


default search action
IIH-MSP 2010: Darmstadt, Germany
- Isao Echizen, Jeng-Shyang Pan, Dieter W. Fellner, Alexander Nouak, Arjan Kuijper, Lakhmi C. Jain:

Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-8378-5
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Hsiao-Han Ko, Kuo-Jin Tseng, Li-Min Wei, Meng-Hsiun Tsai:

Possible Disease-Link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities of Ovarian Carcinoma Microarray Data. 1-4 - Iuon-Chang Lin, Chia-Chang Sung:

An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. 5-8 - Iuon-Chang Lin, Hsing-Lei Wang:

An Improved Digital Signature Scheme with Fault Tolerance in RSA. 9-12 - Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin:

Chaos-Based Image Integrity Authentication Code. 13-16 - Tzu-Chuen Lu, Siang-Ru Liao, Chun-Ming Chang:

The Information Hiding Technology Based on the Similar Sample Blocks of Grayscale Image. 17-20 - Chin-Chen Chang, Kuo-Nan Chen, Ming-Huang Hsieh:

A Robust Public Watermarking Scheme Based on DWT. 21-26 - Hui-Feng Huang, Ya-Fen Chang, Chun-Hung Liu

:
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks. 27-30 - Iuon-Chang Lin, Ping-Kun Hsu:

A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System. 31-33 - Chin-Fang Lee, Huei-Ju Tsai:

A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction. 34-38
Steganography and Watermarking
- Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:

Reversible Watermarking by Coefficient Adjustment Method. 39-42 - Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li:

A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. 43-46 - Yeh-Shun Chen, Ran-Zan Wang

:
Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking. 47-50 - Jeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee:

Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling. 51-54 - Tae-Woo Oh, Seung-Jin Ryu, Ji Won Lee, Won-Young Yoo, Heung-Kyu Lee:

Improved Watermark Estimation Scheme Based on Neighborhood Filter. 55-58 - Wen-Pinn Fang:

Multi-layer Secret Image Sharing. 59-61 - Kuang Tsan Lin:

Graylevel Images Encrypting Based on the n-Graylevel Encoding Method and the Lowest Common Multiple Technique. 62-65 - Lee Shu-Teng Chen

, Wen-Tarn Chang, Suiang-Shyan Lee, Ja-Chen Lin:
Data Hiding Based on Side Match Vector Quantization and Modulus Function. 66-69 - Shang-Kuan Chen, Ran-Zan Wang

:
High-Payload Image Hiding Scheme Using k-Way Block Matching. 70-73 - Wen-Chung Kuo, Shao-Hung Kuo, Lih-Chyau Wuu:

High Embedding Reversible Data Hiding Scheme for JPEG. 74-77 - Marcus Nutzinger, Christian Fabian, Marion Marschalek:

Secure Hybrid Spread Spectrum System for Steganography in Auditive Media. 78-81 - Peter Meerwald

, Andreas Uhl:
Robust Watermarking of H.264-Encoded Video: Extension to SVC. 82-85 - Minghui Deng, Xiuli Zhou:

A Robust Digital Image Watermarking Algorithm Based on CHIRPLET Transform. 86-89 - Brian K. Lien:

An Information-Theoretic Model for Dispersed Ordered Dithered Halftone Image Watermarking by Hilbert Curve Decomposition. 90-93 - Manabu Hirakawa, Junichi Iijima:

Mobile Services and Implementation of Digital Watermarks in Audio Files. 94-97 - Ali Nur Mohammad Noman, Kevin Curran

, Tom Lunney:
A Watermarking Based Tamper Detection Solution for RFID Tags. 98-101 - Charu Agarwal, Anurag Mishra

:
A Novel Image Watermarking Technique Using Fuzzy-BP Network. 102-105 - Dong-Gyu Yeo, Hae-Yeoun Lee, Byeong Man Kim:

Differential Histogram Modification-Based Reversible Watermarking with Predicted Error Compensation. 106-109 - Shinichi Nakazawa, Sho Kasahara, Shigeo Takahashi

:
A Visually Enhanced Approach to Watermarking 3D Models. 110-113 - Kiyoharu Okagaki, Kenichi Takahashi, Hiroaki Ueda:

Robustness Evaluation of Digital Watermarking Based on Discrete Wavelet Transform. 114-117 - Wanli Yang, Suwen Zheng, Li Huang:

Impulsive Synchronization for Coupled Reaction-Diffusion System and Its Application in Information Hiding. 118-122 - Rajesh Mehta, Anurag Mishra, Rampal Singh, Navin Rajpal:

Digital Image Watermarking in DCT Domain Using Finite Newton Support Vector Regression. 123-126 - Yashar Naderahmadian

, Saied Hosseini-Khayat:
Fast Watermarking Based on QR Decomposition in Wavelet Domain. 127-130 - Bassem S. Rabil, Robert Sabourin, Eric Granger

:
Intelligent Watermarking with Multi-objective Population Based Incremental Learning. 131-134 - Raúl Martínez-Noriega, Mariko Nakano

, Kazuhiko Yamaguchi:
Self-Synchronous Time-Domain Audio Watermarking Based on Coded-Watermarks. 135-138 - Eduardo Vellasques, Robert Sabourin, Eric Granger

:
Intelligent Watermarking of Document Images as a Dynamic Optimization Problem. 139-142 - Jian Wang, Ron Healy, Joe Timoney:

A Novel Audio Watermarking Algorithm Based on Reduced Singular Value Decomposition. 143-146
Cross-Discipline Techniques in Signal Processing and Networking
- Jong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang:

Design of 3-D FIR Cone-Shaped Filters by a Nest of McClellan Transformations. 147-150 - Hsiang-Cheh Huang

, Yueh-Hong Chen, I-Hung Wang:
Reversible Data Hiding with Improved Histogram Alteration Method. 151-154 - Liou Chu:

A RFID-Based Hybrid Building Fire Evacuation System on Mobile Phone. 155-158 - Shih-Jung Wu:

A New Integrated Mobile Architecture for Heterogeneous Wireless Networks. 159-162 - Ellen Sharma Shijagurumayum, Feng-Cheng Chang

:
Preliminary Survey of Multiview Synthesis Technology. 163-166 - Duen-Kai Chen:

Systematic Review of Applying Service Oriented Architecture in Networking. 167-170 - Hsiang-Cheh Huang

, Ting-Wei Chen, Feng-Cheng Chang
:
Adjacent Quad Modification Algorithm for Reversible Data Hiding. 171-174 - Feng-Cheng Chang

, Hsiang-Cheh Huang
:
Electrical Network Frequency as a Tool for Audio Concealment Process. 175-178 - Zbigniew Piotrowski

, Krzysztof Sawicki
, Mariusz Bednarczyk
, Piotr Gajewski
:
New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 Networks. 179-183 - Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li:

Compression of 3D Triangle Meshes with a Generalized Parallelogram Prediction Scheme Based on Vector Quantization. 184-187 - Pham Hai Dang Le, Matthias O. Franz:

Single Band Statistics and Steganalysis Performance. 188-191 - Yong-Zhong He, Zhan Han, Ying Cai:

A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty. 192-195 - Hao Jiang, Jie Xu, Zhen Li:

NLOS Mitigation Method for TDOA Measurement. 196-199 - Constantinos Patsakis

, Nikolaos Alexandris:
A New SETUP for Factoring Based Algorithms. 200-203 - Ali Sentürk, Mustafa Gök

:
A Fast Modular Multiplication Method. 204-207 - Christophe Guyeux

, Nicolas Friot, Jacques M. Bahi:
Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security. 208-211 - Fatiha Djebbar

, Habib Hamam, Karim Abed-Meraim, Driss Guerchi:
Controlled Distortion for High Capacity Data-in-Speech Spectrum Steganography. 212-215 - Thomas Tziortzios, Stavros Dokouzyannis:

A Fast 8*8 2D IDCT Architecture, Avoiding Zero Transformed Coefficients. 216-219
Advanced Topics for Biometrics and Video Surveillance
- Chen-Ta Hsieh, Chang-Hsing Lee

, Chin-Chuan Han, Ching-Chien Chuang:
A Framework for Face Recognition Using Laplacian Eigenmaps and Nearest Feature Mixtures. 220-223 - Yuan-Kai Wang

, Wei-Ren Chen:
Facial Feature Alignment by Manifold Learning of Active Appearance Model. 224-227 - Yuan-Kai Wang

, Jia-Hau Jang, Luo-Wei Tsai, Kuo-Chin Fan:
Improvement of Face Recognition by Eyeglass Removal. 228-231 - Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou:

Fast Forgery Detection with the Intrinsic Resampling Properties. 232-235 - Yuan-Kai Wang

, Ching-Tang Fan:
Moving Object Detection for Night Surveillance. 236-239 - Yue-Ru Chuang, Chia-Sheng Hsu, Je-Wei Chen:

Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video Streaming. 240-243 - Jin Jing, Yuan Jie:

A Recovery Algorithm for the Details of the Low Resolution Video Sequence. 244-247
Ubiquitous Multimedia Services and Applications for Residential Users
- Yi-Ting Chien, Mong-Fong Horng, Yu-Cheng Sheu, Jeng-Pong Hsu, Yau-Hwang Kuo, Chin-Shiuh Shieh:

An Alternative-Path Approach to Improve Robustness of TCP Connections in Wireless Mesh Networks. 248-251 - Chun-I Kuo, Chi-Huang Shih, Ce-Kuen Shieh, Wen-Shyang Hwang:

A Fast and Efficient FEC Enhancement Scheme for Delay-Sensitive Video Transmissions. 252-255 - Chi-Huang Shih:

Adaptive Forward Error Correction Combined with Packet Size Control for Wireless Video. 256-259 - Chun-Ting Huang:

Improving the Multimedia Processing of Relay Nodes in Mesh Wireless Networks. 260-263 - Hyeongchul Oh, Joohyun Lee, Changki Min, Jechang Jeong:

Frame Interpolation Method Based on Adaptive Threshold and Adjacent Pixels. 264-267 - Changryoul Choi, Jechang Jeong:

Low-Complexity DC-Compensated Weighted 2BT-Based Motion Estimation. 268-271 - Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi

:
Autoregressive Video Modeling through 2D Wavelet Statistics. 272-275
Circuits and Embedded Systems for Multimedia Signal Processing
- Shin-Chi Lai, Sheau-Fang Lei, Ching-Hsing Luo:

Low-Cost and Shared Architecture Design of Recursive DFT/IDFT/IMDCT Algorithms for Digital Radio Mondiale System. 276-279 - Cheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, Ming-Wei Lyu:

Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction Scheme. 280-283 - Chia-Cheng Lo, Chia-Wei Hsu, Ming-Der Shieh:

Area-Efficient H.264 VLC Decoder Using Sub-tree Classification. 284-287 - Shi-Huang Chen, Ming-Lung Hsu:

The Use of k-Means Algorithm to Compute the Line Spectrum Pair Frequencies with Tschirnhaus Transform. 288-291 - Wen-Kai Tsai, Ming-Hwa Sheu, Chung-Chi Lin:

Efficient Multi-Layer Background Model on Complex Environment for Foreground Object Detection. 292-295 - Yuan-Long Jeang, Ko-Yen Hu:

A Pipelined Program Decompression Engine Generator Based on Partial Field-Partitioned (PFP) Compression Technique for Embedded Systems. 296-299 - Chuen-Ching Wang, Te-Yuan Wang, Tien-Hao Lien, Rong-Ming Su:

A Simple and Efficient Anti-collision Algorithm for RFID System. 300-305
New Biometric Modalities and Capture Devices
- Mohammad Omar Derawi, Claudia Nickel, Patrick Bours, Christoph Busch:

Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. 306-311 - Mohammad Omar Derawi, Patrick Bours, Kjetil Holien:

Improved Cycle Detection for Accelerometer Based Gait Authentication. 312-317 - J. Enrique Suarez Pascual, Jaime Uriarte-Antonio, Raul Sánchez-Reillo

, Michael G. Lorenz:
Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost Devices. 318-322 - Danish Mairaj, Stephen D. Wolthusen, Christoph Busch:

Teeth Segmentation and Feature Extraction for Odontological Biometrics. 323-328 - Xuebing Zhou, Silvia Araujo Sánchez, Arjan Kuijper

:
3D Face Recognition with Local Binary Patterns. 329-332 - Belen Fernandez-Saavedra, Raul Alonso-Moreno, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo

:
Usability Evaluation of Fingerprint Based Access Control Systems. 333-336
Privacy and Security in Biometrics
- Julien Bringer, Hervé Chabanne, Koen Simoens

:
Blackbox Security of Biometrics (Invited Paper). 337-340 - Haiyun Xu, Raymond N. J. Veldhuis:

Spectral Minutiae Representations for Fingerprint Recognition. 341-345 - Ileana Buhan, Emile Kelkboom, Koen Simoens

:
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems. 346-351 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval:
Privacy Preserving Identification: Order Statistics List Decoding Perspective. 352-355 - Davrondzhon Gafurov, Christoph Busch, Patrick Bours, Bian Yang:

Fusion in Fingerprint Authentication: Two Finger Scenarios. 356-359 - Javier Guerra Casanova, Carmen Sánchez Ávila

, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera:
Acceleration Axis Selection in Biometric Technique Based on Gesture Recognition. 360-363 - Alberto de Santos Sierra, Carmen Sánchez Ávila

, Javier Guerra Casanova, Gonzalo Bailador del Pozo, Vicente Jara Vera:
Two Stress Detection Schemes Based on Physiological Signals for Real-Time Applications. 364-367 - Yasuhiro Matsuda, Tsuneshi Isomura:

Teaching of Emotional Expression Using Finger Braille. 368-371 - Cho-Yan Chen, Chih-Jen Wang

, E-Liang Chen, Chi-Keng Wu, Yen-Kuang Yang, Jeen-Shing Wang, Pau-Choo Chung:
Detecting Sustained Attention during Cognitive Work Using Heart Rate Variability. 372-375 - Yanchuan Huang, Mingchu Li, Chuang Lin, Linlin Tian:

Gabor-Based Kernel Independent Component Analysis for Face Recognition. 376-379 - Shenyu Liu, Xi He, Daofu Gong:

Bayesian Decision Based Method for Assets Recognition of Risk Assessment. 380-383 - Muhammad Imran Razzak

, Muhammad Khurram Khan, Khaled Alghathbar:
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. 384-388 - Jeen-Shing Wang, Pau-Choo Chung, Wei-Hsin Wang, Che-Wei Lin:

Driving Conditions Recognition Using Heart Rate Variability Indexes. 389-392 - Mohammad Ibrahim Khan, Md. Al-Amin Bhuiyan

:
Facial Features Approximation for Expression Detection in Human-Robot Interface. 393-397
Multimedia Contents Analysis and Applications
- Qingsheng Li

, Aimin Wang, Jinyu Kai, Jipeng Wang:
Research on Multimedia Intelligence Course and Intelligence Classroom Based on Multiple Intelligence Theory. 398-401 - Qingsheng Li

, Jipeng Wang, Xiaona Jiang:
Design and Implementation of Personalized and Visual Web Page Editor. 402-405 - Xiao Yi Yu, Aiming Wang:

Genetic Algorithm Based Bayesian Network for Customers' Behavior Analysis. 406-409 - Xiao Yi Yu, Aiming Wang:

Revisit LSB Matching. 410-413
Internet Multimedia Technology and Applications
- Shang Rong Tsai, Y. S. Huang, U. L. Dai, Guang-Hung Huang, Chia-Ming Lee, J. Y. Fang, Y. T. Chen, J. N. Lee:

An Object-Based Web System for Building a Virtual Community. 414-417 - Chin-Yang Lin, Ting-Wei Hou, Fuh-Gwo Chen:

A Snapshot-Based Evaluation Method for Garbage Collection. 418-421 - Chia-Feng Kang, Kai-Hua Kuo, Ya-Chun Li, Tin Yu Wu, Wei-Tsong Lee, Jim-Min Lin:

Enhancing UPnP Quality of Service by Intelligent Access Point. 422-425 - Chuan-Yu Chang, Hung-Jen Wang, Ru-Hao Jian:

Color-Based Semantic Image Retrieval with Fuzzy-ART. 426-429
Image/Video Watermarking and Forensics
- Zhaoqing Liu, Qiong Li, Hui Zhang, Xiyuan Peng:

An Image Structure Information Based Robust Hash for Tamper Detection and Localization. 430-433 - Xian-zhe Meng, Shao-Zhang Niu, Jian-Cheng Zou:

Tamper Detection for Shifted Double JPEG Compression. 434-437 - Jiancheng Zou, Xin Yang, Shaozhang Niu:

A Novel Robust Watermarking Method for Certificates Based on DFT and Hough Transforms. 438-441 - Huawei Tian, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan:

Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform. 442-445 - Bo Ou

, Yao Zhao, Rongrong Ni, Gang Cao:
A High Payload Histogram-Based Reversible Wartermarking Using Linear Prediction. 446-449 - Chuanjun Wang, Zhenfeng Shi, Xiamu Niu:

An Error Driven 3D Face Modeling Scheme Based on Partial Differential Equations. 450-453 - Zhe-Ming Lu, Wei-Min Zheng, Jing Wang:

Image Retrieval Based on RST Invariant Features Extracted from Scale Invariant Keypoints. 454-457
Digital Forensics and Security
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang, Rui Xue:

ASM-SPV: A Model Checker for Security Protocols. 458-461 - Ming Liu, Nenghai Yu, Weihai Li:

Camera Model Identification for JPEG Images via Tensor Analysis. 462-465 - Chuanrong Zhang, Long Chi, Yuqing Zhang:

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA. 466-469 - Qingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo:

Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields. 470-473 - Chunling Wang, Jingyu Feng:

A Study of Mutual Authentication for P2P Trust Management. 474-477 - Li Li, Qi Han, Xiamu Niu:

Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network. 478-481 - Shen Wang, Qiong Li, Bian Yang, Xiamu Niu:

A Novel and Secure Image Interpolation Methods for Image Disguise. 482-485 - Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao, Dongyao Ji:

Formal Verification of HMQV Using ASM-SPV. 486-489 - Ying Cai, Qinglong Wang:

Certificates Distributed Storage Scheme in the Trust Management System. 490-493
Techniques and Algorithms for Multimedia Security
- Minoru Kuribayashi

:
Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random Permutation. 494-497 - Tetsuya Kojima, Yoshiya Horii, Naoki Ohtani, Thierno Sene:

On Some Properties of a Digital Watermarking Based on Complete Complementary Codes. 498-501 - Natsuki Watanabe, Hiroshi Yoshiura:

Detecting Revelation of Private Information on Online Social Networks. 502-505 - Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura:

Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network. 506-509 - Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade

:
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. 510-513
Advanced Data Hiding and Coding Techniques for Audio Signals
- Akira Nishimura:

Aerial Acoustic Modem with Decoding Capabilities Using a CELP-Based Speech Encoder. 514-517 - Akinori Ito

, Kiyoshi Konno, Masashi Ito, Shozo Makino:
Improvement of Packet Loss Concealment for MP3 Audio Based on Switching of Concealment Method and Estimation of MDCT Signs. 518-521 - Ryouichi Nishimura:

Audio Information Hiding Based on Spatial Masking. 522-525 - Masashi Unoki

, Toshizo Kosugi, Atsushi Haniu, Ryota Miyauchi:
Design of IIR All-Pass Filter Based on Cochlear Delay to Reduce Embedding Limitations. 526-529 - Masahiro Wakiyama, Yasunobu Hidaka, Koichi Nozaki:

An Audio Steganography by a Low-Bit Coding Method with Wave Files. 530-533 - Naofumi Aoki:

A Semi-lossless Steganography Technique for G.711 Telephony Speech. 534-537 - Xuping Huang, Isao Echizen, Akira Nishimura:

A New Approach of Reversible Acoustic Steganography for Tampering Detection. 538-542
Computational Intelligence and Security
- Chenglong Yu, Xuan Wang, Hejiao Huang, Jianping Shen, Kun Wu:

Vision-Based Hand Gesture Recognition Using Combinational Features. 543-546 - Zhongmei Zhou, Xuan Wang, Zili Zhang, Chenglong Yu:

Example-Based Facial Portraiture Style Learning. 547-550 - Lin Yao, Chengjie Sun, Xiaolong Wang, Xuan Wang:

Multi-class Relationship Extraction from Biomedical Literature Using Maximum Entropy. 551-554 - Yingnan Zhao, Yan Ma, Zhong Jin:

Mirror-Like Gabor Features for Face Recognition under Varying Illumination Conditions. 555-558 - Dazhi Zhang, Songsong Li, Boying Wu, Jiebao Sun:

An Image Level Set Method for Denoising. 559-562 - Zhenfeng Shi, Qiong Li, Xiamu Niu:

A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion. 563-566 - Toshihiko Yamasaki, Tomoaki Matsunami, Kiyoharu Aizawa:

Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients. 567-570 - Yanhui Xiao, Yao Zhao, Zhenfeng Zhu:

Kernel Canonical Correlation with Similarity Refinement for Automatic Image Tagging. 571-574 - Chunyu Lin

, Yao Zhao:
Multiple Description Wavelet Based Image Coding with Classification. 575-578 - Jirí Grim, Petr Somol, Pavel Pudil

:
Digital Image Forgery Detection by Local Statistical Models. 579-582 - Lin Dong, Min Ku:

Novel (n, n) Secret Image Sharing Scheme Based on Addition. 583-586 - Emmanuel Sardis, Theodora A. Varvarigou:

Industrial Workflows Recognition by Computer Vision and AI Technologies. 587-590
High Efficiency Image/Video Coding and Transmission
- Song Xiao, Ji Lu, Yangli Wang, Chengke Wu:

Robust Video Transmission Scheme Based on Network Coding. 591-594 - Yangli Wang, Chengke Wu, Song Xiao:

An Error Concealment Approach for Pixel Based Wyner-Ziv Video Coding. 595-598 - Ji Lu, Song Xiao, Chengke Wu:

Optimized State-Distortion Extraction for Scalable Extension of H.264/AVC. 599-602 - Hongwei Li, Song Xiao, Chengke Wu, Yuli Feng:

A Pixel-Level Rate Control Algorithm for the Optimal Prediction Residual. 603-606 - Haiying Liu, Yunsong Li, Song Xiao, Chengke Wu:

Distributed Compressive Hyperspectral Image Sensing. 607-610 - Yigang Zhou, Linghui Li, Jia Liu:

A Digital Fingerprint Scheme Based on MPEG-2. 611-614
Advanced Event Detection and Intelligent Video Processing
- Duan-Yu Chen, Yi-Shiou Luo:

Content-Aware Video Seam Carving Based on Bag of Visual Cubes. 615-618 - Duan-Yu Chen, Yu-Hao Lin:

Frequency-Tuned Nighttime Brake-Light Detection. 619-622 - Chi-Han Chuang, Yung-Chi Lo, Chin-Chun Chang, Shyi-Chyi Cheng:

Multiple Object Motion Detection for Robust Image Stabilization Using Block-Based Hough Transform. 623-626 - Yu-Hsiang Wu, Yung-Chi Lo, Shyi-Chyi Cheng, Chih-Lang Lin:

Adaptive Ultrasound Image Matching for Automatic Liver Disease Diagnosis Using Generalized Hough Transform. 627-630 - Li-Chih Chen, Jun-Wei Hsieh, Wei-Ru Lai, Chih-Xuan Wu, Sin-Yu Chen:

Vision-Based Vehicle Surveillance and Parking Lot Management Using Multiple Cameras. 631-634 - I-Cheng Chang

, Chieh-Yu Liu, Chung-Lin Huang:
Human Activity Linkage Recording for Multiple Cameras with Disjoint Views. 635-638 - Chao-Ho Chen, Che-Ping Su, Tsong-Yi Chen, Da-Jinn Wang:

Real-Time Video Enhancement for Moving-Object in the Dusk Environment Based on Pixel Classification. 639-642 - Tsong-Yi Chen, Chao-Ho Chen, Da-Jinn Wang, Tsang-Jie Chen:

Real-Time Counting Method for a Crowd of Moving People. 643-646 - Pengyu Liu, Kebin Jia:

A Fast Inter-frame Prediction Algorithm for H.264/AVC. 647-650 - Pengyu Liu, Kebin Jia:

A Self-Adaptive and Fast Motion Estimation Search Method for H.264/AVC. 651-654 - Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li:

Key-Frame Extraction Using Kernel-Based Locality Preserving Learning. 655-658 - Yanqiang Lei, Yuan-Gen Wang, Liang Fan:

Overlapping Interval Differences-Based Fast Intra Mode Decision for H.264/AVC. 659-663 - Pengyu Liu, Kebin Jia:

A Novel Intra-frame Prediction Algorithm Based on Macro-block's Histogram for H.264/AVC. 664-667
Advanced Multimedia Processing and Retrievals
- Takashi Toriu, Shigeyoshi Nakajima, Hiromitsu Hama:

A Saliency Map Model Based on the Principle of Maximum Information Gain. 668-671 - Takaaki Kozaki, Shigeyoshi Nakajima, Tetsuo Tsujioka

, Shinsuke Hara, Tadayuki Inoue, Hajime Nakamura, Kazuhide Takeuchi:
Estimation of Human Movements from Body Acceleration Monitoring Using One Nearest Neighbor Method - Ubiquitous Health Care. 672-675 - Hiromitsu Hama, Pyke Tin, Thi Thi Zin, Takashi Toriu:

A Stochastic Model for Popularity Measures in Web Dynamics. 676-679 - Thi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama:

A Markov Random Walk Model for Loitering People Detection. 680-683 - Daisuke Miyazaki, Keisuke Ohno, Takaaki Mukai:

Real-Time Updatable Volumetric Display System Based on Inclined-Image Scanning. 684-687
High Performance Networking, Digital Content and Ubiquitous Computing
- Nai-Wen Kuo:

A Decision Support System in Geriatric Care. 688-691 - Chung-Hsin Liu, I. Shao:

Attack Analysis for Automatic Monitoring System Used in the Wireless Networks. 692-695 - Chung-Hsin Liu, Wu-Fan Hsu:

The Study of Video Conference Transmission Security as an Example on Polycom. 696-699 - Kuo-Kai Hsu, Dwen-Ren Tsai:

Mobile Ad Hoc Network Applications in the Library. 700-703 - Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang:

Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. 704-707 - Wuu-Yee Chen, Pin-Hsiu Wu:

Factors Affecting Consumers' Motivation in Online Group Buyers. 708-711 - Chia-Han Chou, Allen Y. Chang:

Visual Development Platform for White-Box Algorithmic Trading. 712-715 - Dwen-Ren Tsai, Sheng-Wei Lin:

Building Enterprise Data Centers Using Virtual and Cloud. 716-718
Multimedia and Security Services in Mobile Cloud Computing
- Jing Zhao, Lei Wang, Suran Li, Xiaokang Liu, Zhuxiu Yuan, Zhengjiu Gao:

A Survey of Congestion Control Mechanisms in Wireless Sensor Networks. 719-722 - He Guo, Kai Zhang, Qi Jia:

2.5D SIFT Descriptor for Facial Feature Extraction. 723-726 - Weifeng Sun, Boxiang Dong

, Zhenquan Qin
, Juanyun Wang, Mingchu Li:
A Low-Level Security Solving Method in Grid. 727-730 - Zhenquan Qin

, Lei Wang, Mingchu Li, Weifeng Sun:
An Efficient Trust Mechanism in P2P Network. 731-734 - Jian Wang, Jiajin Le:

Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing. 735-738

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














