scispace - formally typeset
Search or ask a question
Author

Wen-Yuan Chen

Bio: Wen-Yuan Chen is an academic researcher from National Chin-Yi University of Technology. The author has contributed to research in topics: Image processing & Color image. The author has an hindex of 6, co-authored 18 publications receiving 178 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme that can conceal lossless and lossy secret data into a cover image simultaneously and is robust to JPEG attacks.
Abstract: In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme. There are two types of secret data lossless and lossy embedded into a cover image. The lossless data is text that is first encoded by the QR barcode; its data does not have any distortion when comparing with the extracted data and original data. The lossy data is a kind of image; the face image is suitable for our case. Because the extracted text is lossless, the error correction rate of QR encoding must be carefully designed. We found a 25% error correction rate is suitable for our goal. In image embedding, because it can sustain minor perceptible distortion, we thus adopted the lower nibble byte discard of the face image to reduce the secret data. When the image is extracted, we use a median filter to filter out the noise and obtain a smoother image quality. After simulation, it is evident that our scheme is robust to JPEG attacks. Compared to other steganogra- phy schemes, our proposed method has three advantages: i the nested scheme is an enhanced security system never previously developed; ii our scheme can conceal lossless and lossy secret data into a cover image simultaneously; and iii the QR barcode used as secret data can widely extend this method's application fields. © 2009 Society of Photo-Optical

42 citations

Proceedings ArticleDOI
12 Sep 2009
TL;DR: In this paper, QR(Quick Response) bar code and image processing techniques are used to construct a nested steganography scheme and it is evident that the scheme is robust to JPEG attacks.
Abstract: In this paper, QR(Quick Response) bar code and image processing techniques are used to construct a nested steganography scheme. There is a lossless data embedded into a cover image. The lossless data is text that is first encoded by the QR barcode; its data does not have any distortion when comparing with the extracted data and original data. Since the extracted text is lossless, the error correction rate of QR encoding must be carefully designed. We found 25% error correction rate is suitable for our goal. After simulation, it is evident that our scheme is robust to JPEG attacks.

37 citations

Journal ArticleDOI
TL;DR: An effective algorithm for colorizing a grayscale image using a reference color image, an RGB to color transform (=luminance, =chrominance), and a block-based vector quantization of luminance mapping (VQLM) technique is developed.
Abstract: We develop an effective algorithm for colorizing a grayscale image In our approach, a reference color image, an RGB to color transform (=luminance, =chrominance), and a block-based vector quantization of luminance mapping (VQLM) technique are used to automatically colorize the grayscale image The VQLM technique compares the grayscale image with the luminance of the color reference image to obtain the information of the planes of the grayscale image After the chrominance is padded, the inverse color transform, to RGB, colorizes the grayscale scene is colorized Meanwhile, we create a mean of VQLM (MVQLM) method to improve the quality of the colorized grayscale image Experimental results show the MVQLM method is better than the VQLM method Also, we investigate colorizing the grayscale image working in the and YIQ spaces The simulation results also reveal that working in the space is slightly better than working in the YIQ space Compared to other colorizing schemes, our proposed method has two advantages: 1 the codebook and MVQLM techniques colorize the grayscale images for any size image that can be evenly divided by 2 automatically; and 2 the MVQLM method obtains a smoother colorizing effect and improved quality compared to the VQLM method

37 citations

Journal ArticleDOI
TL;DR: A novel color space conversion method called adaptive projection color space (APCS), which includes two portions: adaptive singular value decomposition and an inner product conversion algorithm for color images.
Abstract: In this letter, we propose a novel color space conversion method called adaptive projection color space (APCS). This method includes two portions: adaptive singular value decomposition and an inner product conversion algorithm for color images. We employed images from the Color FERET and CMU-PIE databases for training and experiment. The results revealed that the recognition rates from our proposed APCS approach were higher than other color spaces and those of methods proposed in relevant studies.

26 citations

Journal ArticleDOI
TL;DR: In this article, the mean value of the first and second singular value ratios of normal and defect LCD images was obtained by singular value decomposition, and then the third and fourth singular values matched with the standard deviation of first two singular value ratio were used to divide the defect images into two categories: coarse and fine.
Abstract: Singular value decomposition is used to obtain the mean value of the first and second singular value ratios of normal and defect LCD images. Then the third and fourth singular values matched with the standard deviation of the first two singular value ratios are used to divide the defect images into two categories: coarse and fine. Finally, 2D discrete wavelet coefficient filtering combined with region growing is adopted to extract defect regions.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014, and showcases the most popular software applications to embed secret data into carriers.
Abstract: By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.

93 citations

Proceedings ArticleDOI
16 Jul 2008
TL;DR: Here some novel techniques for squirting colors in grayscale images are presented, attempting to minimize the human efforts needed in manually coloring the graysscale images.
Abstract: Here we are presenting some novel techniques for squirting colors in grayscale images. The problem of coloring grayscale images has no exact solution. Here we are attempting to minimize the human efforts needed in manually coloring the grayscale images. We need human interaction only to find a reference color image, then the job of transferring color traits from reference color image to grayscale image is done by proposed techniques. In these techniques, the color palette is prepared using pixel windows of some degrees taken from reference color image. Then the grayscale image is divided into pixel windows with same degrees. For every window of grayscale image the palette is searched for equivalent color values, which could be used to color grayscale window. In the whole process the luminance values of reference color image and target grayscale image are only matched and based on best possible match the respective chromaticity values of color image are transferred to grayscale image. For palette preparation first we used RGB color space and then Kekre's LUV color space[9]. Results with Kekre's LUV color space were comparatively better. To improve the searching time through color palette the exhaustive and Kekre's fast search are used.

77 citations

Posted Content
TL;DR: In this article, the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014, are surveyed.
Abstract: By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.

70 citations

Journal ArticleDOI
TL;DR: The experimental results indicate that the proposed methods can obtain high performances under different illumination variations and outperform several state-of-the-art approaches which are proposed to address face recognition under varying illumination.

59 citations

Journal ArticleDOI
Pei-Yu Lin1
TL;DR: This article designs a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.
Abstract: QR barcodes are used extensively due to their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However, the private data of the QR barcode lacks adequate security protection. In this article, we design a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system. The proposed approach differs from related QR code schemes in which it uses the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. The secret can be split and conveyed with QR tags in the distribution application, and the system can retrieve the lossless secret when authorized participants cooperate. General browsers can read the original data from the marked QR tag via a barcode reader, and this helps reduce the security risk of the secret. Based on our experiments, the new approach is feasible and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.

58 citations