scispace - formally typeset
Search or ask a question
Author

Jeng-Shyang Pan

Bio: Jeng-Shyang Pan is an academic researcher from Shandong University of Science and Technology. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 50, co-authored 789 publications receiving 11645 citations. Previous affiliations of Jeng-Shyang Pan include National Kaohsiung Normal University & Technical University of Ostrava.


Papers
More filters
Proceedings ArticleDOI
24 May 2015
TL;DR: A new modified SPB multiplication for an arbitrary irreducible pentanomial is presented, and the proposed multiplication scheme has formed a TMVP formula.
Abstract: Toeplitz matrix-vector product (TMVP) approach is a special case of Karatsuba algorithm to design subquadratic multiplier in GF(2m). In binary extension fields, shifted polynomial basis (SPB) is a variable basis representation, and is widely studied. SPB multiplication using coordinate transformation technique can transform TMVP formulas, however, this approach is only applied for the field constructed by all trinomials or special class of pentanomials. For this reason, we present a new modified SPB multiplication for an arbitrary irreducible pentanomial, and the proposed multiplication scheme has formed a TMVP formula.

4 citations

Journal ArticleDOI
TL;DR: In this article, a distributed parallel firefly algorithm (DPFA) with four communication strategies is presented to improve the shortcomings of the traditional FA algorithm, such as low solution accuracy and slow solution speed.
Abstract: Firefly algorithm (FA) is a meta-heuristic optimization algorithm inspired by nature. Due to its superior performance, it has been widely used in real life. However, it also has some shortcomings in some optimization cases, such as low solution accuracy and slow solution speed. Therefore, in this paper, distributed parallel firefly algorithm (DPFA) with four communication strategies is presented to improve these shortcomings. The distributed parallel technique is implanted to divide the initial fireflies into several subgroups, and exchange the information based on communication strategies among subgroups after the fixed iteration. The communication strategies include the maximum of the same group, the average of the same group, the maximum of different groups and the average of different groups. For verifying its performance, this paper compared DPFA with famous optimization algorithms, and experimental results show that DPFA has stronger competitiveness under the test suite of CEC2013. Furthermore, the proposed DPFA is also applied to the PID parameter tuning of variable pitch wind turbine, and conducted experiments show that DPFA outperforms other algorithms. It can smooth the power output and reduce the impact on the power grid when the wind speed fluctuates.

4 citations

01 Jan 2005
TL;DR: Experimental result shows the proposed fractal watermarking mixed of three different approaches can react against the attack JPEG compression.
Abstract: In this study, a novel fractal watermarking is proposed to enforce the robustness of data hiding against possible attack. The proposed fractal watermarking is mixed of three different approaches: inner/exterior search space, odd/even search space, and two classes of isometric search space. During watermark extraction, the watermark bit is always determined by the result of a voting mechanism on the spatial coordinate with respect to three search spaces mentioned above. Experimental result shows the proposed can react against the attack JPEG compression.

4 citations

Book ChapterDOI
21 Nov 2002
TL;DR: It will be analytically proven that the removal process plays role in reducing the interference between an original signal and a watermark to be embedded and improves the ability of the right detection.
Abstract: This paper presents a new watermarking scheme to reduce the detection error probability through removal of local mean values of an original signal. It will be analytically proven that the removal process plays role in reducing the interference between an original signal and a watermark to be embedded. This is simply based on the orthogonality of the DC signal and the AC signal. As a result, the process improves the ability of the right detection. The proposed method is analytically and empirically evaluated with no attack as well as JPEG compression attacks.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: It is proved the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density.
Abstract: A general non-parametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure: the mean shift. For discrete data, we prove the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density. The relation of the mean shift procedure to the Nadaraya-Watson estimator from kernel regression and the robust M-estimators; of location is also established. Algorithms for two low-level vision tasks discontinuity-preserving smoothing and image segmentation - are described as applications. In these algorithms, the only user-set parameter is the resolution of the analysis, and either gray-level or color images are accepted as input. Extensive experimental results illustrate their excellent performance.

11,727 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Proceedings Article
01 Jan 1999

2,010 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations