scispace - formally typeset
Search or ask a question
Author

Jeng-Shyang Pan

Bio: Jeng-Shyang Pan is an academic researcher from Shandong University of Science and Technology. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 50, co-authored 789 publications receiving 11645 citations. Previous affiliations of Jeng-Shyang Pan include National Kaohsiung Normal University & Technical University of Ostrava.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article , the authors proposed a parallel binary arithmetic optimization algorithm (PBAOA) for feature selection problem on 10 low-dimensional and 10 high-dimensional datasets from UCI and scikit-feature repository.
Abstract: Arithmetic Optimization Algorithm (AOA) has simple structure, few parameters and is easy to implement. It utilizes the distribution behavior of the main arithmetic operators in mathematics. The Multiplication and Division operators are used for exploration, while the Subtraction and Addition are used for exploitation. In this manuscript, the AOA algorithm was converted into binary form with the Multiplication Mathematical Optimizer Operator (MOO) redesigned for better exploration. Then, four families of transfer functions are used in the binary AOA (BAOA). Moreover, in order to further improve the performance, the parallel mechanism is introduced to the BAOA and proposed the Parallel Binary AOA (PBAOA) algorithm. The proposed algorithms are applied for feature selection problem on 10 low-dimensional and 10 high-dimensional datasets from UCI and scikit-feature repository. The results show that the proposed BAOA and PBAOA algorithms are superior to the classical and state-of-the-art algorithms. The Z-shaped transfer functions are more suitable for the proposed algorithms on low-dimensional datasets, while the V-shaped transfer functions are more suitable for high-dimensional datasets. Moreover, no matter what transfer function is used, the parallel mechanism is effective for BAOA.
Proceedings ArticleDOI
26 Nov 2007
TL;DR: The information embedding method is also proposed by us, which can resist not only the permutation attack but also some common image processing attacks.
Abstract: In this paper, a covert communication scheme is proposed for a discrete cosine transformation (DCT) based image multiple description coding (MDC) system. In our scheme the data to be transmitted is an 8 bits per pixel gray level image. Before transmission, the image is firstly divided into 8x16 pixel blocks, and then each 8x16 pixel block is divided into two 8x8 pixel blocks. For each 8x8 pixel block, the 8x8 DCT is performed to get the 8x8 DCT coefficient block. The 8x8 DCT coefficient block is quantized and Zig-Zag scanned to a vector. The vectors are named as descriptions. The secrete information is embedded in the descriptions. After Huffman coding, the compressed descriptions which contain the secrete information are transmitted through packet based channels. At the receiver side, the inverse procedures are taken to recover the original image and the secrete information.
Book ChapterDOI
01 Nov 2019
TL;DR: The possible solutions for the observed problems are to establish a big data cloud platform inside the power grid, to propose a unified standard for the powergrid device, and to effectively utilize the two-dimensional code for image classification.
Abstract: The intelligent production of the power grid is the core of the development of smart grids. The current production status of the power grid is in a transitional phase. During the transition period, there are many problems in the power grid foundation due to the application of new technologies. After our investigation, the big data storage and protection problems, the different generation devices coexistence problem, and scene image classification and processing problems taken by drone inspection are the most prominent problems in the current power grid. This paper elaborates on the above issues and proposes feasible solutions according to the development of modern technology. The possible solutions for our observed problems are to establish a big data cloud platform inside the power grid, to propose a unified standard for the power grid device, and to effectively utilize the two-dimensional code for image classification. This will not only effectively solve the various problems faced by the power grid at the current stage, but also lay the foundation for the development of smart grid.
Posted Content
TL;DR: A novel method, called polyhedron volume ratio classification (PVRC) is proposed for image recognition and its application in image recognition is proposed.
Abstract: In this paper, a novel method, called polyhedron volume ratio classification (PVRC) is proposed for image recognition

Cited by
More filters
Journal ArticleDOI
TL;DR: It is proved the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density.
Abstract: A general non-parametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure: the mean shift. For discrete data, we prove the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density. The relation of the mean shift procedure to the Nadaraya-Watson estimator from kernel regression and the robust M-estimators; of location is also established. Algorithms for two low-level vision tasks discontinuity-preserving smoothing and image segmentation - are described as applications. In these algorithms, the only user-set parameter is the resolution of the analysis, and either gray-level or color images are accepted as input. Extensive experimental results illustrate their excellent performance.

11,727 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Proceedings Article
01 Jan 1999

2,010 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations