Page 97 - untitled
P. 97
ѐڲሬ
Lu, Chun-Shien Ӻᔊʧ Research Description
Research Description
Ӻᔊʧ
͉ɛତචݬ˴ࠅٙӺ˙Σ̙ʱމ(1)εద My current research interests include (1) mul- bandwidth, real-time application, mobility, and so
timedia security; (2) multimedia networking; and (3) on) of networks exist, a compressed video is very
τΌe(2)εదၣ༩eၾ(3)ʱόൖৃᇜᇁf
distributed video coding. sensitive to transmission errors such that the quality
of a transmitted video after performing decoding
ίεదτΌ˙ࠦdҢ˴ࠅٙͦᅺ݊Ӻ In the aspect of multimedia security, my re- cannot be guaranteed. Therefore, how to provide
ᅰЗओ˥Ι(digital watermarking)ഃ༟ৃᒯᔛ(data search mainly focuses on the development of data quality of service (QoS) for robust video transmis-
hiding technologies such as digital watermarking
hiding)ҦஔၾᅰЗܸ७(digital fingerprinting)ഃڢ༟ sion is definitely a very important problem in mul-
and non-data hiding technologies such as digital timedia communications. We are currently studying
ৃᒯᔛ(non-data hiding)ҦஔdԸஈଣεదτΌ
fingerprinting, digital signature, and robust/visual the problems of error control, congestion control,
(multimedia security)ٙਪᕚνdوᛆڭᚐ(copyright hash to provide the functionalities of copyright and wireless TCP for wireless video transmission. Research Fellows
protection)ၾ༟ࣘʫ࢙ᛠ֛(content authentication) protection and content authentication. We have
presented (a) robust watermarking techniques for As for distributed video coding (DVC), the
ഃfҢࡁʊ০࿁ᅰЗᅂ྅(image)ၾൖৃ(video)ί(ڢ
copyright protection; (b) semi-fragile watermarking current video coding standards usually concentrate
)༟ৃᒯᔛҦஔਂཀɓӻΐӺdԨ̈(a)੶
techniques for content authentication; and (c) digital on the improvement of increasing compression
ओ˥ΙҦஔ(robust watermarking)ഹЪᛆڭᚐi(b) fingerprinting techniques for content authentication, ratio. For example, H.264/AVC, the newest video
̒ঌࢮओ˥ΙҦஔ(semi-fragile watermarking)༟ and copy detection and tracing. In data hiding, we coding standard, employs several very complex
Research Fellows
ਿ ͉ ༟ ࣘ
ਿ ͉ ༟ ࣘ ࣘʫ࢙ᛠ֛iၾ(c)ᅰЗܸ७Ҧஔ༟ࣘʫ࢙ᛠ֛e own two United States patent, two ROC patents, encoding algorithms so that the data rate obtained
and one Canadian patent. We are currently develop- from H.264/AVC can achieve 50% of that obtained
ልႡਈၾᔳഃᏐ͜fίவ˙ࠦdҢࡁʊᚃᐏ
ing a more complete multimedia security system by from H.263. Typically, the encoder is 5 to 10 times
ᔖcc၈j пӺࡰ Շࡈߕਖ਼лeՇࡈʕശ͏ਖ਼лeၾɓࡈ̋ࣅ studying the challenging issue of integrating robust more complex than the decoder. However, this kind
Assistant Research Fellow (2002/8--) ɽਖ਼лfͦۃdҢࡁ͍ߧɢ೯ɓࡈΥ੶ watermarking techniques, digital fingerprinting of architecture is not suitable for applications of
techniques, and multimedia encryption techniques. video sensor networks, which are mainly composed
௰৷ኪዝj Ph.D., Electrical Engineering, ओ˥ΙҦஔeᅰЗܸ७Ҧஔeၾεద̋Ҧஔٙ
of mobile devices and sensor nodes with limited
National Cheng-Kung University εదτΌӻ୕d༺Ցᕐࠠڭᚐ̌ঐf In the aspect of multimedia networking, in computational capability and battery power. In view
(1998) view of the importance of sharing multimedia data, of this, we are studying and developing a new video
ίεదၣ༩˙ࠦdҢࡁഹεద༟ࣘπ it is important to robustly transmit multimedia (e.g., coding method called ¨distributed video coding.©
ཥcc༑j+886-2-2788-3799 ext. 1513 ίٙᄆ࠽ίʱԮdϾʱԮ௰Ҟٙ˙όک݊ீཀ video) data over error-prone networks. However,
ෂccॆj+886-2-2782-4814 ၣ༩ਗ਼εద༟ࣘෂ̘̈f್Ͼd͟ၣ༩᎖ᄱ owing to the various characteristics (e.g., unknown
ٙʔᖢ֛eၣ༩ٙମሯdԴεద༟ࣘ(νൖ
ཥɿڦᇌjlcs@iis.sinica.edu.tw
Selected Publications
ৃ)ቊաՑ၇ʔΝٙෂ፩፹Ⴌdኬߧൖৃٙۜሯί Selected Publications
ၣccࠫjhttp://www.iis.sinica.edu.tw/~lcs ༆ᏀᐵʘܝɽషɨࠥfΪϤdνОணࠇ̈ቇΥεద
1. Wen L. Hwang, Chun-Shien Lu, and Pau-Choo Chung, Shape From 9. Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang,
༟ࣘतٙਕۜሯڭᗇ(Quality-of-Service)dί Texture: Direct Estimation of Planar Surface Orientations Using Con- Robust Mesh-based Hashing for Copy Detection and Tracing of Im-
tinuous Wavelet Transform, IEEE Trans. on Image Processing, Vol. 7, ages, Proc. IEEE Int. Conf. on Multimedia and Expo (ICME): special
ൖৃෂ፩༁݊ɓࡈࠠࠅٙሙᕚfίவ˙ࠦdҢ
• National Invention and Creation Award 2. pp. 773~780, 1998. 10. session on Media Identification, Taipei, Taiwan, 2004.
Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, Reliable
Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, and Chwen-
(Silver Medal, 2004), ࡁӺ፹ႬછՓ(error control)eኹ෦છՓ(congestion Jye Sze, Cocktail Watermarking on Images, Proc. 3 International Available Bandwidth Estimation Based on Distinguishing Queuing
rd
control)eၾೌᇞTCPഃਪᕚdԨഐΥவԬᗫᒟҦஔ Workshop on Information Hiding (IHW), LNCS 1768, pp. 333-347, Regions and Resolving False Estimations, Proc. IEEE Global Tele-
• Postdoctoral Fellow, Institute of Information Dresden, Germany, Sept. 29 ~ Oct. 1, 1999. communications Conference (Globecom): Wireless Communications,
ೌᇞၣ༩ɪʘൖৃෂ፩f 3. Chun-Shien Lu and Hong-Yuan Mark Liao, Oblivious Cocktail Wa- Networks, and systems, Dallas Texas, USA, 2004.
Science, Academia Sinica (1998/10--2002/7), termarking by Sparse Code Shrinkage: A Regional- and Global-based 11. Chao-Yong Hsu and Chun-Shien Lu, Near-Perfect Cover Image Re-
th
ίʱόൖৃᇜᇁ˙ࠦdͦۃٙൖৃᇜᇁᅺ Approach, Proc. 7 IEEE Int. Conf. on Image Processing (ICIP): covery Anti-Multiple Watermark Embedding Approaches, Proc. IEEE
• Ph.D., Electrical Engineering, National Cheng-Kung special session on second generation multimedia watermarking, Van- Int. Symposium on Circuits and Systems (ISCAS), special session on
University (1998), ˴ࠅഹࠠᏀᐵ率ٙd˸௰อٙൖৃᇜᇁᅺ 4. couver, BC, Canada, Vol. III, pp. 13-16, Sept. 10~13, 2000. Information Assurance and Data Hiding, pp. 5517-5520, Kobe, Japan,
2005. (invited paper)
Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, and Hong-Yuan
H.264/AVC މ例d̴ίᇜᇁ၌Դ͜了εልᕏٙ Mark Liao Cocktail Watermarking for Digital Image Protection, IEEE 12. H. Y. Lin, H. Y. Mark Liao, Chun-Shien Lu, and J. C. Lin, Fragile Wa-
• M.S., Computer Science and Information
စၑجd࿁ۃ˾ٙᇜᇁᅺ (例ν: H.263) ɽ Trans. on Multimedia, Vol. 2, No. 4, pp. 209~224, 2000. termarking for Authenticating 3-D Polygonal Meshes, IEEE Trans. on
Engineering, National Chung-Cheng University 5. Chun-Shien Lu and Hong-Yuan Mark Liao, Multipurpose Watermark- Multimedia, Vol. 7, No. 6, pp. 997-1006, 2005.
ߒ̙˸Ύ降Э50%ٙЗʩ率d್ϾH.264/AVC ίᇜ ing for Image Authentication and Protection, IEEE Trans. on Image 13. Chun-Shien Lu and Chao-Yong Hsu, Geometric Distortion-Resilient
(1992), Processing, Vol. 10, No. 10, pp. 1579~1592, 2001. Image Hashing Scheme and Its Applications on Copy Detection and
ᇁ၌ٙࠇၑልᕏ度ۍɤʱ൮fΪϤdෂ୕ٙൖৃ 6. Chun-Shien Lu and Hong-Yuan Mark Liao, An Oblivious and Robust Authentication, ACM Multimedia Systems Journal, special issue on
• B.S., Applied Mathematics, National Chung-Hsing Watermarking Scheme Using Communications-with-Side-Information Multimedia and Security, Vol. 11, No. 2, pp. 159-173, December 2005.
ᇜᇁᅺஷ੬ਿɓࡈՈϞልᕏᇜᇁ၌ʿᔊఊ༆ᇁ nd
University (1990). Mechanism, Proc. 2 IEEE Int. Conf. Information Technology: Coding (peer-reviewed invited paper)
၌ٙݖdՉʕᇜᇁ၌ٙࠇၑልᕏ度ɽߒ݊༆ᇁ၌ and Computing (ITCC): Special Session on Multimedia Security and 14. Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, Available
Watermarking Applications, Las Vegas, Nevada, USA, pp. 103-107, Bandwidth Estimation via One-Way Delay Jitter and Queuing Delay
ࠇၑልᕏ度ٙ5~10࠴f್ϾdவᅵٙᏀᐵҦஔʊ Apr. 2-4, 2001. (invited paper) Propagation Model, Proc. IEEE Wireless Communication and Net-
不ቇ͜͟Э̌率אЭ༶ၑঐ力ٙ行ਗʩၾช 7. Chun-Shien Lu, Hong-Yuan Mark Liao, and Martin Kutter, Denoising working Conference (WCNC), Las Vegas, USA, 2006.
and Copy Attacks Resilient Watermarking by Exploiting Knowledge 15. Chun-Shien Lu, Shih-Wei Sun, Chao-Yong Hsu, and Pao-Chi Chang,
ኜהଡ଼ϓٙൖৃชၣ路fΪϤdҢࡁ͍೯ɓ၇ at Detector, IEEE Trans. on Image Processing, Vol. 11, No. 3, pp. Media Hash-dependent Image Watermarking Resilient Against Both
280~292, 2002. Geometric Attacks and Estimation Attacks Based on False Positive-
ЭልᕏܓٙอൖৃᏀᐵҦஔd၈މ¨ʱόൖৃᇜ 8. Chun-Shien Lu and Hong-Yuan Mark Liao, Structural Digital Sig- Oriented Detection, IEEE Trans. on Multimedia, Vol. 8, No. 4, 2006.
ᇁf© nature for Image Authentication: An Incidental Distortion Resistant
Scheme, IEEE Trans. on Multimedia, Vol. 5, No. 2, pp. 161-173, 2003.
86 87