default search action
IIH-MSP 2011: Dalian, China
- Xiamu Niu, Mingchu Li, Yôiti Suzuki, Jeng-Shyang Pan, Lakhmi C. Jain:
Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1397-2
Cross-Discipline Techniques in Signal Processing and Networking
- Jong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang:
Design of 3-D FIR Cone-Shaped Filters by McClellan Transformation and Least-Squares Contour Mapping. 1-4 - Yuh-Yih Lu, Shih-Chiang Wei, Chun-Yi Li, Hsiang-Cheh Huang:
Design of 2.45GHz Planar Meander Dipole Antenna. 5-8 - Feng-Cheng Chang, Hsiang-Cheh Huang:
A Study on ENF Discontinuity Detection Techniques. 9-12 - Hsiang-Cheh Huang, Yuh-Yih Lu, Yueh-Hong Chen:
Reversible Data Hiding with Difference Modification and Rhombus Relationships in Quadtree Decomposition. 13-16 - Liou Chu, Shih-Jung Wu:
An Integrated Building Fire Evacuation System with RFID and Cloud Computing. 17-20 - Yueh-Hong Chen, Hsiang-Cheh Huang:
A Copyright Information Embedding System for Android Platform. 21-24 - Shih-Jung Wu, Liou Chu:
A Novel Packet Scheduling Scheme for Downlink LTE System. 25-28 - Hsiang-Cheh Huang, Wei-Hao Lai, Feng-Cheng Chang:
Content-Adaptive Multi-level Data Embedding for Lossless Data Hiding. 29-32 - Feng-Cheng Chang, Duen-Kai Chen:
The Design of an XMPP-based Service Integration Scheme. 33-36 - Hsiang-Cheh Huang, Yueh-Hong Chen, Yuh-Yih Lu:
Histogram-Based Difference Expansion for Reversible Data Hiding with Content Statistics. 37-40 - Xiaojing Meng, Weidong Liu, Enjie Ding:
The Research of Acoustic Emission Signal Classification. 41-44
Techniques and Algorithms for Multimedia Security
- Ryusuke Mayuzumi, Tetsuya Kojima:
A Blind Digital Steganography Scheme Based on Complete Complementary Codes. 45-48 - Nao Teranishi, Masaki Kawamura:
Asynchronous Stochastic Decoder for Spread Spectrum Digital Watermarking. 49-52 - Tomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama, Hiroshi Yoshiura:
Content-Based De-anonymisation of Tweets. 53-56 - Viktor Monarev, Andrey Pestunov:
A New Compression-Based Method for Estimating LSB Replacement Rate in Color and Grayscale Images. 57-60 - Shuo-Tsung Chen, Huang-Nan Huang, Chih-Yu Hsu, Kuo-Kun Tseng, Chun-Hua Wu, Jeng-Shyang Pan:
Wavelet-Based Entropy for Digital Audio Watermarking. 61-64
Data Hiding, Visual Cryptography, and Secret Image Sharing
- Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Prediction-Based Lossless Data Hiding by Adaptive Coefficient-Bias Algorithm. 65-68 - Kuang Tsan Lin:
Data Encrypting in a Binary Image Base on Modified Data Hiding Method. 69-72 - Brian K. Lien, Zhi-Lin Lan:
Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood Toggling. 73-76 - Shang-Kuan Chen, Chiu-Jian Hsu, Yen-Wu Ti:
Hierarchical Three-Dimension Mesh Model Sharing. 77-80 - Min-Jeong Lee, Ji Won Lee, Heung-Kyu Lee:
Perceptual Watermarking for 3D Stereoscopic Video Using Depth Information. 81-84 - Ji Won Lee, Tae-Woo Oh, Min-Jeong Lee, Hae-Yeoun Lee, Heung-Kyu Lee:
Video Watermarking on Overlay Layer. 85-88 - Wen-Pinn Fang:
Offline QR Code Authorization Based on Visual Cryptography. 89-92 - Yung-Yi Lin, Ran-Zan Wang:
Improved Invertible Secret Image Sharing with Steganography. 93-96 - Wen-Chung Kuo, Yi-Lin Chen, Shuen-Chih Tsai, Jung-Shian Li:
Single-Packet IP Traceback with Less Logging. 97-100 - Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault. 101-104 - Rong Huang, Kouichi Sakurai:
A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing. 105-108
Multimedia Signal Processing and Networking
- Meiqiang Zhu, Jun Wang, Ming Li, Dong Li:
Design and Research on the Control of Biped Robot System Based on RUP. 109-112 - Meiqiang Zhu, Jun Wang, Ming Li, Yajing Lin:
Static Gait Analysis and Planning of Biped Robot. 113-116 - Hanjun Li:
The Research on the Module of Bipedal Robot Balance Adjustment. 117-120 - Jianping Qiao, Huamei Xin, Xiaojuan Yang:
Super-resolution Reconstruction Based on Irregular Sample and Local Statistics. 121-124 - Fang Liu, Lee-Ming Cheng:
A Novel Image Hashing Scheme Based on Wave Atoms. 125-128 - Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Saliency Detection Approach to Combine LSK and Color for Color Image. 129-132
Intelligent Watermarking Techniques, Image Authentication, and Visual Cryptography
- Chih-Yang Lin, Chao-Chin Chang, Yi-Hui Chen, Panyaporn Prangjarote:
Multimedia Privacy Protection System for Mobil Environments. 133-136 - Jau-Ji Shen, Ya-Hsin Lo:
A New Approach of Image Compression Based on Difference Vector Quantization. 137-140 - Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Chia-Chi Yang:
An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table. 141-144 - Jen-Ho Yang, Chin-Chen Chang, Shih-Yi Lin:
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices. 145-148 - Wen-Pinn Fang:
Fast Decoding Method for On-line Visual Secret Sharing by Parallel Processing Approach. 149-152 - Xin Liao, Qiao-Yan Wen, Sha Shi:
Distributed Steganography. 153-156 - Chin-Chen Chang, Kuo-Nan Chen, Ying-Hsuan Huang:
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing. 157-160 - Chia-Chen Lin, Li-Cheng Yang, Yi-Hui Chen:
Data Hiding Scheme Based on Features of Chinese Text. 161-164 - Anahita Shojaei-Hashemi, Mostafa Mehdipour-Ghazi, Shahrokh Ghaemmaghami, Hamid Soltanian-Zadeh:
Universal Steganalysis Based on Local Prediction Error in Wavelet Domain. 165-168 - Constantinos Patsakis, Nikolaos Aroukatos:
A DCT Steganographic Classifier Based on Compressive Sensing. 169-172 - Gundeep Singh Bindra:
Invisible Communication through Portable Document File (PDF) Format. 173-176 - Charu Agarwal, Anurag Mishra, Arpita Sharma:
Genetic Algorithm-Backpropagation Network Hybrid Architecture for Grayscale Image Watermarking in DCT Domain. 177-180 - Pranab Kumar Dhar, Isao Echizen:
Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data. 181-184 - Sen-Ren Jan, Steen J. Hsu, Chuan-Feng Chiu, Shu-Lin Chang:
An Improved Data Hiding Method Using Image Interpolation. 185-188 - Peyman Rahmani, Ehsan Rahmani, Gholamhossein Dastghaibyfard:
A Location Map Free Reversible Data Hiding Scheme for VQ-Compressed Images Based on Search Order Coding. 189-192
Multimedia Signal Processing and Stegarnography
- Cai-Hua Li, Zhe-Ming Lu:
Graph-Based Features for Image Retrieval. 193-195 - Tatsuya Tanaka, Toshifumi Kai, Yusuke Tamura, Ryôichi Sasaki:
Development and Evaluation of Defaced Sites Automatic Detection System DICE. 196-201 - Tiejun Zhang, Xuefeng Bai, Xianhua Song, Xiamu Niu:
An Improved Algorithm for Multiple Closed Contour Detection. 202-205 - Xinsheng Wang, Mingyan Yu:
Power Research of JPEG Circuits in FPGA. 206-208 - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Steganography: A Class of Algorithms having Secure Properties. 209-212 - Salih Ergün:
IC Postprocessing Stage for Random Number Generators and an Alternative Design Methodology. 213-217 - Chunxia Gao, Tianqi Zhang, Fangqing Tan, Chao Wang:
DOA Estimation of Coherent NLFM Signals. 218-221
Digital Rights Management in Cloud Computing
- Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian:
Compressing Encrypted Image Using Compressive Sensing. 222-225 - Qian Mao, Boqing Xu, Yanping Qin:
A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes. 226-229 - Chia-Min Lin, Shyh-Chang Tsaur, Yeong-Chin Chen, Iuon-Chang Lin:
HB Family RFID Mutual Authentication Protocol. 230-235 - Lu-Lu Wang, Kebin Jia, Zhuo-Yi Lu:
A Multi-stage Fast Intra Mode Decision Algorithm in H.264. 236-239 - Jiande Sun, Jie Zhang, Hua Yan, Likun Zhang, Wei Liu:
Visual Attention Model with Cross-Layer Saliency Optimization. 240-243 - Cheng Guo, Chin-Chen Chang:
General Threshold Signature Based on the Chinese Remainder Theorem. 244-247 - Guojun Ma, Qingqi Pei, Yuchen Wang, Xiaohong Jiang:
A General Sharing Model Based on Proxy Re-encryption. 248-251 - Chin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, Ching-Hsiang Chang:
A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol. 252-255 - Chin-Feng Lee, Kai-Chin Chen:
Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method. 256-259 - Bee Yan Hiew, Andrew Teoh Beng Jin:
Secure Template Protection in Touch-less Based Fingeprint Verification System. 260-265 - Yue Wang, Tian-qi Zhang, Juan Bai, Rui Bao:
Modulation Recognition Algorithms for Communication Signals Based on Particle Swarm Optimization and Support Vector Machines. 266-269
Robust Image/Video Coding and Transmission
- Jianchao Du, Song Xiao, Chengke Wu, Jianlong Zhang:
A Video Transmission Framework Based on Packet Criticality Model. 270-273 - Lei Quan, Song Xiao, Jianchao Du, Janli Zhou:
A Threshold-Based Coefficients Cutting Method for Compressive Imaging. 274-277 - Xuesong Sun, Song Xiao, Jianchao Du, Min Hu:
Fast Mode Decision Algorithm for H.264/SVC Based on Motion Vector Relation Analysis. 278-281 - Ying Kang, Song Xiao, Ji Lu, Chengke Wu:
A Rate Distortion-Based Network Coding Design for Video Transmission. 282-285 - Jianlong Zhang, Xinbao Gao, Song Xiao, Jianchao Du:
An Error Concealment Algorithm Based on Non-uniform Lagrange Interpolation. 286-289 - Li Zhang, Song Xiao, Ning Cai, Jianchao Du:
An Opportunistic Network Coding Algorithm Based on the Queue State and Network Topology. 290-293
New Possibility of Audio Information Processing Based on Information Hiding and Enrichment Techniques
- Kazuhiro Kondo:
The Effect of Speaker and Noise Type on the Accuracy of Estimated Speech Intelligibility Using Objective Measures. 294-297 - Yuto Sasaki, Seongjun Hahm, Akinori Ito:
Manipulating Vocal Signal in Mixed Music Sounds Using Small Amount of Side Information. 298-301 - Ryouichi Nishimura, Hiroaki Kato, Parham Mokhtari, Hironori Takemoto:
Median Plane Mislocalization of Virtual Sound Presented through Headphones. 302-305 - Naofumi Aoki:
Audio Trick Art Based on Information Misreading Technique. 306-309 - Wai-Lin Chan, Chi-Man Pun:
Robust Character Recognition Using Connected-Component Extraction. 310-313 - Masashi Unoki, Ryota Miyauchi:
Reversible Watermarking for Digital Audio Based on Cochlear Delay Characteristics. 314-317 - Akira Nishimura:
Reversible Audio Data Hiding Using Linear Prediction and Error Expansion. 318-321 - Kitahiro Kaneda, Yuta Kito, Keiichi Iwamura:
Information Hiding Based on the Artificial Fiber Pattern with Improved Robustness against Foregound Objects. 322-329 - Kitahiro Kaneda, Yoshiaki Tachibana, Keiichi Iwamura:
Information Hiding Based on a Single Dot Pattern Method with Improved Extraction and Robustness against Foreground Objects. 330-335 - Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai:
An Efficient Key Generation Method in Audio Zero-Watermarking. 336-339
Intelligent Video Processing
- Chao-Ho Chen, Tsong-Yi Chen, Chi-Ming Huang, Da-Jinn Wang:
License Plate Location for Vehicles Passing through a Gate. 340-343 - Chun Wang, Zhonghua Sun, Kebin Jia:
Abrupt Cut Detection Based on Motion Information. 344-347 - Wei-Lieh Hsu, Kun-Fong Lin, Chang-Lung Tsai:
Crowd Density Estimation Based on Frequency Analysis. 348-351 - Pengyu Liu, Kebin Jia:
Low-Complexity Encoding Method for H.264/AVC Based on Visual Perception. 352-355 - Xuefeng Bai, Tiejun Zhang, Xianhua Song, Xiamu Niu:
Playfield Detection Using Color Ratio and Local Entropy. 356-359 - Yongcheng Wang, You Ling, Mi Liang:
A Joint Approach to Frame Synchronization in Presence of Frequency Offset. 360-364
Digital Forensics
- Shidou Yan, Yatao Yang, Zichen Li:
Design of U Disk Remote Monitoring System in Trusted Computing Environment. 365-368 - Ahmed A. Abd El-Latif, Li Li, Ning Wang, Xiamu Niu:
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. 369-373 - Xueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Sockpuppet Detection in Online Discussion Forums. 374-377 - Shuhui Hou, Tetsutaro Uehara, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers. 378-383 - Yuk-Ming Lai, Xueling Zheng, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Automatic Online Monitoring and Data-Mining Internet Forums. 384-387 - Rongsheng Xu, Kam-Pui Chow, Ying Yang:
Development of Domestic and International Computer Forensics. 388-394 - Fang Cheng, Lei Tian, Jinfeng Xie:
Research on Path ID and VPI/VCI Relating Guess Solution for TD-SCDMA Network Centralized Monitoring System. 395-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.