Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The steganography that we suggested uses the data that ties strongly to the characteristics of the original image as watermark information without changing the original image. Although similarity with zero-watermarking is pointed out, the major difference is that our method does not need pre-processing for a feature extraction at decoding. Since the decoding can do at high speed, besides using as the original steganography, it is possible to apply it to similar image retrieving, similar image order sorting or template matching. For example, when applying it to medical images, a doctor is possible to pick some similar images from a medical image database and refers the treatments through the images with concealing the information of the patient. This time, we have investigated the identification accuracy of our method with respect to the template matching of similar image searching.

Original languageEnglish
Title of host publicationProceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages457-462
Number of pages6
ISBN (Electronic)9781467397971
DOIs
Publication statusPublished - Mar 2 2016
Event3rd International Symposium on Computing and Networking, CANDAR 2015 - Sapporo, Hokkaido, Japan
Duration: Dec 8 2015Dec 11 2015

Other

Other3rd International Symposium on Computing and Networking, CANDAR 2015
CountryJapan
CitySapporo, Hokkaido
Period12/8/1512/11/15

Fingerprint

Steganography
Template matching
Decoding
Watermarking
Sorting
Feature extraction
Processing

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computational Theory and Mathematics
  • Computer Networks and Communications

Cite this

Ishizuka, H., Sakurai, K., Echizen, I., & Iwamura, K. (2016). Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. In Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015 (pp. 457-462). [7424757] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CANDAR.2015.68

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. / Ishizuka, Hirokazu; Sakurai, Kouichi; Echizen, Isao; Iwamura, Keiichi.

Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., 2016. p. 457-462 7424757.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ishizuka, H, Sakurai, K, Echizen, I & Iwamura, K 2016, Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. in Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015., 7424757, Institute of Electrical and Electronics Engineers Inc., pp. 457-462, 3rd International Symposium on Computing and Networking, CANDAR 2015, Sapporo, Hokkaido, Japan, 12/8/15. https://doi.org/10.1109/CANDAR.2015.68
Ishizuka H, Sakurai K, Echizen I, Iwamura K. Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. In Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc. 2016. p. 457-462. 7424757 https://doi.org/10.1109/CANDAR.2015.68
Ishizuka, Hirokazu ; Sakurai, Kouichi ; Echizen, Isao ; Iwamura, Keiichi. / Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 457-462
@inproceedings{4ac2c0461fdb4619800564aea33b23d1,
title = "Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm",
abstract = "The steganography that we suggested uses the data that ties strongly to the characteristics of the original image as watermark information without changing the original image. Although similarity with zero-watermarking is pointed out, the major difference is that our method does not need pre-processing for a feature extraction at decoding. Since the decoding can do at high speed, besides using as the original steganography, it is possible to apply it to similar image retrieving, similar image order sorting or template matching. For example, when applying it to medical images, a doctor is possible to pick some similar images from a medical image database and refers the treatments through the images with concealing the information of the patient. This time, we have investigated the identification accuracy of our method with respect to the template matching of similar image searching.",
author = "Hirokazu Ishizuka and Kouichi Sakurai and Isao Echizen and Keiichi Iwamura",
year = "2016",
month = "3",
day = "2",
doi = "10.1109/CANDAR.2015.68",
language = "English",
pages = "457--462",
booktitle = "Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

AU - Ishizuka, Hirokazu

AU - Sakurai, Kouichi

AU - Echizen, Isao

AU - Iwamura, Keiichi

PY - 2016/3/2

Y1 - 2016/3/2

N2 - The steganography that we suggested uses the data that ties strongly to the characteristics of the original image as watermark information without changing the original image. Although similarity with zero-watermarking is pointed out, the major difference is that our method does not need pre-processing for a feature extraction at decoding. Since the decoding can do at high speed, besides using as the original steganography, it is possible to apply it to similar image retrieving, similar image order sorting or template matching. For example, when applying it to medical images, a doctor is possible to pick some similar images from a medical image database and refers the treatments through the images with concealing the information of the patient. This time, we have investigated the identification accuracy of our method with respect to the template matching of similar image searching.

AB - The steganography that we suggested uses the data that ties strongly to the characteristics of the original image as watermark information without changing the original image. Although similarity with zero-watermarking is pointed out, the major difference is that our method does not need pre-processing for a feature extraction at decoding. Since the decoding can do at high speed, besides using as the original steganography, it is possible to apply it to similar image retrieving, similar image order sorting or template matching. For example, when applying it to medical images, a doctor is possible to pick some similar images from a medical image database and refers the treatments through the images with concealing the information of the patient. This time, we have investigated the identification accuracy of our method with respect to the template matching of similar image searching.

UR - http://www.scopus.com/inward/record.url?scp=84964765608&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84964765608&partnerID=8YFLogxK

U2 - 10.1109/CANDAR.2015.68

DO - 10.1109/CANDAR.2015.68

M3 - Conference contribution

AN - SCOPUS:84964765608

SP - 457

EP - 462

BT - Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -