


default search action
IIH-MSP 2009: Kyoto, Japan
- Jeng-Shyang Pan, Yen-Wei Chen, Lakhmi C. Jain:

Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings. IEEE Computer Society 2009, ISBN 978-1-4244-4717-6
Intelligent Video Processing
- Deng-Yuan Huang, Wu-Chih Hu, Sung-Hsiang Chang:

Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVM. 1-4 - Chao-Yu Chen, Chao-Ho Chen, Yi-Li Kuo, Chin-Hsing Chen:

A Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics. 5-8 - Wen-Chia Lee, Chin-Hsing Chen:

A Fast Template Matching Method for Rotation Invariance Using Two-Stage Process. 9-12 - Ji-Hong Chen, Chin-Hsing Chen:

A Watermarking Scheme Using Code Division Multiple Access and DWT. 13-16 - Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Yi-Long Lin:

A Compression-Resistant Invisible Watermarking Scheme for H.264. 17-20 - Te Li

, Susanto Rahardja
, Haiyan Shu, Haibin Huang:
Information Embedding in MPEG-4 Scalable Lossless Audio. 21-24 - Jung-Yang Kao, Jih-Sheng Tu:

An Algorithm for Packing Bitstream of Scalable Video Coding. 25-29 - Bin Li, Kai-Kuang Ma:

Fisherface vs. Eigenface in the Dual-tree Complex Wavelet Domain. 30-33
Techniques and Algorithms for Multimedia Security
- Hirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, Ryôichi Sasaki:

Security Evaluation of Biometrics Authentications for Cellular Phones. 34-39 - Maki Yoshida, Toru Fujiwara:

Watermarking Cryptographic Data. 40-43 - Takaaki Yamada, Yoshiyasu Takahashi, Ryu Ebisawa, Yoshinori Sato, Seiichi Susaki:

Evaluation of Audio Watermark System Using Short Detection Time Frame. 44-47 - Shinta Nakayama, Hiroshi Yoshiura, Isao Echizen:

Preventing False Positives in Content-Based Phishing Detection. 48-51 - Minh-Triet Tran

, Anh Duc Duong, Isao Echizen:
XPROB - A Generalized Pool-Based Anonymous Communication Framework. 52-55 - Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:

On Privacy-aware Delegation of Personal Data using Digital Watermarking. 56-59 - Hirohisa Hioki:

Web behind Web - A Steganographic Web Framework. 60-63 - Rongling Lang, Hui Lu:

Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded Message. 64-67
Advanced Data Hiding and Coding Techniques for Audio Signals
- Akio Ogihara, Harumi Murata, Motoi Iwata, Akira Shiozaki:

Multi-Layer Audio Watermarking Based on Amplitude Modification. 68-71 - Kotaro Sonoda

, Osamu Takizawa:
Audio Watermarking Using QIM on Wavelet Packet Coefficients. 72-75 - Kotaro Yamamoto, Munetoshi Iwakiri:

Robust Audio Watermarking with Time and Frequency Division. 76-81 - Kuniaki Imabeppu, Daiki Hamada, Masashi Unoki

:
Embedding Limitations with Audio-watermarking Method Based on Cochlear-delay Characteristics. 82-85 - Kazuhiro Kondo

:
A Data Hiding Method for Stereo Audio Signals Using the Polarity of the Inter-Channel Decorrelator. 86-89 - Raúl Martínez-Noriega, Mariko Nakano

, Kazuhiko Yamaguchi:
On the Channel Characteristic of Dither Modulation Data Hiding for MP3 Compression. 90-93 - Yuan-Gen Wang, Yanqiang Lei:

A Robust Content in DCT Domain for Image Authentication. 94-97 - Guo-An Jian, Jui-Chin Chu, Jiun-In Guo:

Optimization of AVS-M Video Decoder for Real-time Implementation on Embedded RISC Processors. 98-101
Visual Based Context Awareness Computing
- Jiann-Shu Lee, Fong-Ping Chuang, Kuen-Horng Tsai:

Image Watermarking Based on Multiple Objective Genetic Algorithm. 102-105 - Yi-Chun Lee, Chin-Hsing Chen:

Feature Extraction for Face Recognition Based on Gabor Filters and Two-Dimensional Locality Preserving Projections. 106-109 - Hsiao-Chen Kuo, Jiann-Shu Lee, Sho-Tsung Kao:

An Autonomous License Plate Detection Method. 110-113 - Yung-Lung Kuo, Jiann-Shu Lee, Sho-Tsung Kao:

Eye Tracking in Visible Environment. 114-117 - Kuo-Wei Lin, Pau-Choo Chung:

Aspect Ratio Waves for Gait Analysis. 118-121 - Heng Li, Yanchun Zhong:

Adaptive Reed - Solomon Code Protection of Data Partitioned H.264 Video. 122-127 - Myoung-Jin Kim, Min-Cheol Hong:

Adaptive Rate Control Scheme in Frame-layer for Real-time H.264. 128-131
Steganography and Watermarkin
- Ching-Yu Yang, Wu-Chih Hu, Po-Yen Chang, Chang-Min Hwang:

A Semi-fragile Reversible Data Hiding by Coefficient-Bias Algorithm. 132-135 - Chen-Tsung Kuo, Da-Chun Wu, Shyi-Chyi Cheng:

3D Triangular Mesh Watermarking for Copyright Protection Using Moment-Preserving. 136-139 - Qingtang Su, Xianxi Liu, Steve Zhang:

Quality Evaluation of Digital Image Watermarking. 140-143 - Xiuli Lv, Hongyu Bian, Bo Yu, Xinghui Quan:

Color Image Watermarking Scheme Based on Support Vector Regression. 144-147 - Yuta Goto, Osamu Uchida

:
Digital Watermarking Method for Printed Materials Embedding in Hue Component. 148-152 - Xun Gong, Hai-Ming Lu:

Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 Frames. 153-156 - Ming-Quan Fan, Hong-Xia Wang:

Time-Scale Invariant Zero-Watermarking Scheme for Audio. 157-160 - Yunkai Gao, Xiaolong Li, Bin Yang:

Employing Optimal Matrix for Efficient Matrix Embedding. 161-165
Advanced Multimedia Processing and Retrievals
- Kenji Nakamura, Takashi Toriu, Shigeyoshi Nakajima, Hiromitsu Hama:

An Attention Focusing Tree Based on Saliency and a Display Method for Small Displays. 166-169 - Shigeyoshi Nakajima, Kana Sugimoto, Takashi Toriu:

Collision Detection of 4-legged Robots Using Acceleration Sensors. 170-173 - Shuhei Miyatake, Hideya Takahashi, Kenji Yamada:

Three-Dimensional Circular Camera System for the Three-Dimensional Display Based on the Reconstruction of Parallax Rays. 174-177 - Kenichi Hirose, Takashi Toriu, Hiromitsu Hama:

Detection of Tire-Road Contact Point for Vehicle Position Estimate Considering Shape Distortion in a Circular Fisheye Image. 178-181 - Hiromitsu Hama, Thi Thi Zin, Pyke Tin:

Optimal Crawling Strategies for Multimedia Search Engines. 182-185 - Thi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama:

Dominant Color Embedded Markov Chain Model for Object Image Retrieval. 186-189 - Luke K. Wang, Shan-Chih Hsieh, Kou-Yuan Huang, Wen-Cheng Chen:

Mobile Sensor for Target Tracking via Modified Particle Filter. 190-193 - Ching-Yu Wu, Po-Chyi Su

:
A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance Videos. 194-197
Wired and Wireless Multimedia Networking and Applications
- Ningping Sun, Kentarou Okumura, Wenling Sun:

A New Approach to the Dynamic Timeline of Animation Engine. 198-201 - Ningping Sun, Satoshi Tanaka, Wenling Sun:

An Alternative Algorithm of Triangulation of Polygons with Holes. 202-205 - Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi:

DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. 206-209 - Zhufang Kuang, Guogui Yang:

Multi Path Based on Cache Notification Algorithm in Wireless Sensor Networks. 210-213 - Jer-Min Tsai, I-Te Chen, Jengnan Tzeng

:
Random Number Generated from White Noise of Webcam. 214-217 - Szu-Hong Wang, Shih-Chang Hsia:

Quantization Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVC. 218-221 - Long-Chang Chen, Tsair-Fwu Lee, Pei-Ju Chao, Wen-Cheng Chen:

An Observer-Based Method for Secure Communication. 222-225 - Shih-Wei Kau, Wei-Ting Lu, Wen-Ping Chen, Tsair-Fwu Lee, Cheng-Nan Tsai:

Performance Study of Asymmetric Traffic Load for OBS Ring Networks. 226-229
Intelligent Surveillance and Pattern Recognition
- Shing-Han Li, Kuo-Chung Wang:

Applications of Ontology in Management of Information Asset. 230-233 - Ping-Lin Fan, Shih-Ying Chen, Wei-Hsien Wu, Joey Lin, Su-Ju Lu, Hsueh-Wu Wang, Yuan-Fan Tsai:

High Dynamic Range Color Image Rendering with Human Visual Adaptation Simulation. 234-237 - Chung-Hsin Liu, Chih-Chieh Fan:

The Design of Remote Surveillance System for Digital Family. 238-241 - Chung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, Chuen-Lung Chen:

To Build Tele-care System Network Environment. 242-245 - Chang-Lung Tsai, Wei-Lieh Hsu:

Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM Algorithm. 246-249 - Chih-Jen Lee, I-Horng Jeng, Tai-Ning Yang, Chun-Jung Chen, Peng Su:

Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier Filters. 250-253 - Kuo-Kai Hsu, Dwen-Ren Tsai:

Build a Home Security Surveillance System Using LEGO MINDSTORMS NXT. 254-257 - I-Horng Jeng, Dwen-Ren Tsai, Hou-An Chen, Yi-Chun Yen, Chien-Kang Cheng:

Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based on Hamilton-connected Subgraph Recognition. 258-261
Multimedia in Ubiquitous Computing and Application Services (1)
- Tzong-Chen Wu, Hung-Yu Chien:

Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. 262-265 - Jau-Ji Shen, Jia-Chiuan Wu:

Meaningful Inner Link Objects for Automatic Text Categorization. 266-269 - Chou Chen Yang, Ju-Chun Hsiao, Hung-Wen Yang:

Identity-Based DRM in Ubiquitous Multimedia System. 270-273 - Chia-Chen Lin

, Po-Hsuan Chiang:
A Novel Mutual Authentication Based on Data Embedding Technique. 274-277 - Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin:

Embedding Secret Messages Using Modified Huffman Coding. 278-281 - Zhenfei Zhao, Hao Luo, Zhe-Ming Lu:

Joint Secret Image Sharing and Progressive Transmission Based on Integer Discrete Cosine Transform. 282-285 - Pengyu Liu, Kebin Jia:

A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm for H.264/AVC Based on the Characteristics of Macro-block. 286-289
Multimedia in Ubiquitous Computing and Application Services (2)
- Kuo Lung Hung, Yih Cheng Tsay:

A Fast Image Retrieval Method Using Multi-Feature Dimension Technique. 290-294 - Hao-Kuan Tso, Der-Chyuan Lou

, Dah-Lih Jeng, Chao-Lung Chou
:
Secret Sharing Method for Gray-level Images. 295-298 - Chin-Chen Chang, Chia-Chen Lin

, Pei-Yan Pai, Yen-Chang Chen:
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector. 299-302 - Ming-Yen Lin

, Sue-Chen Hsueh, Ming-Hong Chen, Hong-Yang Hsu:
Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia Systems. 303-306 - Li-Chun Liao, Shin-Jung Gu, Bin-Chyi Tseng:

Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise Detectors. 307-311 - Nan Zhang, Siwei Ma:

H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter. 312-315 - Nan Zhang, Siwei Ma

, Wen Gao:
Shape-Based Depth Map Coding. 316-319
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, Mingchu Li:

Reversible Steganography for VQ Indices Using the Modified State Codebook. 320-323 - The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, Mingchu Li:

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. 324-327 - Zhenxing Qian

, Xinpeng Zhang, Shuozhong Wang:
Matrix Selection in High Payload Embedding. 328-331 - Zhi-Fang Yang, Po-Chen Lee, Wei-Hung Chen, Jia-Guu Leu:

Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks. 332-335 - Hsu-Hung Chiang, Ching-Chung Liu, Ying-Ming Chen, Ya-Fen Chang:

Security of Indirect-Authenticated Key Exchange Protocol. 336-339 - Shinfeng D. Lin, Chih-Yao Chuang, Hsiang-Cheng Meng:

A Video Watermarking in H.264/AVC Encoder. 340-343 - Kazuyo Yoneda, Shinichi Tamura, Yoshinori Nishino, Kazuki Nakamura, Takio Shimosakon, Kyohei Shimada, Rong Long Wang, Kozo Okazaki:

Electrical Impedance Tomography for Washing out Undergound Pollution. 344-347 - Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. 348-352
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (2)
- Tzung-Her Chen, Yao-Sheng Lee:

Yet Another Friendly Progressive Visual Secret Sharing Scheme. 353-356 - Zhi-Fang Yang, Chih-Jung Su, Ping-Chang Tseng, Chan-Ting Shu:

Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation Resistant Watermarking. 357-360 - Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang:

An Embedding Technique Based upon Block Prediction and Code Cascading Shift. 361-364 - Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. 365-368 - Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, Jason Lin

:
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. 369-373 - Tzu-Chuen Lu, Cheng-Chun Huang, Siang-Ru Liao:

Lossless Information Hiding Scheme Based on Predictive Coding. 374-377 - Jin-Bao Liu, Zhi-Long Qiu, Hui Zhou, Bao-Hui Liu, Xiamu Niu:

A Schema for Multi-Signature Handling Based on Workflow Model. 378-381 - Zhaoqing Liu, Qiong Li, Shuai Guan, Xiyuan Peng:

A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed Video. 382-385
Circuit Techniques for Multimedia Signal Processing
- Wen-Kai Tsai, Ming-Hwa Sheu, Ching-Lung Su, Jun-Jie Lin, Shau-Yin Tseng:

Image Object Detection and Tracking Implementation for Outdoor Scenes on an Embedded Soc Platform. 386-389 - Chao-Lieh Chen, Chien-Hao Lai:

Implementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless Networks. 390-393 - Ya-Hsin Hsueh, Wei-Da Chen:

An Implementation of Frame Rate Control for Reducing Flicker in CSTN Panel. 394-397 - Yang-Chiuan Lin, Hung-Yu Wang, Wei-Jeng Cheng:

A Novel Vehicle Brake Light System. 398-401 - Roger Y. Chen, Ming-Jen Chang:

A CMOS Variable-gain Fully-differential Transimpedance Amplifier for Multimedia Data Links. 402-405 - Zhe-Mao Hsu, I-Yao Chuang, Wen-Chien Su, Jen-Chieh Yeh, Jen-Kuei Yang, Shau-Yin Tseng:

System Performance Analyses on PAC Duo ESL Virtual Platform. 406-409 - Marek R. Ogiela, Urszula Ogiela:

Secret Sharing Protocol for Linguistic Threshold Schemes. 410-413 - Shinichi Tamura, Yuko Mizuno-Matsumoto, Yen-Wei Chen, Kazuki Nakamura:

Association and Abstraction on Neural Circuit Loop and Coding. 414-417
Network-Aware Multimedia: QoS and Security
- Fenglin Qin, Ju Liu, Lina Zheng, Liansheng Ge:

An Effective Network-Aware Peer Selection Algorithm in BitTorrent. 418-421 - Boyang Zhang, Ju Liu, Jinyu Chu, Jianping Qiao:

A Mutual Information Based Sub-Pixel Registration Method for Image Super Resolution. 422-425 - Jie Ling, Ju Liu, Zhaowan Sun:

Performance Comparison of Several Watermarking Methods Based on ICA and AQIM. 426-429 - Xiushan Nie, Ju Liu, Xianqing Wang, Jiande Sun:

Watermarking for 3D Triangular Meshes Based on SVD. 430-433 - Chun-Xing Wang, Xiushan Nie, Xianqing Wan, Wenbo Wan, Feng Chao:

A Blind Video Watermarking Scheme Based on DWT. 434-437 - Rong-Song He:

Optimizing Constrained Mixed-Integer Nonlinear Programming Problems Using Nature Selection. 438-441 - Cagatay Karabat

:
A Novel Secure RFID System to Ensure Privacy. 442-445 - Luke K. Wang, Shan-Chih Hsieh, Kou-Yuan Huang, Chien-Chang Wu:

Target Tracking in Clusters of Sensor Networks via Handoff Scheme with Extended Kalman Filter. 446-449
Semantic Annotation and Retrieval Techniques for Image and Video Databases
- Qingyong Li, Weitao Lu:

A Histogram Descriptor Based on Co-occurrence Matrix and its Application in Cloud Image Indexing and Retrieval. 450-454 - Lili Wan, Zhenjiang Miao:

3D Object Classification by Fuzzy KNN and Bayesian Decision. 455-458 - Tao Yang, Hongli Xu:

An Image Index Algorithm Based on Hierarchical Clustering. 459-462 - Guanghua Gu, Yao Zhao, Zhenfeng Zhu:

An Integrative Codebook for Natural Scene Categorization. 463-466 - Tao Zhang, Wenxue Hong, Jinjia Wang

:
A Novel Texture Analysis Method Based on Graph Spectral Theory. 467-470 - Lin Li, Lingfu Kong:

Image Denoising Based on Non-local Means with Wiener Filtering in Wavelet Domain. 471-474 - Hung-Yi Lin, Shih-Ying Chen:

Indexing and Querying in Multimedia Databases. 475-478 - Jinwoo Kim, Robert Close, Hisashi Taketani, Rong Long Wang, Kozo Okazaki, Shinichi Tamura:

Orthogonal Functional Expansion Method of Optical Flow for Large Displacement. 479-482
Recent Technologies and Applications of Audio Data Hiding
- Akira Nishimura:

Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech Codec. 483-486 - Naofumi Aoki:

Improvement of a Band Extension Technique for G.711 Telephony Speech by Using Steganography. 487-490 - Akinori Ito

, Hironori Handa, Yôiti Suzuki:
A Band Extension of G.711 Speech with Low Computational Cost for Data Hiding Application. 491-494 - Akinori Ito

, Shozo Makino:
Data Hiding is a Better Way for Transmitting Side Information for MP3 Bitstream. 495-498 - Toshio Modegi:

Spatial and Temporal Position Information Delivery to Mobile Terminals Using Audio Watermarking Techniques. 499-502 - Yi Gao, John Han, Lei Lin, Congde Lu, Qin Yang:

Chinese Name Speech Classification Using Fisher Score Based on Continuous Density Hidden Markov Models. 503-506 - Kai-En Tsay, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang:

Personal Photo Organizer Based on Automated Annotation Framework. 507-510 - Jiann-Jone Chen, Chun-Rong Su:

Volume Image Segmentaton by Dual Multi-Scale Morphological Reconstructions. 511-514
Intelligent Image and Signal Processing
- Chuin-Mu Wang, Ming-Ju Wu, Jian-Hong Chen, Cheng-Yi Yu:

Extension Neural Network Approach to Classification of Brain MRI. 515-517 - Bao Rong Chang, Hsiu Fen Tsai:

Applying Visual Image and Satellite Positioning for Fast Vehicle Detection and Lane Marking Recognition. 518-521 - Chin-Ho Chung, Wen-Yuan Chen, Ching-Ming Tu:

Image Hidden Technique Using QR-Barcode. 522-525 - Lung-Tsai Li, Chin-Fu Tsai, Ming-Shing Young:

Design of a System with a Multielement Thermopile for Monitoring the Temperature of Indoor Objects. 526-529 - Chin-Fu Tsai, Lung-Tsai Li, Chin-Hao Li, Ming-Shing Young:

Implementation of Thermistor Linearization Using LabVIEW. 530-533 - Ching-Hwa Cheng, Chiou-Kou Tung, Shao-Hui Shieh, Yu-Cherng Hung:

Design High-Performance and Low-Power Adder Cores with Full-Swing Nodes for Embedded Systems. 534-537 - Yu-Cherng Hung, Min-Ming Kuo, Chiou-Kou Tung, Shao-Hui Shieh:

High-Speed CMOS Chip Design for Manchester and Miller Encoder. 538-541 - Ching-Hsi Lu, Hong-Yang Hsu, Lei Wang:

A New Contrast Enhancement Technique Implemented on FPGA for Real Time Image Processing. 542-545
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian, Isao Echizen:

A Comparison between Windows Mobile and Symbian S60 Embedded Forensics. 546-550 - Marina Ponomar:

On Acceptable Modification Limits of Electroacoustic Speech Signals for Data Hiding. 551-554 - Wen-Pinn Fang:

Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift Style. 555-558 - Chin-Lun Lai

, Shu-Wen Chang:
An Image Processing Based Visual Compensation System for Vision Defects. 559-562 - Hirofumi Otori, Shigeru Kuriyama:

Robust Data Hiding on Texture Images. 563-566 - Joo-Yeon Hwang, Min-Cheol Hong:

An Adaptive Gradient-Projection Image Restoration Using Local Statistics and Estimated Noise Characteristics. 567-570 - Xiao Yi Yu, Aiming Wang:

Histogram Shifting Lossless Data Hiding Based on Space Filling Curves. 571-574 - Ali Ameri Mahabadi, Mohammad Eshghi:

Half-Zone Quantization Based Algorithm for Information Hiding. 575-578
Intelligent Document Processing and Management Systems
- Dominic Wong:

Adapting e-TOM Model to Improve Multimedia Network Management-A Case Study with a Taiwan Multimedia Service Provider. 579-582 - Yu-Fen Fu, Cheng-Seen Ho:

A Fast Text-Based Communication System for Handicapped Aphasiacs. 583-594 - Jiann-Gwo Doong:

Document Filing Approaches Using an Internal Based Folder Organization. 595-598 - Hung-Peng Lee, Kunta Hsiesh:

Fast Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue Code. 599-603 - Huifang Deng, Wen Deng:

Identity Authentication in RFID Based Logistics-Customs Clearance Service Platform. 604-607 - Jun-Bao Li, Longjiang Yu, Shize Guo:

Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object Description. 608-611 - Chung-Hong Lee, Hsin-Chang Yang

, Chih-Hong Wu, Yi-Ju Li:
A Multilingual Patent Text-Mining Approach for Computing Relatedness Evaluation of Patent Documents. 612-615 - Mohammad Shahram Moin

, Mehdi Parviz
:
Exploring AUC Boosting Approach in Multimodal Biometrics Score Level Fusion. 616-619
Protection and Authentication for Multimedia Information
- Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, Chien-Ting Huang:

Palette Partition Based Data Hiding for Color Images. 620-623 - Chin-Chen Chang, Yung-Chen Chou, Ming-Huang Hsieh:

A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments. 624-627 - Wen-Chuan Wu, Guang-Ruei Ren:

A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle. 628-631 - Chin-Feng Lee, Hsing-Ling Chen:

Data Concealment Scheme for HTML Documents Based on Color Code. 632-635 - Chih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang, Kuan-Ju Chen:

Multipurpose Watermarking Method Based on Blind Vector Quantization. 636-639 - Wei-Lieh Hsu, Chang-Lung Tsai, Po-Lun Chang:

Automatic Traffic Monitoring Method Based on Cellular Model. 640-643 - Mengbo Hou, Qiuliang Xu, Tao Ban:

Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. 644-647 - Hassana Grema Kaganami, Beiji Zou, M. Sami Soliman:

Advanced Color Images Enhancement Using Wavelet and K-means Clustering. 648-652
Behavior Analysis and Abnormal Event Detection
- Duan-Yu Chen, Kuan-Yi Lin:

A Novel Viewer Counter for Digital Billboards. 653-656 - Sin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, Yung-Sheng Chen:

Vehicle Retrieval Using Eigen Color and Multiple Instance Learning. 657-660 - Chung-Chi Tsai, Chin-Song Wu, Ching-Yu Wu, Po-Chyi Su

:
Towards Efficient Copy Detection for Digital Videos by Using Spatial and Temporal Features. 661-664 - Yu-Dun Lin, Wen-Yu Tseng, Cheng-Jie Hsu, Chia-Hung Yeh:

Driving Situations Understanding through Content Rhythm Analysis. 665-668 - Hao-Chung Shih, Chian C. Ho, Hsuan T. Chang, Chin-Song Wu:

Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling Verification. 669-672 - Yea-Shuan Huang, Wei-Cheng Liu:

Face Recognition Based on Complementary Matching of Single Image and Sequential Images. 673-676 - Tsair-Fwu Lee, Chang-Yu Lee, Pei-Ju Chao, Chang-Yu Wang:

Precision Segmentation Rendering for 3-D Coronary Angiography Medical Image. 677-680 - Yihun Alemu, Jong-bin Koh, Muhammad Ikram, Dong-Kyoo Kim:

Image Retrieval in Multimedia Databases: A Survey. 681-689
Statistical Image Processing and Application
- Huchuan Lu, Wenling Zhang, Fan Yang, Xiaojing Wang:

Robust Tracking Based on PSO and On-line AdaBoost. 690-693 - Haiyan Fu, Xiangwei Kong, Shijie Jia, Yanqing Guo:

Visual Search Based on Contour Salient. 694-697 - Nan Ding, Honglian Ma, Guozhen Tan:

The Parallelization Design of Chaotic Encryption System Based on Mulit-level Shuffle-Exchange Network. 698-701 - Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng:

Source Camera Identification Forensics Based on Wavelet Features. 702-705 - Bin Li, Xiangwei Kong, Zhe Wang, Haiyan Fu:

SIFT-Based Image Retrieval Combining the Distance Measure of Global Image and Sub-Image. 706-709 - Ying Hou, Yi Sun:

Level Set-Based Semiautomatic Bolus Segmentation in Bolus-Chasing CTA. 710-713 - Wenqi Liu, Jianhua Yang, Zhixin Li:

Fairness Analysis of Electronic Commerce Protocol Based on Strand Space. 714-717 - Jie He, Kebin Jia, Zhuoyi Lv:

A Fast and Robust Algorithm of Detection and Segmentation for Moving Object. 718-721
Human Information Processing and Its Applications
- Yoshihiro Nakamura:

Unskilled User Support for Network Operation Based on Service Composition Using Web Ontology Languages. 722-727 - Hironori Takimoto, Hironobu Fukai, Yasue Mitsukura, Minoru Fukumi:

An Analysis of the Influence of Facial Feature for Apparent Age Estimation. 728-731 - Tsukasa Nakamura, Shin-Ichi Ito, Yasue Mitsukura, Hiroto Setokawa:

A Method for Evaluating the Degree of Human's Preference Based on EEG Analysis. 732-735 - Koichiro Goya, Xiaoxue Zhang, Kouki Kitayama, Itaru Nagayama:

A Method for Automatic Detection of Crimes for Public Security by Using Motion Analysis. 736-741 - Seiji Ito, Yoshinari Oguro:

A High Speed Mixel Estimation Method by Using the Genetic Algorithm. 742-745 - Seiki Yoshimori, Hironori Takimoto, Yasue Mitsukura, Minoru Fukumi:

An Important Facial Parts Analysis for Evaluating the Impression - Difference by Gender. 746-749 - Ya-Fen Chang, Yen-Cheng Lai, Mu-Yen Chen

:
Further Remarks on Identity-Based RSA Multi-signature. 750-753 - Yifeng Lu, Xiaolong Li, Bin Yang:

A ±1-Based Steganography by Minimizing the Distortion of First Order Statistics. 754-758
Multimedia Signal Processing for Plasma Diagnostics
- Teruhisa Hochin, Yoshihiro Yamauchi, Hiroki Nomiya, Hideya Nakanishi

, Mamoru Kojima:
Fast Subsequence Matching in Plasma Waveform Databases. 759-762 - Eunjoo Choi, Jiayong Zhong, Shinsuke Fujioka

, Hiroyuki Shiraga, Hiroshi Azechi:
Image Processing in Ultra Fast X-ray Imaging with Streak Cameras for Laser Fusion Research. 763-766 - Tatsuki Ueda, Shinsuke Fujioka

, Shinya Nozaki, Yen-Wei Chen, Hiroaki Nishimura:
Improvements of Signal-to-noise Ratio Utilizing Penumbral Imaging with M-sequences Aperture and Its Heuristic Scheme. 767-770 - Shinya Nozaki, Yen-Wei Chen, Shinsuke Fujioka

, Tatsuki Ueda, Yoshinori Namihira:
A Heuristic Decoding Method for Coded Images of Random Uniformly Redundant Array. 771-774 - Yen-Wei Chen, Chen-Lun Lin, Aya Mimori:

Particle Swarm Optimization for Reconstruction of Penumbral Images. 775-778 - Constantinos Patsakis

, Evangellos Fountas:
Creating RSA Trapdoors Using Lagrange Four Square Theorem. 779-782 - Xiu-ying Ma, Jia-jun Lin:

Imperceptibility Evaluation for Color Stego Image. 783-786 - Seyed Mojtaba Seyedhosseini Tarzjani, Shahrokh Ghaemmaghami:

Detection of LSB Replacement and LSB Matching Steganography Using Gray Level Run Length Matrix. 787-790
Ubiquitous Multimedia Services and Applications for Residential Users (1)
- Jui-Fang Chang, Chi-Ming Kuan, Yu-Wen Lin:

Forecasting Exchange Rates by Genetic Algorithms Based Back Propagation Network Model. 791-794 - Feng-Cheng Chang

, Hsiang-Cheh Huang
:
A Study on the Cache Miss Rate in a Genetic Algorithm Implementation. 795-798 - Chuan-Yu Chang, Ru-Hao Jian, Hung-Jen Wang:

Two-phase Fuzzy-ART with Independent Component Analysis for Semantic Image Classification. 799-802 - Yuh-Ming Cheng:

Using ZigBee and Room-Based Location Technology to Constructing an Indoor Location-Based Service Platform. 803-806 - Minhao Liu, Yunbiao Guo, Linna Zhou:

Text Steganography Based on Online Chat. 807-810 - Qi Han, Qiong Li, Xiamu Niu:

Perceptual Content Authentication and Tamper Detection of Facial Image. 811-814 - Young-Ho Song, Taeck-Geun Kwon:

Fast Channel Change IPTV System for Enhanced User Experience. 815-818 - Toshihiko Sasama, Hiroshi Mitsumoto, Kazuyo Yoneda, Shinichi Tamura:

Mental Rotation by Neural Network. 819-822
Ubiquitous Multimedia Services and Applications for Residential Users (2)
- Yi-Ting Chen, Shu-Chuan Chu, Mong-Fong Horng, Jeng-Shyang Pan:

An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone Images. 823-827 - Jinn-Kwei Guo, Chun-Lin Lu, Ju-Yun Chang, Yi-Jing Li, Ya-Chi Huang, Fu-Jiun Lu, Ching-Wen Hsu:

Interactive Voice-Controller Applied to Home Automation. 828-831 - Zhi Chai, Kai-Kuang Ma, Zhengguang Liu:

Complex Wavelet-Based Face Recognition Using Independent Component Analysis. 832-835 - Hsiang-Cheh Huang

, Feng-Cheng Chang
:
Similarity-Based Watermarking for Sub-Sampling Images with Bacterial Foraging Techniques. 836-839 - Chun-Chieh Tseng, Jia-Hao Wu, Bin-Yih Liao:

Defect Detection of Skewed Images for Multilayer Ceramic Capacitors. 840-843 - Wei Kuang Lai, Mu-Lung Weng, Chien-Hua Lin, Chin-Shiuh Shieh:

Adaptive Multicast Routing Protocol for Wireless Mobile Ad Hoc Networks. 844-847 - Jing He, Yan Huang, Xinyu Xu:

An Efficient Architecture for Deblocking Filter in H.264/AVC. 848-851 - Mao Nakajima, Minoru Watanabe:

A 13.75 ns Holographic Reconfiguration of an Optically Differential Reconfigurable Gate Array. 852-855
Coding and Protocols in Security and Applications
- Chung-Huang Yang, Kuang-Li Ting:

Fast Deployment of Botnet Detection with Traffic Monitoring. 856-860 - Chung-Ming Ou, Chung-Ren Ou:

Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRM. 861-864 - Jen-Chun Chang, Hsin-Lung Wu:

A Hybrid RFID Protocol against Tracking Attacks. 865-868 - Narn-Yih Lee, Tzu-Yi Lee:

User Friendly Digital Rights Management System Based on Smart Cards. 869-872 - Wei-Chen Wu, Yi-Ming Chen:

TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks. 873-876 - Yasuhiro Matsuda, Tsuneshi Isomura:

Emotion Feature Vector of Finger Braille. 877-880 - Wenfa Qi, Xiaolong Li, Bin Yang:

Bilinear Coons Patch and its Application in Security Pattern Design. 881-884 - Jun-Da Txia, Chung-Lin Huang:

Age Estimation Using AAM and Local Facial Features. 885-888
Coding and Protocols in Security and Applications (2)
- Tzung-Her Chen, Yan-Ting Wu, Yue-Rong Lin:

Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression. 889-892 - Chien-Lung Chan, Chia-Li Lin:

Determinants of Satisfaction and Intention of Use Self-service Technology - Technology Readiness and Computer Self-efficacy. 893-897 - Yu-Wei Lai, Chin-Chen Chang, Shih-Chang Chang:

Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve. 898-901 - Chin-Chen Chang, Chia-Yin Lee, Wei-Bin Lee:

Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. 902-904 - Gang-Zeng Mao, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang:

Real-Time Hand Detection and Tracking against Complex Background. 905-908 - Yosuke Horiuchi, Osamu Uchida

:
A Falsification Prevention Method for Face Authentication Using Light. 909-912 - Ehsan Ehsani, M. Shahram Moin

, Farbod Razzazi
:
Image Watermarking in Face Recognition Systems Based on Contourlet Transform. 913-916 - Guang Xu, Hong An, Gu Liu, Ping Yao, Mu Xu, Wenting Han, Xiaoqiang Li, Xiurui Hao:

Performance and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream Processor Architectures. 917-920
Advanced Reversible Data Hiding and Steganalysis
- Xinshan Zhu, Yun Yang, Yanming Chen:

Novel Robust Image Watermarking Exploiting the Features of Double Domains. 921-924 - Yongge Liu, Yanqiang Ge:

Study on Digital Watermarking in the Oracle Bone Inscriptions Rubbings. 925-928 - Qinxia Wu, Weiping Li, Xiao Yi Yu:

Revisit Steganalysis on QIM-Based Data Hiding. 929-932 - Xiao Yi Yu, Aiming Wang:

Chain Coding Based Data Hiding in Binary Images. 933-936 - Brian K. Lien:

Robust Data Hiding by Hilbert Curve Decomposition. 937-940 - Xiangfei Sun, Qiuliang Xu, Tao Ban:

Identity Based Authenticated Key Agreement for Tree-Based Group. 941-944 - Mao Ye, Fenlin Liu, Chunfang Yang, Xiongfei He:

Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography. 945-948 - Shang-Kuan Chen, Sian-Jheng Lin:

Non-expansible Flip-flop Visual Cryptography with Perfect Security. 949-952
Intelligent Image Fusion and Its Application
- Naizhang Feng, Mingjian Sun, Liyong Ma

, Jiachen Ma:
Curvelet Based Image Fusion for Ultrasound Contrast Harmonic Imaging. 953-956 - Liyong Ma

, Yude Sun, Naizhang Feng, Zheng Liu:
Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity Detecting. 957-960 - Yuhao Gu, Qing Lin, Bo Hu, Xiao Bo:

A Fast Medical Image Registration Based on Steerable Pyramid. 961-964 - Miao Zhang

, Qiang Wang
, Yi Shen, Bo Zhang:
Hyperspectral Feature Selection Based on Mutual Information and Nonlinear Correlation Coefficient. 965-968 - Jiasheng Hao, Yi Shen, Hongbing Xu, Jianxiao Zou:

Generalized Local Priority Based Medical Image Fusion Scheme. 969-972 - Jiang Wang, Jian Qiu Zhang:

An Iterative Refinement DSA Image Registration Algorithm Using Structural Image Quality Measure. 973-976 - Ran-Zan Wang

, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang, Shyong Jian Shyu
:
Multisecret Image Sharing. 977-980 - Weilan Wang:

Study of Thangka Image Retrieval and Multimedia Presentation Management System. 981-984
Internet Multimedia Technology and Applications
- Hung-Wei Lin, Kuo-Chih Chu, Wei-Tsong Lee, Jim-Min Lin:

Seamless Handover for Multimedia Applications between Heterogeneous Wireless Networks. 985-988 - Po-Chang Huang, Kuo-Chih Chu, Hsiang-Fu Lo, Wei-Tsong Lee, Tin Yu Wu:

A Novel Adaptive FEC and Interleaving Architecture for H.264/SVC Wireless Video Transmission. 989-992 - Chia-Ming Lee, Shang-Rong Tsai, Yu-Sheng Huang, Yuan-Liang Tai, Guang-Hung Huang, Hewijin Christine Jiau:

Information Objects Encapsulating Multimedia and Intelligence. 993-997 - Pang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang, Ting-Wei Hou:

A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java Processor. 998-1001 - Hewijin Christine Jiau, Ming Lun Lee:

Automatic Internet Media Clipper. 1002-1005 - Feng-Pu Yang, Hewijin Christine Jiau, Kuo-Feng Ssu:

IDEA: An Interest-DrivEn Architecture for Establishing Personalized Semantic Infrastructure. 1006-1009 - Yanan Wang, Di Wu, Hui Zhang, Xiamu Niu:

A Robust Contourlet Based Image Hash Algorithm. 1010-1013 - Chia-Chun Wu

, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Reversible Secret Image Sharing Based on Shamir's Scheme. 1014-1017
Multimedia Signal Processing for Intelligent Applications
- Cheng-Chang Lien, Ya-Lin Huang, Chin-Chuan Han:

People Counting Using Multi-Mode Multi-Target Tracking Scheme. 1018-1021 - Fang-Hsuan Cheng, Cheng-Yuan Chang:

Human Behavior Description Model Based on Action Recognition. 1022-1025 - Jau-Ling Shih, Chang-Hsing Lee

, Chih-Hsun Chou, Yu-Cheng Chang:
A New Feature Integration Approach and Its Application to 3D Model Retrieval. 1026-1029 - Chang-Hsing Lee

, Hwai-San Lin, Chih-Hsun Chou, Jau-Ling Shih:
Modulation Spectral Analysis of Static and Transitional Information of Cepstral and Spectral Features for Music Genre Classification. 1030-1033 - Yuan-Kai Wang

, Cai-Ren Huang:
Face Image Super-Resolution Using Two-dimensional Locality Preserving Projection. 1034-1037 - Jengnan Tzeng

, I-Te Chen, Jer-Min Tsai:
Random Number Generator Designed by the Divergence of Scaling Functions. 1038-1041 - Hao Wang, Qiuliang Xu, Tao Ban:

A Provably Secure Two-Party Attribute-Based Key Agreement Protocol. 1042-1045 - Yifeng Lu, Xiaolong Li, Bin Yang:

A Secure Steganography: Noisy Region Embedding. 1046-1051
Advances in Biometrics (1)
- Martin Drahanský

, Dana Lodrova:
Experiments with Optical Liveness Testing Method. 1052-1055 - Claudia Nickel, Christoph Busch, Xuebing Zhou:

Template Protection via Piecewise Hashing. 1056-1060 - Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper

:
Feature Correlation Attack on Biometric Privacy Protection Schemes. 1061-1065 - Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog:

The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. 1066-1071 - Patrick Bours, Christopher Johnsrud Fullu:

A Login System Using Mouse Dynamics. 1072-1077 - Xiuxin Chen, Kebin Jia, Zhipin Deng:

A Video Retrieval Algorithm Based on Spatio-temporal Feature Curves and Key Frames. 1078-1081 - Cagatay Karabat

, Hakan Erdogan
:
A Cancelable Biometric Hashing for Secure Biometric Verification System. 1082-1085 - Wei-Ho Tsai, Wei-Che Hsieh:

Blind Clustering of Music Recordings Based on Audio Fingerprinting. 1086-1089
Advances in Biometrics (2)
- Daniel Hartung, Christoph Busch:

Why Vein Recognition Needs Privacy Protection. 1090-1095 - Robert Mueller, Raul Sánchez-Reillo

:
An Approach to Biometric Identity Management Using Low Cost Equipment. 1096-1100 - Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:

Template Protection for Multimodal Biometric System. 1101-1104 - Stephen D. Wolthusen, Christoph Busch:

Non-Forensic Odontological Biometrics. 1105-1109 - Jakub Galka

, Mariusz Ziólko:
Mean Best Basis Algorithm for Wavelet Speech Parameterization. 1110-1113 - Javad RavanJamJah, Soodeh Bakhshandeh, Seyed Bahram Zahir Azami:

A Steganalysis Algorithm Based on Denoising of Source Image Using ICA and SVM. 1114-1117 - Xiao Yi Yu, Aiming Wang:

An Investigation of Genetic Algorithm on Steganalysis Techniques. 1118-1121 - Satoshi Yairi, Yukio Iwaya, Maori Kobayashi, Makoto Otani, Yôiti Suzuki, Takeru Chiba:

The Effects of Ambient Sounds on the Quality of 3D Virtual Sound Space. 1122-1125
Digital Archives and Digital Heritages
- Fuminori Kimura, Akira Maeda:

Construction of Ancient-Modern Word Dictionary from Parallel Corpus of Ancient Writings and Their Translations in Modern Language. 1126-1129 - Kingkarn Sookhanaphibarn, Ruck Thawonmas

:
A Framework for Design and Evaluation of Digital Museums in Second Life as Learning Institutions. 1130-1133 - Junichi Oda, Ruck Thawonmas

, Kuan-Ta Chen:
Comparison of User Trajectories Based on Coordinate Data and State Transitions. 1134-1137 - Masakazu Sawai, Yuzuru Isoda, Akihiro Tsukamoto, Yoshihiro Kosaka, Kyoko Hasegawa, Susumu Nakata

, Satoshi Tanaka:
Automatic Modeling of Virtual 3D Streets Based on GIS Data - Application to Generation of Kyoto in the Edo Era. 1138-1143 - Tsuyoshi Matsuoka, Asako Soga, Kazuhiro Fujita:

A Retrieval System for Ballet Steps Using Three-dimensional Motion Data. 1144-1147 - Masahito Shiba:

A Method of Managing Distributed Contents in Heterogeneous Servers. 1148-1151 - Hung-Min Sun, Cheng-Ta Yang, Yue-Hsun Lin, Mu-En Wu:

A Pair-wise Key Establishment for Wireless Sensor Networks. 1152-1155 - Guibin Zheng, Miao Li, Jiqing Han, Tieran Zheng:

A Fast Audio Retrieval Method Based on Negativity Judgment. 1156-1159
Digital Archives and Digital Heritages (2)
- Kohei Furukawa, Ryo Akama, Chisako Hirose, Kozaburo Hachimura:

Digital Reconstruction of a Historical Kabuki Theater. 1160-1163 - Woong Choi, Hiroyuki Sekiguchi, Kozaburo Hachimura:

Analysis of Gait Motion by Using Motion Capture in the Japanese Traditional Performing Arts. 1164-1167 - Xin Yin, Kazuyoshi Nomura, Hiromi T. Tanaka:

Extracting Tactile Sensation Information from Multi-illuminated Images of Tangible Cultural Property. 1168-1171 - Mamiko Sakata, Sayaka Wakamiya:

An Analysis of Body Movement on Music Expressivity Using Motion Capture. 1172-1176 - Woong Choi, Takatoshi Ono, Kozaburo Hachimura:

Body Motion Analysis for Similarity Retrieval of Motion Data and Its Evaluation. 1177-1180 - Jian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu:

An Automated On-line Traffic Flow Classification Scheme. 1181-1184 - Tanya Ignatenko, Frans M. J. Willems:

Achieving Secure Fuzzy Commitment Scheme for Optical PUFs. 1185-1188 - Ryouichi Nishimura:

Information Hiding into Interaural Phase Differences for Stereo Audio Signals. 1189-1192
Application of Intelligent Computing to Signal and Image Processing
- Chu-Zheng Wang, Xian-Hua Han, Masahiro Ito, Ikuko Nishikawa, Yen-Wei Chen:

Principal Component Analysis for Prediction of O-Linked Glycosylation Sites in Protein by Multi-Layered Neural Networks. 1193-1196 - Caifen Wang, Xiaodong Yang, Caihui Lan, Xiaojun Cao

:
An Efficient Identity-Based Certified E-mail Protocol. 1197-1200 - Xiang-Yan Zeng, Yen-Wei Chen, Caixia Tao:

Denoising by Anisotropic Diffusion in ICA Subspace. 1201-1204 - Xiang-Yan Zeng, Yen-Wei Chen, Caixia Tao, Deborah van Alphen:

Feature Selection Using Recursive Feature Elimination for Handwritten Digit Recognition. 1205-1208 - Yukiko Nakajima, Kazutoshi Sakakibara, Masahiro Ito, Ikuko Nishikawa:

Prediction of the O-glycosylation by Support Vector Machines and Characteristics of the Crowded and Isolated O-glycosylation Sites. 1209-1212 - Xinyin Huang, Yan Zhang, Aibing Xu, Hisashi Kawabayashi, Yen-Wei Chen:

A Research on Social Anxiety Individuals' Emotion Recognition Using IEC. 1213-1216 - Hassana Grema Kaganami, Beiji Zou:

Region-Based Segmentation versus Edge Detection. 1217-1221 - Ying Dai:

Representing Meanings of Images Based on Associative Values with Lexicons. 1222-1227
Advances in Multimedia Signal Processing and Communications
- Chin-Feng Lai

, Yi-Wei Ma, Chia-Cheng Hu, Yueh-Min Huang:
P2P Multimedia Streaming Schedule for Maximum Network Capacity. 1228-1231 - Jen-Wen Ding, Guan-Wei Wu, Der-Jiunn Deng:

Optimal Rate Allocation and Admission Control Policy for P2P On-Demand Streaming Systems. 1232-1235 - Ming-Fong Tsai, Chih-Heng Ke, Chun-I Kuo, Ce-Kuen Shieh:

Path Dependent Adaptive Forward Error Correction with Multipath Interleaving Control Scheme for Video Streaming over Wireless Networks. 1236-1239 - Kawuu Weicheng Lin, Ming-Hua Hsieh, Vincent S. Tseng:

Mining Temporal Region-Based Service Patterns for Cooperative Caching in Wireless Multimedia Sensor Networks. 1240-1244 - Mei-Yi Wu, Chuan-Chi Hsu, Jia-Hong Lee:

A GeoTagging Scheme Using Image Steganography and GPS Information Authentication. 1245-1248 - Huei-Yu Yang, Ya-Chun Li, Feng-Yi Chou, Tin Yu Wu, Wei-Tsong Lee:

Pre-Register Algorithm for SVC by Fast BSS Transition Wireless Networks. 1249-1252 - Chuen-Ching Wang, Ming-Jun Chi, Yao-Tang Chang:

New Watermarking Algorithm with Coding Efficiency Improvement and Authentication in Video Surveillance. 1253-1257 - Wen-Chien Yen, Yen-Yu Chen, Ying-Wen Chang:

An Enlargement Method Using Undecimated Wavelet Transform and Shape Function. 1258-1261
Multimedia Signal Processing and Application
- Menrit Samir Fahmy:

New Approach for Cancer Computer Aided Diagnosis and Treatment. 1262-1265 - Tomoko Tateyama, Amir Hossein Foruzan

, Yen-Wei Chen:
2D-PCA Based Statistical Shape Model from few Medical Samples. 1266-1269 - Qi Xi, Xing Wu, Shensheng Zhang:

Compound Image Compression with Multi-step Text Extraction Method. 1270-1273 - Masataka Seo, Yen-Wei Chen:

Face Image Metamorphosis with an Improved Multilevel B-Spline Approximation. 1274-1277 - Hisashi Kawabayashi, Mohammad Khazab, Jeffrey Tweedale, Lakhmi C. Jain, Yen-Wei Chen:

Remote Control System of Artificial Fish School and Its Fast Implementation. 1278-1281 - Xian-Hua Han, Yen-Wei Chen:

Image Categorization by Learned PCA Subspace of Combined Visual-words and Low-level Features. 1282-1285 - Minoru Kuribayashi

, Hiroshi Kato, Masakatu Morii:
A Study of Rounding Error on CDMA-Based Fingerprinting Scheme. 1286-1289 - Mariusz Ziólko, Bartosz Ziólko

, Rafal Samborski:
Dual-Microphone Speech Extraction from Signals with Audio Background. 1290-1292
Multi-Dimensional Signal Processing, Modeling and Visualization
- Amir Hossein Foruzan

, Yen-Wei Chen, Reza Aghaeizadeh Zoroofi, Akira Furukawa, Yoshinobu Sato, Masatoshi Hori:
Multi-mode Narrow-band Thresholding with Application in Liver Segmentation from Low-contrast CT Images. 1293-1296 - Farshid Babapour Mofrad

, Reza Aghaeizadeh Zoroofi, Yen-Wei Chen, Ali Abbaspour Tehrani-Fard, Yoshinobu Sato, Akira Furukawa:
Evaluation of Liver Shape Approximation and Characterization. 1297-1300 - Hideo Nakajima, Kyoko Hasegawa, Susumu Nakata

, Satoshi Tanaka:
Volume Visualization with Grid-Independent Adaptive Monte Carlo Sampling. 1301-1304 - Tomohiro Nakamichi, Gang Xu:

Detection and 3D Measurement of a Rectangular Solid in a Single Image. 1305-1309 - Pooneh R. Tabrizi, Reza Aghaeizadeh Zoroofi:

Drowsiness Detection Based on Brightness and Numeral Features of Eye Image. 1310-1313 - Alireza Ghahari, Y. Rakhshani Fatmehsari, Reza Aghaeizadeh Zoroofi:

A Novel Clustering-Based Feature Extraction Method for an Automatic Facial Expression Analysis System. 1314-1317 - Mohammad Hosntalab, Reza Aghaeizadeh Zoroofi, Ali Abbaspour Tehrani-Fard, Gholamreza Shirani:

Automated Dental Recognition in MSCT Images for Human Identification. 1318-1321 - Yu-Long Qiao, Chun-Yan Song:

Double-Density Dual-Tree Wavelet Transform Based Texture Classification. 1322-1325
Image Processing and VLSI Implementation
- Hiroki Sugano, Ryusuke Miyamoto:

Parallel Implementation of Good Feature Extraction for Tracking on the Cell Processor with OpenCV Interface. 1326-1329 - Ryoji Kadota, Hiroki Sugano, Masayuki Hiromoto, Hiroyuki Ochi, Ryusuke Miyamoto, Yukihiro Nakamura:

Hardware Architecture for HOG Feature Extraction. 1330-1333 - Jingbang Qiu, Ying Lu, Tianci Huang, Takeshi Ikenaga:

An FPGA-Based Real-Time Hardware Accelerator for Orientation Calculation Part in SIFT. 1334-1337 - Tianci Huang, Chengjiao Guo, Jingbang Qiu, Takeshi Ikenaga:

Temporal Information Cooperated Gaussian Mixture Models for Real-time Surveillance with Ghost Detection. 1338-1341 - Yohei Fukumizu, Tomoaki Takano, Yasuyuki Oshima, Toshihiko Terada, Hironori Yamauchi:

A Gabor Pseudo Fisherface Based Face Recognition Algorithm for LSI Implementation. 1342-1345 - Gen Fujita, Tomokazu Matsuno:

An Approach to Video Coding Using Parameter Estimation in the Decoding Process. 1346-1349 - Ali Ghorbanian, Amir Mousavinia

:
Wavelet-Based Sequence Codec Implementation on TMS320DM642. 1350-1353 - Pachara V. Rao, Cyril Prasanna Raj, S. Ravi

:
VLSI Design and Analysis of Multipliers for Low Power. 1354-1357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














