default search action
IIH-MSP 2010: Darmstadt, Germany
- Isao Echizen, Jeng-Shyang Pan, Dieter W. Fellner, Alexander Nouak, Arjan Kuijper, Lakhmi C. Jain:
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-8378-5
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Hsiao-Han Ko, Kuo-Jin Tseng, Li-Min Wei, Meng-Hsiun Tsai:
Possible Disease-Link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities of Ovarian Carcinoma Microarray Data. 1-4 - Iuon-Chang Lin, Chia-Chang Sung:
An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. 5-8 - Iuon-Chang Lin, Hsing-Lei Wang:
An Improved Digital Signature Scheme with Fault Tolerance in RSA. 9-12 - Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin:
Chaos-Based Image Integrity Authentication Code. 13-16 - Tzu-Chuen Lu, Siang-Ru Liao, Chun-Ming Chang:
The Information Hiding Technology Based on the Similar Sample Blocks of Grayscale Image. 17-20 - Chin-Chen Chang, Kuo-Nan Chen, Ming-Huang Hsieh:
A Robust Public Watermarking Scheme Based on DWT. 21-26 - Hui-Feng Huang, Ya-Fen Chang, Chun-Hung Liu:
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks. 27-30 - Iuon-Chang Lin, Ping-Kun Hsu:
A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System. 31-33 - Chin-Fang Lee, Huei-Ju Tsai:
A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction. 34-38
Steganography and Watermarking
- Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Reversible Watermarking by Coefficient Adjustment Method. 39-42 - Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li:
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. 43-46 - Yeh-Shun Chen, Ran-Zan Wang:
Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking. 47-50 - Jeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee:
Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling. 51-54 - Tae-Woo Oh, Seung-Jin Ryu, Ji Won Lee, Won-Young Yoo, Heung-Kyu Lee:
Improved Watermark Estimation Scheme Based on Neighborhood Filter. 55-58 - Wen-Pinn Fang:
Multi-layer Secret Image Sharing. 59-61 - Kuang Tsan Lin:
Graylevel Images Encrypting Based on the n-Graylevel Encoding Method and the Lowest Common Multiple Technique. 62-65 - Lee Shu-Teng Chen, Wen-Tarn Chang, Suiang-Shyan Lee, Ja-Chen Lin:
Data Hiding Based on Side Match Vector Quantization and Modulus Function. 66-69 - Shang-Kuan Chen, Ran-Zan Wang:
High-Payload Image Hiding Scheme Using k-Way Block Matching. 70-73 - Wen-Chung Kuo, Shao-Hung Kuo, Lih-Chyau Wuu:
High Embedding Reversible Data Hiding Scheme for JPEG. 74-77 - Marcus Nutzinger, Christian Fabian, Marion Marschalek:
Secure Hybrid Spread Spectrum System for Steganography in Auditive Media. 78-81 - Peter Meerwald, Andreas Uhl:
Robust Watermarking of H.264-Encoded Video: Extension to SVC. 82-85 - Minghui Deng, Xiuli Zhou:
A Robust Digital Image Watermarking Algorithm Based on CHIRPLET Transform. 86-89 - Brian K. Lien:
An Information-Theoretic Model for Dispersed Ordered Dithered Halftone Image Watermarking by Hilbert Curve Decomposition. 90-93 - Manabu Hirakawa, Junichi Iijima:
Mobile Services and Implementation of Digital Watermarks in Audio Files. 94-97 - Ali Nur Mohammad Noman, Kevin Curran, Tom Lunney:
A Watermarking Based Tamper Detection Solution for RFID Tags. 98-101 - Charu Agarwal, Anurag Mishra:
A Novel Image Watermarking Technique Using Fuzzy-BP Network. 102-105 - Dong-Gyu Yeo, Hae-Yeoun Lee, Byeong Man Kim:
Differential Histogram Modification-Based Reversible Watermarking with Predicted Error Compensation. 106-109 - Shinichi Nakazawa, Sho Kasahara, Shigeo Takahashi:
A Visually Enhanced Approach to Watermarking 3D Models. 110-113 - Kiyoharu Okagaki, Kenichi Takahashi, Hiroaki Ueda:
Robustness Evaluation of Digital Watermarking Based on Discrete Wavelet Transform. 114-117 - Wanli Yang, Suwen Zheng, Li Huang:
Impulsive Synchronization for Coupled Reaction-Diffusion System and Its Application in Information Hiding. 118-122 - Rajesh Mehta, Anurag Mishra, Rampal Singh, Navin Rajpal:
Digital Image Watermarking in DCT Domain Using Finite Newton Support Vector Regression. 123-126 - Yashar Naderahmadian, Saied Hosseini-Khayat:
Fast Watermarking Based on QR Decomposition in Wavelet Domain. 127-130 - Bassem S. Rabil, Robert Sabourin, Eric Granger:
Intelligent Watermarking with Multi-objective Population Based Incremental Learning. 131-134 - Raúl Martínez-Noriega, Mariko Nakano, Kazuhiko Yamaguchi:
Self-Synchronous Time-Domain Audio Watermarking Based on Coded-Watermarks. 135-138 - Eduardo Vellasques, Robert Sabourin, Eric Granger:
Intelligent Watermarking of Document Images as a Dynamic Optimization Problem. 139-142 - Jian Wang, Ron Healy, Joe Timoney:
A Novel Audio Watermarking Algorithm Based on Reduced Singular Value Decomposition. 143-146
Cross-Discipline Techniques in Signal Processing and Networking
- Jong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang:
Design of 3-D FIR Cone-Shaped Filters by a Nest of McClellan Transformations. 147-150 - Hsiang-Cheh Huang, Yueh-Hong Chen, I-Hung Wang:
Reversible Data Hiding with Improved Histogram Alteration Method. 151-154 - Liou Chu:
A RFID-Based Hybrid Building Fire Evacuation System on Mobile Phone. 155-158 - Shih-Jung Wu:
A New Integrated Mobile Architecture for Heterogeneous Wireless Networks. 159-162 - Ellen Sharma Shijagurumayum, Feng-Cheng Chang:
Preliminary Survey of Multiview Synthesis Technology. 163-166 - Duen-Kai Chen:
Systematic Review of Applying Service Oriented Architecture in Networking. 167-170 - Hsiang-Cheh Huang, Ting-Wei Chen, Feng-Cheng Chang:
Adjacent Quad Modification Algorithm for Reversible Data Hiding. 171-174 - Feng-Cheng Chang, Hsiang-Cheh Huang:
Electrical Network Frequency as a Tool for Audio Concealment Process. 175-178 - Zbigniew Piotrowski, Krzysztof Sawicki, Mariusz Bednarczyk, Piotr Gajewski:
New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 Networks. 179-183 - Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li:
Compression of 3D Triangle Meshes with a Generalized Parallelogram Prediction Scheme Based on Vector Quantization. 184-187 - Pham Hai Dang Le, Matthias O. Franz:
Single Band Statistics and Steganalysis Performance. 188-191 - Yong-Zhong He, Zhan Han, Ying Cai:
A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty. 192-195 - Hao Jiang, Jie Xu, Zhen Li:
NLOS Mitigation Method for TDOA Measurement. 196-199 - Constantinos Patsakis, Nikolaos Alexandris:
A New SETUP for Factoring Based Algorithms. 200-203 - Ali Sentürk, Mustafa Gök:
A Fast Modular Multiplication Method. 204-207 - Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:
Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security. 208-211 - Fatiha Djebbar, Habib Hamam, Karim Abed-Meraim, Driss Guerchi:
Controlled Distortion for High Capacity Data-in-Speech Spectrum Steganography. 212-215 - Thomas Tziortzios, Stavros Dokouzyannis:
A Fast 8*8 2D IDCT Architecture, Avoiding Zero Transformed Coefficients. 216-219
Advanced Topics for Biometrics and Video Surveillance
- Chen-Ta Hsieh, Chang-Hsing Lee, Chin-Chuan Han, Ching-Chien Chuang:
A Framework for Face Recognition Using Laplacian Eigenmaps and Nearest Feature Mixtures. 220-223 - Yuan-Kai Wang, Wei-Ren Chen:
Facial Feature Alignment by Manifold Learning of Active Appearance Model. 224-227 - Yuan-Kai Wang, Jia-Hau Jang, Luo-Wei Tsai, Kuo-Chin Fan:
Improvement of Face Recognition by Eyeglass Removal. 228-231 - Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou:
Fast Forgery Detection with the Intrinsic Resampling Properties. 232-235 - Yuan-Kai Wang, Ching-Tang Fan:
Moving Object Detection for Night Surveillance. 236-239 - Yue-Ru Chuang, Chia-Sheng Hsu, Je-Wei Chen:
Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video Streaming. 240-243 - Jin Jing, Yuan Jie:
A Recovery Algorithm for the Details of the Low Resolution Video Sequence. 244-247
Ubiquitous Multimedia Services and Applications for Residential Users
- Yi-Ting Chien, Mong-Fong Horng, Yu-Cheng Sheu, Jeng-Pong Hsu, Yau-Hwang Kuo, Chin-Shiuh Shieh:
An Alternative-Path Approach to Improve Robustness of TCP Connections in Wireless Mesh Networks. 248-251 - Chun-I Kuo, Chi-Huang Shih, Ce-Kuen Shieh, Wen-Shyang Hwang:
A Fast and Efficient FEC Enhancement Scheme for Delay-Sensitive Video Transmissions. 252-255 - Chi-Huang Shih:
Adaptive Forward Error Correction Combined with Packet Size Control for Wireless Video. 256-259 - Chun-Ting Huang:
Improving the Multimedia Processing of Relay Nodes in Mesh Wireless Networks. 260-263 - Hyeongchul Oh, Joohyun Lee, Changki Min, Jechang Jeong:
Frame Interpolation Method Based on Adaptive Threshold and Adjacent Pixels. 264-267 - Changryoul Choi, Jechang Jeong:
Low-Complexity DC-Compensated Weighted 2BT-Based Motion Estimation. 268-271 - Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi:
Autoregressive Video Modeling through 2D Wavelet Statistics. 272-275
Circuits and Embedded Systems for Multimedia Signal Processing
- Shin-Chi Lai, Sheau-Fang Lei, Ching-Hsing Luo:
Low-Cost and Shared Architecture Design of Recursive DFT/IDFT/IMDCT Algorithms for Digital Radio Mondiale System. 276-279 - Cheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, Ming-Wei Lyu:
Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction Scheme. 280-283 - Chia-Cheng Lo, Chia-Wei Hsu, Ming-Der Shieh:
Area-Efficient H.264 VLC Decoder Using Sub-tree Classification. 284-287 - Shi-Huang Chen, Ming-Lung Hsu:
The Use of k-Means Algorithm to Compute the Line Spectrum Pair Frequencies with Tschirnhaus Transform. 288-291 - Wen-Kai Tsai, Ming-Hwa Sheu, Chung-Chi Lin:
Efficient Multi-Layer Background Model on Complex Environment for Foreground Object Detection. 292-295 - Yuan-Long Jeang, Ko-Yen Hu:
A Pipelined Program Decompression Engine Generator Based on Partial Field-Partitioned (PFP) Compression Technique for Embedded Systems. 296-299 - Chuen-Ching Wang, Te-Yuan Wang, Tien-Hao Lien, Rong-Ming Su:
A Simple and Efficient Anti-collision Algorithm for RFID System. 300-305
New Biometric Modalities and Capture Devices
- Mohammad Omar Derawi, Claudia Nickel, Patrick Bours, Christoph Busch:
Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. 306-311 - Mohammad Omar Derawi, Patrick Bours, Kjetil Holien:
Improved Cycle Detection for Accelerometer Based Gait Authentication. 312-317 - J. Enrique Suarez Pascual, Jaime Uriarte-Antonio, Raul Sánchez-Reillo, Michael G. Lorenz:
Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost Devices. 318-322 - Danish Mairaj, Stephen D. Wolthusen, Christoph Busch:
Teeth Segmentation and Feature Extraction for Odontological Biometrics. 323-328 - Xuebing Zhou, Silvia Araujo Sánchez, Arjan Kuijper:
3D Face Recognition with Local Binary Patterns. 329-332 - Belen Fernandez-Saavedra, Raul Alonso-Moreno, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo:
Usability Evaluation of Fingerprint Based Access Control Systems. 333-336
Privacy and Security in Biometrics
- Julien Bringer, Hervé Chabanne, Koen Simoens:
Blackbox Security of Biometrics (Invited Paper). 337-340 - Haiyun Xu, Raymond N. J. Veldhuis:
Spectral Minutiae Representations for Fingerprint Recognition. 341-345 - Ileana Buhan, Emile Kelkboom, Koen Simoens:
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems. 346-351 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Privacy Preserving Identification: Order Statistics List Decoding Perspective. 352-355 - Davrondzhon Gafurov, Christoph Busch, Patrick Bours, Bian Yang:
Fusion in Fingerprint Authentication: Two Finger Scenarios. 356-359 - Javier Guerra Casanova, Carmen Sánchez Ávila, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera:
Acceleration Axis Selection in Biometric Technique Based on Gesture Recognition. 360-363 - Alberto de Santos Sierra, Carmen Sánchez Ávila, Javier Guerra Casanova, Gonzalo Bailador del Pozo, Vicente Jara Vera:
Two Stress Detection Schemes Based on Physiological Signals for Real-Time Applications. 364-367 - Yasuhiro Matsuda, Tsuneshi Isomura:
Teaching of Emotional Expression Using Finger Braille. 368-371 - Cho-Yan Chen, Chih-Jen Wang, E-Liang Chen, Chi-Keng Wu, Yen-Kuang Yang, Jeen-Shing Wang, Pau-Choo Chung:
Detecting Sustained Attention during Cognitive Work Using Heart Rate Variability. 372-375 - Yanchuan Huang, Mingchu Li, Chuang Lin, Linlin Tian:
Gabor-Based Kernel Independent Component Analysis for Face Recognition. 376-379 - Shenyu Liu, Xi He, Daofu Gong:
Bayesian Decision Based Method for Assets Recognition of Risk Assessment. 380-383 - Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. 384-388 - Jeen-Shing Wang, Pau-Choo Chung, Wei-Hsin Wang, Che-Wei Lin:
Driving Conditions Recognition Using Heart Rate Variability Indexes. 389-392 - Mohammad Ibrahim Khan, Md. Al-Amin Bhuiyan:
Facial Features Approximation for Expression Detection in Human-Robot Interface. 393-397
Multimedia Contents Analysis and Applications
- Qingsheng Li, Aimin Wang, Jinyu Kai, Jipeng Wang:
Research on Multimedia Intelligence Course and Intelligence Classroom Based on Multiple Intelligence Theory. 398-401 - Qingsheng Li, Jipeng Wang, Xiaona Jiang:
Design and Implementation of Personalized and Visual Web Page Editor. 402-405 - Xiao Yi Yu, Aiming Wang:
Genetic Algorithm Based Bayesian Network for Customers' Behavior Analysis. 406-409 - Xiao Yi Yu, Aiming Wang:
Revisit LSB Matching. 410-413
Internet Multimedia Technology and Applications
- Shang Rong Tsai, Y. S. Huang, U. L. Dai, Guang-Hung Huang, Chia-Ming Lee, J. Y. Fang, Y. T. Chen, J. N. Lee:
An Object-Based Web System for Building a Virtual Community. 414-417 - Chin-Yang Lin, Ting-Wei Hou, Fuh-Gwo Chen:
A Snapshot-Based Evaluation Method for Garbage Collection. 418-421 - Chia-Feng Kang, Kai-Hua Kuo, Ya-Chun Li, Tin Yu Wu, Wei-Tsong Lee, Jim-Min Lin:
Enhancing UPnP Quality of Service by Intelligent Access Point. 422-425 - Chuan-Yu Chang, Hung-Jen Wang, Ru-Hao Jian:
Color-Based Semantic Image Retrieval with Fuzzy-ART. 426-429
Image/Video Watermarking and Forensics
- Zhaoqing Liu, Qiong Li, Hui Zhang, Xiyuan Peng:
An Image Structure Information Based Robust Hash for Tamper Detection and Localization. 430-433 - Xian-zhe Meng, Shao-Zhang Niu, Jian-Cheng Zou:
Tamper Detection for Shifted Double JPEG Compression. 434-437 - Jiancheng Zou, Xin Yang, Shaozhang Niu:
A Novel Robust Watermarking Method for Certificates Based on DFT and Hough Transforms. 438-441 - Huawei Tian, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan:
Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform. 442-445 - Bo Ou, Yao Zhao, Rongrong Ni, Gang Cao:
A High Payload Histogram-Based Reversible Wartermarking Using Linear Prediction. 446-449 - Chuanjun Wang, Zhenfeng Shi, Xiamu Niu:
An Error Driven 3D Face Modeling Scheme Based on Partial Differential Equations. 450-453 - Zhe-Ming Lu, Wei-Min Zheng, Jing Wang:
Image Retrieval Based on RST Invariant Features Extracted from Scale Invariant Keypoints. 454-457
Digital Forensics and Security
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang, Rui Xue:
ASM-SPV: A Model Checker for Security Protocols. 458-461 - Ming Liu, Nenghai Yu, Weihai Li:
Camera Model Identification for JPEG Images via Tensor Analysis. 462-465 - Chuanrong Zhang, Long Chi, Yuqing Zhang:
Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA. 466-469 - Qingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo:
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields. 470-473 - Chunling Wang, Jingyu Feng:
A Study of Mutual Authentication for P2P Trust Management. 474-477 - Li Li, Qi Han, Xiamu Niu:
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network. 478-481 - Shen Wang, Qiong Li, Bian Yang, Xiamu Niu:
A Novel and Secure Image Interpolation Methods for Image Disguise. 482-485 - Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao, Dongyao Ji:
Formal Verification of HMQV Using ASM-SPV. 486-489 - Ying Cai, Qinglong Wang:
Certificates Distributed Storage Scheme in the Trust Management System. 490-493
Techniques and Algorithms for Multimedia Security
- Minoru Kuribayashi:
Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random Permutation. 494-497 - Tetsuya Kojima, Yoshiya Horii, Naoki Ohtani, Thierno Sene:
On Some Properties of a Digital Watermarking Based on Complete Complementary Codes. 498-501 - Natsuki Watanabe, Hiroshi Yoshiura:
Detecting Revelation of Private Information on Online Social Networks. 502-505 - Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura:
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network. 506-509 - Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade:
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. 510-513
Advanced Data Hiding and Coding Techniques for Audio Signals
- Akira Nishimura:
Aerial Acoustic Modem with Decoding Capabilities Using a CELP-Based Speech Encoder. 514-517 - Akinori Ito, Kiyoshi Konno, Masashi Ito, Shozo Makino:
Improvement of Packet Loss Concealment for MP3 Audio Based on Switching of Concealment Method and Estimation of MDCT Signs. 518-521 - Ryouichi Nishimura:
Audio Information Hiding Based on Spatial Masking. 522-525 - Masashi Unoki, Toshizo Kosugi, Atsushi Haniu, Ryota Miyauchi:
Design of IIR All-Pass Filter Based on Cochlear Delay to Reduce Embedding Limitations. 526-529 - Masahiro Wakiyama, Yasunobu Hidaka, Koichi Nozaki:
An Audio Steganography by a Low-Bit Coding Method with Wave Files. 530-533 - Naofumi Aoki:
A Semi-lossless Steganography Technique for G.711 Telephony Speech. 534-537 - Xuping Huang, Isao Echizen, Akira Nishimura:
A New Approach of Reversible Acoustic Steganography for Tampering Detection. 538-542
Computational Intelligence and Security
- Chenglong Yu, Xuan Wang, Hejiao Huang, Jianping Shen, Kun Wu:
Vision-Based Hand Gesture Recognition Using Combinational Features. 543-546 - Zhongmei Zhou, Xuan Wang, Zili Zhang, Chenglong Yu:
Example-Based Facial Portraiture Style Learning. 547-550 - Lin Yao, Chengjie Sun, Xiaolong Wang, Xuan Wang:
Multi-class Relationship Extraction from Biomedical Literature Using Maximum Entropy. 551-554 - Yingnan Zhao, Yan Ma, Zhong Jin:
Mirror-Like Gabor Features for Face Recognition under Varying Illumination Conditions. 555-558 - Dazhi Zhang, Songsong Li, Boying Wu, Jiebao Sun:
An Image Level Set Method for Denoising. 559-562 - Zhenfeng Shi, Qiong Li, Xiamu Niu:
A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion. 563-566 - Toshihiko Yamasaki, Tomoaki Matsunami, Kiyoharu Aizawa:
Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients. 567-570 - Yanhui Xiao, Yao Zhao, Zhenfeng Zhu:
Kernel Canonical Correlation with Similarity Refinement for Automatic Image Tagging. 571-574 - Chunyu Lin, Yao Zhao:
Multiple Description Wavelet Based Image Coding with Classification. 575-578 - Jirí Grim, Petr Somol, Pavel Pudil:
Digital Image Forgery Detection by Local Statistical Models. 579-582 - Lin Dong, Min Ku:
Novel (n, n) Secret Image Sharing Scheme Based on Addition. 583-586 - Emmanuel Sardis, Theodora A. Varvarigou:
Industrial Workflows Recognition by Computer Vision and AI Technologies. 587-590
High Efficiency Image/Video Coding and Transmission
- Song Xiao, Ji Lu, Yangli Wang, Chengke Wu:
Robust Video Transmission Scheme Based on Network Coding. 591-594 - Yangli Wang, Chengke Wu, Song Xiao:
An Error Concealment Approach for Pixel Based Wyner-Ziv Video Coding. 595-598 - Ji Lu, Song Xiao, Chengke Wu:
Optimized State-Distortion Extraction for Scalable Extension of H.264/AVC. 599-602 - Hongwei Li, Song Xiao, Chengke Wu, Yuli Feng:
A Pixel-Level Rate Control Algorithm for the Optimal Prediction Residual. 603-606 - Haiying Liu, Yunsong Li, Song Xiao, Chengke Wu:
Distributed Compressive Hyperspectral Image Sensing. 607-610 - Yigang Zhou, Linghui Li, Jia Liu:
A Digital Fingerprint Scheme Based on MPEG-2. 611-614
Advanced Event Detection and Intelligent Video Processing
- Duan-Yu Chen, Yi-Shiou Luo:
Content-Aware Video Seam Carving Based on Bag of Visual Cubes. 615-618 - Duan-Yu Chen, Yu-Hao Lin:
Frequency-Tuned Nighttime Brake-Light Detection. 619-622 - Chi-Han Chuang, Yung-Chi Lo, Chin-Chun Chang, Shyi-Chyi Cheng:
Multiple Object Motion Detection for Robust Image Stabilization Using Block-Based Hough Transform. 623-626 - Yu-Hsiang Wu, Yung-Chi Lo, Shyi-Chyi Cheng, Chih-Lang Lin:
Adaptive Ultrasound Image Matching for Automatic Liver Disease Diagnosis Using Generalized Hough Transform. 627-630 - Li-Chih Chen, Jun-Wei Hsieh, Wei-Ru Lai, Chih-Xuan Wu, Sin-Yu Chen:
Vision-Based Vehicle Surveillance and Parking Lot Management Using Multiple Cameras. 631-634 - I-Cheng Chang, Chieh-Yu Liu, Chung-Lin Huang:
Human Activity Linkage Recording for Multiple Cameras with Disjoint Views. 635-638 - Chao-Ho Chen, Che-Ping Su, Tsong-Yi Chen, Da-Jinn Wang:
Real-Time Video Enhancement for Moving-Object in the Dusk Environment Based on Pixel Classification. 639-642 - Tsong-Yi Chen, Chao-Ho Chen, Da-Jinn Wang, Tsang-Jie Chen:
Real-Time Counting Method for a Crowd of Moving People. 643-646 - Pengyu Liu, Kebin Jia:
A Fast Inter-frame Prediction Algorithm for H.264/AVC. 647-650 - Pengyu Liu, Kebin Jia:
A Self-Adaptive and Fast Motion Estimation Search Method for H.264/AVC. 651-654 - Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li:
Key-Frame Extraction Using Kernel-Based Locality Preserving Learning. 655-658 - Yanqiang Lei, Yuan-Gen Wang, Liang Fan:
Overlapping Interval Differences-Based Fast Intra Mode Decision for H.264/AVC. 659-663 - Pengyu Liu, Kebin Jia:
A Novel Intra-frame Prediction Algorithm Based on Macro-block's Histogram for H.264/AVC. 664-667
Advanced Multimedia Processing and Retrievals
- Takashi Toriu, Shigeyoshi Nakajima, Hiromitsu Hama:
A Saliency Map Model Based on the Principle of Maximum Information Gain. 668-671 - Takaaki Kozaki, Shigeyoshi Nakajima, Tetsuo Tsujioka, Shinsuke Hara, Tadayuki Inoue, Hajime Nakamura, Kazuhide Takeuchi:
Estimation of Human Movements from Body Acceleration Monitoring Using One Nearest Neighbor Method - Ubiquitous Health Care. 672-675 - Hiromitsu Hama, Pyke Tin, Thi Thi Zin, Takashi Toriu:
A Stochastic Model for Popularity Measures in Web Dynamics. 676-679 - Thi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama:
A Markov Random Walk Model for Loitering People Detection. 680-683 - Daisuke Miyazaki, Keisuke Ohno, Takaaki Mukai:
Real-Time Updatable Volumetric Display System Based on Inclined-Image Scanning. 684-687
High Performance Networking, Digital Content and Ubiquitous Computing
- Nai-Wen Kuo:
A Decision Support System in Geriatric Care. 688-691 - Chung-Hsin Liu, I. Shao:
Attack Analysis for Automatic Monitoring System Used in the Wireless Networks. 692-695 - Chung-Hsin Liu, Wu-Fan Hsu:
The Study of Video Conference Transmission Security as an Example on Polycom. 696-699 - Kuo-Kai Hsu, Dwen-Ren Tsai:
Mobile Ad Hoc Network Applications in the Library. 700-703 - Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang:
Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. 704-707 - Wuu-Yee Chen, Pin-Hsiu Wu:
Factors Affecting Consumers' Motivation in Online Group Buyers. 708-711 - Chia-Han Chou, Allen Y. Chang:
Visual Development Platform for White-Box Algorithmic Trading. 712-715 - Dwen-Ren Tsai, Sheng-Wei Lin:
Building Enterprise Data Centers Using Virtual and Cloud. 716-718
Multimedia and Security Services in Mobile Cloud Computing
- Jing Zhao, Lei Wang, Suran Li, Xiaokang Liu, Zhuxiu Yuan, Zhengjiu Gao:
A Survey of Congestion Control Mechanisms in Wireless Sensor Networks. 719-722 - He Guo, Kai Zhang, Qi Jia:
2.5D SIFT Descriptor for Facial Feature Extraction. 723-726 - Weifeng Sun, Boxiang Dong, Zhenquan Qin, Juanyun Wang, Mingchu Li:
A Low-Level Security Solving Method in Grid. 727-730 - Zhenquan Qin, Lei Wang, Mingchu Li, Weifeng Sun:
An Efficient Trust Mechanism in P2P Network. 731-734 - Jian Wang, Jiajin Le:
Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing. 735-738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.