Author Search Result

[Author] Ke DING(4hit)

1-4hit
  • Public Watermarking Based on Chaotic Map

    Hongxia WANG  Chen HE  Ke DING  

     
    LETTER-Image/Visual Signal Processing

      Vol:
    E87-A No:8
      Page(s):
    2045-2047

    A novel public watermarking algorithm based on chaotic properties is proposed. Thanks to good randomness and easy reproducibility of chaos, firstly the watermark is permuted by chaotic sequences, then a small number of reference points are selected randomly in the middle frequency bands of DCT domain, and the variable number disorder watermark bits are embedded into the neighborhood of each reference point according to chaotic sequences. The experimental results show the invisibility and robustness.

  • Wavelet-Based Semi-Fragile Watermarking with Tamper Detection

    Ke DING  Chen HE  Ling-ge JIANG  Hong-xia WANG  

     
    LETTER-Information Security

      Vol:
    E88-A No:3
      Page(s):
    787-790

    In this letter, a novel wavelet-based semi-fragile watermarking scheme is presented which exploiting the time-frequency feature of discrete wavelet transform (DWT) and high sensitivity on initial value of chaotic map. We also analyze the robustness to mild modification and fragility to malicious attack of our scheme. Its application includes tamper detection, image verification and copyright protection of multimedia content. Simulation results show the scheme can detect and localize malicious attacks with high peak signal-to-noise ratio (PSNR), while tolerating certain degree of JPEG compression and channel additive white Gaussian noise (AWGN).

  • Quadtrees-Based Image Authentication Technique

    Hongxia WANG  Chen HE  Ke DING  

     
    LETTER-Digital Signal Processing

      Vol:
    E87-A No:4
      Page(s):
    946-948

    This letter presents a novel quandtree-based image authentication technique especially suitable for the content authentication of high quality required digital images. The host image and the hiding marks generate quadtrees which record the information of host images. Any malicious tamper to the image is reflected from the recovered marks. Compared to other authentication schemes based on the fragile watermarking technique, the host image is not at all modified and the detection to malicious tamper is sensitive.

  • Geometrically Invariant Watermarking Based on Gravity Center

    Ke DING  Chen HE  Ling-ge JIANG  Hong-xia WANG  

     
    LETTER-Information Security

      Vol:
    E87-A No:2
      Page(s):
    513-515

    A novel geometrically invariant watermarking scheme based on gravity center is presented which treating the geometrically invariant gravity centers of host image and its supplement image as reference points. Thus watermark synchronization is obtained. Simulation results show the effectiveness of our scheme to the geometrical distortion including rotation and/or scaling.

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.