scispace - formally typeset
Search or ask a question
Author

Chwen-Jye Sze

Bio: Chwen-Jye Sze is an academic researcher from Academia Sinica. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 7, co-authored 11 publications receiving 446 citations. Previous affiliations of Chwen-Jye Sze include Northwestern University & National Central University.

Papers
More filters
Journal ArticleDOI
TL;DR: From extensive experiments, results indicate that the proposed cocktail watermarking scheme is remarkably effective in resisting various attacks, including combined ones.
Abstract: A novel image protection scheme called "cocktail watermarking" is proposed in this paper. We analyze and point out the inadequacy of the modulation techniques commonly used in ordinary spread spectrum watermarking methods and the visual model-based ones. To resolve the inadequacy, two watermarks which play complementary roles are simultaneously embedded into a host image. We also conduct a statistical analysis to derive the lower bound of the worst likelihood that the better watermark (out of the two) can be extracted. With this "high" lower bound, it is ensured that a "better" extracted watermark is always obtained. From extensive experiments, results indicate that our cocktail watermarking scheme is remarkably effective in resisting various attacks, including combined ones.

226 citations

Book ChapterDOI
29 Sep 1999
TL;DR: A novel image protection scheme named “cocktail watermarking” improves over current spread-spectrum watermarks, which play complementary roles, are simultaneously embedded into an original image.
Abstract: A novel image protection scheme named “cocktail watermarking” improves over current spread-spectrum watermarking approaches. Two watermarks, which play complementary roles, are simultaneously embedded into an original image. The new watermarking scheme has the characteristic that, no matter what an attack is, at least one watermark typically survives well and can be detected. Results of extensive experiments indicate that our cocktail watermarking scheme is effective in resisting various attacks.

97 citations

01 Jan 1999
TL;DR: A robust watermarking scheme for hiding binary or gray scale watermarks in digital images is proposed and a semi public watermark detector which does not require use of the original source is proposed for the purpose of authentication.
Abstract: A robust watermarking scheme for hiding binary or gray scale watermarks in digital images is proposed in this chapter Motivated by the fact that a detector response a correlation value only provides a soft evidence for convincing jury in courtroom embedded watermarks are designed to be visually recognizable after retrieval To strengthen the existence con dence of a watermark visually signi cant transformed components are selected In addition a relocation technique is presented to tackle geometric distortion based attacks without using any registration scheme Finally a semi public watermark detector which does not require use of the original source is proposed for the purpose of authentication Experimental results demonstrate that our approach satis es the common requirements of image watermarking and that the performance is superb

38 citations

Proceedings ArticleDOI
01 Jul 2000
TL;DR: A novel combined watermarking scheme for image authentication and protection is proposed by utilizing the publicly available wavelet-based just noticeable distortion (JND) values, and the hidden watermark is designed to carry the host image's information such that blind watermark detection becomes possible.
Abstract: A novel combined watermarking scheme for image authentication and protection is proposed in this paper. By utilizing the publicly available wavelet-based just noticeable distortion (JND) values, the hidden watermark is designed to carry the host image's information such that blind watermark detection becomes possible. The watermarks are embedded using the previously proposed cocktail watermarking technique and are extracted by a quantization process. According to the polarities and the differences of the hidden and the extracted watermarks, the fragility and robustness of a watermark can be measured, respectively, such that both content authentication and copyright protection are achieved simultaneously.

36 citations

Book ChapterDOI
TL;DR: A novel image protection scheme using "complementary modulations" in order to satisfy the robustness requirement, two watermarks are embedded into a host image to play complementary roles so that at least one watermark survives any attack.
Abstract: In this paper, a novel image protection scheme using "complementary modulations" is proposed. In order to satisfy the robustness requirement, two watermarks are embedded into a host image to play complementary roles so that at least one watermark survives any attack. Statistical analysis is conducted to derive the lower bound of the worst likelihood that the better watermark (of the two) can be extracted. With this "high" lower bound, it is ensured that a "better" extracted watermark is always obtained. Experimental results demonstrate that our watermarking scheme is remarkably effective in resisting various attacks.

19 citations


Cited by
More filters
Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Book
23 Nov 2007
TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract: Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

1,773 citations

Journal ArticleDOI
TL;DR: Computer and Robot Vision Vol.
Abstract: Computer and Robot Vision Vol. 1, by R.M. Haralick and Linda G. Shapiro, Addison-Wesley, 1992, ISBN 0-201-10887-1.

1,426 citations

Patent
25 Jan 2001
TL;DR: In this paper, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc.
Abstract: Media objects are transformed into active, connected objects via identifiers embedded into them or their containers. In the context of a user's playback experience, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server. The server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc. The linking process applies to broadcast objects as well as objects transmitted over networks in streaming and compressed file formats.

1,026 citations

01 Jan 1983
TL;DR: The neocognitron recognizes stimulus patterns correctly without being affected by shifts in position or even by considerable distortions in shape of the stimulus patterns.
Abstract: Suggested by the structure of the visual nervous system, a new algorithm is proposed for pattern recognition. This algorithm can be realized with a multilayered network consisting of neuron-like cells. The network, “neocognitron”, is self-organized by unsupervised learning, and acquires the ability to recognize stimulus patterns according to the differences in their shapes: Any patterns which we human beings judge to be alike are also judged to be of the same category by the neocognitron. The neocognitron recognizes stimulus patterns correctly without being affected by shifts in position or even by considerable distortions in shape of the stimulus patterns.

649 citations