


default search action
IIH-MSP 2008: Harbin, China
- Jeng-Shyang Pan, Xiamu Niu, Hsiang-Cheh Huang, Lakhmi C. Jain:
4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3278-3
Digital Crime and Forensics
- Emmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh:
Challenges of Location Tracking Techniques in Wireless Forensics. 3-6 - Rong Xiao, Xingming Sun, Ying Yang:
Copyright Protection in Wireless Sensor Networks by Watermarking. 7-10 - Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao:
File-Update Based Steganography for Microsoft PowerPoint Files. 11-15 - Chang-Tsun Li
, Yue Li:
Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images. 16-19 - Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang:
A Steganography Scheme in P2P Network. 20-24 - Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan:
A Fragile Document Watermarking Technique Based on Wet Paper Code. 25-28 - Te-Cheng Hsu, Wen-Shyong Hsieh, Tung-Shih Su:
A New Watermark Attacking Method Based on Eigen-Image Energy. 29-32
Ubiquitous Multimedia Services and Applications for Residential Users
- Yuh-Ming Cheng, Peng-Fei Chen:
Building an Online Game-Based Learning System for Elementary School. 35-38 - Chun-Ting Huang:
The Study of Balance Traffic Load with Genetic Algorithm for PON. 39-42 - Chien-Ming You, Mong-Fong Horng, Yau-Hwang Kuo, Wan-Ling Du:
A Hybrid Fast Approach to Secure Group-Oriented Management of Key Trees on Internet. 43-46 - Han Xiao, Chao Wang, Na Feng:
Research on Remote Monitoring and Control System Key Techniques Based on Data Point Table. 47-51 - Xiuyuan Li, Xiaojuan Wu, Wenming Li, Xiaogang Wang:
An Adaptive Cross-Layer Scheduling Algorithm for Multimedia Networks. 52-55 - Junfeng Man, Lu-Ming Yang, Wen-qiu Zhu, Qianqian Li:
A Model of Smart Home Fusing Multi-intelligence. 56-59 - Jih-Hsin Ho, Wen-Shyang Hwang:
Supporting Multiple Classes of Services in IP over WDM Ring Network. 60-63 - Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. 64-67
Information Retrieval (1)
- Gang Zhang, Zong Min Ma
, Qiang Tong, Ying He, Tie-Nan Zhao:
Shape Feature Extraction Using Fourier Descriptors with Brightness in Content-Based Medical Image Retrieval. 71-74 - Kai-xing Wu, Qiang Xu:
Image Retrieval Based on Fuzzy Color Histogram. 75-78 - Kejun Wang, Zhen Ren, Xinyan Xiong:
Combination of Wavelet snd SIFT Features for Image Classification Using Trained Gaussion Mixture Model. 79-82 - Tian-Yun Huang:
Media Adaptation in MPEG-21 DIA, Framework, Activities and Open Issues. 83-86 - Qi Han, Chen Song, Meihui Zhang
, Xiamu Niu:
A Novel Facial Image Retrieval Algorithm Based on PLT-PCA. 87-90 - Feng-Cheng Chang
, Hsueh-Ming Hang:
An Improved Presentation Method for Relevance Feedback in a Content-Based Image Retrieval System. 91-94 - Feng-Cheng Chang
, Chin-Yuan Chang, Hsueh-Ming Hang:
A Study on the Meta-data Design for Long-Term Digital Multimedia Preservation. 95-98
Wired and Wireless Multimedia Networking and Applications
- Takuo Nakashima, Akari Ono, Toshinori Sueyoshi:
Performance Framework for P2P Overlay Network. 101-104 - Takuo Nakashima, Yusuke Shomura, Toshinori Sueyoshi:
Queueing Property for Different Type of Self-Similar Traffics. 105-108 - Ningping Sun, Toru Ayabe, Kentarou Okumura:
An Animation Engine with the Cubic Spline Interpolation. 109-112 - Ningping Sun, Kaori Suigetsu, Toru Ayabe:
An Approach to Speech Driven Animation. 113-116 - Jin-Yu Zhang, Man-Gui Liang:
IPTV QoS Implement Mechanism in WLAN. 117-120 - Ye Yao, Wandong Cai, Vincent Hilaire
, Abder Koukam
:
Location Scheme in Wireless Sensor Networks. 121-125 - Wei Song, Yuelong Zhao:
Secure Peer Joining Process in Structured P2P System. 126-129 - Jiemin Liu, Jingxin Dou, Hongxing Zou, Yuan Gao:
Reducing Signaling cost with Simplifed mSCTP In Fast Mobile IPv6. 130-133
Techniques and Algorithms for Multimedia Security (1)
- Kenshi Uematsu, Ryôichi Sasaki:
A Proposal of Falsification Detection System in Structural Design. 137-142 - Katsunari Yoshioka
, Tsutomu Matsumoto:
Fingerprinting Traffic Log. 143-146 - Maki Yoshida, Toru Fujiwara:
Expiration Dated Fingerprinting. 147-150 - Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda:
Lossless Data Hiding Using Bit-Depth Embedding for JPEG2000 Compressed Bit-Stream. 151-154 - Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
Performance Improvement of JPEG2000 Steganography Using QIM. 155-158 - Shengbing Che, Bin Ma, Zuguo Che:
An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System. 159-162 - Xiaoming Zhang, Xiong Yin, Zhaoyang Yu:
Robust Audio Watermarking Algorithm Based on Histogram Specification. 163-166 - Shao-Cheng Qu, Mei-jing Gong, Xiaoyan Wang:
Parameter Modulation Secure Communication Based on Active Control. 167-170
Event Analysis in Videos
- Yuan-Kai Wang
, Chin-Fa Wang:
Face Detection with Automatic White Balance for Digital Still Camera. 173-178 - Chi-Hung Chuang, Jun-Wei Hsieh, Luo-Wei Tsai, Kuo-Chin Fan:
Human Action Recognition Using Star Templates and Delaunay Triangulation. 179-182 - Yueh-Shiun Lee, Jinn Ho, Wen-Liang Hwang, Chung-Lin Huang:
Iris Recognition Based on Matching Pursuits. 183-187 - Duan-Yu Chen, Hsiao-Rong Tyan, Sheng-Wen Shih, Hong-Yuan Mark Liao:
Dynamic Visual Saliency Modeling for Video Semantics. 188-191 - Xin Wang, Bo Xuan, Silong Peng:
Digital Image Forgery Detection Based on the Consistency of Defocus Blur. 192-195 - Zhonghua Sun, Kebin Jia, Hexin Chen:
Video Key Frame Extraction Based on Spatial-Temporal Color Distribution. 196-199 - Jing Bi, Shu-Chang Liu:
A Speaker Identification System for Video Content Analysis. 200-203 - Tien-Ying Kuo
, Yi-Chung Lo:
Detection of H.264 Shot Change Using Intra Predicted Direction. 204-207
Fingerprinting
- Yanzhen Ren, Ruimin Hu, Haojun Ai:
An Asymmetric Multicast Fingerprinting Scheme Based on Secret Sharing. 211-214 - Wansu Bao, Yun Wei:
A Forward Secure Ring Signature Scheme. 215-218 - Lifen Li:
Trust Derivation and Recommendation Management in a Trust Model. 219-222 - Yongjian Hu, Heung-Kyu Lee, Huafei Zeng:
Curve Watermarking Technique for Fingerprinting Digital Maps. 223-226 - Xinghua Yu, Tiejun Huang:
An Image Fingerprinting Method Robust to Complicated Image Modifications. 227-230 - Hsiang-Cheh Huang
, Yueh-Hong Chen:
Multicast Video Fingerprinting Scheme with Genetic Algorithm. 231-234 - Yongjian Liao, Qing Lu, Zhiguang Qin:
Designated Verifier Proxy Signature Scheme. 235-238 - Hsiang-Cheh Huang
, Yueh-Hong Chen, Shin-Chang Chen:
Copyright Protection for Images with EXIF Metadata. 239-242
Data Hiding and Steganography (1)
- Hedieh Sajedi
, Mansour Jamzad:
A Steganalysis Method Based on Contourlet Transform Coefficients. 245-248 - Diqun Yan
, Rangding Wang:
Reversible Data Hiding for Audio Based on Prediction Error Expansion. 249-252 - Kensuke Naoe, Yoshiyasu Takefuji
:
Damageless Information Hiding Technique Using Neural Network. 253-256 - Huajun Huang, Shaohong Zhong, Xingming Sun:
An Algorithm of Webpage Information Hiding Based on Attributes Permutation. 257-260 - Farzin Yaghmaee
, Mansour Jamzad:
Estimating Data Hiding Capacity of Gray Scale Images Based on Its bitplanes Structure. 261-264 - Chih-Cheng Lo, Chien-Ming Lee, Bin-Yih Liao, Jeng-Shyang Pan
:
Halftone Image Data Hiding with Reference to Original Multitone Image. 265-268 - Jianquan Xie, Chunhua Yang
, Dazu Huang:
High Capacity Information Hiding Algorithm for DCT Domain of Image. 269-272 - Hai-Ying Gao:
A Blind Steganalysis Algorithm of QIM-Based Hiding. 273-276
Cryptography (1)
- Changji Wang, Rongbo Lu:
A Certificateless Restrictive Partially Blind Signature Scheme. 279-282 - Jing Liu, Fei Gao, Haiyan Ma:
A Speech Chaotic Encryption Algorithm Based on Network. 283-286 - Dawei Zhang, Wenrui Ding, Ding Ding:
Fast Implementation of SMS4 Cryptographic Algorithms on Smart Card. 287-290 - Tao Meng, Xiaoqian Wu, Shenghe Sun:
A Method of Big Prime Number Generator Based on NTL. 291-293 - Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo:
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. 294-297 - Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Myong-Soon Park:
An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network. 298-303 - Chun-Yan Song, Yu-Long Qiao, Xing-Zhou Zhang:
Data Study on the Chaotic Synchronization Driven by External Chaotic Signal. 304-307 - Xiamu Niu, Chongqing Zhou, Jianghua Ding, Bian Yang:
JPEG Encryption with File Size Preservation. 308-311
Techniques and Algorithms for Multimedia Security (2)
- Yusuke Atomori, Isao Echizen, Hiroshi Yoshiura:
Picture Watermarks Surviving General Affine Transformation and Random Distortion. 315-318 - Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai:
Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed Documents. 319-322 - Kitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, Seiichiro Hangai:
A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile Sizes. 323-326 - Kosuke Kamiya, Takuma Mori, Keiichi Iwamura:
Development of Benchmark Tool for Digital Watermarking. 327-330 - Xuping Huang, Ryota Kawashima
, Norihisa Segawa, Yoshihiko Abe:
Design and Implementation of Synchronized Audio-to-Audio Steganography Scheme. 331-334 - Qingcheng Li, Jin Zhang, Zhenhua Zhang, Jia-xin Liu:
A Chinese Text Watermarking Based on Statistic of Phrase Frequency. 335-338 - Xiaofeng Huang, Fei Peng
, Tao Deng:
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System. 339-342 - Yi Xiao, Lee-Ming Cheng
, L. L. Cheng:
A Robust Image Watermarking Scheme Based on a Novel HVS Model in Curvelet Domain. 343-347
Pattern Recognition (1)
- Xiaochun Shi:
Comparison of Two Modern Pattern Recognition Methods. 351-353 - Xiaoyu Wang, Feng Jiang, Hongxun Yao:
Sign Language Synthesis of Individuation Based on Data Model. 354-357 - Pham Anh Phuong, Ngo Quoc Tao, Chi Mai Luong:
An Efficient Model for Isolated Vietnamese Handwritten Recognition. 358-361 - Tong-Yan Li, Xing-Ming Li:
New Criterion for Mining Strong Association Rules in Unbalanced Events. 362-365 - Tao Peng, Minghua Jiang, Ming Hu:
Using Semantics for Dynamic Access Control of XML Documents in Dynamic Coalition Environment. 366-369 - JianLiang Meng, WeiXiang Cheng:
MST Clustering Algorithm Based on Optimized Grid. 370-373 - Qianwen Wang, Wenjun Huang, Xiamu Niu, Xiuzhan Jiang:
A Template Protection Scheme For Statistic Feature-based 2D Face Recognition. 374-377 - Yung-Mao Lu, Bin-Yih Liao, Jeng-Shyang Pan
:
A Face Recognition Algorithm Decreasing the Effect of Illumination. 378-381
Image and Speech Processing
- Renlong Wang, Yanling Hao, Ying Liu, Jin Xi:
An Embedded and Efficient Low Memory Hierarchical Image Coder. 385-388 - Wenzhe Lv, Zhe Zhang, Xixian Niu:
Improved Hidden Markov Tree Model and Its Application in Image Denoising. 389-392 - Chung Ming Kuo, Nai-Chung Yang, Wei-Han Chang, Chi-Lin Wu:
Image Recovery Based on Effective Image Completion. 393-396 - Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. 397-401 - Huiyan Jiang, Yudong Zhao, Ning Li:
The Study of 3D Reconstruction Method Based on Dynamic Threshold Method and Improved Ray Casting Algorithm. 402-405 - Lihua Liu, Mingyu Li, Qiong Li, Yan Liang:
Perceptually Transparent Information Hiding in G.729 Bitstream. 406-409 - Yuhua Jiao, Qiong Li, Xiamu Niu:
Compressed Domain Perceptual Hashing for MELP Coded Speech. 410-413 - Chang'an Wei, Shouda Jiang:
Automatic Target Detection and Tracking in FLIR Image Sequences Using Morphological Connected Operator. 414-417
Video Signal Processing (1)
- Yunpeng Zhang, Zhengjun Zhai, Xuan Nie, Chunyan Ma, Fei Zuo:
An Extended Self-Adaptive Kalman Filtering Object Motion Prediction Model. 421-424 - Zhuoyi Lv, Kebin Jia:
A Novel Algorithm of Fast Detection and Segmentation of Moving Object. 425-428 - Chia-Hung Yeh, Shih-Meng Chen, Shiunn-Jang Chern:
Content-Aware Video Transcoding via Visual Attention Model Analysis. 429-432 - Yuan-Qing He, Shi-Xin Sun:
A Data Layout and Access Control Strategies of the Video Storage Server Based Disk Array. 433-437 - Guiguang Ding:
A Multi-view Video Coding Method Based on Distributed Source Coding for Free Viewpoint Switching. 438-441 - Tien-Ying Kuo
, Chung-Hsin Wang:
Fast Local Motion Estimation and Robust Global Motion Decision for Digital Image Stabilization. 442-445 - Zu-jue Chen, Zhi-xiong Zhang, Xing Luo:
Efficient Block-Matching Motion Estimation Algorithm Based on Temporal and Spatial Correlation for H.264. 446-449 - Wei Ren, Yuesheng Zhu:
A Video Summarization Approach Based on Machine Learning. 450-453
Watermarking Applications (1)
- Elham Salahi, M. Shahram Moin
, Ahmad Salahi:
A New Visually Imperceptible and Robust Image Watermarking Scheme in Contourlet Domain. 457-460 - Xiaohong Deng, Guowen Xu
, Guang Sun, Junfeng Man:
Software Watermarking Based on Dynamic Program Slicing. 461-464 - H. Y. Leung, Lee-Ming Cheng
, L. L. Cheng:
A Robust Watermarking Scheme Using Selective Curvelet Coefficients. 465-468 - Chih-Chin Lai, Hsiang-Cheh Huang
, Cheng-Chih Tsai:
Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. 469-472 - Larbi Boubchir
, Ayoub Otmani
, Nadia Zerida:
The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking. 473-476 - Qian Zhang, Nigel Boston:
Stylometric Watermarking. 477-480 - Tianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang:
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity. 481-484 - Jing-Ming Guo, Chung-Te Yang, Jiann-Der Lee
:
Mean-Classified and Hierarchical Block Matching Watermarking in Fractal Coding. 485-488
Networking Applications (1)
- Ye Yao, Vincent Hilaire
, Abder Koukam
, Wandong Cai:
A Holonic Model in Wireless Sensor Networks. 491-495 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesAsymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia Transport. 496-499
- Kai Li, Shijue Zheng, Zhenhua Zheng, Xiaoyan Chen:
Research on Three-Dimensional Localization Algorithm in Wireless Sensor Network. 500-503 - Yuan-Bo Chen, Chih-Jen Yang, Gwo-Jia Jong:
Intelligent Campus Multi-application RFID Integration System. 504-507 - Wenying Zeng, Yuelong Zhao, Wei Song, Wenfeng Wang:
Wireless Grid and Storage System Design. 508-511 - Haohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo:
A Metrics Suite for Static Structure of Large-Scale Software Based on Complex Networks. 512-515 - Zhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo
:
On the Security of WAI Protocol in the Third Version of WAPI. 516-519 - Chin-Shiuh Shieh, Che-Wei Hsu, Wei Kuang Lai:
Application-Layer Implementation of Service Migration. 520-525
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian:
Symbian Forensics: An Overview. 529-533 - Lei Pan
, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. 534-537 - Keun-Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung-Soo Lim, Seokhee Lee, Sangjin Lee:
Methodologies for Detecting Covert Database. 538-541 - Sunmi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, Sangjin Lee:
Design and Implementation of a Tool for System Restore Point Analysis. 542-546 - Yeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim:
Design and Implementation of a Tool to Detect Accounting Frauds. 547-552 - Ya-Jing Zhang, Shuan-Hu Wu:
A Gene Immune Detection Algorithm with Complement Operator on the Basis of Biological Immune Principles. 553-556 - Xiaoyi Yu, Noboru Babaguchi:
An Improved Steganalysis Method of LSB Matching. 557-560 - Hui Zhang, Shenghong Chen, Yuqin Sun, Xiamu Niu:
An Evaluation Framework for Kernel-Mode Security Modules. 561-564
The Applications of Skin Detection
- Jiann-Shu Lee, Kai-Yang Huang, Sho-Tsung Kao
, Seng-Fong Lin:
Face Recognition by Integrating Chin Outline. 567-571 - Yi-Chun Lee, Chin-Hsing Chen:
Face Recognition Based on Gabor Features and Two-Dimensional PCA. 572-576 - Cheung-Wen Chang, Yung-Nien Sun:
Hand Detections Based on Invariant Skin-Color Models Constructed Using Linear and Nonlinear Color Spaces. 577-580 - Sajad Shirali-Shahreza, Hamid Beigy
, Mohammad Hassan Shirali-Shahreza
:
Knapsack Model for Pixel Based Skin Detection. 581-584 - Jing-Wein Wang
:
Face Localization in Cluttered Background. 585-589 - JianLiang Meng, WeiXiang Cheng:
Research of Gravity-Based Outliers Detection. 590-593 - Damon Shing-Min Liu, Ching-I Cheng:
Sensation Based Clothes Search System. 594-597
Advanced Data Hiding and Coding Techniques for Audio Signals
- Akira Nishimura:
Data Hiding for Audio Signals That Are Robust with Respect to Air Transmission and a Speech Codec. 601-604 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
Steganography in Silence Intervals of Speech. 605-607 - Naofumi Aoki:
A Technique of Lossless Steganography for G.711 Telephony Speech. 608-611 - Akinori Ito
, Kiyoshi Konno, Shozo Makino, Motoyuki Suzuki:
Packet Loss Concealment for MDCT-Based Audio Codec Using Correlation-Based Side Information. 612-615 - Masashi Unoki
, Daiki Hamada:
Audio Watermarking Method Based on the Cochlear Delay Characteristics. 616-619 - Michael Gulbis, Erika Müller, Martin Steinebach:
Content-Based Authentication Watermarking with Improved Audio Content Feature Extraction. 620-623 - Kazuhiro Kondo
, Kiyoshi Nakagawa:
A Digital Watermark for Stereo Audio Signals Using Variable Interchannel Delay in High Frequency Bands. 624-627 - Koudai Hiratsuka, Kazuhiro Kondo
, Kiyoshi Nakagawa:
On the Accuracy of Estimated Synchronization Positions for Audio Digital Watermarks Using the Modified Patchwork Algorithm on Analog Channels. 628-631
Intelligent Video Processing
- Chih-Cheng Wei, Chin-Hsing Chen:
Generalized Bilinear Interpolation of Motion Vectors for Quad-Tree Mesh. 635-638 - Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang:
Robust Superresolution Reconstruction from Compressed Video Sequences with Occlusion. 639-642 - Chao-Yu Chen, Chao-Ho Chen, Tien-Hsiang Huang, Chin-Hsing Chen:
An Adaptive Image Frequency Subbanding Method for High-Frequency Pixel Estimation. 643-646 - Chin-Fa Hsieh, Tsung-Han Tsai, Chih-Hung Lai, Tai-An Shan:
A Novel Efficient VLSI Architecture of 2-D Discrete Wavelet Transform. 647-650 - Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen:
Low Power Adders Design for Portable Video Terminal. 651-654 - Da-Jinn Wang, Wen-Sheng Chen, Thou-Ho Chen, Tsong-Yi Chen:
The Study on Ship-Flow Analysis and Counting System in a Specific Sea-Area Based on Video Processing. 655-658 - Tsong-Yi Chen, Thou-Ho Chen, Yin-Ting Lin, Yin-Chan Chang, Da-Jinn Wang:
H.264 Video Authentication Based on Semi-fragile Watermarking. 659-662
Joint Source Channel Coding and Applications
- Lishui Chen, Guizhong Liu:
A Delivery System for Scalable Video Streaming Using the Scalability Extension of H.264/AVC over DiffServ Networks. 665-669 - Xueming Qian, Guizhong Liu, Huan Wang:
GM/LM Based Error Concealment for MPEG-4 Video Transmission over High Lossy and Noisy Networks. 670-674 - Ying Feng, Song Xiao, Chengke Wu, Rui Song:
A Refined Algorithm for the Side Information in DVC. 675-678 - Yangli Wang, Jechang Jeong, Chengke Wu, Song Xiao, Min Zhou:
An Approach to Side Information Estimation Based on Universal Prediction and Motion Compensated Interpolation. 679-682 - Xuejuan Gao, Li Zhuo, Suyu Wang
, Lansun Shen:
A H.264 Based Joint Source Channel Coding Scheme over Wireless Channels. 683-686 - Chuang Lin, Jeng-Shyang Pan
:
Double-Domains-Based Covert Communication Scheme for a RS-Code-Based Multiple Description Image Coding System. 687-690 - Anhong Wang, Yao Zhao, Jeng-Shyang Pan
:
Multiple Description Image Coding Based on DSC and Pixel Interleaving. 691-694 - Tian-Yun Huang:
Multiple Descriptions and Adaptive Delivery of Media Content over Wireless. 695-698
Intelligent Signal and Image Processing (1)
- Xian-Hua Han, Yen-Wei Chen, Akihiko Yamada, Hideto Fujita:
Robust Face Recognition Based on Modified ICA without Training Sample of Test Subjects. 701-704 - Huchuan Lu, Chao Wang, Yen-Wei Chen:
Gaze Tracking by Binocular Vision Technology and PPBTF Features. 705-708 - Yohei Tsurugai, Yuuta Iwasaki, Xian-Hua Han, Yen-Wei Chen:
Region-Based Segmentation and Auto-Annotation for Color Images. 709-712 - Tomoko Tateyama, Zensho Nakao, Yen-Wei Chen:
Classification of Brain Matters in MRI by Kernel Independent Component Analysis. 713-716 - Shingo Takemura, Xian-Hua Han, Yen-Wei Chen, Kazuhiro Ito, Ikuko Nishikawa, Masahiro Ito:
Enhancement and detection of lung nodules with Multiscale filters in CT images. 717-720 - Hisashi Kawabayashi, Yen-Wei Chen:
Interactive System of Artificial Fish School Based on the Extended Boid Model. 721-724 - Yen-Wei Chen, Shouta Sobue, Xinyin Huang:
Mapping Functions of Color Image Features and Human KANSEI. 725-728
Image Feature Extraction, Compression and Watermarking
- Xiangyang Sun, Ju Liu, Jiande Sun, Qiang Zhang, Wei Ji:
A Robust Image Watermarking Scheme Based on the Relationship of SVD. 731-734 - Shiraz Ahmad, Zhe-Ming Lu:
Intelligent Watermark Recovery Using Spatial Domain Extension. 735-739 - Gaorong Zeng, Zhengding Qiu:
A Novel ICA-Based Extraction Scheme for Image Watermarking. 740-743 - Yi Wang, Kuilong Xia, Yu Fan, Qiong Li:
Digital Watermarking Algorithms for Vector Images. 744-747 - Xinghua Sun, Ju Liu, Jiande Sun, Niqing Yang, Shilong Wu:
An Improved Adaptive QIM Watermark Iterative Algorithm. 748-751 - Zhan-Long Yang, Bao-Long Guo:
Image Registration Using Feature Points Extraction and Pseudo-Zernike Moments. 752-755 - Meng Li, Canjie Huang, Ping Fu, Suyan Yue:
Heritage Debris Classification Based on 3D Texture Feature and SVM. 756-759 - Tien-Ying Kuo
, Wen-Hai Hsiao:
A Novel Preservation Framework for Digital Image Archiving System. 760-763
Information Retrieval (2)
- Jen-Wen Ding, Wan-Ting Wang, Chu-Fu Wang:
An Efficient Data Replication Scheme for Peer-to-Peer Video Streaming over Wireless-Mesh Community Networks. 767-770 - Nguyen Huu Quynh, Ngo Quoc Tao:
Improving Harbin Method for Content Based Landscape Image Retrieval. 771-774 - Jirong Li:
Feature Selection Based on Correlation between Fuzzy Features and Optimal Fuzzy-Valued Feature Subset Selection. 775-778 - Hua Hu, Ying Liu, Xun Wang, Xia-jun Zhu, Bin Xu:
Road Extraction in Remote Sensing Images Using a New Algorithm. 779-782 - Yan Wang, Kebin Jia:
A Novel Information Entropy Shift Based Image Retrieval Algorithm. 783-786 - Lin Xie, Yao Zhao, Zhenfeng Zhu:
A Unified System for Web Personal Image Retrieval. 787-790 - Qiong Li, Jing Wu, Xin He:
Content-Based Audio Retrieval Using Perceptual Hash. 791-794
Video Signal Processing (2)
- Pengyu Liu, Kebin Jia:
An Effective Motion Estimation Scheme for H.264/AVC. 797-801 - Chia-Hung Yeh, Kai-Lin Huang, Shiunn-Jang Chern:
Deblocking Filter by Color Psychology Analysis for H.264/AVC Video Coders. 802-805 - Chih-Shan Liu, Wen-Li Wei, Nai-Chung Yang, Chung Ming Kuo:
Motion Vector Re-estimation for Video Trans-coding with Arbitrary Downsizing. 806-809 - Sangchun Han, Hwangjun Song, Jun Heo:
Path Virtualization Using Fountain Code for Video Streaming over Heterogeneous Networks. 810-813 - Baofeng Li, Yong Dou:
Subblock-Based BPE Scheme to Conquer Mismatch in Memory Access Pattern. 814-817 - Mohammad Reza Hosseiny Fatemi, Hasan F. Ates
, Rosli Salleh
:
A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC. 818-821 - Zu-jue Chen, Wei Jia, Zhi-xiong Zhang:
Video Monitoring System Based on Amending Model of Motion Vector. 822-825 - Xiang Fu, Baolong Guo:
Framework for Distributed Video Surveillance in Heterogeneous Environment. 826-829
Video Watermarking
- Shaohui Liu
, Tianhang Chen, Hongxun Yao, Wen Gao:
A Real-Time Video Watermarking Using Adjacent Luminance Blocks Correlation Based on Compressed Domain. 833-836 - Chung Ming Kuo, Cheng-Ping Chao, Wei-Han Chang, Jin-Long Shen:
Broadcast Video Logo Detection and Removing. 837-840 - Ren-Guey Lee, Chun-Chieh Hsiao, Hsin-Hao Tseng, Chih-Chun Lai:
Digital Video Multicasting System with Seamless Handover Mechanism. 841-844 - Zhi Li, Xiaowei Chen:
Self-Adaptive Video Watermarking Based on the Motion Characteristic Detection and the Model of Entropy. 845-848 - Po-Chyi Su
, Ming-Lun Li, Ing-Fan Chen:
A Content-Adaptive Digital Watermarking Scheme in H.264/AVC Compressed Videos. 849-852 - Tien-Ying Kuo
, Yi-Chung Lo, Chen-I Lin:
Fragile Video Watermarking Technique by Motion Field Embedding with Rate-Distortion Minimization. 853-856 - Ning Zhu, Guiguang Ding, Yaguang Yin, Jianmin Wang
:
A Novel Watermarking Method For Wyner-Ziv Video Coding. 857-860
Pattern Recognition (2)
- Jian-liang Meng, Wan-qing Gao, Hui-jing Pang, Wei-hua Niu:
Face Recognition Based on Chaotic Fuzzy RBF Neural Network. 863-866 - Xiaoyan Hao, Xiaoming Chang, Kaiying Liu:
Shallow Semantic Parsing for Lexical Units in Chinese FrameNet. 867-872 - Bo Li, Zhiyuan Zeng, Jian-zhong Zhou:
An Algorithm for License Plate Recognition System for Non-stop Toll Stations. 873-876 - Chunjiang Pang, Weixiang Cheng, Weihua Niu:
Grid Distance-Based Improving Accuracy Clustering Algorithm. 877-880 - Xinwu Li:
A Volume Segmentation Algorithm for Medical Image Based on K-Means Clustering. 881-884 - Ming Liu, Yuanchao Liu, Xiaolong Wang:
IGSOM: Incremental Clustering Based on Self-Organizing-Mapping. 885-890 - Qingdong Du, Jin Li, Xiao Chen:
Image Recognition Based on a Novel Data Fusion Method. 891-894
Optimization Techniques and Applications (1)
- Xilong Qu, Jian Feng, Wenfang Sun:
Parallel Genetic Algorithm Model Based on AHP and Neural Networks for Enterprise Comprehensive Business. 897-900 - Bo Lei, Jiu-Lun Fan:
Parameter Selection of Generalized Fuzzy Entropy-Based Thresholding Segmentation Method with Particle Swarm Optimization. 901-904 - Jian-liang Meng, Wan-qing Gao, Hui-jing Pang, Wei-hua Niu:
Fault Diagnosis of Distribution System Based on Distributed Chaotic Fuzzy RBF Neural Networks. 905-908 - Doru Constantin, Luminita State:
The FastICA Algorithm Based on Successive Approximations with Superior Convergence Rate. 909-912 - Xue-mei Wu, Gui-xian Li, Wei-min Zhao:
Incomplete Points Cloud Data Surface Reconstruction Based on Neural Network. 913-916 - Dongyun Wang, Guan Wang:
Parameters Optimization of Fuzzy Controller Based on Improved Particle Swarm Optimization. 917-921 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesAn Implementation of Fuzzy Clustering with Size and Shape Constraints. 922-925
Cross-Discipline Techniques (1)
- Jin-Yu Zhang, Man-Gui Liang:
An Optimal Predictive Polling Mechanism on EPON. 929-932 - Ang Li, Nannan Geng, Hong Gao:
Design and Implementation of A New Practical Grid. 933-936 - Xiaosong Zhao, Zhen He, Fangfang Gui, Shenqing Zhang:
Research on the Application of Six Sigma in Software Process Improvement. 937-940 - Liu Zhong:
The Research of Trusted Computing Based on the Model of Trusted Meta Data of BSCM. 941-945 - Yong-Zhong He, Zhan Han, Ye Du:
Configuring RBAC to Simulate Bell Model. 946-949 - Dening Zhang, Shuguang Zhang, Xuesong Suo, Man Cheng, Hong Juan Kou, Xiang Ling Shi, Su Zhang, Haiquan Li:
Development on the Partial Discharge On-Line Monitoring System of Transformer Based on Embedded System. 950-953 - Haohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo:
Visualization and Cognition of Large-Scale Software Structure Using the k-Core Analysis. 954-957 - Chuan-Sheng Zhou:
Research and Design of Autonomic Software Agent Architecture. 958-961
Watermarking Applications (2)
- Gaurav Gupta
, Josef Pieprzyk
:
Source Code Watermarking Based on Function Dependency Oriented Sequencing. 965-968 - Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu:
A New Approach against Color Attacks of Watermarked Images. 969-972 - Cagatay Karabat
, Mehmet Keskinöz
:
Watermark Detection Using Channel Estimation in the Quantization Based Watermarking System. 973-976 - Jing-Ming Guo, Yu-Cheng Lu, Jiann-Der Lee
:
Variance-Classified Capacity Watermarking Using Discrete Cosine Transform. 977-980 - Farzin Yaghmaee
, Mansour Jamzad:
Introducing a New Method for Estimation Image Complexity According To Calculate Watermark Capacity. 981-984 - Yu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang:
A Novel Relational Database Watermarking Algorithm for Joint Ownership. 985-988 - Anbo Li, Ying Chen, Bingxian Lin, Wei Zhou, Guonian Lv:
Review on Copyright Marking Techniques of GIS Vector Data. 989-993 - Niansheng Liu, Guo-hao Yang, Donghui Guo, L. L. Cheng:
A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences. 994-998
Networking Applications (2)
- Sheng-Rong Huang, Gwo-Jiun Horng, Gwo-Jia Jong:
Intelligent Hospital Space Platform Combined with RFID and Wireless Sensor Network. 1001-1004 - Jiemin Liu, Hongxing Zou, Jingxin Dou, Yuan Gao:
Rethinking Retransmission Policy In Concurrent Multipath Transfer. 1005-1008 - Zae-Kwun Lee, Hwangjun Song, GyeongCheol Lee:
Cooperative QoS-Aware Routing Algorithm Based on IEEE 802.11 Multi-rate over Mobile Ad Hoc Networks. 1009-1012 - Chuang Lin, Jeng-Shyang Pan
:
An Information Hiding Scheme for the MDC-OFDM Wireless Networks. 1013-1016 - Liguo Deng, Zongmin Ma
, Qiang Tong:
The Design and Analysis of Constraint Networks for Uncertain Temporal Interval Relations. 1017-1020 - Wen-Hao Hsieh, Chien-Jung Ho, Gwo-Jia Jong:
Vehicle Information Communication Safety Combined with Mobile RFID System. 1021-1024 - Jing-Cyun You, Yao-Lung Yeh, Gwo-Jia Jong:
Mobile RFID Integration Home-Care System for Wireless Network. 1025-1028 - Ning Jiang, Liancheng Shan:
Application of MAC-Based VLANs for Mobile Office in Campus Area Network. 1029-1032
Biometrics - From Sensors to Standardization
- Patrick Bours, Kirsi Helkala
:
Face Recognition Using Separate Layers of the RGB Image. 1035-1042 - Menrit S. Fahmy, Amir F. Atiya
, Raafat S. Elfouly:
Biometric Fusion Using Enhanced SVM Classification. 1043-1048 - Raul Sánchez-Reillo
, Luis Mengibar-Pozo, Michael G. Lorenz, Raul Alonso-Moreno:
Common Interface for Connecting of Low Profile Biometric Modules. 1049-1055 - Halvor Borgen, Patrick Bours, Stephen D. Wolthusen:
Visible-Spectrum Biometric Retina Recognition. 1056-1062 - Nicolas Delvaux, Hervé Chabanne, Julien Bringer, Bruno Kindarji, Patrik Lindeberg, Johannes Midgren, Jeroen Breebaart, Ton H. Akkermans, Michiel van der Veen, Raymond N. J. Veldhuis, Els Kindt, Koen Simoens
, Christoph Busch, Patrick Bours, Davrondzhon Gafurov, Bian Yang, Julien Stern, Carsten Rust, Bruno Cucinelli, Dimitrios Skepastianos:
Pseudo Identities Based on Fingerprint Characteristics. 1063-1068 - Thomas Frassen, Xuebing Zhou, Christoph Busch:
Fuzzy Vault for 3D Face Recognition Systems. 1069-1074 - Martin Drahanský
:
Experiments with Skin Resistance and Temperature for Liveness Detection. 1075-1079 - Davrondzhon Gafurov, Einar Snekkenes:
Arm Swing as a Weak Biometric for Unobtrusive User Authentication. 1080-1087 - Martin Meints, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung, Gisela Quiring-Kock:
Biometric Systems and Data Protection Legislation in Germany. 1088-1093
Intelligent Watermark Hiding and Digital Image Processing
- Ziwen Sun, Maomao Hui, Chao Guan:
Steganalysis Based on Co-occurrence Matrix of Differential Image. 1097-1100 - Zhiping Zhou, Huijun Wu, Qianxing Lv:
A New Iris Recognition Method Based on Gabor Wavelet Neural Network. 1101-1104 - Bin Luo
, Li Li:
Document Watermarking Robust to Copying. 1105-1108 - Xiaoqing Feng, Li Li, Zhigeng Pan, Shusen Sun, Daxing Zhang:
A Robust Double Watermarking 3D Mesh Model Based On Feature. 1109-1112 - Jian-Bin Li, Kwok-Yan Lam, Hong-Wei Sun, Siu Leung Chung:
Robust Remote Authentication for Scalable Web-Based Services. 1113-1117 - Chin-Feng Lee, Hsing-Ling Chen:
Reversible Data Embedding Using the Sliding Window. 1118-1121 - Chin-Feng Lee, Huai-En Lee:
A Blind Associative Watermark Detection Scheme Using Self-Embedding Technique. 1122-1125 - Jim-Min Lin, Wen-Gung Cheng, Guo-Ming Fang:
Software Integration for Applications with Audio Stream. 1126-1129
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (1)
- Tzu-Chuen Lu, Ying-Hsuan Huang:
The Distortion Control Method of Reversible Contrast Mapping Hiding Scheme. 1133-1136 - Yuan-Liang Tang, Chih-Peng Wang:
A Robust Watermarking Algorithm Based on Salient Image Features. 1137-1140 - Chang-Chin Huang, Du-shiau Tsai, Gwoboa Horng
:
Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding Algorithm. 1141-1145 - Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng:
Secret Sharing Systems with Authentication-Based Steganography. 1146-1149 - Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang:
An Effective Demosaicking and Zooming Algorithm for CFA Images. 1150-1153 - Yan-Jun Hu, Xiaoping Ma, Linming Dou, Li Gao:
A Computation Model for Capacity and Robustness of Robust Image Watermarking Scheme in Spatial Domai. 1154-1157 - Xuehu Yan, Shuai Guan, Xiamu Niu:
Research on the Capacity of Error-Correcting Codes-Based Information Hiding. 1158-1161
Steganography and Watermarking
- Ching-Yu Yang, Wei-Ying Hwang, Ya-Fen Cheng:
IWT-Based Watermarking By Adaptive Bit-Labeling Scheme. 1165-1168 - Ching-Yu Yang, Chen-Yuan Lai:
Use of Quotient-Embedding Scheme with Smart Arrangement Technique to Hide Gray-Scale Data. 1169-1172 - Da-Chun Wu, Jiun-Sheng Li:
A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in E-commerce Applications. 1173-1176 - Chia-Chun Wu
, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Enhance the Image Sharing with Steganography and Authentication. 1177-1181 - Chih-Hung Lin, Sheng-Lung Chien, Hsiao-Fen Chien:
Multi-Purpose Image Watermarking Method Based on Wavelet Transform. 1182-1185 - Chih-Hung Lin, Hsiao-Fen Chien, Sheng-Lung Chien:
Multipurpose Image Authentication Method based on Vector Quantization. 1186-1189 - Minghui Deng, Fang Yang, Jingbo Zhen:
Robust Digital Image Watermarking Based on Haar Orthogonal Function System. 1190-1193
Digital Communications
- Jing Xue, Qi Zhao, Zhijie Wu:
An FFT-Based DS-SS Signal Acquisition Algorithm Research. 1197-1200 - Chuntao Man, Zhenqi Wang:
The Design and Research of Remote Terminal Unit Based on Radio Technology. 1201-1204 - Zhang Nan, Yang Ping:
Reduced-State Detection for Continuous Phase Modulation (CPM) Signals. 1205-1208 - Peng Wang, Yong-en Chen:
Low-Complexity Real-Time LDPC Encoder Design for CMMB. 1209-1212 - Huan Li, Zhiyong Zou, Xiaoxiang Zhao, Kuang Wang:
A Novel Soft-In-Soft-Out Decoder for Nordstrom-Robinson Code. 1213-1216 - Yonghong Yan, Yan Xie, Wei Peng, Yun Zeng:
Wide-Band Low-Noise Quadrature VCO Design. 1217-1220 - Cagatay Karabat
, Mehmet Keskinöz
:
Robust Non-blind Detection for Spread Spectrum Watermarking System. 1221-1224 - Er-Fu Chen, Naitong Zhang, Wei-Xiao Meng:
A Novel Grading Noise-Pretreatment Algorithm Based on Time-Frequency Blind Source Separation. 1225-1228
Intelligent Signal and Image Processing (2)
- Junsup Kwon, Manbae Kim, Changyeol Choi:
Multiview Video Service Framework for 3D Mobile Devices. 1231-1234 - Soon-Young Lee, Junhee Heu, Chang-Su Kim
, Sang-Uk Lee:
An Object Removal Using Multi-view Sequence Inpainting Technique. 1235-1238 - Jongryool Kim, Koh Choi, Changhyeok Bae, JongWon Kim:
Challenges and Realization of Real-Time Multi-view Video Transport Systems over IP Networks. 1239-1242 - Taeyoung Chung, Kwanwoong Song, Chang-Su Kim
:
Efficient Prediction Structure for 2-D Wide Multi-view Video Sequence. 1243-1246 - Sang Heon Lee, Sang Hwa Lee, Nam Ik Cho
, Jeong Hyu Yang:
A Motion Vector Prediction Method For Multi-view Video Coding. 1247-1250 - Tae Hoon Kim, Ho Yub Jung, Kyoung Mu Lee, Sang Uk Lee:
Segment-based Foreground Object Disparity Estimation Using Zcam and Multiple-View Stereo. 1251-1254 - Yanling Hao, Ying Liu, Renlong Wang:
High Performance Hardware Implementation Architecture for DWT of Lifting Scheme. 1255-1258
Authentication
- Xian-ge Huang, Lei Shen, Yan-hong Feng:
A User Authentication Scheme Based on Fingerprint and USIM Card. 1261-1264 - Fang Chen, Wei Li, Xiaoqiang Li:
Audio Quality-Based Authentication Using Wavelet Packet Decomposition and Best Tree Selection. 1265-1268 - Tiegang Gao, Qiaolun Gu:
A Novel Watermarking-Based Reversible Image Authentication Scheme. 1269-1272 - Hsi-Wen Wang, Chien-Chih Lai, Chun-Chieh Hsiao, Guan-Yu Hsieh, Ren-Guey Lee:
Design and Implementation of Secure Active RFID System with Cyptography and Authentication Mechanisms. 1273-1276 - Jun Yang, Xianze Yang:
A New Variant of the Diffie-Hellman Key-Exchange Protocol Based on Block Triangular Matrix Groups. 1277-1281 - Wenjie Liu, Hanwu Chen, Zhiqiang Li, Jun Zhao:
Efficient Many-to-One and One-to-Many Multiparty Quantum Secure Direct Dommunication with Authentication. 1282-1285 - Xiamu Niu, Wei Song, Meiyu Lu, Wenjun Huang:
A 3D Model Authentication Algorithm Based on Reversible Watermarking. 1286-1289
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (2)
- Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree. 1293-1296 - Jun-Chou Chuang, Chin-Chen Chang:
An Image Authentication Scheme for Halftone Images Based upon Error Diffusion. 1297-1300 - Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Twice Gric Colorings in Steganography. 1301-1304 - Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le
, Hoai Bac Le:
A New Probabilistic Visual Secret Sharing Scheme for Color Images. 1305-1308 - Tao Meng, Jianfeng Wang, Shenghe Sun:
Covert Communication Based on Subliminal Channel in Broadcast Multi Signature. 1309-1311 - Zhihua Hu, Jiping Niu:
A Color Image Digital Watermarking Method Based on Valve-Value Surface. 1312-1315 - Chune Zhang, Zhengding Qiu, L. L. Cheng, Lee-Ming Cheng
:
Analysis Based on Generalized Vector Quantization for Information Hiding. 1316-1320 - Yong Zhang, Jianfeng Yin, Benyang Dai:
A Blocking-Resistant Method for Anonymity System Based on Proxy and Data Hiding. 1321-1325
Cryptography (2)
- Xinsheng Wang, Liang Han, Chenxu Wang, Xiaoning Liu:
Based MATLAB on Advanced Encryption Standard (AES) IP Validation. 1329-1331 - Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin:
Breaking Instance II of New TTM Cryptosystems. 1332-1335 - Shao-Cheng Qu, Xiaoyan Wang, Mei-jing Gong:
Secure Communication Based on Synchronization of Unified Chaotic Systems. 1336-1339 - Feng Huang, Fangfang Lei:
A Novel Symmetric Image Encryption Approach Based on a New Invertible Two-Dimensional Map. 1340-1343 - Haiting Cui, Xinchun Cui, Mailing Meng:
A Public Key Cryptography Based Algorithm for Watermarking Relational Databases. 1344-1347 - Jian-liang Meng, Hui-jing Pang, Wan-qing Gao:
New Color Image Encryption Algorithm Based on Chaotic Sequences Ranking. 1348-1351 - Tao Deng, Fei Peng
, Xiaofeng Huang:
A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling. 1352-1355 - Chung-Ping Young, Chung-Chu Chia, Liang-Bi Chen
, Ing-Jer Huang:
NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem. 1356-1359
Network Security (1)
- Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, Tzungher Chen:
Assigning Keys in a Hierarchy. 1363-1366 - Iuon-Chang Lin, Chin-Chen Chang:
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization. 1367-1370 - Chu-Hsing Lin, Jung-Chun Liu, Fuu-Cheng Jiang, Chien-Ting Kuo:
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks. 1371-1374 - Chin-Chen Chang, Shih-Chang Chang:
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. 1375-1378 - Jen-Ho Yang, Chin-Chen Chang:
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. 1379-1382 - Zhaoyang Qu, Chunfeng Huang:
A Fractional-Step DDoS Attack Source Traceback Algorithm Based on Autonomous System. 1383-1387 - Linda Yunlu Bai, Yongfeng Huang, Guannan Hou, Bo Xiao:
Covert Channels Based on Jitter Field of the RTCP Header. 1388-1391 - Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor:
Distinguishing Attack on SN3 Stream Cipher. 1392-1395
Pattern Recognition (3)
- Xiaoyu Wang, Feng Jiang, Hongxun Yao:
DTW/ISODATA Algorithm and Multilayer Architecture in Sign Language Recognition with Large Vocabulary. 1399-1402 - Ning Wang:
Printed Chinese Character Recognition Based on Pixel Distribution Probability of Character Image. 1403-1407 - Yasuhiro Matsuda, Tsuneshi Isomura, Ichiro Sakuma, Yasuhiko Jimbo, Etsuko Kobayashi, Tatsuhiko Arafune:
Emotion Recognition of Finger Braille. 1408-1411 - Hao Meng, Fukang Sun:
The Research of Vehicle Driving Multimedia Data Recording. 1412-1415 - Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang:
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. 1416-1421 - Zhan-Long Yang, Bao-Long Guo:
Image Mosaic Based on SIFT. 1422-1425 - Wenjun Huang, Xin Yu, Qiong Li, Xiamu Niu:
A New Face Recognition Scheme with Renewable Templates. 1426-1429
Optimization Techniques and Applications (2)
- Zhen Yang, Mu-hai Li:
A Method on Impedance Control of Robots Based on the Neural Network. 1433-1436 - W. Gao:
New Neural Network Based on Ant Colony Algorithm for Financial Data Forecasting. 1437-1440 - Fu-sheng Dai, Xian-he Shao:
The Heuristic Route Algorithm of Multiple Restrictions Based on Quality of Service. 1441-1445 - Ya-Li Qi, Wei He, Hou Shu:
An Optimized Approach on Reduced Kernel Matrix to ClusterSVM. 1446-1449 - Li Hong, Xiong Shibo:
On Ant Colony Algorithm for Solving Continuous Optimization Problem. 1450-1453 - Aimin Wang, Wenhua Liu:
Design Theory of Intellectualized Computer Aided Instruction and Its Applications. 1454-1458 - Te-Jen Su, Tzu-Hsiang Lin, Jia-Wei Liu:
Particle Swarm Optimization for Gray-Scale Image Noise Cancellation. 1459-1462 - Lu Wang, Dianzhong Wen:
BP Neural Network to Distinguish Pregnant Woman by Arterial Pressure Pulse Waveform Analysis. 1463-1466
Cross-Discipline Techniques (2)
- Jin-Yu Zhang, Man-Gui Liang:
An Efficient USR Eliminating Mechanism on EPON. 1469-1472 - Lexiao Ye, Yigang Wang, Dajian Liu, Jianqi Chen:
Application Research of Secondary Development Technology for the Replacement of Furniture Part Based on Inventor API. 1473-1477 - Fu Duan, Yuxing Wang, Chanchan Zhao, Yueqin Zhang:
Research and Implementation on Middleware of Database Workload Autonomic Adaptation. 1478-1481 - Meihua Chen, Liang He, Xueming Cai, Weiwei Xia:
Trust Evaluation Model for Composite Service Based on Subjective Logic. 1482-1485 - Lei Liu, Hong Ni:
WBISD: A Debugger of Web-Based Interactive Services. 1486-1489 - Xuemei Hu, Linhong Tian:
Research and Analysis of Bias Voltage on Variable-Capacitance Micro-mechanical Accelerometer. 1490-1493 - Xinfu Liu, Jinhe Liu, Zhanping Du, Quanming Zhao, Junying Zhao, Yuhui Huang:
The Research on Non-destructive Testing Method of Sheet Resistance in Micro Area of Silicon Wafer Based on EIT Technology. 1494-1497 - Ying Yang, Ying-Hua Li, Yong Li:
Research on Communication Constellation Simulation Based on Exploratory Analysis. 1498-1500
Data Hiding and Steganography (2)
- Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang, Zhili Chen:
A Statistical Attack on a Kind of Word-Shift Text-Steganography. 1503-1507 - Nima Asadi, Mansour Jamzad, Hedieh Sajedi
:
Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. 1508-1511 - Yongfeng Huang, Bo Xiao, Honghua Xiao:
Implementation of Covert Communication Based on Steganography. 1512-1515 - Fei Peng, Xingming Sun:
Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic. 1516-1519 - Ching-Nung Yang
, Yao-Yu Yang, Tse-Shih Chen, Guo-Cin Ye:
New Steganography Scheme in Halftone Images. 1520-1523 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:
A New Synonym Text Steganography. 1524-1526 - Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi
:
Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. 1527-1530
Network Security (2)
- Xiangqian Wu, Ning Qi, Kuanquan Wang, David Zhang
:
An Iris Cryptosystem for Information Security. 1533-1536 - Iuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang:
An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy. 1537-1540 - Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee:
An Efficient Non-repudiation Mechanism for SIP-Based Services. 1541-1544 - Jing Li, Jung-San Lee, Chin-Chen Chang:
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques. 1545-1548 - Xuansen He:
Programming Method for Failure of Network Security Based on Game Model. 1549-1552 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Ming Zeng, Li Liu:
A Grid Resource Discovery Model Using P2P Technology. 1553-1556 - Janani Arthanari
, Arputharaj Kannan
:
ASCON - A Synchronization-Concurrency Control Model For Distributed Multimedia Systems. 1557-1560 - Chao Sun, Yukun Liu, Shouda Jiang:
Communications Security Research on "Man-in-the-Loop" Television Guidance System Data Link. 1561-1564

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.