default search action
IIH-MSP 2008: Harbin, China
- Jeng-Shyang Pan, Xiamu Niu, Hsiang-Cheh Huang, Lakhmi C. Jain:
4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3278-3
Digital Crime and Forensics
- Emmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh:
Challenges of Location Tracking Techniques in Wireless Forensics. 3-6 - Rong Xiao, Xingming Sun, Ying Yang:
Copyright Protection in Wireless Sensor Networks by Watermarking. 7-10 - Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao:
File-Update Based Steganography for Microsoft PowerPoint Files. 11-15 - Chang-Tsun Li, Yue Li:
Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images. 16-19 - Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang:
A Steganography Scheme in P2P Network. 20-24 - Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan:
A Fragile Document Watermarking Technique Based on Wet Paper Code. 25-28 - Te-Cheng Hsu, Wen-Shyong Hsieh, Tung-Shih Su:
A New Watermark Attacking Method Based on Eigen-Image Energy. 29-32
Ubiquitous Multimedia Services and Applications for Residential Users
- Yuh-Ming Cheng, Peng-Fei Chen:
Building an Online Game-Based Learning System for Elementary School. 35-38 - Chun-Ting Huang:
The Study of Balance Traffic Load with Genetic Algorithm for PON. 39-42 - Chien-Ming You, Mong-Fong Horng, Yau-Hwang Kuo, Wan-Ling Du:
A Hybrid Fast Approach to Secure Group-Oriented Management of Key Trees on Internet. 43-46 - Han Xiao, Chao Wang, Na Feng:
Research on Remote Monitoring and Control System Key Techniques Based on Data Point Table. 47-51 - Xiuyuan Li, Xiaojuan Wu, Wenming Li, Xiaogang Wang:
An Adaptive Cross-Layer Scheduling Algorithm for Multimedia Networks. 52-55 - Junfeng Man, Lu-Ming Yang, Wen-qiu Zhu, Qianqian Li:
A Model of Smart Home Fusing Multi-intelligence. 56-59 - Jih-Hsin Ho, Wen-Shyang Hwang:
Supporting Multiple Classes of Services in IP over WDM Ring Network. 60-63 - Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. 64-67
Information Retrieval (1)
- Gang Zhang, Zong Min Ma, Qiang Tong, Ying He, Tie-Nan Zhao:
Shape Feature Extraction Using Fourier Descriptors with Brightness in Content-Based Medical Image Retrieval. 71-74 - Kai-xing Wu, Qiang Xu:
Image Retrieval Based on Fuzzy Color Histogram. 75-78 - Kejun Wang, Zhen Ren, Xinyan Xiong:
Combination of Wavelet snd SIFT Features for Image Classification Using Trained Gaussion Mixture Model. 79-82 - Tian-Yun Huang:
Media Adaptation in MPEG-21 DIA, Framework, Activities and Open Issues. 83-86 - Qi Han, Chen Song, Meihui Zhang, Xiamu Niu:
A Novel Facial Image Retrieval Algorithm Based on PLT-PCA. 87-90 - Feng-Cheng Chang, Hsueh-Ming Hang:
An Improved Presentation Method for Relevance Feedback in a Content-Based Image Retrieval System. 91-94 - Feng-Cheng Chang, Chin-Yuan Chang, Hsueh-Ming Hang:
A Study on the Meta-data Design for Long-Term Digital Multimedia Preservation. 95-98
Wired and Wireless Multimedia Networking and Applications
- Takuo Nakashima, Akari Ono, Toshinori Sueyoshi:
Performance Framework for P2P Overlay Network. 101-104 - Takuo Nakashima, Yusuke Shomura, Toshinori Sueyoshi:
Queueing Property for Different Type of Self-Similar Traffics. 105-108 - Ningping Sun, Toru Ayabe, Kentarou Okumura:
An Animation Engine with the Cubic Spline Interpolation. 109-112 - Ningping Sun, Kaori Suigetsu, Toru Ayabe:
An Approach to Speech Driven Animation. 113-116 - Jin-Yu Zhang, Man-Gui Liang:
IPTV QoS Implement Mechanism in WLAN. 117-120 - Ye Yao, Wandong Cai, Vincent Hilaire, Abder Koukam:
Location Scheme in Wireless Sensor Networks. 121-125 - Wei Song, Yuelong Zhao:
Secure Peer Joining Process in Structured P2P System. 126-129 - Jiemin Liu, Jingxin Dou, Hongxing Zou, Yuan Gao:
Reducing Signaling cost with Simplifed mSCTP In Fast Mobile IPv6. 130-133
Techniques and Algorithms for Multimedia Security (1)
- Kenshi Uematsu, Ryôichi Sasaki:
A Proposal of Falsification Detection System in Structural Design. 137-142 - Katsunari Yoshioka, Tsutomu Matsumoto:
Fingerprinting Traffic Log. 143-146 - Maki Yoshida, Toru Fujiwara:
Expiration Dated Fingerprinting. 147-150 - Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda:
Lossless Data Hiding Using Bit-Depth Embedding for JPEG2000 Compressed Bit-Stream. 151-154 - Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
Performance Improvement of JPEG2000 Steganography Using QIM. 155-158 - Shengbing Che, Bin Ma, Zuguo Che:
An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System. 159-162 - Xiaoming Zhang, Xiong Yin, Zhaoyang Yu:
Robust Audio Watermarking Algorithm Based on Histogram Specification. 163-166 - Shao-Cheng Qu, Mei-jing Gong, Xiaoyan Wang:
Parameter Modulation Secure Communication Based on Active Control. 167-170
Event Analysis in Videos
- Yuan-Kai Wang, Chin-Fa Wang:
Face Detection with Automatic White Balance for Digital Still Camera. 173-178 - Chi-Hung Chuang, Jun-Wei Hsieh, Luo-Wei Tsai, Kuo-Chin Fan:
Human Action Recognition Using Star Templates and Delaunay Triangulation. 179-182 - Yueh-Shiun Lee, Jinn Ho, Wen-Liang Hwang, Chung-Lin Huang:
Iris Recognition Based on Matching Pursuits. 183-187 - Duan-Yu Chen, Hsiao-Rong Tyan, Sheng-Wen Shih, Hong-Yuan Mark Liao:
Dynamic Visual Saliency Modeling for Video Semantics. 188-191 - Xin Wang, Bo Xuan, Silong Peng:
Digital Image Forgery Detection Based on the Consistency of Defocus Blur. 192-195 - Zhonghua Sun, Kebin Jia, Hexin Chen:
Video Key Frame Extraction Based on Spatial-Temporal Color Distribution. 196-199 - Jing Bi, Shu-Chang Liu:
A Speaker Identification System for Video Content Analysis. 200-203 - Tien-Ying Kuo, Yi-Chung Lo:
Detection of H.264 Shot Change Using Intra Predicted Direction. 204-207
Fingerprinting
- Yanzhen Ren, Ruimin Hu, Haojun Ai:
An Asymmetric Multicast Fingerprinting Scheme Based on Secret Sharing. 211-214 - Wansu Bao, Yun Wei:
A Forward Secure Ring Signature Scheme. 215-218 - Lifen Li:
Trust Derivation and Recommendation Management in a Trust Model. 219-222 - Yongjian Hu, Heung-Kyu Lee, Huafei Zeng:
Curve Watermarking Technique for Fingerprinting Digital Maps. 223-226 - Xinghua Yu, Tiejun Huang:
An Image Fingerprinting Method Robust to Complicated Image Modifications. 227-230 - Hsiang-Cheh Huang, Yueh-Hong Chen:
Multicast Video Fingerprinting Scheme with Genetic Algorithm. 231-234 - Yongjian Liao, Qing Lu, Zhiguang Qin:
Designated Verifier Proxy Signature Scheme. 235-238 - Hsiang-Cheh Huang, Yueh-Hong Chen, Shin-Chang Chen:
Copyright Protection for Images with EXIF Metadata. 239-242
Data Hiding and Steganography (1)
- Hedieh Sajedi, Mansour Jamzad:
A Steganalysis Method Based on Contourlet Transform Coefficients. 245-248 - Diqun Yan, Rangding Wang:
Reversible Data Hiding for Audio Based on Prediction Error Expansion. 249-252 - Kensuke Naoe, Yoshiyasu Takefuji:
Damageless Information Hiding Technique Using Neural Network. 253-256 - Huajun Huang, Shaohong Zhong, Xingming Sun:
An Algorithm of Webpage Information Hiding Based on Attributes Permutation. 257-260 - Farzin Yaghmaee, Mansour Jamzad:
Estimating Data Hiding Capacity of Gray Scale Images Based on Its bitplanes Structure. 261-264 - Chih-Cheng Lo, Chien-Ming Lee, Bin-Yih Liao, Jeng-Shyang Pan:
Halftone Image Data Hiding with Reference to Original Multitone Image. 265-268 - Jianquan Xie, Chunhua Yang, Dazu Huang:
High Capacity Information Hiding Algorithm for DCT Domain of Image. 269-272 - Hai-Ying Gao:
A Blind Steganalysis Algorithm of QIM-Based Hiding. 273-276
Cryptography (1)
- Changji Wang, Rongbo Lu:
A Certificateless Restrictive Partially Blind Signature Scheme. 279-282 - Jing Liu, Fei Gao, Haiyan Ma:
A Speech Chaotic Encryption Algorithm Based on Network. 283-286 - Dawei Zhang, Wenrui Ding, Ding Ding:
Fast Implementation of SMS4 Cryptographic Algorithms on Smart Card. 287-290 - Tao Meng, Xiaoqian Wu, Shenghe Sun:
A Method of Big Prime Number Generator Based on NTL. 291-293 - Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo:
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. 294-297 - Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Myong-Soon Park:
An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network. 298-303 - Chun-Yan Song, Yu-Long Qiao, Xing-Zhou Zhang:
Data Study on the Chaotic Synchronization Driven by External Chaotic Signal. 304-307 - Xiamu Niu, Chongqing Zhou, Jianghua Ding, Bian Yang:
JPEG Encryption with File Size Preservation. 308-311
Techniques and Algorithms for Multimedia Security (2)
- Yusuke Atomori, Isao Echizen, Hiroshi Yoshiura:
Picture Watermarks Surviving General Affine Transformation and Random Distortion. 315-318 - Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai:
Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed Documents. 319-322 - Kitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, Seiichiro Hangai:
A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile Sizes. 323-326 - Kosuke Kamiya, Takuma Mori, Keiichi Iwamura:
Development of Benchmark Tool for Digital Watermarking. 327-330 - Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe:
Design and Implementation of Synchronized Audio-to-Audio Steganography Scheme. 331-334 - Qingcheng Li, Jin Zhang, Zhenhua Zhang, Jia-xin Liu:
A Chinese Text Watermarking Based on Statistic of Phrase Frequency. 335-338 - Xiaofeng Huang, Fei Peng, Tao Deng:
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System. 339-342 - Yi Xiao, Lee-Ming Cheng, L. L. Cheng:
A Robust Image Watermarking Scheme Based on a Novel HVS Model in Curvelet Domain. 343-347
Pattern Recognition (1)
- Xiaochun Shi:
Comparison of Two Modern Pattern Recognition Methods. 351-353 - Xiaoyu Wang, Feng Jiang, Hongxun Yao:
Sign Language Synthesis of Individuation Based on Data Model. 354-357 - Pham Anh Phuong, Ngo Quoc Tao, Chi Mai Luong:
An Efficient Model for Isolated Vietnamese Handwritten Recognition. 358-361 - Tong-Yan Li, Xing-Ming Li:
New Criterion for Mining Strong Association Rules in Unbalanced Events. 362-365 - Tao Peng, Minghua Jiang, Ming Hu:
Using Semantics for Dynamic Access Control of XML Documents in Dynamic Coalition Environment. 366-369 - JianLiang Meng, WeiXiang Cheng:
MST Clustering Algorithm Based on Optimized Grid. 370-373 - Qianwen Wang, Wenjun Huang, Xiamu Niu, Xiuzhan Jiang:
A Template Protection Scheme For Statistic Feature-based 2D Face Recognition. 374-377 - Yung-Mao Lu, Bin-Yih Liao, Jeng-Shyang Pan:
A Face Recognition Algorithm Decreasing the Effect of Illumination. 378-381
Image and Speech Processing
- Renlong Wang, Yanling Hao, Ying Liu, Jin Xi:
An Embedded and Efficient Low Memory Hierarchical Image Coder. 385-388 - Wenzhe Lv, Zhe Zhang, Xixian Niu:
Improved Hidden Markov Tree Model and Its Application in Image Denoising. 389-392 - Chung Ming Kuo, Nai-Chung Yang, Wei-Han Chang, Chi-Lin Wu:
Image Recovery Based on Effective Image Completion. 393-396 - Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. 397-401 - Huiyan Jiang, Yudong Zhao, Ning Li:
The Study of 3D Reconstruction Method Based on Dynamic Threshold Method and Improved Ray Casting Algorithm. 402-405 - Lihua Liu, Mingyu Li, Qiong Li, Yan Liang:
Perceptually Transparent Information Hiding in G.729 Bitstream. 406-409 - Yuhua Jiao, Qiong Li, Xiamu Niu:
Compressed Domain Perceptual Hashing for MELP Coded Speech. 410-413 - Chang'an Wei, Shouda Jiang:
Automatic Target Detection and Tracking in FLIR Image Sequences Using Morphological Connected Operator. 414-417
Video Signal Processing (1)
- Yunpeng Zhang, Zhengjun Zhai, Xuan Nie, Chunyan Ma, Fei Zuo:
An Extended Self-Adaptive Kalman Filtering Object Motion Prediction Model. 421-424 - Zhuoyi Lv, Kebin Jia:
A Novel Algorithm of Fast Detection and Segmentation of Moving Object. 425-428 - Chia-Hung Yeh, Shih-Meng Chen, Shiunn-Jang Chern:
Content-Aware Video Transcoding via Visual Attention Model Analysis. 429-432 - Yuan-Qing He, Shi-Xin Sun:
A Data Layout and Access Control Strategies of the Video Storage Server Based Disk Array. 433-437 - Guiguang Ding:
A Multi-view Video Coding Method Based on Distributed Source Coding for Free Viewpoint Switching. 438-441 - Tien-Ying Kuo, Chung-Hsin Wang:
Fast Local Motion Estimation and Robust Global Motion Decision for Digital Image Stabilization. 442-445 - Zu-jue Chen, Zhi-xiong Zhang, Xing Luo:
Efficient Block-Matching Motion Estimation Algorithm Based on Temporal and Spatial Correlation for H.264. 446-449 - Wei Ren, Yuesheng Zhu:
A Video Summarization Approach Based on Machine Learning. 450-453
Watermarking Applications (1)
- Elham Salahi, M. Shahram Moin, Ahmad Salahi:
A New Visually Imperceptible and Robust Image Watermarking Scheme in Contourlet Domain. 457-460 - Xiaohong Deng, Guowen Xu, Guang Sun, Junfeng Man:
Software Watermarking Based on Dynamic Program Slicing. 461-464 - H. Y. Leung, Lee-Ming Cheng, L. L. Cheng:
A Robust Watermarking Scheme Using Selective Curvelet Coefficients. 465-468 - Chih-Chin Lai, Hsiang-Cheh Huang, Cheng-Chih Tsai:
Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. 469-472 - Larbi Boubchir, Ayoub Otmani, Nadia Zerida:
The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking. 473-476 - Qian Zhang, Nigel Boston:
Stylometric Watermarking. 477-480 - Tianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang:
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity. 481-484 - Jing-Ming Guo, Chung-Te Yang, Jiann-Der Lee:
Mean-Classified and Hierarchical Block Matching Watermarking in Fractal Coding. 485-488
Networking Applications (1)
- Ye Yao, Vincent Hilaire, Abder Koukam, Wandong Cai:
A Holonic Model in Wireless Sensor Networks. 491-495 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesAsymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia Transport. 496-499
- Kai Li, Shijue Zheng, Zhenhua Zheng, Xiaoyan Chen:
Research on Three-Dimensional Localization Algorithm in Wireless Sensor Network. 500-503 - Yuan-Bo Chen, Chih-Jen Yang, Gwo-Jia Jong:
Intelligent Campus Multi-application RFID Integration System. 504-507 - Wenying Zeng, Yuelong Zhao, Wei Song, Wenfeng Wang:
Wireless Grid and Storage System Design. 508-511 - Haohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo:
A Metrics Suite for Static Structure of Large-Scale Software Based on Complex Networks. 512-515 - Zhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo:
On the Security of WAI Protocol in the Third Version of WAPI. 516-519 - Chin-Shiuh Shieh, Che-Wei Hsu, Wei Kuang Lai:
Application-Layer Implementation of Service Migration. 520-525
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian:
Symbian Forensics: An Overview. 529-533 - Lei Pan, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. 534-537 - Keun-Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung-Soo Lim, Seokhee Lee, Sangjin Lee:
Methodologies for Detecting Covert Database. 538-541 - Sunmi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, Sangjin Lee:
Design and Implementation of a Tool for System Restore Point Analysis. 542-546 - Yeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim:
Design and Implementation of a Tool to Detect Accounting Frauds. 547-552 - Ya-Jing Zhang, Shuan-Hu Wu:
A Gene Immune Detection Algorithm with Complement Operator on the Basis of Biological Immune Principles. 553-556 - Xiaoyi Yu, Noboru Babaguchi:
An Improved Steganalysis Method of LSB Matching. 557-560 - Hui Zhang, Shenghong Chen, Yuqin Sun, Xiamu Niu:
An Evaluation Framework for Kernel-Mode Security Modules. 561-564
The Applications of Skin Detection
- Jiann-Shu Lee, Kai-Yang Huang, Sho-Tsung Kao, Seng-Fong Lin:
Face Recognition by Integrating Chin Outline. 567-571 - Yi-Chun Lee, Chin-Hsing Chen:
Face Recognition Based on Gabor Features and Two-Dimensional PCA. 572-576 - Cheung-Wen Chang, Yung-Nien Sun:
Hand Detections Based on Invariant Skin-Color Models Constructed Using Linear and Nonlinear Color Spaces. 577-580 - Sajad Shirali-Shahreza, Hamid Beigy, Mohammad Hassan Shirali-Shahreza:
Knapsack Model for Pixel Based Skin Detection. 581-584 - Jing-Wein Wang:
Face Localization in Cluttered Background. 585-589 - JianLiang Meng, WeiXiang Cheng:
Research of Gravity-Based Outliers Detection. 590-593 - Damon Shing-Min Liu, Ching-I Cheng:
Sensation Based Clothes Search System. 594-597
Advanced Data Hiding and Coding Techniques for Audio Signals
- Akira Nishimura:
Data Hiding for Audio Signals That Are Robust with Respect to Air Transmission and a Speech Codec. 601-604 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
Steganography in Silence Intervals of Speech. 605-607 - Naofumi Aoki:
A Technique of Lossless Steganography for G.711 Telephony Speech. 608-611 - Akinori Ito, Kiyoshi Konno, Shozo Makino, Motoyuki Suzuki:
Packet Loss Concealment for MDCT-Based Audio Codec Using Correlation-Based Side Information. 612-615 - Masashi Unoki, Daiki Hamada:
Audio Watermarking Method Based on the Cochlear Delay Characteristics. 616-619 - Michael Gulbis, Erika Müller, Martin Steinebach:
Content-Based Authentication Watermarking with Improved Audio Content Feature Extraction. 620-623 - Kazuhiro Kondo, Kiyoshi Nakagawa:
A Digital Watermark for Stereo Audio Signals Using Variable Interchannel Delay in High Frequency Bands. 624-627 - Koudai Hiratsuka, Kazuhiro Kondo, Kiyoshi Nakagawa:
On the Accuracy of Estimated Synchronization Positions for Audio Digital Watermarks Using the Modified Patchwork Algorithm on Analog Channels. 628-631
Intelligent Video Processing
- Chih-Cheng Wei, Chin-Hsing Chen:
Generalized Bilinear Interpolation of Motion Vectors for Quad-Tree Mesh. 635-638 - Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang:
Robust Superresolution Reconstruction from Compressed Video Sequences with Occlusion. 639-642 - Chao-Yu Chen, Chao-Ho Chen, Tien-Hsiang Huang, Chin-Hsing Chen:
An Adaptive Image Frequency Subbanding Method for High-Frequency Pixel Estimation. 643-646 - Chin-Fa Hsieh, Tsung-Han Tsai, Chih-Hung Lai, Tai-An Shan:
A Novel Efficient VLSI Architecture of 2-D Discrete Wavelet Transform. 647-650 - Chien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen:
Low Power Adders Design for Portable Video Terminal. 651-654 - Da-Jinn Wang, Wen-Sheng Chen, Thou-Ho Chen, Tsong-Yi Chen:
The Study on Ship-Flow Analysis and Counting System in a Specific Sea-Area Based on Video Processing. 655-658 - Tsong-Yi Chen, Thou-Ho Chen, Yin-Ting Lin, Yin-Chan Chang, Da-Jinn Wang:
H.264 Video Authentication Based on Semi-fragile Watermarking. 659-662
Joint Source Channel Coding and Applications
- Lishui Chen, Guizhong Liu:
A Delivery System for Scalable Video Streaming Using the Scalability Extension of H.264/AVC over DiffServ Networks. 665-669 - Xueming Qian, Guizhong Liu, Huan Wang:
GM/LM Based Error Concealment for MPEG-4 Video Transmission over High Lossy and Noisy Networks. 670-674 - Ying Feng, Song Xiao, Chengke Wu, Rui Song:
A Refined Algorithm for the Side Information in DVC. 675-678 - Yangli Wang, Jechang Jeong, Chengke Wu, Song Xiao, Min Zhou:
An Approach to Side Information Estimation Based on Universal Prediction and Motion Compensated Interpolation. 679-682 - Xuejuan Gao, Li Zhuo, Suyu Wang, Lansun Shen:
A H.264 Based Joint Source Channel Coding Scheme over Wireless Channels. 683-686 - Chuang Lin, Jeng-Shyang Pan:
Double-Domains-Based Covert Communication Scheme for a RS-Code-Based Multiple Description Image Coding System. 687-690 - Anhong Wang, Yao Zhao, Jeng-Shyang Pan:
Multiple Description Image Coding Based on DSC and Pixel Interleaving. 691-694 - Tian-Yun Huang:
Multiple Descriptions and Adaptive Delivery of Media Content over Wireless. 695-698
Intelligent Signal and Image Processing (1)
- Xian-Hua Han, Yen-Wei Chen, Akihiko Yamada, Hideto Fujita:
Robust Face Recognition Based on Modified ICA without Training Sample of Test Subjects. 701-704 - Huchuan Lu, Chao Wang, Yen-Wei Chen:
Gaze Tracking by Binocular Vision Technology and PPBTF Features. 705-708 - Yohei Tsurugai, Yuuta Iwasaki, Xian-Hua Han, Yen-Wei Chen:
Region-Based Segmentation and Auto-Annotation for Color Images. 709-712 - Tomoko Tateyama, Zensho Nakao, Yen-Wei Chen:
Classification of Brain Matters in MRI by Kernel Independent Component Analysis. 713-716 - Shingo Takemura, Xian-Hua Han, Yen-Wei Chen, Kazuhiro Ito, Ikuko Nishikawa, Masahiro Ito:
Enhancement and detection of lung nodules with Multiscale filters in CT images. 717-720 - Hisashi Kawabayashi, Yen-Wei Chen:
Interactive System of Artificial Fish School Based on the Extended Boid Model. 721-724 - Yen-Wei Chen, Shouta Sobue, Xinyin Huang:
Mapping Functions of Color Image Features and Human KANSEI. 725-728
Image Feature Extraction, Compression and Watermarking
- Xiangyang Sun, Ju Liu, Jiande Sun, Qiang Zhang, Wei Ji:
A Robust Image Watermarking Scheme Based on the Relationship of SVD. 731-734 - Shiraz Ahmad, Zhe-Ming Lu:
Intelligent Watermark Recovery Using Spatial Domain Extension. 735-739 - Gaorong Zeng, Zhengding Qiu:
A Novel ICA-Based Extraction Scheme for Image Watermarking. 740-743 - Yi Wang, Kuilong Xia, Yu Fan, Qiong Li:
Digital Watermarking Algorithms for Vector Images. 744-747 - Xinghua Sun, Ju Liu, Jiande Sun, Niqing Yang, Shilong Wu:
An Improved Adaptive QIM Watermark Iterative Algorithm. 748-751 - Zhan-Long Yang, Bao-Long Guo:
Image Registration Using Feature Points Extraction and Pseudo-Zernike Moments. 752-755 - Meng Li, Canjie Huang, Ping Fu, Suyan Yue:
Heritage Debris Classification Based on 3D Texture Feature and SVM. 756-759 - Tien-Ying Kuo, Wen-Hai Hsiao:
A Novel Preservation Framework for Digital Image Archiving System. 760-763
Information Retrieval (2)
- Jen-Wen Ding, Wan-Ting Wang, Chu-Fu Wang:
An Efficient Data Replication Scheme for Peer-to-Peer Video Streaming over Wireless-Mesh Community Networks. 767-770 - Nguyen Huu Quynh, Ngo Quoc Tao:
Improving Harbin Method for Content Based Landscape Image Retrieval. 771-774 - Jirong Li:
Feature Selection Based on Correlation between Fuzzy Features and Optimal Fuzzy-Valued Feature Subset Selection. 775-778 - Hua Hu, Ying Liu, Xun Wang, Xia-jun Zhu, Bin Xu:
Road Extraction in Remote Sensing Images Using a New Algorithm. 779-782 - Yan Wang, Kebin Jia:
A Novel Information Entropy Shift Based Image Retrieval Algorithm. 783-786 - Lin Xie, Yao Zhao, Zhenfeng Zhu:
A Unified System for Web Personal Image Retrieval. 787-790 - Qiong Li, Jing Wu, Xin He:
Content-Based Audio Retrieval Using Perceptual Hash. 791-794
Video Signal Processing (2)
- Pengyu Liu, Kebin Jia:
An Effective Motion Estimation Scheme for H.264/AVC. 797-801 - Chia-Hung Yeh, Kai-Lin Huang, Shiunn-Jang Chern:
Deblocking Filter by Color Psychology Analysis for H.264/AVC Video Coders. 802-805 - Chih-Shan Liu, Wen-Li Wei, Nai-Chung Yang, Chung Ming Kuo:
Motion Vector Re-estimation for Video Trans-coding with Arbitrary Downsizing. 806-809 - Sangchun Han, Hwangjun Song, Jun Heo:
Path Virtualization Using Fountain Code for Video Streaming over Heterogeneous Networks. 810-813 - Baofeng Li, Yong Dou:
Subblock-Based BPE Scheme to Conquer Mismatch in Memory Access Pattern. 814-817 - Mohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh:
A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC. 818-821 - Zu-jue Chen, Wei Jia, Zhi-xiong Zhang:
Video Monitoring System Based on Amending Model of Motion Vector. 822-825 - Xiang Fu, Baolong Guo:
Framework for Distributed Video Surveillance in Heterogeneous Environment. 826-829
Video Watermarking
- Shaohui Liu, Tianhang Chen, Hongxun Yao, Wen Gao:
A Real-Time Video Watermarking Using Adjacent Luminance Blocks Correlation Based on Compressed Domain. 833-836 - Chung Ming Kuo, Cheng-Ping Chao, Wei-Han Chang, Jin-Long Shen:
Broadcast Video Logo Detection and Removing. 837-840 - Ren-Guey Lee, Chun-Chieh Hsiao, Hsin-Hao Tseng, Chih-Chun Lai:
Digital Video Multicasting System with Seamless Handover Mechanism. 841-844 - Zhi Li, Xiaowei Chen:
Self-Adaptive Video Watermarking Based on the Motion Characteristic Detection and the Model of Entropy. 845-848 - Po-Chyi Su, Ming-Lun Li, Ing-Fan Chen:
A Content-Adaptive Digital Watermarking Scheme in H.264/AVC Compressed Videos. 849-852 - Tien-Ying Kuo, Yi-Chung Lo, Chen-I Lin:
Fragile Video Watermarking Technique by Motion Field Embedding with Rate-Distortion Minimization. 853-856 - Ning Zhu, Guiguang Ding, Yaguang Yin, Jianmin Wang:
A Novel Watermarking Method For Wyner-Ziv Video Coding. 857-860
Pattern Recognition (2)
- Jian-liang Meng, Wan-qing Gao, Hui-jing Pang, Wei-hua Niu:
Face Recognition Based on Chaotic Fuzzy RBF Neural Network. 863-866 - Xiaoyan Hao, Xiaoming Chang, Kaiying Liu:
Shallow Semantic Parsing for Lexical Units in Chinese FrameNet. 867-872 - Bo Li, Zhi-yuan Zeng, Jian-zhong Zhou:
An Algorithm for License Plate Recognition System for Non-stop Toll Stations. 873-876 - Chunjiang Pang, Weixiang Cheng, Weihua Niu:
Grid Distance-Based Improving Accuracy Clustering Algorithm. 877-880 - Xinwu Li:
A Volume Segmentation Algorithm for Medical Image Based on K-Means Clustering. 881-884 - Ming Liu, Yuanchao Liu, Xiaolong Wang:
IGSOM: Incremental Clustering Based on Self-Organizing-Mapping. 885-890 - Qingdong Du, Jin Li, Xiao Chen:
Image Recognition Based on a Novel Data Fusion Method. 891-894
Optimization Techniques and Applications (1)
- Xilong Qu, Jian Feng, Wenfang Sun:
Parallel Genetic Algorithm Model Based on AHP and Neural Networks for Enterprise Comprehensive Business. 897-900 - Bo Lei, Jiu-Lun Fan:
Parameter Selection of Generalized Fuzzy Entropy-Based Thresholding Segmentation Method with Particle Swarm Optimization. 901-904 - Jian-liang Meng, Wan-qing Gao, Hui-jing Pang, Wei-hua Niu:
Fault Diagnosis of Distribution System Based on Distributed Chaotic Fuzzy RBF Neural Networks. 905-908 - Doru Constantin, Luminita State:
The FastICA Algorithm Based on Successive Approximations with Superior Convergence Rate. 909-912 - Xue-mei Wu, Gui-xian Li, Wei-min Zhao:
Incomplete Points Cloud Data Surface Reconstruction Based on Neural Network. 913-916 - Dongyun Wang, Guan Wang:
Parameters Optimization of Fuzzy Controller Based on Improved Particle Swarm Optimization. 917-921 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesAn Implementation of Fuzzy Clustering with Size and Shape Constraints. 922-925
Cross-Discipline Techniques (1)
- Jin-Yu Zhang, Man-Gui Liang:
An Optimal Predictive Polling Mechanism on EPON. 929-932 - Ang Li, Nannan Geng, Hong Gao:
Design and Implementation of A New Practical Grid. 933-936 - Xiaosong Zhao, Zhen He, Fangfang Gui, Shenqing Zhang:
Research on the Application of Six Sigma in Software Process Improvement. 937-940 - Liu Zhong:
The Research of Trusted Computing Based on the Model of Trusted Meta Data of BSCM. 941-945 - Yong-Zhong He, Zhan Han, Ye Du:
Configuring RBAC to Simulate Bell Model. 946-949 - Dening Zhang, Shuguang Zhang, Xuesong Suo, Man Cheng, Hong Juan Kou, Xiang Ling Shi, Su Zhang, Haiquan Li:
Development on the Partial Discharge On-Line Monitoring System of Transformer Based on Embedded System. 950-953 - Haohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo:
Visualization and Cognition of Large-Scale Software Structure Using the k-Core Analysis. 954-957 - Chuan-Sheng Zhou:
Research and Design of Autonomic Software Agent Architecture. 958-961
Watermarking Applications (2)
- Gaurav Gupta, Josef Pieprzyk:
Source Code Watermarking Based on Function Dependency Oriented Sequencing. 965-968 - Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu:
A New Approach against Color Attacks of Watermarked Images. 969-972 - Cagatay Karabat, Mehmet Keskinöz:
Watermark Detection Using Channel Estimation in the Quantization Based Watermarking System. 973-976 - Jing-Ming Guo, Yu-Cheng Lu, Jiann-Der Lee:
Variance-Classified Capacity Watermarking Using Discrete Cosine Transform. 977-980 - Farzin Yaghmaee, Mansour Jamzad:
Introducing a New Method for Estimation Image Complexity According To Calculate Watermark Capacity. 981-984 - Yu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang:
A Novel Relational Database Watermarking Algorithm for Joint Ownership. 985-988 - Anbo Li, Ying Chen, Bingxian Lin, Wei Zhou, Guonian Lv:
Review on Copyright Marking Techniques of GIS Vector Data. 989-993 - Niansheng Liu, Guo-hao Yang, Donghui Guo, L. L. Cheng:
A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences. 994-998
Networking Applications (2)
- Sheng-Rong Huang, Gwo-Jiun Horng, Gwo-Jia Jong:
Intelligent Hospital Space Platform Combined with RFID and Wireless Sensor Network. 1001-1004 - Jiemin Liu, Hongxing Zou, Jingxin Dou, Yuan Gao:
Rethinking Retransmission Policy In Concurrent Multipath Transfer. 1005-1008 - Zae-Kwun Lee, Hwangjun Song, GyeongCheol Lee:
Cooperative QoS-Aware Routing Algorithm Based on IEEE 802.11 Multi-rate over Mobile Ad Hoc Networks. 1009-1012 - Chuang Lin, Jeng-Shyang Pan:
An Information Hiding Scheme for the MDC-OFDM Wireless Networks. 1013-1016 - Liguo Deng, Zongmin Ma, Qiang Tong:
The Design and Analysis of Constraint Networks for Uncertain Temporal Interval Relations. 1017-1020 - Wen-Hao Hsieh, Chien-Jung Ho, Gwo-Jia Jong:
Vehicle Information Communication Safety Combined with Mobile RFID System. 1021-1024 - Jing-Cyun You, Yao-Lung Yeh, Gwo-Jia Jong:
Mobile RFID Integration Home-Care System for Wireless Network. 1025-1028 - Ning Jiang, Liancheng Shan:
Application of MAC-Based VLANs for Mobile Office in Campus Area Network. 1029-1032
Biometrics - From Sensors to Standardization
- Patrick Bours, Kirsi Helkala:
Face Recognition Using Separate Layers of the RGB Image. 1035-1042 - Menrit S. Fahmy, Amir F. Atiya, Raafat S. Elfouly:
Biometric Fusion Using Enhanced SVM Classification. 1043-1048 - Raul Sánchez-Reillo, Luis Mengibar-Pozo, Michael G. Lorenz, Raul Alonso-Moreno:
Common Interface for Connecting of Low Profile Biometric Modules. 1049-1055 - Halvor Borgen, Patrick Bours, Stephen D. Wolthusen:
Visible-Spectrum Biometric Retina Recognition. 1056-1062 - Nicolas Delvaux, Hervé Chabanne, Julien Bringer, Bruno Kindarji, Patrik Lindeberg, Johannes Midgren, Jeroen Breebaart, Ton H. Akkermans, Michiel van der Veen, Raymond N. J. Veldhuis, Els Kindt, Koen Simoens, Christoph Busch, Patrick Bours, Davrondzhon Gafurov, Bian Yang, Julien Stern, Carsten Rust, Bruno Cucinelli, Dimitrios Skepastianos:
Pseudo Identities Based on Fingerprint Characteristics. 1063-1068 - Thomas Frassen, Xuebing Zhou, Christoph Busch:
Fuzzy Vault for 3D Face Recognition Systems. 1069-1074 - Martin Drahanský:
Experiments with Skin Resistance and Temperature for Liveness Detection. 1075-1079 - Davrondzhon Gafurov, Einar Snekkenes:
Arm Swing as a Weak Biometric for Unobtrusive User Authentication. 1080-1087 - Martin Meints, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung, Gisela Quiring-Kock:
Biometric Systems and Data Protection Legislation in Germany. 1088-1093
Intelligent Watermark Hiding and Digital Image Processing
- Ziwen Sun, Maomao Hui, Chao Guan:
Steganalysis Based on Co-occurrence Matrix of Differential Image. 1097-1100 - Zhiping Zhou, Huijun Wu, Qianxing Lv:
A New Iris Recognition Method Based on Gabor Wavelet Neural Network. 1101-1104 - Bin Luo, Li Li:
Document Watermarking Robust to Copying. 1105-1108 - Xiaoqing Feng, Li Li, Zhigeng Pan, Shusen Sun, Daxing Zhang:
A Robust Double Watermarking 3D Mesh Model Based On Feature. 1109-1112 - Jian-Bin Li, Kwok-Yan Lam, Hong-Wei Sun, Siu Leung Chung:
Robust Remote Authentication for Scalable Web-Based Services. 1113-1117 - Chin-Feng Lee, Hsing-Ling Chen:
Reversible Data Embedding Using the Sliding Window. 1118-1121 - Chin-Feng Lee, Huai-En Lee:
A Blind Associative Watermark Detection Scheme Using Self-Embedding Technique. 1122-1125 - Jim-Min Lin, Wen-Gung Cheng, Guo-Ming Fang:
Software Integration for Applications with Audio Stream. 1126-1129
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (1)
- Tzu-Chuen Lu, Ying-Hsuan Huang:
The Distortion Control Method of Reversible Contrast Mapping Hiding Scheme. 1133-1136 - Yuan-Liang Tang, Chih-Peng Wang:
A Robust Watermarking Algorithm Based on Salient Image Features. 1137-1140 - Chang-Chin Huang, Du-shiau Tsai, Gwoboa Horng:
Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding Algorithm. 1141-1145 - Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng:
Secret Sharing Systems with Authentication-Based Steganography. 1146-1149 - Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang:
An Effective Demosaicking and Zooming Algorithm for CFA Images. 1150-1153 - Yan-Jun Hu, Xiaoping Ma, Linming Dou, Li Gao:
A Computation Model for Capacity and Robustness of Robust Image Watermarking Scheme in Spatial Domai. 1154-1157 - Xuehu Yan, Shuai Guan, Xiamu Niu:
Research on the Capacity of Error-Correcting Codes-Based Information Hiding. 1158-1161
Steganography and Watermarking
- Ching-Yu Yang, Wei-Ying Hwang, Ya-Fen Cheng:
IWT-Based Watermarking By Adaptive Bit-Labeling Scheme. 1165-1168 - Ching-Yu Yang, Chen-Yuan Lai:
Use of Quotient-Embedding Scheme with Smart Arrangement Technique to Hide Gray-Scale Data. 1169-1172 - Da-Chun Wu, Jiun-Sheng Li:
A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in E-commerce Applications. 1173-1176 - Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Enhance the Image Sharing with Steganography and Authentication. 1177-1181 - Chih-Hung Lin, Sheng-Lung Chien, Hsiao-Fen Chien:
Multi-Purpose Image Watermarking Method Based on Wavelet Transform. 1182-1185 - Chih-Hung Lin, Hsiao-Fen Chien, Sheng-Lung Chien:
Multipurpose Image Authentication Method based on Vector Quantization. 1186-1189 - Minghui Deng, Fang Yang, Jingbo Zhen:
Robust Digital Image Watermarking Based on Haar Orthogonal Function System. 1190-1193
Digital Communications
- Jing Xue, Qi Zhao, Zhijie Wu:
An FFT-Based DS-SS Signal Acquisition Algorithm Research. 1197-1200 - Chuntao Man, Zhenqi Wang:
The Design and Research of Remote Terminal Unit Based on Radio Technology. 1201-1204 - Zhang Nan, Yang Ping:
Reduced-State Detection for Continuous Phase Modulation (CPM) Signals. 1205-1208 - Peng Wang, Yong-en Chen:
Low-Complexity Real-Time LDPC Encoder Design for CMMB. 1209-1212 - Huan Li, Zhiyong Zou, Xiaoxiang Zhao, Kuang Wang:
A Novel Soft-In-Soft-Out Decoder for Nordstrom-Robinson Code. 1213-1216 - Yonghong Yan, Yan Xie, Wei Peng, Yun Zeng:
Wide-Band Low-Noise Quadrature VCO Design. 1217-1220 - Cagatay Karabat, Mehmet Keskinöz:
Robust Non-blind Detection for Spread Spectrum Watermarking System. 1221-1224 - Er-Fu Chen, Naitong Zhang, Wei-Xiao Meng:
A Novel Grading Noise-Pretreatment Algorithm Based on Time-Frequency Blind Source Separation. 1225-1228
Intelligent Signal and Image Processing (2)
- Junsup Kwon, Manbae Kim, Changyeol Choi:
Multiview Video Service Framework for 3D Mobile Devices. 1231-1234 - Soon-Young Lee, Junhee Heu, Chang-Su Kim, Sang-Uk Lee:
An Object Removal Using Multi-view Sequence Inpainting Technique. 1235-1238 - Jongryool Kim, Koh Choi, Changhyeok Bae, JongWon Kim:
Challenges and Realization of Real-Time Multi-view Video Transport Systems over IP Networks. 1239-1242 - Taeyoung Chung, Kwanwoong Song, Chang-Su Kim:
Efficient Prediction Structure for 2-D Wide Multi-view Video Sequence. 1243-1246 - Sang Heon Lee, Sang Hwa Lee, Nam Ik Cho, Jeong Hyu Yang:
A Motion Vector Prediction Method For Multi-view Video Coding. 1247-1250 - Tae Hoon Kim, Ho Yub Jung, Kyoung Mu Lee, Sang Uk Lee:
Segment-based Foreground Object Disparity Estimation Using Zcam and Multiple-View Stereo. 1251-1254 - Yanling Hao, Ying Liu, Renlong Wang:
High Performance Hardware Implementation Architecture for DWT of Lifting Scheme. 1255-1258
Authentication
- Xian-ge Huang, Lei Shen, Yan-hong Feng:
A User Authentication Scheme Based on Fingerprint and USIM Card. 1261-1264 - Fang Chen, Wei Li, Xiaoqiang Li:
Audio Quality-Based Authentication Using Wavelet Packet Decomposition and Best Tree Selection. 1265-1268 - Tiegang Gao, Qiaolun Gu:
A Novel Watermarking-Based Reversible Image Authentication Scheme. 1269-1272 - Hsi-Wen Wang, Chien-Chih Lai, Chun-Chieh Hsiao, Guan-Yu Hsieh, Ren-Guey Lee:
Design and Implementation of Secure Active RFID System with Cyptography and Authentication Mechanisms. 1273-1276 - Jun Yang, Xianze Yang:
A New Variant of the Diffie-Hellman Key-Exchange Protocol Based on Block Triangular Matrix Groups. 1277-1281 - Wenjie Liu, Hanwu Chen, Zhiqiang Li, Jun Zhao:
Efficient Many-to-One and One-to-Many Multiparty Quantum Secure Direct Dommunication with Authentication. 1282-1285 - Xiamu Niu, Wei Song, Meiyu Lu, Wenjun Huang:
A 3D Model Authentication Algorithm Based on Reversible Watermarking. 1286-1289
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (2)
- Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree. 1293-1296 - Jun-Chou Chuang, Chin-Chen Chang:
An Image Authentication Scheme for Halftone Images Based upon Error Diffusion. 1297-1300 - Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Twice Gric Colorings in Steganography. 1301-1304 - Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
A New Probabilistic Visual Secret Sharing Scheme for Color Images. 1305-1308 - Tao Meng, Jianfeng Wang, Shenghe Sun:
Covert Communication Based on Subliminal Channel in Broadcast Multi Signature. 1309-1311 - Zhihua Hu, Jiping Niu:
A Color Image Digital Watermarking Method Based on Valve-Value Surface. 1312-1315 - Chune Zhang, Zhengding Qiu, L. L. Cheng, Lee-Ming Cheng:
Analysis Based on Generalized Vector Quantization for Information Hiding. 1316-1320 - Yong Zhang, Jianfeng Yin, Benyang Dai:
A Blocking-Resistant Method for Anonymity System Based on Proxy and Data Hiding. 1321-1325
Cryptography (2)
- Xinsheng Wang, Liang Han, Chenxu Wang, Xiaoning Liu:
Based MATLAB on Advanced Encryption Standard (AES) IP Validation. 1329-1331 - Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin:
Breaking Instance II of New TTM Cryptosystems. 1332-1335 - Shao-Cheng Qu, Xiaoyan Wang, Mei-jing Gong:
Secure Communication Based on Synchronization of Unified Chaotic Systems. 1336-1339 - Feng Huang, Fangfang Lei:
A Novel Symmetric Image Encryption Approach Based on a New Invertible Two-Dimensional Map. 1340-1343 - Haiting Cui, Xinchun Cui, Mailing Meng:
A Public Key Cryptography Based Algorithm for Watermarking Relational Databases. 1344-1347 - Jian-liang Meng, Hui-jing Pang, Wan-qing Gao:
New Color Image Encryption Algorithm Based on Chaotic Sequences Ranking. 1348-1351 - Tao Deng, Fei Peng, Xiaofeng Huang:
A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling. 1352-1355 - Chung-Ping Young, Chung-Chu Chia, Liang-Bi Chen, Ing-Jer Huang:
NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem. 1356-1359
Network Security (1)
- Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, Tzungher Chen:
Assigning Keys in a Hierarchy. 1363-1366 - Iuon-Chang Lin, Chin-Chen Chang:
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization. 1367-1370 - Chu-Hsing Lin, Jung-Chun Liu, Fuu-Cheng Jiang, Chien-Ting Kuo:
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks. 1371-1374 - Chin-Chen Chang, Shih-Chang Chang:
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. 1375-1378 - Jen-Ho Yang, Chin-Chen Chang:
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. 1379-1382 - Zhaoyang Qu, Chunfeng Huang:
A Fractional-Step DDoS Attack Source Traceback Algorithm Based on Autonomous System. 1383-1387 - Linda Yunlu Bai, Yongfeng Huang, Guannan Hou, Bo Xiao:
Covert Channels Based on Jitter Field of the RTCP Header. 1388-1391 - Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor:
Distinguishing Attack on SN3 Stream Cipher. 1392-1395
Pattern Recognition (3)
- Xiaoyu Wang, Feng Jiang, Hongxun Yao:
DTW/ISODATA Algorithm and Multilayer Architecture in Sign Language Recognition with Large Vocabulary. 1399-1402 - Ning Wang:
Printed Chinese Character Recognition Based on Pixel Distribution Probability of Character Image. 1403-1407 - Yasuhiro Matsuda, Tsuneshi Isomura, Ichiro Sakuma, Yasuhiko Jimbo, Etsuko Kobayashi, Tatsuhiko Arafune:
Emotion Recognition of Finger Braille. 1408-1411 - Hao Meng, Fukang Sun:
The Research of Vehicle Driving Multimedia Data Recording. 1412-1415 - Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang:
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. 1416-1421 - Zhan-Long Yang, Bao-Long Guo:
Image Mosaic Based on SIFT. 1422-1425 - Wenjun Huang, Xin Yu, Qiong Li, Xiamu Niu:
A New Face Recognition Scheme with Renewable Templates. 1426-1429
Optimization Techniques and Applications (2)
- Zhen Yang, Mu-hai Li:
A Method on Impedance Control of Robots Based on the Neural Network. 1433-1436 - W. Gao:
New Neural Network Based on Ant Colony Algorithm for Financial Data Forecasting. 1437-1440 - Fu-sheng Dai, Xian-he Shao:
The Heuristic Route Algorithm of Multiple Restrictions Based on Quality of Service. 1441-1445 - Ya-Li Qi, Wei He, Hou Shu:
An Optimized Approach on Reduced Kernel Matrix to ClusterSVM. 1446-1449 - Li Hong, Xiong Shibo:
On Ant Colony Algorithm for Solving Continuous Optimization Problem. 1450-1453 - Aimin Wang, Wenhua Liu:
Design Theory of Intellectualized Computer Aided Instruction and Its Applications. 1454-1458 - Te-Jen Su, Tzu-Hsiang Lin, Jia-Wei Liu:
Particle Swarm Optimization for Gray-Scale Image Noise Cancellation. 1459-1462 - Lu Wang, Dianzhong Wen:
BP Neural Network to Distinguish Pregnant Woman by Arterial Pressure Pulse Waveform Analysis. 1463-1466
Cross-Discipline Techniques (2)
- Jin-Yu Zhang, Man-Gui Liang:
An Efficient USR Eliminating Mechanism on EPON. 1469-1472 - Lexiao Ye, Yigang Wang, Dajian Liu, Jianqi Chen:
Application Research of Secondary Development Technology for the Replacement of Furniture Part Based on Inventor API. 1473-1477 - Fu Duan, Yuxing Wang, Chanchan Zhao, Yueqin Zhang:
Research and Implementation on Middleware of Database Workload Autonomic Adaptation. 1478-1481 - Meihua Chen, Liang He, Xueming Cai, Weiwei Xia:
Trust Evaluation Model for Composite Service Based on Subjective Logic. 1482-1485 - Lei Liu, Hong Ni:
WBISD: A Debugger of Web-Based Interactive Services. 1486-1489 - Xuemei Hu, Linhong Tian:
Research and Analysis of Bias Voltage on Variable-Capacitance Micro-mechanical Accelerometer. 1490-1493 - Xinfu Liu, Jinhe Liu, Zhanping Du, Quanming Zhao, Junying Zhao, Yuhui Huang:
The Research on Non-destructive Testing Method of Sheet Resistance in Micro Area of Silicon Wafer Based on EIT Technology. 1494-1497 - Ying Yang, Ying-Hua Li, Yong Li:
Research on Communication Constellation Simulation Based on Exploratory Analysis. 1498-1500
Data Hiding and Steganography (2)
- Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang, Zhili Chen:
A Statistical Attack on a Kind of Word-Shift Text-Steganography. 1503-1507 - Nima Asadi, Mansour Jamzad, Hedieh Sajedi:
Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. 1508-1511 - Yongfeng Huang, Bo Xiao, Honghua Xiao:
Implementation of Covert Communication Based on Steganography. 1512-1515 - Fei Peng, Xingming Sun:
Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic. 1516-1519 - Ching-Nung Yang, Yao-Yu Yang, Tse-Shih Chen, Guo-Cin Ye:
New Steganography Scheme in Halftone Images. 1520-1523 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:
A New Synonym Text Steganography. 1524-1526 - Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi:
Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. 1527-1530
Network Security (2)
- Xiangqian Wu, Ning Qi, Kuanquan Wang, David Zhang:
An Iris Cryptosystem for Information Security. 1533-1536 - Iuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang:
An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy. 1537-1540 - Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee:
An Efficient Non-repudiation Mechanism for SIP-Based Services. 1541-1544 - Jing Li, Jung-San Lee, Chin-Chen Chang:
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques. 1545-1548 - Xuansen He:
Programming Method for Failure of Network Security Based on Game Model. 1549-1552 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Ming Zeng, Li Liu:
A Grid Resource Discovery Model Using P2P Technology. 1553-1556