Page 98 - untitled
P. 98

ѐڲሬ

 Lu, Chun-Shien  ޼Ӻᔊʧ  Research Description
                   Research Description
 ޼Ӻᔊʧ

 ͉ɛତචݬ˴ࠅٙ޼Ӻ˙Σ̙ʱމ(1)εద᜗  My current research interests include (1) mul-  bandwidth, real-time application, mobility, and so
               timedia security; (2) multimedia networking; and (3)   on) of networks exist, a compressed video is very
 τΌe(2)εద᜗ၣ༩eၾ(3)ʱ౳όൖৃᇜᇁf
               distributed video coding.                        sensitive to transmission errors such that the quality
                                                                of a transmitted video after performing decoding
 ίεద᜗τΌ˙ࠦdҢ˴ࠅٙͦᅺ݊޼Ӻ  In the aspect of multimedia security, my re-  cannot be guaranteed. Therefore, how to provide
 ᅰЗओ˥Ι(digital watermarking)ഃ༟ৃᒯᔛ(data   search mainly focuses on the development of data   quality of service (QoS) for robust video transmis-
               hiding technologies such as digital watermarking
 hiding)ҦஔၾᅰЗܸ७(digital fingerprinting)ഃڢ༟                      sion is definitely a very important problem in mul-
               and non-data hiding technologies such as digital   timedia communications. We are currently studying
 ৃᒯᔛ(non-data hiding)ҦஔdԸஈଣεద᜗τΌ
               fingerprinting, digital signature, and robust/visual   the problems of error control, congestion control,
 (multimedia security)ٙਪᕚνdوᛆڭᚐ(copyright   hash to provide the functionalities of copyright   and wireless TCP for wireless video transmission.  Research Fellows
 protection)ၾ༟ࣘʫ࢙ᛠ֛(content authentication)  protection and content authentication. We have
               presented (a) robust watermarking techniques for     As for distributed video coding (DVC), the
 ഃfҢࡁʊ০࿁ᅰЗᅂ྅(image)ၾൖৃ(video)ί(ڢ
               copyright protection; (b) semi-fragile watermarking   current video coding standards usually concentrate
 )༟ৃᒯᔛҦஔਂཀɓӻΐ޼ӺdԨ౤̈(a)੶਄׌
               techniques for content authentication; and (c) digital   on the improvement of increasing compression
 ओ˥ΙҦஔ(robust watermarking)׵ഹЪᛆڭᚐi(b)  fingerprinting techniques for content authentication,   ratio. For example, H.264/AVC, the newest video
 ̒ঌࢮ׌ओ˥ΙҦஔ(semi-fragile watermarking)׵༟  and copy detection and tracing. In data hiding, we   coding standard, employs several very complex
                                                                                                                  Research Fellows
 ͉
 ༟
 ਿ ͉ ༟ ࣘ  ࣘʫ࢙ᛠ֛iၾ(c)ᅰЗܸ७Ҧஔ׵༟ࣘʫ࢙ᛠ֛e  own two United States patent, two ROC patents,   encoding algorithms so that the data rate obtained
 ਿ
 ࣘ
               and one Canadian patent. We are currently develop-  from H.264/AVC can achieve 50% of that obtained
 ልႡਈ಻ၾ৛ᔳഃᏐ͜fίவ˙ࠦdҢࡁʊ௔ᚃᐏ
               ing a more complete multimedia security system by   from H.263. Typically, the encoder is 5 to 10 times
 ᔖcc၈j п޼Ӻࡰ  ੻Շࡈߕ਷ਖ਼лeՇࡈʕശ͏਷ਖ਼лeၾɓࡈ̋ࣅ  studying the challenging issue of integrating robust   more complex than the decoder. However, this kind
 Assistant Research Fellow (2002/8--)  ɽਖ਼лfͦۃdҢࡁ͍ߧɢ׵޼೯ɓࡈ዆Υ੶਄׌  watermarking techniques, digital fingerprinting   of architecture is not suitable for applications of
               techniques, and multimedia encryption techniques.  video sensor networks, which are mainly composed
 ௰৷ኪዝj Ph.D., Electrical Engineering,  ओ˥ΙҦஔeᅰЗܸ७Ҧஔeၾεద᜗̋੗Ҧஔٙ
                                                                of mobile devices and sensor nodes with limited
 National Cheng-Kung University   εద᜗τΌӻ୕d༺Ցᕐࠠڭᚐ̌ঐf  In the aspect of multimedia networking, in   computational capability and battery power. In view
 (1998)        view of the importance of sharing multimedia data,   of this, we are studying and developing a new video
 ίεద᜗ၣ༩˙ࠦdҢࡁഹ଻׵εద᜗༟ࣘπ  it is important to robustly transmit multimedia (e.g.,   coding method called ¨distributed video coding.©
 ཥcc༑j+886-2-2788-3799 ext. 1513  ίٙᄆ࠽ί׵ʱԮdϾʱԮ௰Ҟ஺ٙ˙όک݊ீཀ  video) data over error-prone networks. However,
 ෂccॆj+886-2-2782-4814  ၣ༩ਗ਼εద᜗༟ࣘෂ჈̘̈f್Ͼd͟׵ၣ༩᎖ᄱ  owing to the various characteristics (e.g., unknown
 ٙʔᖢ֛׌eၣ༩ٙମሯ׌dԴ੻εద᜗༟ࣘ(νൖ
 ཥɿڦᇌjlcs@iis.sinica.edu.tw
                   Selected Publications
 ৃ)ቊաՑ΢၇ʔΝٙෂ፩፹Ⴌdኬߧൖৃٙۜሯί  Selected Publications
 ၣccࠫjhttp://www.iis.sinica.edu.tw/~lcs  ༆ᏀᐵʘܝɽషɨࠥfΪϤdνОணࠇ̈ቇΥεద
               1.  Wen L. Hwang, Chun-Shien Lu, and Pau-Choo Chung, Shape From   9.  Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang,
 ᜗༟ࣘत׌ٙ؂ਕۜሯڭᗇ(Quality-of-Service)dί  Texture: Direct Estimation of Planar Surface Orientations Using Con-  Robust Mesh-based Hashing for Copy Detection and Tracing of Im-
                 tinuous Wavelet Transform, IEEE Trans. on Image Processing, Vol. 7,   ages, Proc. IEEE Int. Conf. on Multimedia and Expo (ICME): special
 ൖৃෂ፩༁݊ɓࡈ޴຅ࠠࠅٙሙᕚfίவ˙ࠦdҢ

 •  National Invention and Creation Award  2.  pp. 773~780, 1998.  10.  session on Media Identification, Taipei, Taiwan, 2004.
                 Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, and Chwen-
                                                                  Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, Reliable
 (Silver Medal, 2004),  ࡁ޼Ӻ፹ႬછՓ(error control)eኹ෦છՓ(congestion   Jye Sze, Cocktail Watermarking on Images, Proc. 3  International   Available Bandwidth Estimation Based on Distinguishing Queuing
                                                rd
 control)eၾೌᇞTCPഃਪᕚdԨഐΥவԬᗫᒟҦஔ  Workshop on Information Hiding (IHW), LNCS 1768, pp. 333-347,   Regions and Resolving False Estimations, Proc. IEEE Global Tele-
 •  Postdoctoral Fellow, Institute of Information  Dresden, Germany, Sept. 29 ~ Oct. 1, 1999.  communications Conference (Globecom): Wireless Communications,
 ׵ೌᇞၣ༩ɪʘൖৃෂ፩f  3.  Chun-Shien Lu and Hong-Yuan Mark Liao, Oblivious Cocktail Wa-  Networks, and systems, Dallas Texas, USA, 2004.
 Science, Academia Sinica (1998/10--2002/7),  termarking by Sparse Code Shrinkage: A Regional- and Global-based   11.  Chao-Yong Hsu and Chun-Shien Lu, Near-Perfect Cover Image Re-
                             th
 ίʱ౳όൖৃᇜᇁ˙ࠦdͦۃٙൖৃᇜᇁᅺ  Approach, Proc. 7  IEEE Int. Conf. on Image Processing (ICIP):   covery Anti-Multiple Watermark Embedding Approaches, Proc. IEEE
 •  Ph.D., Electrical Engineering, National Cheng-Kung   special session on second generation multimedia watermarking, Van-  Int. Symposium on Circuits and Systems (ISCAS), special session on
 University (1998),  ๟˴ࠅഹࠠ׵Ꮐᐵ率ٙ౤؁d˸௰อٙൖৃᇜᇁᅺ  4.  couver, BC, Canada, Vol. III, pp. 13-16, Sept. 10~13, 2000.  Information Assurance and Data Hiding, pp. 5517-5520, Kobe, Japan,
                                                                  2005. (invited paper)
                 Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, and Hong-Yuan
 ๟H.264/AVC މ例d̴ίᇜᇁ၌Դ͜了஢εልᕏٙ  Mark Liao Cocktail Watermarking for Digital Image Protection, IEEE   12.  H. Y. Lin, H. Y. Mark Liao, Chun-Shien Lu, and J. C. Lin, Fragile Wa-
 •  M.S., Computer Science and Information
 စၑجd޴࿁׵ۃ˾ٙᇜᇁᅺ๟ (例ν: H.263) ɽ  Trans. on Multimedia, Vol. 2, No. 4, pp. 209~224, 2000.  termarking for Authenticating 3-D Polygonal Meshes, IEEE Trans. on
 Engineering, National Chung-Cheng University   5.  Chun-Shien Lu and Hong-Yuan Mark Liao, Multipurpose Watermark-  Multimedia, Vol. 7, No. 6, pp. 997-1006, 2005.
 ߒ̙˸Ύ降Э50%ٙЗʩ率d್ϾH.264/AVC ίᇜ  ing for Image Authentication and Protection, IEEE Trans. on Image   13.  Chun-Shien Lu and Chao-Yong Hsu, Geometric Distortion-Resilient
 (1992),         Processing, Vol. 10, No. 10, pp. 1579~1592, 2001.  Image Hashing Scheme and Its Applications on Copy Detection and
 ᇁ၌ٙࠇၑልᕏ度ۍɤʱ׻൮fΪϤdෂ୕ٙൖৃ  6.  Chun-Shien Lu and Hong-Yuan Mark Liao, An Oblivious and Robust   Authentication, ACM Multimedia Systems Journal, special issue on
 •  B.S., Applied Mathematics, National Chung-Hsing   Watermarking Scheme Using Communications-with-Side-Information   Multimedia and Security, Vol. 11, No. 2, pp. 159-173, December 2005.
 ᇜᇁᅺ๟ஷ੬ਿ׵ɓࡈՈϞልᕏᇜᇁ၌ʿᔊఊ༆ᇁ      nd
 University (1990).  Mechanism, Proc. 2  IEEE Int. Conf. Information Technology: Coding   (peer-reviewed invited paper)
 ၌ٙݖ࿴dՉʕᇜᇁ၌ٙࠇၑልᕏ度ɽߒ݊༆ᇁ၌  and Computing (ITCC): Special Session on Multimedia Security and   14.  Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, Available
                 Watermarking Applications, Las Vegas, Nevada, USA, pp. 103-107,   Bandwidth Estimation via One-Way Delay Jitter and Queuing Delay
 ࠇၑልᕏ度ٙ5~10࠴f್ϾdவᅵٙᏀᐵҦஔʊ຾  Apr. 2-4, 2001. (invited paper)        Propagation Model, Proc. IEEE Wireless Communication and Net-
 不ቇ͜׵͟Э̌率אЭ༶ၑঐ力ٙ行ਗʩ΁ၾช಻  7.  Chun-Shien Lu, Hong-Yuan Mark Liao, and Martin Kutter, Denoising   working Conference (WCNC), Las Vegas, USA, 2006.
                 and Copy Attacks Resilient Watermarking by Exploiting Knowledge   15.  Chun-Shien Lu, Shih-Wei Sun, Chao-Yong Hsu, and Pao-Chi Chang,
 ኜהଡ଼ϓٙൖৃช಻ၣ路fΪϤdҢࡁ͍޼೯ɓ၇  at Detector, IEEE Trans. on Image Processing, Vol. 11, No. 3, pp.   Media Hash-dependent Image Watermarking Resilient Against Both
                 280~292, 2002.                                   Geometric Attacks and Estimation Attacks Based on False Positive-
 ЭልᕏܓٙอൖৃᏀᐵҦஔd၈މ¨ʱ౳όൖৃᇜ  8.  Chun-Shien Lu and Hong-Yuan Mark Liao, Structural Digital Sig-  Oriented Detection, IEEE Trans. on Multimedia, Vol. 8, No. 4, 2006.
 ᇁf©             nature for Image Authentication: An Incidental Distortion Resistant
                 Scheme, IEEE Trans. on Multimedia, Vol. 5, No. 2, pp. 161-173, 2003.
 86                                                                                                               87
   93   94   95   96   97   98   99   100   101   102   103