Ja-Ling Wu - Academia.edu (original) (raw)

Papers by Ja-Ling Wu

Research paper thumbnail of JQF: Optimal JPEG Quantization Table Fusion by Simulated Annealing on Texture Images and Predicting Textures

arXiv (Cornell University), Aug 12, 2020

Research paper thumbnail of JQTS: Optimal JPEG Quantization Table Selection by Deep CNN-based Texture Prediction

arXiv (Cornell University), Aug 13, 2020

Research paper thumbnail of Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques

IEEE Transactions on Multimedia, Jun 1, 2008

Research paper thumbnail of Bridging Music via Sound Effects

Research paper thumbnail of Fast algorithms for short prime length fast biased polynomial transforms

Research paper thumbnail of Decoding Reed-Muller codes by multi-layer perceptrons

International Journal of Electronics, Oct 1, 1993

Research paper thumbnail of Short Note: A Neural Network Simulating System

The Computer Journal, 1991

Research paper thumbnail of DATE: A Decentralized, Anonymous, and Transparent E-voting System

2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 2018

A trusted electronic election system requires that all the involved information must go public. H... more A trusted electronic election system requires that all the involved information must go public. However, it focuses not only on transparency but also on privacy issues. In other words, each ballot should be counted anonymously, correctly, and efficiently. In this work, an effective e-voting system is proposed for voters to minimize their trust in the authority or government. We ensure the transparency of election by putting all messages on the Ethereum blockchain; in the meantime, the privacy of individual voter is protected via an effective ring signature mechanism. Besides, the attractive self-tallying feature is also built in our system, which guarantees that everyone who can access the blockchain network is able to tally the result on his own, i.e., no third party is required after the voting phase. More importantly, we ensure the correctness of voting results and keep the Ethereum gas cost of individual participant as low as possible, at the same time. Moreover, the pre-described characteristics of stealth address in our system makes it more suitable for large-scale election on line.

Research paper thumbnail of 7.7 an Efficient Jpeg to MPEG-1 Transcoding Alg

From the view points of media editing, it is desired that pictures in an video sequence should be... more From the view points of media editing, it is desired that pictures in an video sequence should be coded in picture-bypicture sense. But, in order to increase the compress ratio, the temporal correlation among pictures must be taken into account. Instead of using JPEG or MPEG alone, in this paper, a transform-domain transcoding approach is proposed to achieve the above goal. Based on the proposed transcoding algorithm, a low-cost and low-bit-rate editing system, which produces MPEG-I decodable bitstreams , can be constructed.

Research paper thumbnail of K-Same-Siamese-GAN: K-Same Algorithm with Generative Adversarial Network for Facial Image De-identification with Hyperparameter Tuning and Mixed Precision Training

2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2019

Research paper thumbnail of An Oracle-Based On-Chain Privacy

Computers, 2020

In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-bas... more In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-based mechanisms, which build an effective connection between a distributed database and real assets. For demonstration purposes, smart contracts were drawn up to deal with two different applications. Due to the characteristics of the blockchain, we may still encounter severe privacy issues, since the data stored on the blockchain are exposed to the public. The proposed scheme provides a general solution for resolving the above-mentioned privacy issue; that is, we try to protect the on-chain privacy of the sensitive data by using homomorphic encryption techniques. Specifically, we constructed a secure comparison protocol that can check the correctness of a logic function directly in the encrypted domain. By using the proposed access control contract and the secure comparison protocol, one can carry out sensitive data-dependent smart contract operations without revealing the data themselves.

Research paper thumbnail of A privacy-preserving cloud-based data management system with efficient revocation scheme

International Journal of Computational Science and Engineering, 2019

Research paper thumbnail of A Multi-User Searchable Encryption Scheme with Constant-Size Keys

International Journal of Computer & Software Engineering, 2018

Research paper thumbnail of Two-stage convolver-based DCT and IDCT algorithms

IEE Proceedings I Communications, Speech and Vision, 1991

Research paper thumbnail of Improved long convolutions using generalized number theoretic and polynomial transforms

IEEE Transactions on Acoustics, Speech, and Signal Processing, 1985

Research paper thumbnail of Real-number DFT codes on a fading channel

Proceedings of 1995 IEEE International Symposium on Information Theory, 1995

Research paper thumbnail of <title>Segmentation-based subband video coder</title>

Visual Communications and Image Processing '95, 1995

In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm... more In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm, each encoding frame is first compared with the associated prediction frame (outputed from a motion estimation based predictor) and the variant blocks (those blocks with variation larger than a given threshold) in the encoding frame are located. And the successive QMF decompositions and entropy coding are applied to encode each variant block. Simulations show that, by using the proposed coding scheme, the picture quality of the reconstructed frames is better than that of the other two well-known subband coding schemes while the resultant data rates are nearly the same. The computational complexities involved in the proposed approach are also shown to be less than that of the others. Moreover, the segmented nature of the proposed algorithm makes it more suitable for parallel implementation.

Research paper thumbnail of When Specular Object Meets RGB-D Camera 3D Scanning: Color Image Plus Fragmented Depth Map

2014 IEEE International Symposium on Multimedia, 2014

3D scanning is an important technology since one can apply the scanning results of objects to num... more 3D scanning is an important technology since one can apply the scanning results of objects to numerous 3D applications (e.g. Artwork sculpture preserving, 3D animation and 3D printing). However, 3D laser scanners are too expensive to be adopted in daily usage. Therefore, building a 3D scanner by a low cost RGB-D camera (e.g. Kinect) is an emerging trend. For a 3D scanner, a specular object is one of the challenging 3D scanning targets where the specular surface will compromise the scanning (laser) lights and lead to scanning failure. In order to acquire the ground truth for 3D scanning of specular objects, we have to perform a non-specular painting process even a 3D laser scanner is used. In order to meet this challenge for an RGB-D camera based 3D scanner, we integrate the response of visual cues reflection and the depth scattering characteristics of specular surfaces to resolve the artifacts of 3D scanning results. Experimental results show our proposed system outperforms the traditional RGB-D 3D scanners in reconstruction quality while keeping the specular object intact (i.e., We need not to perform the pre-described non-specular painting process on the object before scanning).

Research paper thumbnail of Www-efxer: A Java-based Video Editing System

International Conference on Consumer Electronics, 1998

To allow video authoring using low-end platforms, we have designed a Java-based video editing sys... more To allow video authoring using low-end platforms, we have designed a Java-based video editing system using a client-server framework. In the system, the process of video editing is split into a low-resolution authoring stage and a high-resolution production stage which are carried out in the client site and the server site respectively. We defined the Movie Markup Language (MML) as the interface between the two stages. The MML covers a set of primitive operators for video authoring, e.g., spatial and temporal composition, special effect rendering, etc. In our experimental “WWW-EFXer” system, the MML script composed by the client user will be submitted to the remote server for guiding the Movie-Making Agent (MMA) to perform the authoring instructions received.

Research paper thumbnail of Bridging Music via Sound Effects

2014 IEEE International Symposium on Multimedia, 2014

Research paper thumbnail of JQF: Optimal JPEG Quantization Table Fusion by Simulated Annealing on Texture Images and Predicting Textures

arXiv (Cornell University), Aug 12, 2020

Research paper thumbnail of JQTS: Optimal JPEG Quantization Table Selection by Deep CNN-based Texture Prediction

arXiv (Cornell University), Aug 13, 2020

Research paper thumbnail of Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques

IEEE Transactions on Multimedia, Jun 1, 2008

Research paper thumbnail of Bridging Music via Sound Effects

Research paper thumbnail of Fast algorithms for short prime length fast biased polynomial transforms

Research paper thumbnail of Decoding Reed-Muller codes by multi-layer perceptrons

International Journal of Electronics, Oct 1, 1993

Research paper thumbnail of Short Note: A Neural Network Simulating System

The Computer Journal, 1991

Research paper thumbnail of DATE: A Decentralized, Anonymous, and Transparent E-voting System

2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 2018

A trusted electronic election system requires that all the involved information must go public. H... more A trusted electronic election system requires that all the involved information must go public. However, it focuses not only on transparency but also on privacy issues. In other words, each ballot should be counted anonymously, correctly, and efficiently. In this work, an effective e-voting system is proposed for voters to minimize their trust in the authority or government. We ensure the transparency of election by putting all messages on the Ethereum blockchain; in the meantime, the privacy of individual voter is protected via an effective ring signature mechanism. Besides, the attractive self-tallying feature is also built in our system, which guarantees that everyone who can access the blockchain network is able to tally the result on his own, i.e., no third party is required after the voting phase. More importantly, we ensure the correctness of voting results and keep the Ethereum gas cost of individual participant as low as possible, at the same time. Moreover, the pre-described characteristics of stealth address in our system makes it more suitable for large-scale election on line.

Research paper thumbnail of 7.7 an Efficient Jpeg to MPEG-1 Transcoding Alg

From the view points of media editing, it is desired that pictures in an video sequence should be... more From the view points of media editing, it is desired that pictures in an video sequence should be coded in picture-bypicture sense. But, in order to increase the compress ratio, the temporal correlation among pictures must be taken into account. Instead of using JPEG or MPEG alone, in this paper, a transform-domain transcoding approach is proposed to achieve the above goal. Based on the proposed transcoding algorithm, a low-cost and low-bit-rate editing system, which produces MPEG-I decodable bitstreams , can be constructed.

Research paper thumbnail of K-Same-Siamese-GAN: K-Same Algorithm with Generative Adversarial Network for Facial Image De-identification with Hyperparameter Tuning and Mixed Precision Training

2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2019

Research paper thumbnail of An Oracle-Based On-Chain Privacy

Computers, 2020

In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-bas... more In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-based mechanisms, which build an effective connection between a distributed database and real assets. For demonstration purposes, smart contracts were drawn up to deal with two different applications. Due to the characteristics of the blockchain, we may still encounter severe privacy issues, since the data stored on the blockchain are exposed to the public. The proposed scheme provides a general solution for resolving the above-mentioned privacy issue; that is, we try to protect the on-chain privacy of the sensitive data by using homomorphic encryption techniques. Specifically, we constructed a secure comparison protocol that can check the correctness of a logic function directly in the encrypted domain. By using the proposed access control contract and the secure comparison protocol, one can carry out sensitive data-dependent smart contract operations without revealing the data themselves.

Research paper thumbnail of A privacy-preserving cloud-based data management system with efficient revocation scheme

International Journal of Computational Science and Engineering, 2019

Research paper thumbnail of A Multi-User Searchable Encryption Scheme with Constant-Size Keys

International Journal of Computer & Software Engineering, 2018

Research paper thumbnail of Two-stage convolver-based DCT and IDCT algorithms

IEE Proceedings I Communications, Speech and Vision, 1991

Research paper thumbnail of Improved long convolutions using generalized number theoretic and polynomial transforms

IEEE Transactions on Acoustics, Speech, and Signal Processing, 1985

Research paper thumbnail of Real-number DFT codes on a fading channel

Proceedings of 1995 IEEE International Symposium on Information Theory, 1995

Research paper thumbnail of <title>Segmentation-based subband video coder</title>

Visual Communications and Image Processing '95, 1995

In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm... more In this paper, a segmentation-based subband video coding algorithm is proposed. In this algorithm, each encoding frame is first compared with the associated prediction frame (outputed from a motion estimation based predictor) and the variant blocks (those blocks with variation larger than a given threshold) in the encoding frame are located. And the successive QMF decompositions and entropy coding are applied to encode each variant block. Simulations show that, by using the proposed coding scheme, the picture quality of the reconstructed frames is better than that of the other two well-known subband coding schemes while the resultant data rates are nearly the same. The computational complexities involved in the proposed approach are also shown to be less than that of the others. Moreover, the segmented nature of the proposed algorithm makes it more suitable for parallel implementation.

Research paper thumbnail of When Specular Object Meets RGB-D Camera 3D Scanning: Color Image Plus Fragmented Depth Map

2014 IEEE International Symposium on Multimedia, 2014

3D scanning is an important technology since one can apply the scanning results of objects to num... more 3D scanning is an important technology since one can apply the scanning results of objects to numerous 3D applications (e.g. Artwork sculpture preserving, 3D animation and 3D printing). However, 3D laser scanners are too expensive to be adopted in daily usage. Therefore, building a 3D scanner by a low cost RGB-D camera (e.g. Kinect) is an emerging trend. For a 3D scanner, a specular object is one of the challenging 3D scanning targets where the specular surface will compromise the scanning (laser) lights and lead to scanning failure. In order to acquire the ground truth for 3D scanning of specular objects, we have to perform a non-specular painting process even a 3D laser scanner is used. In order to meet this challenge for an RGB-D camera based 3D scanner, we integrate the response of visual cues reflection and the depth scattering characteristics of specular surfaces to resolve the artifacts of 3D scanning results. Experimental results show our proposed system outperforms the traditional RGB-D 3D scanners in reconstruction quality while keeping the specular object intact (i.e., We need not to perform the pre-described non-specular painting process on the object before scanning).

Research paper thumbnail of Www-efxer: A Java-based Video Editing System

International Conference on Consumer Electronics, 1998

To allow video authoring using low-end platforms, we have designed a Java-based video editing sys... more To allow video authoring using low-end platforms, we have designed a Java-based video editing system using a client-server framework. In the system, the process of video editing is split into a low-resolution authoring stage and a high-resolution production stage which are carried out in the client site and the server site respectively. We defined the Movie Markup Language (MML) as the interface between the two stages. The MML covers a set of primitive operators for video authoring, e.g., spatial and temporal composition, special effect rendering, etc. In our experimental “WWW-EFXer” system, the MML script composed by the client user will be submitted to the remote server for guiding the Movie-Making Agent (MMA) to perform the authoring instructions received.

Research paper thumbnail of Bridging Music via Sound Effects

2014 IEEE International Symposium on Multimedia, 2014