In the paper, fast algorithms for three short prime length fast biased polynomial transforms are ... more In the paper, fast algorithms for three short prime length fast biased polynomial transforms are presented, based on the strategy of the minimum number of rotations. These algorithms are of practical use in digital image processing.
2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 2018
A trusted electronic election system requires that all the involved information must go public. H... more A trusted electronic election system requires that all the involved information must go public. However, it focuses not only on transparency but also on privacy issues. In other words, each ballot should be counted anonymously, correctly, and efficiently. In this work, an effective e-voting system is proposed for voters to minimize their trust in the authority or government. We ensure the transparency of election by putting all messages on the Ethereum blockchain; in the meantime, the privacy of individual voter is protected via an effective ring signature mechanism. Besides, the attractive self-tallying feature is also built in our system, which guarantees that everyone who can access the blockchain network is able to tally the result on his own, i.e., no third party is required after the voting phase. More importantly, we ensure the correctness of voting results and keep the Ethereum gas cost of individual participant as low as possible, at the same time. Moreover, the pre-described characteristics of stealth address in our system makes it more suitable for large-scale election on line.
From the view points of media editing, it is desired that pictures in an video sequence should be... more From the view points of media editing, it is desired that pictures in an video sequence should be coded in picture-bypicture sense. But, in order to increase the compress ratio, the temporal correlation among pictures must be taken into account. Instead of using JPEG or MPEG alone, in this paper, a transform-domain transcoding approach is proposed to achieve the above goal. Based on the proposed transcoding algorithm, a low-cost and low-bit-rate editing system, which produces MPEG-I decodable bitstreams , can be constructed.
2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2019
For a data holder, such as a hospital or a government entity, who has a privately held collection... more For a data holder, such as a hospital or a government entity, who has a privately held collection of personal data, in which the revealing and/or processing of the personal identifiable data is restricted and prohibited by law. Then, "how can we ensure the data holder does conceal the identity of each individual in the imagery of personal data while still preserving certain useful aspects of the data after deidentification?" becomes a challenge issue. In this work, we propose an approach towards high-resolution facial image de-identification, called k-Same-Siamese-GAN, which leverages the k-Same-Anonymity mechanism, the Generative Adversarial Network, and the hyperparameter tuning methods. Moreover, to speed up model training and reduce memory consumption, the mixed precision training technique is also applied to make kSS-GAN provide guarantees regarding privacy protection on close-form identities and be trained much more efficiently as well. Finally, to validate its applicability, the proposed work has been applied to actual datasets-RafD and CelebA for performance testing. Besides protecting privacy of high-resolution facial images, the proposed system is also justified for its ability in automating parameter tuning and breaking through the limitation of the number of adjustable parameters.
In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-bas... more In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-based mechanisms, which build an effective connection between a distributed database and real assets. For demonstration purposes, smart contracts were drawn up to deal with two different applications. Due to the characteristics of the blockchain, we may still encounter severe privacy issues, since the data stored on the blockchain are exposed to the public. The proposed scheme provides a general solution for resolving the above-mentioned privacy issue; that is, we try to protect the on-chain privacy of the sensitive data by using homomorphic encryption techniques. Specifically, we constructed a secure comparison protocol that can check the correctness of a logic function directly in the encrypted domain. By using the proposed access control contract and the secure comparison protocol, one can carry out sensitive data-dependent smart contract operations without revealing the data themselves.
International Journal of Computer & Software Engineering, 2018
Cloud storage is widely adopted nowadays. Considering about the data leakage issue, people encryp... more Cloud storage is widely adopted nowadays. Considering about the data leakage issue, people encrypted the data before uploading them to cloud server. However, due to the loss of data's original properties, it is hard to search the encrypted data directly. To solve this problem, searchable encryption scheme has been proposed to search the data stored on Cloud server in the ciphertext domain. To enhance the searchable encryption scheme's practicability, we propose a scheme, which has constant-size keys, to decrease the corresponding storage requirement. In this work, we also provide efficient mechanisms for the participation and revocation of a user. Therefore, it can be easily applied to storage systems of a University or a cooperate user. More importantly, it is our belief that our work provides a useful function for dealing with the mandating enforcement of General Data Protection Regulation (GDPR). Finally, a prototype based on the proposed scheme has been built to verify the feasibility of our work.
Proceedings of 1995 IEEE International Symposium on Information Theory, 1995
The utilization of real-number DFT codes for a m u l t~~l i c a t~v e channel is introduced in y ... more The utilization of real-number DFT codes for a m u l t~~l i c a t~v e channel is introduced in y the proposed encoding procedundancies can be added into data. With these redunmes for t h e parameters of a a n be obtained from the re-The decoding algorithm for realdes can be used to calculate the fading parameters with these syndromes.
Visual Communications and Image Processing '95, 1995
In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm... more In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm, each encoding frame is first compared with the associated prediction frame (outputed from a motion estimation based predictor) and the variant blocks (those blocks with variation larger than a given threshold) in the encoding frame are located. And the successive QMF decompositions and entropy coding are applied to encode each variant block. Simulations show that, by using the proposed coding scheme, the picture quality of the reconstructed frames is better than that of the other two well-known subband coding schemes while the resultant data rates are nearly the same. The computational complexities involved in the proposed approach are also shown to be less than that of the others. Moreover, the segmented nature of the proposed algorithm makes it more suitable for parallel implementation.
2014 IEEE International Symposium on Multimedia, 2014
3D scanning is an important technology since one can apply the scanning results of objects to num... more 3D scanning is an important technology since one can apply the scanning results of objects to numerous 3D applications (e.g. Artwork sculpture preserving, 3D animation and 3D printing). However, 3D laser scanners are too expensive to be adopted in daily usage. Therefore, building a 3D scanner by a low cost RGB-D camera (e.g. Kinect) is an emerging trend. For a 3D scanner, a specular object is one of the challenging 3D scanning targets where the specular surface will compromise the scanning (laser) lights and lead to scanning failure. In order to acquire the ground truth for 3D scanning of specular objects, we have to perform a non-specular painting process even a 3D laser scanner is used. In order to meet this challenge for an RGB-D camera based 3D scanner, we integrate the response of visual cues reflection and the depth scattering characteristics of specular surfaces to resolve the artifacts of 3D scanning results. Experimental results show our proposed system outperforms the traditional RGB-D 3D scanners in reconstruction quality while keeping the specular object intact (i.e., We need not to perform the pre-described non-specular painting process on the object before scanning).
International Conference on Consumer Electronics, 1998
To allow video authoring using low-end platforms, we have designed a Java-based video editing sys... more To allow video authoring using low-end platforms, we have designed a Java-based video editing system using a client-server framework. In the system, the process of video editing is split into a low-resolution authoring stage and a high-resolution production stage which are carried out in the client site and the server site respectively. We defined the Movie Markup Language (MML) as the interface between the two stages. The MML covers a set of primitive operators for video authoring, e.g., spatial and temporal composition, special effect rendering, etc. In our experimental “WWW-EFXer” system, the MML script composed by the client user will be submitted to the remote server for guiding the Movie-Making Agent (MMA) to perform the authoring instructions received.
2014 IEEE International Symposium on Multimedia, 2014
The prevalence of digital technologies allows people to easily create and share their own media c... more The prevalence of digital technologies allows people to easily create and share their own media contents, but sometimes we do not have handy tools to manipulate the media we want to create. For example, while creating personal films, a user may separately find the music segment that matches each part of the video, and then concatenate the segments to create the soundtrack that matches the visual contents along the timeline. However, one may lose the temporal coherence between consecutive music segments if the user just choose music segments that best match parts of the video contents. In this study, we focus on how to smoothly connect not-so-coherent music clips and make the transition natural and pleasant to hear. In particular, we improve the temporal smoothness by bar alignment and dual tempo adjustment. To further fit in with the transition between clips, we incorporate "sound effect insertion" which is a commonly used technique in popular song composition/remixing. In order to provide pleasant listening experience and systematically analyze the effectiveness of the proposed music bridging method, we have conducted specifically designed experiments to collect subjective opinions and reduce the cognitive loads of the participants. The experimental results indicate that with proper arrangement for creating smooth transition via tempo adjustment and sound effect insertion, the listening experience can be largely enhanced.
In the paper, fast algorithms for three short prime length fast biased polynomial transforms are ... more In the paper, fast algorithms for three short prime length fast biased polynomial transforms are presented, based on the strategy of the minimum number of rotations. These algorithms are of practical use in digital image processing.
2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 2018
A trusted electronic election system requires that all the involved information must go public. H... more A trusted electronic election system requires that all the involved information must go public. However, it focuses not only on transparency but also on privacy issues. In other words, each ballot should be counted anonymously, correctly, and efficiently. In this work, an effective e-voting system is proposed for voters to minimize their trust in the authority or government. We ensure the transparency of election by putting all messages on the Ethereum blockchain; in the meantime, the privacy of individual voter is protected via an effective ring signature mechanism. Besides, the attractive self-tallying feature is also built in our system, which guarantees that everyone who can access the blockchain network is able to tally the result on his own, i.e., no third party is required after the voting phase. More importantly, we ensure the correctness of voting results and keep the Ethereum gas cost of individual participant as low as possible, at the same time. Moreover, the pre-described characteristics of stealth address in our system makes it more suitable for large-scale election on line.
From the view points of media editing, it is desired that pictures in an video sequence should be... more From the view points of media editing, it is desired that pictures in an video sequence should be coded in picture-bypicture sense. But, in order to increase the compress ratio, the temporal correlation among pictures must be taken into account. Instead of using JPEG or MPEG alone, in this paper, a transform-domain transcoding approach is proposed to achieve the above goal. Based on the proposed transcoding algorithm, a low-cost and low-bit-rate editing system, which produces MPEG-I decodable bitstreams , can be constructed.
2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2019
For a data holder, such as a hospital or a government entity, who has a privately held collection... more For a data holder, such as a hospital or a government entity, who has a privately held collection of personal data, in which the revealing and/or processing of the personal identifiable data is restricted and prohibited by law. Then, "how can we ensure the data holder does conceal the identity of each individual in the imagery of personal data while still preserving certain useful aspects of the data after deidentification?" becomes a challenge issue. In this work, we propose an approach towards high-resolution facial image de-identification, called k-Same-Siamese-GAN, which leverages the k-Same-Anonymity mechanism, the Generative Adversarial Network, and the hyperparameter tuning methods. Moreover, to speed up model training and reduce memory consumption, the mixed precision training technique is also applied to make kSS-GAN provide guarantees regarding privacy protection on close-form identities and be trained much more efficiently as well. Finally, to validate its applicability, the proposed work has been applied to actual datasets-RafD and CelebA for performance testing. Besides protecting privacy of high-resolution facial images, the proposed system is also justified for its ability in automating parameter tuning and breaking through the limitation of the number of adjustable parameters.
In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-bas... more In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-based mechanisms, which build an effective connection between a distributed database and real assets. For demonstration purposes, smart contracts were drawn up to deal with two different applications. Due to the characteristics of the blockchain, we may still encounter severe privacy issues, since the data stored on the blockchain are exposed to the public. The proposed scheme provides a general solution for resolving the above-mentioned privacy issue; that is, we try to protect the on-chain privacy of the sensitive data by using homomorphic encryption techniques. Specifically, we constructed a secure comparison protocol that can check the correctness of a logic function directly in the encrypted domain. By using the proposed access control contract and the secure comparison protocol, one can carry out sensitive data-dependent smart contract operations without revealing the data themselves.
International Journal of Computer & Software Engineering, 2018
Cloud storage is widely adopted nowadays. Considering about the data leakage issue, people encryp... more Cloud storage is widely adopted nowadays. Considering about the data leakage issue, people encrypted the data before uploading them to cloud server. However, due to the loss of data's original properties, it is hard to search the encrypted data directly. To solve this problem, searchable encryption scheme has been proposed to search the data stored on Cloud server in the ciphertext domain. To enhance the searchable encryption scheme's practicability, we propose a scheme, which has constant-size keys, to decrease the corresponding storage requirement. In this work, we also provide efficient mechanisms for the participation and revocation of a user. Therefore, it can be easily applied to storage systems of a University or a cooperate user. More importantly, it is our belief that our work provides a useful function for dealing with the mandating enforcement of General Data Protection Regulation (GDPR). Finally, a prototype based on the proposed scheme has been built to verify the feasibility of our work.
Proceedings of 1995 IEEE International Symposium on Information Theory, 1995
The utilization of real-number DFT codes for a m u l t~~l i c a t~v e channel is introduced in y ... more The utilization of real-number DFT codes for a m u l t~~l i c a t~v e channel is introduced in y the proposed encoding procedundancies can be added into data. With these redunmes for t h e parameters of a a n be obtained from the re-The decoding algorithm for realdes can be used to calculate the fading parameters with these syndromes.
Visual Communications and Image Processing '95, 1995
In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm... more In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm, each encoding frame is first compared with the associated prediction frame (outputed from a motion estimation based predictor) and the variant blocks (those blocks with variation larger than a given threshold) in the encoding frame are located. And the successive QMF decompositions and entropy coding are applied to encode each variant block. Simulations show that, by using the proposed coding scheme, the picture quality of the reconstructed frames is better than that of the other two well-known subband coding schemes while the resultant data rates are nearly the same. The computational complexities involved in the proposed approach are also shown to be less than that of the others. Moreover, the segmented nature of the proposed algorithm makes it more suitable for parallel implementation.
2014 IEEE International Symposium on Multimedia, 2014
3D scanning is an important technology since one can apply the scanning results of objects to num... more 3D scanning is an important technology since one can apply the scanning results of objects to numerous 3D applications (e.g. Artwork sculpture preserving, 3D animation and 3D printing). However, 3D laser scanners are too expensive to be adopted in daily usage. Therefore, building a 3D scanner by a low cost RGB-D camera (e.g. Kinect) is an emerging trend. For a 3D scanner, a specular object is one of the challenging 3D scanning targets where the specular surface will compromise the scanning (laser) lights and lead to scanning failure. In order to acquire the ground truth for 3D scanning of specular objects, we have to perform a non-specular painting process even a 3D laser scanner is used. In order to meet this challenge for an RGB-D camera based 3D scanner, we integrate the response of visual cues reflection and the depth scattering characteristics of specular surfaces to resolve the artifacts of 3D scanning results. Experimental results show our proposed system outperforms the traditional RGB-D 3D scanners in reconstruction quality while keeping the specular object intact (i.e., We need not to perform the pre-described non-specular painting process on the object before scanning).
International Conference on Consumer Electronics, 1998
To allow video authoring using low-end platforms, we have designed a Java-based video editing sys... more To allow video authoring using low-end platforms, we have designed a Java-based video editing system using a client-server framework. In the system, the process of video editing is split into a low-resolution authoring stage and a high-resolution production stage which are carried out in the client site and the server site respectively. We defined the Movie Markup Language (MML) as the interface between the two stages. The MML covers a set of primitive operators for video authoring, e.g., spatial and temporal composition, special effect rendering, etc. In our experimental “WWW-EFXer” system, the MML script composed by the client user will be submitted to the remote server for guiding the Movie-Making Agent (MMA) to perform the authoring instructions received.
2014 IEEE International Symposium on Multimedia, 2014
The prevalence of digital technologies allows people to easily create and share their own media c... more The prevalence of digital technologies allows people to easily create and share their own media contents, but sometimes we do not have handy tools to manipulate the media we want to create. For example, while creating personal films, a user may separately find the music segment that matches each part of the video, and then concatenate the segments to create the soundtrack that matches the visual contents along the timeline. However, one may lose the temporal coherence between consecutive music segments if the user just choose music segments that best match parts of the video contents. In this study, we focus on how to smoothly connect not-so-coherent music clips and make the transition natural and pleasant to hear. In particular, we improve the temporal smoothness by bar alignment and dual tempo adjustment. To further fit in with the transition between clips, we incorporate "sound effect insertion" which is a commonly used technique in popular song composition/remixing. In order to provide pleasant listening experience and systematically analyze the effectiveness of the proposed music bridging method, we have conducted specifically designed experiments to collect subjective opinions and reduce the cognitive loads of the participants. The experimental results indicate that with proper arrangement for creating smooth transition via tempo adjustment and sound effect insertion, the listening experience can be largely enhanced.
Uploads
Papers by Ja-Ling Wu