default search action
IIH-MSP 2006: Pasadena, California, USA
- Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2745-0
New Data Hiding and Secreting Techniques for Sound Signals
- Hosei Matsuoka:
Spread Spectrum Audio Steganography Using Sub-band Phase Shifting. 3-6 - Akira Nishimura:
Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise. 7-10 - Ryuta Fujimoto, Mamoru Iwaki, Tohru Kiryu:
A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation. 11-14 - Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto:
Information Hiding on Lossless Data Compression. 15-18 - Akinori Ito, Shozo Makino:
Multiple Description Coding of an Audio Stream by Optimum Recovery Transform. 19-22 - Yôiti Suzuki, Ryouichi Nishimura, Hao Tao:
Audio Watermark Enhanced by LDPC Coding for Air Transmission. 23-26 - Ming Li, Yun Lei, Jian Liu, Yonghong Yan:
A Novel Audio Watermarking in Wavelet Domain. 27-32 - Saeed Sedghi, Morteza Khademi, Nedeljko Cvejic:
Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments. 33-36 - Gui-jun Nian, Zhiyuan Xie, Shuxun Wang:
Audio Watermarking Based on Reverberation. 37-40 - Zhao Xu, Ke Wang, Xiao-hua Qiao:
Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. 41-46
Digital Watermarking (I)
- Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin:
A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. 47-50 - Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi:
An Information Hiding Scheme for OFDM Wireless Networks. 51-54 - Kai Wang, Wenjiang Pei, Zhenya He, Yiu-ming Cheung:
A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme. 55-58 - Zhao Xu, Ke Wang, Xiao-hua Qiao:
A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. 59-62 - Xiao-hua Qiao, Shuxun Wang, Quan Wen, Zhao Xu:
A Robust Watermarking Algorithm Adopting Double Embedding. 63-66 - Ying-Tzu Shih, Feng-Cheng Chang, Hsueh-Ming Hang:
A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems. 67-70 - Cong Jin, Feng Tao, Yu Fu:
Image Watermarking Based HVS Characteristic of Wavelet Transform. 71-74 - Deyun Peng, Jiazhen Wang, Sumin Yang, Suzhen Wang, Aizhen Liu:
CDMA Based Multiple-User Digital Watermarking. 75-78 - Zheng Fang, Yao Zhao:
Image Watermarking Resisting to Geometrical Attacks Based on Histogram. 79-82 - Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li:
A New Watermarking Protocol of Copyright Protection. 83-88
Techniques and Algorithms for Multimedia Security
- Takanobu Masubuchi, Mitsuyuki Takatsuka, Ryôichi Sasaki:
A Digital Document Flexible Sanitizing Scheme. 89-92 - Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura:
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. 93-96 - Akiomi Kunisa, Kousuke Tsujita:
Improved Guided Position Scrambling for Digital Watermarking. 97-100 - Maki Yoshida, Takaaki Fujita, Toru Fujiwara:
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. 101-104 - Zhiyu Zhang, Wei Huang, Jiulong Zhang, Hai-yan Yu, Yanjun Lu:
Digital Image Watermark Algorithm in the Curvelet Domain. 105-108 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Bin-Yih Liao:
Joint Halftoning and Visible Watermarking. 109-112 - Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao:
A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. 113-116 - Li Weng, Karel Wouters, Bart Preneel:
Extending the Selective MPEG Encryption Algorithm PVEA. 117-120 - Niansheng Liu, Donghui Guo, Gerard Parr:
A New Image Steganography for Internet Communications Based on Chaotic Sequences. 121-124 - Feng Huang, Yong Feng:
An Image Encryption Approach Based on a New Two-Dimensional Map. 125-130
Image Processing
- Longjiang Yu, Sheng-He Sun:
Image Robust Hashing Based on DCT Sign. 131-134 - Shengbing Che, Da Huang, Guang Li:
A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System. 135-138 - Junding Sun, Xiaosheng Wu:
Chain Code Distribution-Based Image Retrieval. 139-142 - Kewen Xia, Guan Xu, Naixun Xu:
Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique. 143-146 - Lin Ma, Zhongzhao Zhang, Xuezhi Tan:
A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System. 147-150 - Jianping Qiao, Ju Liu:
A Novel Log-WT Based Super-Resolution Algorithm. 151-154 - Jinye Peng, Wanhai Yang, Yichun Wang:
Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement. 155-158 - Qiang He, Chee-Hung Henry Chu:
Recovering Intrinsic Images from Weighted Edge Maps. 159-162 - Nan Zhang, Xianchuan Yu, Guosheng Ding:
An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data. 163-166 - Bian Yang, Fan Gu, Xiamu Niu:
Block Mean Value Based Image Perceptual Hashing. 167-172
IP Multimedia Services
- Pei-Chen Tseng, Ching-Tuey Sung, Wen-Shyang Hwang:
Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway. 173-176 - Yung-Li Chang, Hsiang-Kai Liao, Ce-Kuen Shieh, Yu-Ben Miao:
KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis. 177-180 - Ku-Lan Kao, Chih-Heng Ke, Ce-Kuen Shieh:
Video Transmission Performance Evaluation of Ad Hoc Routing Protocols. 181-184 - Mong-Fong Horng, Hung-Wei Hsu, Wan-Ling Du, Yi-Hsiang Hung, Ming-Harng Lee:
A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks. 185-188 - Hong-Peng Wang, Tie-Jun Zhang, Xiao-Zong Yang:
Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks. 189-192 - Takuo Nakashima:
Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment. 193-196 - Xue-Guang Wang:
Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism. 197-200 - Yongjin Cho, Do-Kyoung Kwon, C.-C. Jay Kuo, Renxiang Huang, Claudio Lima, Jim D. Black, James J. Pan:
Video Streaming over 3G Networks with GOP-Based Priority Scheduling. 201-204 - Nongluk Eiamjumrus, Supavadee Aramvith:
Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint. 205-210
Evolutionary and Soft Computing
- Lei Zhang, Qiuguang Wang, Jiping Qi:
Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition. 211-214 - Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang:
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. 215-218 - JinFei Wu, DongXing Qin, HongPing Yu:
Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm. 219-222 - Mehdi Rezaei, Moncef Gabbouj, Imed Bouazizi:
Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H. 223-227 - Te-Jen Su, Jyun-Wei Jhang:
Medical Image Noise Reduction Using Cellular Neural Networks. 228-231 - Dingxue Zhang, Xinzhi Liu, Zhi-Hong Guan:
A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification. 232-235 - Binglong Li, QingXian Wang, Junyong Luo:
Forensic Analysis of Document Fragment Based on SVM. 236-239 - Wei Fang, Jun Sun, Wenbo Xu:
Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization. 240-243 - Qiong Li, Zhaoqing Liu, Xiamu Niu:
Analysis and Problems on Fuzzy Vault Scheme. 244-250
Multimedia Networking and Communications in Dynamic Heterogeneous Environments
- Junghun Park, Hsiao-Rong Tyan, C.-C. Jay Kuo:
GA-Based Internet Traffic Classification Technique for QoS Provisioning. 251-254 - Hsien-Po Shiang, Mihaela van der Schaar:
Multi-user Video Streaming over Multi-hop Wireless Networks: A Cross-Layer Priority Queuing Scheme. 255-258 - Yuh-Chou Tsai, Chia-Ming Tsai, Chia-Wen Lin:
H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh. 259-262 - Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto, Enrico Magli:
Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications. 263-266 - Deepa Kundur, Unoma Ndili Okorafor, William Luh:
HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. 267-270 - Wenhui Zhao, Daxin Liu, Yu Jiang:
Positioning Algorithm of Wireless Sensor Network Nodes. 271-273 - Hao Wang, Yanying Wang, Jikun Guo, Dianwu Gao:
Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation. 274-277 - Fenhua Cheng, Jin Zhang, Zheng Ma:
Curve-Based Secure Routing Algorithm for Sensor Network. 278-281 - Guomin Zhang, Yong Zhang, Ming Chen, Huan Xiong:
Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. 282-288
Pattern Recognition
- Jingyi Qu, Haoshan Shi:
Symmetrical Color-Spatial Feature for Medical Image Retrieval. 289-292 - Qian Zhang, Zhi-Jing Liu:
Face Detection Based on Complexional Segmentation and Feature Extraction. 293-296 - Yu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun:
Gabor Filter Based Text Extraction from Digital Document Images. 297-300 - Jun-Bao Li, Shu-Chuan Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan:
Discriminant Feature Fusion Strategy for Supervised Learning. 301-304 - Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan, Jiun-Huei Ho:
A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images. 305-308 - Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He:
A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree. 309-312 - Chi Cui:
An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices. 313-316 - Bo Qian, Yanping Li, Limin Xu, Zhenmin Tang:
A Method of Biomimetic Pattern Recognition for Speaker Recognition. 317-320 - Xiaopeng Hong, Hongxun Yao, Yuqi Wan, Rong Chen:
A PCA Based Visual DCT Feature Extraction Method for Lip-Reading. 321-326
Recognizing Humans and Human Behavior in Video
- Duan-Yu Chen, Sheng-Wen Shih, Hong-Yuan Mark Liao:
Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework. 327-330 - Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao:
Understanding Human Behavior Using a Language Modeling Approach. 331-334 - Yu-Chun Lai, Hong-Yuan Mark Liao:
Human Motion Recognition Using Clay Representation of Trajectories. 335-338 - Yung-Tai Hsu, Jun-Wei Hsieh:
Boosted String Representation and Its Application to Video Surveillance. 339-342 - Yong Xu, Yingnan Zhao:
Comparison Study on SVD-Based Face Classification. 343-346 - Junding Sun:
Image Retrieval Based on Improved Entropy and Moments. 347-350 - Yuhua Jiao, Bian Yang, He Wang, Xiamu Niu:
SVD Based Robust Image Content Retrieval. 351-354 - Lan Li, Ji-hua Chen:
Emotion Recognition Using Physiological Signals from Multiple Subjects. 355-358 - Ping-He Huang, Jing-Yong Su, Zhe-Ming Lu, Jeng-Shyang Pan:
A Fire-Alarming Method Based on Video Processing. 359-364
Steganography
- Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang, Jianchao Sun:
A New Steganalysis Method for Adaptive Spread Spectrum Steganography. 365-368 - Xin-guang Sui, Hui Luo, Zhong-liang Zhu:
A Steganalysis Method Based on the Distribution of First Letters of Words. 369-372 - Antonio Savoldi, Paolo Gubian:
A Methodology to Improve the Detection Accuracy in Digital Steganalysis. 373-376 - Cui-Qing Liu, Xijian Ping, Tao Zhang, Linna Zhou, Yun-He Wang:
A Research on Steganography Method Based on Error-Correcting Codes. 377-380 - Jinhong Luo, Haiyi Shi:
Research of Chaos Encryption Algorithm Based on Logistic Mapping. 381-383 - Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. 384-387 - Mohammad Shirali-Shahreza:
Java Applets Copy Protection by Steganography. 388-391 - Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh:
Novel Steganographic Schemes Based on Row-Major Mapping Relation. 392-395 - Ping Wang, Xiangyang Luo, Fenlin Liu:
An Improved Secret Key Estimation Method for Sequential Steganography. 396-402
Video Surveillance
- Chia-Te Chou, Sheng-Wen Shih, Duan-Yu Chen:
Design of Gabor Filter Banks for Iris Recognition. 403-406 - Chun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang:
Abnormal Event Detection in Video Using N-cut Clustering. 407-410 - Chih-Chung Hsu, Hsuan-Ting Chang, Ting Cheng Chang:
Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video. 411-414 - Kai-Li Chiang, Wen-Hsiang Tsai:
Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information. 415-418 - Cheng-Chang Lien, Yang-Kai Chang, Chih-Chiang Tien:
A Fast Facial Expression Recognition Method at Low-Resolution Images. 419-422 - Yining Qi, Mingyuan Dai:
The Effect of Frame Freezing and Frame Skipping on Video Quality. 423-426 - Thou-Ho Chen, Yen-Hui Yin, Shi-Feng Huang, Yan-Ting Ye:
The Smoke Detection for Early Fire-Alarming System Base on Video Processing. 427-430 - Tsong-Yi Chen, Thou-Ho Chen, Shi-Feng Huang, Yi-Fan Li:
An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation. 431-434 - Shahryar Karimi-Ashtiani, C.-C. Jay Kuo:
Automatic Real-Time Moving Target Detection from Infrared Video. 435-440
Digital Watermarking (II)
- Ping-Sung Liao, Cheng-Yi Chen, Chun-Chi Chen, Jeng-Shyang Pan:
Interlacing Domain Partition for Fractal Watermarking. 441-444 - Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura:
Improved Video Verification Method Using Digital Watermarking. 445-448 - M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai:
Blind Watermarking in Contourlet Domain with Improved Detection. 449-452 - Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. 453-456 - Jie Liu, Xiamu Niu, Wenhai Kong:
Image Watermarking Based on Singular Value Decomposition. 457-460 - Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang:
A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. 461-464 - Dan Wang, Peizhong Lu:
Geometrically Invariant Watermark Using Fast Correlation Attacks. 465-468 - Michael Gulbis, Erika Müller, Martin Steinebach:
Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks. 469-472 - Pei-wei Tsai, Shu-Chuan Chu, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao:
The Attacking Method for DC Components Watermarking. 473-478
Advanced Algorithms and Systems for Multimedia Processing and Networking
- Wai-Chi Fang, Jaw-Chyng L. Lue:
VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition. 479-482 - Chua-Chin Wang, Gang-Neng Sung, Jia-Hao Li:
Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263. 483-486 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Hsiang-Cheh Huang:
Reversible Data Hiding for 3D Point Cloud Model. 487-490 - Huihui Bai, Yao Zhao:
Multiple Description Image Coding Using Shifted Lattice Vector Quantization. 491-494 - Joseph Kolibal, Daniel Howard:
Implications of a Novel Family of Stochastic Methods for Function Recovery. 495-498