scispace - formally typeset
Search or ask a question
Author

Hsien-Hsin Chou

Bio: Hsien-Hsin Chou is an academic researcher from National Ilan University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 4, co-authored 6 publications receiving 134 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The experimental results confirm that the TPFF attains an excellent quality of restored images in terms of peak signal-to-noise ratio, mean square error, and mean absolute error even when the noise rate is above 0.5 and without the aid of noise-free images.
Abstract: Digital images are often corrupted by impulsive noise during data acquisition, transmission, and processing. This paper presents a turbulent particle swarm optimization (PSO) (TPSO)-based fuzzy filtering (or TPFF for short) approach to remove impulse noise from highly corrupted images. The proposed fuzzy filter contains a parallel fuzzy inference mechanism, a fuzzy mean process, and a fuzzy composition process. To a certain extent, the TPFF is an improved and online version of those genetic-based algorithms which had attracted a number of works during the past years. As the PSO is renowned for its ability of achieving success rate and solution quality, the superiority of the TPFF is almost for sure. In particular, by using a no-reference Q metric, the TPSO learning is sufficient to optimize the parameters necessitated by the TPFF. Therefore, the proposed fuzzy filter can cope with practical situations where the assumption of the existence of the “ground-truth” reference does not hold. The experimental results confirm that the TPFF attains an excellent quality of restored images in terms of peak signal-to-noise ratio, mean square error, and mean absolute error even when the noise rate is above 0.5 and without the aid of noise-free images.

45 citations

Journal ArticleDOI
TL;DR: The effectiveness of the proposed VDVM scheme is proven using the perceptual evaluation of audio quality and bit error rates of recovered watermarks under various signal processing attacks and the imperfection of applying quantization index modulation in the open-loop case is rectified.

43 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed DWPT-DCT scheme is comparable to three recently developed methods in robustness while it is the only scheme surviving the amplitude scaling attack.

33 citations

Journal ArticleDOI
TL;DR: Experimental results confirm that the combination of the DWPT, SVD, and adaptive QIM achieves imperceptible data hiding with satisfying robustness and payload capacity.
Abstract: This paper presents a novel approach for blind audio watermarking. The proposed scheme utilizes the flexibility of discrete wavelet packet transformation (DWPT) to approximate the critical bands and adaptively determines suitable embedding strengths for carrying out quantization index modulation (QIM). The singular value decomposition (SVD) is employed to analyze the matrix formed by the DWPT coefficients and embed watermark bits by manipulating singular values subject to perceptual criteria. To achieve even better performance, two auxiliary enhancement measures are attached to the developed scheme. Performance evaluation and comparison are demonstrated with the presence of common digital signal processing attacks. Experimental results confirm that the combination of the DWPT, SVD, and adaptive QIM achieves imperceptible data hiding with satisfying robustness and payload capacity. Moreover, the inclusion of self-synchronization capability allows the developed watermarking system to withstand time-shifting and cropping attacks.

24 citations

Journal ArticleDOI
TL;DR: In this paper , a high capacity QR decomposition (QRD) based blind watermarking algorithm with artificial intelligence (AI) technologies for color images was proposed, which involves dividing the host image into non-overlapping blocks of size 4 × 4 pixels and then applying the QRD to each block.
Abstract: In this study, a high-capacity QR decomposition (QRD) based blind watermarking algorithm with artificial intelligence (AI) technologies for color images was proposed. Watermarking implementation involves dividing the host image into non-overlapping blocks of size 4 × 4 pixels and then applying the QRD to each block. Within each block, a two-bit watermark can be embedded by manipulating the relationship between paired elements drawn from the first column of the orthogonal matrix in the ORD. Through orthonormal restoration and iterative regulation, a perfect watermark retrieval can be guaranteed in the absence of image attacks. On top of the high-capacity watermarking, the proposed algorithm also exploits two AI technologies, namely, particle swarm optimization (PSO) and super-resolution convolutional neural network (SRCNN). The PSO seeks the optimal parameters for enhancing the imperceptibility and robustness, while the SRCNN facilitates the visual recognition of extracted watermarks. In comparison with previous matrix decomposition-based watermarking algorithms, the proposed algorithm exhibits a superior performance in imperceptibility and robustness while operating at the rate of 1/8 bit per pixel. Moreover, the SRCNN refinement contributes an improvement of 0.191 to image quality in terms of mean structural similarity index measure (MSSIM).

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The experimental results demonstrate that the proposed blind image blur evaluation algorithm can produce blur scores highly consistent with subjective evaluations and outperforms the state-of-the-art image blur metrics and several general-purpose no-reference quality metrics.
Abstract: Blur is a key determinant in the perception of image quality. Generally, blur causes spread of edges, which leads to shape changes in images. Discrete orthogonal moments have been widely studied as effective shape descriptors. Intuitively, blur can be represented using discrete moments since noticeable blur affects the magnitudes of moments of an image. With this consideration, this paper presents a blind image blur evaluation algorithm based on discrete Tchebichef moments. The gradient of a blurred image is first computed to account for the shape, which is more effective for blur representation. Then the gradient image is divided into equal-size blocks and the Tchebichef moments are calculated to characterize image shape. The energy of a block is computed as the sum of squared non-DC moment values. Finally, the proposed image blur score is defined as the variance-normalized moment energy, which is computed with the guidance of a visual saliency model to adapt to the characteristic of human visual system. The performance of the proposed method is evaluated on four public image quality databases. The experimental results demonstrate that our method can produce blur scores highly consistent with subjective evaluations. It also outperforms the state-of-the-art image blur metrics and several general-purpose no-reference quality metrics.

239 citations

Journal ArticleDOI
TL;DR: The authors' develop a digital watermarking algorithm based on a fractal encoding method and the discrete cosine transform (DCT) method that has higher performance characteristics such as robustness and peak signal to noise ratio than classical methods.
Abstract: With the rapid development of computer science, problems with digital products piracy and copyright dispute become more serious; therefore, it is an urgent task to find solutions for these problems. In this study, the authors' develop a digital watermarking algorithm based on a fractal encoding method and the discrete cosine transform (DCT). The proposed method combines fractal encoding method and DCT method for double encryptions to improve traditional DCT method. The image is encoded by fractal encoding as the first encryption, and then encoded parameters are used in DCT method as the second encryption. First, the fractal encoding method is adopted to encode a private image with private scales. Encoding parameters are applied as digital watermarking. Then, digital watermarking is added to the original image to reversibly using DCT, which means the authors can extract the private image from the carrier image with private encoding scales. Finally, attacking experiments are carried out on the carrier image by using several attacking methods. Experimental results show that the presented method has higher performance characteristics such as robustness and peak signal to noise ratio than classical methods.

114 citations

Journal ArticleDOI
TL;DR: This proposed novel adaptive SVD method for fault feature detection based on the correlation coefficient achieves not only the optimal determination of the delay step k by means of the absolute value of the autocorrelation function sequence of the collected vibration signal, but also the adaptive selection of effective singular values using the index corresponding to useful component signals.
Abstract: Aiming at solving the existing sharp problems by using singular value decomposition (SVD) in the fault diagnosis of rolling bearings, such as the determination of the delay step k for creating the Hankel matrix and selection of effective singular values, the present study proposes a novel adaptive SVD method for fault feature detection based on the correlation coefficient by analyzing the principles of the SVD method. This proposed method achieves not only the optimal determination of the delay step k by means of the absolute value of the autocorrelation function sequence of the collected vibration signal, but also the adaptive selection of effective singular values using the index corresponding to useful component signals including weak fault information to detect weak fault signals for rolling bearings, especially weak impulse signals. The effectiveness of this method has been verified by contrastive results between the proposed method and traditional SVD, even using the wavelet-based method through simulated experiments. Finally, the proposed method has been applied to fault diagnosis for a deep-groove ball bearing in which a single point fault located on either the inner or outer race of rolling bearings is obtained successfully. Therefore, it can be stated that the proposed method is of great practical value in engineering applications.

112 citations

Journal ArticleDOI
TL;DR: The detailed steps of multiple attribute decision making with the presented operators under intuitionistic fuzzy environment are investigated and an example is illustrated to show the validity and feasibility of the new approach.
Abstract: The Bonferroni mean (BM) was originally presented by Bonferroni and had been generalized by many researchers for its capacity to capture the interrelationship between input arguments. Nevertheless, the existing intuitionistic fuzzy BMs only consider the effects of membership function or nonmembership function of different intuitionistic fuzzy sets (IFSs). As complements to the existing generalizations of BM under intuitionistic fuzzy environment, this paper also considers the interactions between the membership function and nonmembership function of different IFSs and develops the intuitionistic fuzzy interaction BM and the weighted intuitionistic fuzzy interaction BM. We investigate the properties of these new extensions of BM and discuss their special cases. Furthermore, the detailed steps of multiple attribute decision making with the presented operators under intuitionistic fuzzy environment are investigated and an example is illustrated to show the validity and feasibility of the new approach.

101 citations

Journal ArticleDOI
Genggeng Liu1, Xing Huang1, Wenzhong Guo1, Yuzhen Niu1, Guolong Chen1 
TL;DR: An effective algorithm based on particle swarm optimization is presented to construct a multilayer obstacle-avoiding X-architecture SMT (ML-OAXSMT), which is the first work to address this problem and can offer the theory supports for chip design based on non-Manhattan architecture.
Abstract: As the basic model for very large scale integration routing, the Steiner minimal tree (SMT) can be used in various practical problems, such as wire length optimization, congestion, and time delay estimation. In this paper, an effective algorithm based on particle swarm optimization is presented to construct a multilayer obstacle-avoiding X-architecture SMT (ML-OAXSMT). First, a pretreatment strategy is presented to reduce the total number of judgments for the routing conditions around obstacles and vias. Second, an edge transformation strategy is employed to make the particles have the ability to bypass the obstacles while the union-find partition is used to prevent invalid solutions. Third, according to the feature of ML-OAXSMT problem, we design an edge-vertex encoding strategy, which has the advantage of simple and effective. Moreover, a penalty mechanism is proposed to help the particle bypass the obstacles, and reduce the generation of via at the same time. Experimental results show that our algorithm from a global perspective of multilayer structure can achieve the best solution quality among the existing algorithms. Finally, to our best knowledge, we redefine the edge cost and then construct the obstacle-avoiding preferred direction X-architecture Steiner tree, which is the first work to address this problem and can offer the theory supports for chip design based on non-Manhattan architecture.

89 citations