scispace - formally typeset
Search or ask a question
Author

Jeng-Shyang Pan

Bio: Jeng-Shyang Pan is an academic researcher from Shandong University of Science and Technology. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 50, co-authored 789 publications receiving 11645 citations. Previous affiliations of Jeng-Shyang Pan include National Kaohsiung Normal University & Technical University of Ostrava.


Papers
More filters
Proceedings ArticleDOI
26 Nov 2008
TL;DR: The method is suitable for binary, gray level or color image encryption, and the bit error rates are adjustable, and thus the secret image can be recovered to different extents including lossless and nearly lossless.
Abstract: This paper proposes a method to encrypt an image in two shares with following properties. (1) The method is suitable for binary, gray level or color image encryption. (2) The bit error rates are adjustable, and thus the secret image can be recovered to different extents including lossless and nearly lossless. (3) Sizes of the share images are flexible to be changed, and thus the method can be used in different transmission environments. Experimental results show the effectiveness of the proposed method.

1 citations

Journal ArticleDOI
01 May 2023-Sensors
TL;DR: In this paper , the authors proposed an opposition-based learning black hole (OBH) algorithm and utilized it to improve the accuracy of the mobile wireless sensor network (MWSN) localization.
Abstract: The mobile node location method can find unknown nodes in real time and capture the movement trajectory of unknown nodes in time, which has attracted more and more attention from researchers. Due to their advantages of simplicity and efficiency, intelligent optimization algorithms are receiving increasing attention. Compared with other algorithms, the black hole algorithm has fewer parameters and a simple structure, which is more suitable for node location in wireless sensor networks. To address the problems of weak merit-seeking ability and slow convergence of the black hole algorithm, this paper proposed an opposition-based learning black hole (OBH) algorithm and utilized it to improve the accuracy of the mobile wireless sensor network (MWSN) localization. To verify the performance of the proposed algorithm, this paper tests it on the CEC2013 test function set. The results indicate that among the several algorithms tested, the OBH algorithm performed the best. In this paper, several optimization algorithms are applied to the Monte Carlo localization algorithm, and the experimental results show that the OBH algorithm can achieve the best optimization effect in advance.

1 citations

Book ChapterDOI
10 Nov 2010
TL;DR: A novel embedded coding algorithm based on the reconstructed DCT coefficient to avoid the difficulties brought by the choice of wavelet transform base is proposed in this paper and its efficiency can be seen from the experimental results.
Abstract: As an efficient tool for image compression, wavelet has been widely used in all kinds of image processing areas. Based on the different encoding effects, wavelet compression algorithms can be probably classified into two categories. They are the embedded wavelet coding algorithms and the nonembedded wavelet coding algorithms. For the convenience of producing the anytime cut coding stream and the progressing reconstruction results, the embedded wavelet coding algorithms have been paid more attention in practice. Such as the embedded wavelet coding algorithms, EZW and SPIHT are the outstanding representatives. The only drawback for this wavelet based embedded coding algorithms is the choice of the different wavelet transform base. We propose a novel embedded coding algorithm based on the reconstructed DCT coefficient to avoid the difficulties brought by the choice of wavelet transform base in this paper. The new algorithm's efficiency can be seen from the experimental results.

1 citations

Book ChapterDOI
14 Dec 2018
TL;DR: The external hierarchical archive in the mutation strategy of DE algorithm can further improve the diversity of trial vectors and the depth information extracted from the hierarchical archive can achieve a better perception of the landscape of objective function, both of which consequently help this new DE variant secure an overall better optimization performance.
Abstract: Evolutionary Algorithms (EAs) have become much popular in tackling kinds of complex optimization problems nowadays, and Differential Evolution (DE) is one of the most popular EAs for real-parameter numerical optimization problems. Here in this paper, we mainly focus on an external hierarchical archive based DE algorithm. The external hierarchical archive in the mutation strategy of DE algorithm can further improve the diversity of trial vectors and the depth information extracted from the hierarchical archive can achieve a better perception of the landscape of objective function, both of which consequently help this new DE variant secure an overall better optimization performance. Commonly used benchmark functions are employed here in verifying the overall performance and experiment results show that the new algorithm is competitive with other state-of-the-art DE variants.

1 citations

Proceedings ArticleDOI
29 Jun 2000
TL;DR: Experimental results show that the tabu search based MD algorithm can produce a better clustering performance than the K-means and MD algorithms.
Abstract: The maximum descent (MD) algorithms have been proposed for clustering objects. Compared with the traditional K-means (or GLA, or LBG) algorithm, the MD algorithms achieve better clustering performance with far less computation time. However, the searching of the optimal partitioning hyperplane of a multidimensional cluster is a difficult problem in the MD algorithms. In this paper, a new partition technique based on tabu search (TS) approach is presented for the MD algorithms. Experimental results show that the tabu search based MD algorithm can produce a better clustering performance than the K-means and MD algorithms.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: It is proved the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density.
Abstract: A general non-parametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure: the mean shift. For discrete data, we prove the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density. The relation of the mean shift procedure to the Nadaraya-Watson estimator from kernel regression and the robust M-estimators; of location is also established. Algorithms for two low-level vision tasks discontinuity-preserving smoothing and image segmentation - are described as applications. In these algorithms, the only user-set parameter is the resolution of the analysis, and either gray-level or color images are accepted as input. Extensive experimental results illustrate their excellent performance.

11,727 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Proceedings Article
01 Jan 1999

2,010 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations