Due to the flexibility of algorithm designs, parameter selections, and performance metrics, the uses of bio-inspired optimization techniques provide...
Article
In this paper, we propose the low-profile planar triple symmetric arms dipole antennas for wireless communication applications. Three symmetric arms are etched on the metallic layer of a single sided printed circuit board to form the planar dipole antenna. For diferent applications, we present two antennas based on similar design concepts. For the...
Article
Lossless data hiding belongs to one major branch in information security researches. The major goal is to retain the lossless property of proposed algorithm, meaning that original image and embedded secret should be perfectly recovered at decoder. Based on the multi-round prediction of differences between original and marked images, enhanced amount...
Conference Paper
In this study, low-profile planar triple symmetric arms dipole antenna is proposed for wireless communication applications. Three symmetric arms are etched on the metallic layer of a single sided printed circuit board to form the planar dipole antenna. The size parameters of symmetric arms are changed to design and fabricate the antenna which can b...
Conference Paper
Hiding data into images can be referred to as a constrained optimization problem. Hence, we proposed a reversible genetic watermarking scheme based on the wavelet packet transform in this paper. Genetic algorithm is used to select an appropriate basis from permissible bases of wavelet packet transform to increase the robustness of the embedded data...
Conference Paper
In this paper, we propose a genetic watermarking method for stereoscopic images. A stereoscopic image is stored as two images and combined by software while displayed. Thus, a pirate can only clip half of the image to remove the embedded watermark. To prevent the watermarks from being removed, the proposed watermarking method embeds an identical wa...
Article
Full-text available
Compressed sensing is a newly developed topic in the field of data com- pression. Most of relating researches focus on compression performances or theoretical studies, and there are very few papers aiming at the integration of watermarking into compressed sensing systems. In this paper, we propose an innovative scheme that con- siders the copyright...
Article
In this paper, we propose a coevolutionary genetic watermarking scheme based on wavelet packet transform. Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform, and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. Coevolutionary genetic algorithm i...
Article
Full-text available
Telecare is the term for providing remote care to less able people such as elderly people and babies. A elecare application may be composed of several software and hardware components. The typical deployment structure is a distributed environment for hosting these interconnected components. In this paper, we design a software framework that is suit...
Conference Paper
Lossless data hiding is a newly developed topic in information security researches. With the term of 'lossless', secret information is embedded into original image with methods developed by researchers at the encoder, and marked image is produced. Correspondingly, at the decoder, users are capable of perfectly separating the embedded secret and ori...
Conference Paper
Compressive sensing is a signal processing technique that takes advantage of signal sparseness in some domain. To use compressive sensing, a domain in which the signal is represented as a few significant coefficients should be defined. If the proper domain is identified as a set of basis vectors, the coefficients are the projections of the signal o...
Conference Paper
This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design...
Conference Paper
Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Diff...
Conference Paper
Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the...
Conference Paper
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken...
Conference Paper
In this paper, we present the loss less data hiding algorithm based on the concept of quad tree decomposition. With the slight changes of original images, by altering the shape of histogram, or by modifying the difference value between two consecutive pixels, loss less data hiding can be achieved at the encoder. Correspondingly, at the receiver, bo...
Conference Paper
One of the interesting image processing applications is to detect and/or restore a damaged image. Because image damage would vary in different ways, a straightforward method is to use a program to represent the damage. Then, the type of artefact can be searched by applying programs to the original image and comparing with the target image. The run-...
Conference Paper
Progressive transmission of multimedia is an important application in multimedia communications. We employ reversible data hiding for protecting the copyright of progressively transmitted images. We consider carefully altering the luminance differences between base and enhancement layers in progressive transmission, and obtain similar qualities of...
Conference Paper
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. In the circumstances, it should be taken into consideration to resist coalition attacks while developing a watermarking...
Article
The worldwide population of people over the age of 65 has been predicted to more than double from 1990 to 2025. Therefore, ubiquitous health-care systems have become an important topic of research in recent years. In this paper, an integrated system for portable electrocardiography (ECG) monitoring, with an on-board processor for time–frequency ana...
Conference Paper
Telecare is the term for providing remote care to elderly people, babies, and/or less able people. Different implementation approaches would be used for deploying a telecare application. In this paper, we design a software framework that is suitable for prototyping a telecare application. The framework is programming language independent. We may de...
Conference Paper
In this paper, we propos e a new algorithm in reversible data hiding, with the applications of copyright and privacy protection for natural images. Security issues for digital images have long been an important topic in resear ch and practical applications, and reversible data hiding has attracted more and more attention. Unlike conventional scheme...
Article
In this paper, we propose a new method for reversible data hiding by employing the hierarchical relationships of original images. There are many parameters for accessing the performances of reversible data hiding algorithms, including the output image quality, the hiding capacity, and the overhead for decoding. Considering the ease of implementatio...
Chapter
In recent years, Camera Smartphone has become a popular consumer electronics product. Young people like to use it to record their daily lives; moreover, they will share these photos and information to others. But the photos may be used without consent after they are uploaded to Internet. To avoid this problem, one can embed visible and invisible wa...
Article
This chapter presents a method to embed a watermark in a video for recording copyright information to prevent the video from being pirated. Firstly, a video is cut into small shots, and the shots are classified with clustering algorithm in accordance with their similarity. Then, the DWT (Discrete Wavelet Transform is applied to transform a watermar...
Article
In this paper, we propose a new algorithm in reversible data hiding with prediction-based scheme. Reversible data hiding can be implemented with two types, one is by modifying the histogram of images, named the histogram-based scheme, and the other is by changing the difference value between neighboring pixels, called the difference-expansion-based...
Article
Trusted communication is mostly required for lots of applications, and watermarking is a scheme for making trusted communication possible. In this paper, we propose a generic watermarking scheme, optimized with genetic algorithm (GA), based on the wavelet packet transform (WPT) for the applications of trusted communication. Digital images are emplo...
Article
Copyright protection is mostly required for lots of applications, and watermarking is a scheme for making this possible. In this chapter, we propose a genetic watermarking scheme based on the wavelet packet transform (WPT) for the applications of copyright protection and trusted communication. Wavelet packet transform can be regarded as a generaliz...
Conference Paper
In this paper, we proposed a co evolutionary genetic watermarking scheme based on wavelet packet transform. Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. Co evolutionary genetic algorithm...
Conference Paper
This paper describes a new class of loop antenna. Two inverted-L open slots are etched on the rectangular metallic layer of a single sided printed circuit board to form the irregular width loop antenna. The dimension of inverted-L open slot is changed to design and fabricate the antenna which can be operated at 2.45/5.2/5.8 GHz successfully. We use...
Conference Paper
Reversible data hiding is a newly developed research field in digital rights management (DRM) applications. It is a branch in watermarking researches, with the characteristics of reversibility at the decoder. Secret information can first be embedded into original image, with algorithms designed by researchers, at the encoder. Next, image containing...
Conference Paper
Sophisticated image processing is usually nonlinear and difficult to model. In addition to the conventional image processing tools, we need some alternatives to bridge the gap between low-level and semantic level computation. This paper presents an idea of image processing scheme. We transform an image into different representations; feed the repre...
Conference Paper
Compressive sampling is a newly developed topic in the field of data compression. For current researches, compressive sampling techniques focus on compression performances. There are very few papers aiming at the integration of watermarking into compressive sampling systems. In this paper, we propose an innovative scheme that considers the copyrigh...
Conference Paper
Full-text available
Reversible data hiding has its attractions and possible drawbacks in researches, and it has the potential to extend to digital rights management (DRM) applications. For reversible data hiding, secret information can be hidden into original multimedia content, and the content with hidden data can be transmitted to the receiver. After reception, rece...