


default search action
IIH-MSP 2010: Darmstadt, Germany
- Isao Echizen, Jeng-Shyang Pan, Dieter W. Fellner, Alexander Nouak, Arjan Kuijper, Lakhmi C. Jain:
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-8378-5
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Hsiao-Han Ko, Kuo-Jin Tseng, Li-Min Wei, Meng-Hsiun Tsai:
Possible Disease-Link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities of Ovarian Carcinoma Microarray Data. 1-4 - Iuon-Chang Lin, Chia-Chang Sung:
An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. 5-8 - Iuon-Chang Lin, Hsing-Lei Wang:
An Improved Digital Signature Scheme with Fault Tolerance in RSA. 9-12 - Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin:
Chaos-Based Image Integrity Authentication Code. 13-16 - Tzu-Chuen Lu, Siang-Ru Liao, Chun-Ming Chang:
The Information Hiding Technology Based on the Similar Sample Blocks of Grayscale Image. 17-20 - Chin-Chen Chang, Kuo-Nan Chen, Ming-Huang Hsieh:
A Robust Public Watermarking Scheme Based on DWT. 21-26 - Hui-Feng Huang, Ya-Fen Chang, Chun-Hung Liu
:
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks. 27-30 - Iuon-Chang Lin, Ping-Kun Hsu:
A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System. 31-33 - Chin-Fang Lee, Huei-Ju Tsai:
A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction. 34-38
Steganography and Watermarking
- Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Reversible Watermarking by Coefficient Adjustment Method. 39-42 - Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li:
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. 43-46 - Yeh-Shun Chen, Ran-Zan Wang:
Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking. 47-50 - Jeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee:
Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling. 51-54 - Tae-Woo Oh, Seung-Jin Ryu, Ji Won Lee, Won-Young Yoo, Heung-Kyu Lee:
Improved Watermark Estimation Scheme Based on Neighborhood Filter. 55-58 - Wen-Pinn Fang:
Multi-layer Secret Image Sharing. 59-61 - Kuang Tsan Lin:
Graylevel Images Encrypting Based on the n-Graylevel Encoding Method and the Lowest Common Multiple Technique. 62-65 - Lee Shu-Teng Chen, Wen-Tarn Chang, Suiang-Shyan Lee, Ja-Chen Lin:
Data Hiding Based on Side Match Vector Quantization and Modulus Function. 66-69 - Shang-Kuan Chen, Ran-Zan Wang:
High-Payload Image Hiding Scheme Using k-Way Block Matching. 70-73 - Wen-Chung Kuo, Shao-Hung Kuo, Lih-Chyau Wuu:
High Embedding Reversible Data Hiding Scheme for JPEG. 74-77 - Marcus Nutzinger, Christian Fabian, Marion Marschalek:
Secure Hybrid Spread Spectrum System for Steganography in Auditive Media. 78-81 - Peter Meerwald
, Andreas Uhl:
Robust Watermarking of H.264-Encoded Video: Extension to SVC. 82-85 - Minghui Deng, Xiuli Zhou:
A Robust Digital Image Watermarking Algorithm Based on CHIRPLET Transform. 86-89 - Brian K. Lien:
An Information-Theoretic Model for Dispersed Ordered Dithered Halftone Image Watermarking by Hilbert Curve Decomposition. 90-93 - Manabu Hirakawa, Junichi Iijima:
Mobile Services and Implementation of Digital Watermarks in Audio Files. 94-97 - Ali Nur Mohammad Noman, Kevin Curran
, Tom Lunney:
A Watermarking Based Tamper Detection Solution for RFID Tags. 98-101 - Charu Agarwal, Anurag Mishra
:
A Novel Image Watermarking Technique Using Fuzzy-BP Network. 102-105 - Dong-Gyu Yeo, Hae-Yeoun Lee, Byeong Man Kim:
Differential Histogram Modification-Based Reversible Watermarking with Predicted Error Compensation. 106-109 - Shinichi Nakazawa, Sho Kasahara, Shigeo Takahashi
:
A Visually Enhanced Approach to Watermarking 3D Models. 110-113 - Kiyoharu Okagaki, Kenichi Takahashi, Hiroaki Ueda:
Robustness Evaluation of Digital Watermarking Based on Discrete Wavelet Transform. 114-117 - Wanli Yang, Suwen Zheng, Li Huang:
Impulsive Synchronization for Coupled Reaction-Diffusion System and Its Application in Information Hiding. 118-122 - Rajesh Mehta, Anurag Mishra, Rampal Singh, Navin Rajpal:
Digital Image Watermarking in DCT Domain Using Finite Newton Support Vector Regression. 123-126 - Yashar Naderahmadian
, Saied Hosseini-Khayat:
Fast Watermarking Based on QR Decomposition in Wavelet Domain. 127-130 - Bassem S. Rabil, Robert Sabourin, Eric Granger
:
Intelligent Watermarking with Multi-objective Population Based Incremental Learning. 131-134 - Raúl Martínez-Noriega, Mariko Nakano
, Kazuhiko Yamaguchi:
Self-Synchronous Time-Domain Audio Watermarking Based on Coded-Watermarks. 135-138 - Eduardo Vellasques, Robert Sabourin, Eric Granger
:
Intelligent Watermarking of Document Images as a Dynamic Optimization Problem. 139-142 - Jian Wang, Ron Healy, Joe Timoney:
A Novel Audio Watermarking Algorithm Based on Reduced Singular Value Decomposition. 143-146
Cross-Discipline Techniques in Signal Processing and Networking
- Jong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang:
Design of 3-D FIR Cone-Shaped Filters by a Nest of McClellan Transformations. 147-150 - Hsiang-Cheh Huang
, Yueh-Hong Chen, I-Hung Wang:
Reversible Data Hiding with Improved Histogram Alteration Method. 151-154 - Liou Chu:
A RFID-Based Hybrid Building Fire Evacuation System on Mobile Phone. 155-158 - Shih-Jung Wu:
A New Integrated Mobile Architecture for Heterogeneous Wireless Networks. 159-162 - Ellen Sharma Shijagurumayum, Feng-Cheng Chang
:
Preliminary Survey of Multiview Synthesis Technology. 163-166 - Duen-Kai Chen:
Systematic Review of Applying Service Oriented Architecture in Networking. 167-170 - Hsiang-Cheh Huang
, Ting-Wei Chen, Feng-Cheng Chang
:
Adjacent Quad Modification Algorithm for Reversible Data Hiding. 171-174 - Feng-Cheng Chang
, Hsiang-Cheh Huang
:
Electrical Network Frequency as a Tool for Audio Concealment Process. 175-178 - Zbigniew Piotrowski
, Krzysztof Sawicki
, Mariusz Bednarczyk
, Piotr Gajewski
:
New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 Networks. 179-183 - Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li:
Compression of 3D Triangle Meshes with a Generalized Parallelogram Prediction Scheme Based on Vector Quantization. 184-187 - Pham Hai Dang Le, Matthias O. Franz:
Single Band Statistics and Steganalysis Performance. 188-191 - Yong-Zhong He, Zhan Han, Ying Cai:
A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty. 192-195 - Hao Jiang, Jie Xu, Zhen Li:
NLOS Mitigation Method for TDOA Measurement. 196-199 - Constantinos Patsakis
, Nikolaos Alexandris:
A New SETUP for Factoring Based Algorithms. 200-203 - Ali Sentürk, Mustafa Gök
:
A Fast Modular Multiplication Method. 204-207 - Christophe Guyeux
, Nicolas Friot, Jacques M. Bahi:
Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security. 208-211 - Fatiha Djebbar
, Habib Hamam, Karim Abed-Meraim, Driss Guerchi:
Controlled Distortion for High Capacity Data-in-Speech Spectrum Steganography. 212-215 - Thomas Tziortzios, Stavros Dokouzyannis:
A Fast 8*8 2D IDCT Architecture, Avoiding Zero Transformed Coefficients. 216-219
Advanced Topics for Biometrics and Video Surveillance
- Chen-Ta Hsieh, Chang-Hsing Lee
, Chin-Chuan Han, Ching-Chien Chuang:
A Framework for Face Recognition Using Laplacian Eigenmaps and Nearest Feature Mixtures. 220-223 - Yuan-Kai Wang
, Wei-Ren Chen:
Facial Feature Alignment by Manifold Learning of Active Appearance Model. 224-227 - Yuan-Kai Wang
, Jia-Hau Jang, Luo-Wei Tsai, Kuo-Chin Fan:
Improvement of Face Recognition by Eyeglass Removal. 228-231 - Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou:
Fast Forgery Detection with the Intrinsic Resampling Properties. 232-235 - Yuan-Kai Wang
, Ching-Tang Fan:
Moving Object Detection for Night Surveillance. 236-239 - Yue-Ru Chuang, Chia-Sheng Hsu, Je-Wei Chen:
Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video Streaming. 240-243 - Jin Jing, Yuan Jie:
A Recovery Algorithm for the Details of the Low Resolution Video Sequence. 244-247
Ubiquitous Multimedia Services and Applications for Residential Users
- Yi-Ting Chien, Mong-Fong Horng, Yu-Cheng Sheu, Jeng-Pong Hsu, Yau-Hwang Kuo, Chin-Shiuh Shieh:
An Alternative-Path Approach to Improve Robustness of TCP Connections in Wireless Mesh Networks. 248-251 - Chun-I Kuo, Chi-Huang Shih, Ce-Kuen Shieh, Wen-Shyang Hwang:
A Fast and Efficient FEC Enhancement Scheme for Delay-Sensitive Video Transmissions. 252-255 - Chi-Huang Shih:
Adaptive Forward Error Correction Combined with Packet Size Control for Wireless Video. 256-259 - Chun-Ting Huang:
Improving the Multimedia Processing of Relay Nodes in Mesh Wireless Networks. 260-263 - Hyeongchul Oh, Joohyun Lee, Changki Min, Jechang Jeong:
Frame Interpolation Method Based on Adaptive Threshold and Adjacent Pixels. 264-267 - Changryoul Choi, Jechang Jeong:
Low-Complexity DC-Compensated Weighted 2BT-Based Motion Estimation. 268-271 - Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi
:
Autoregressive Video Modeling through 2D Wavelet Statistics. 272-275
Circuits and Embedded Systems for Multimedia Signal Processing
- Shin-Chi Lai, Sheau-Fang Lei, Ching-Hsing Luo:
Low-Cost and Shared Architecture Design of Recursive DFT/IDFT/IMDCT Algorithms for Digital Radio Mondiale System. 276-279 - Cheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, Ming-Wei Lyu:
Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction Scheme. 280-283 - Chia-Cheng Lo, Chia-Wei Hsu, Ming-Der Shieh:
Area-Efficient H.264 VLC Decoder Using Sub-tree Classification. 284-287 - Shi-Huang Chen, Ming-Lung Hsu:
The Use of k-Means Algorithm to Compute the Line Spectrum Pair Frequencies with Tschirnhaus Transform. 288-291 - Wen-Kai Tsai, Ming-Hwa Sheu, Chung-Chi Lin:
Efficient Multi-Layer Background Model on Complex Environment for Foreground Object Detection. 292-295 - Yuan-Long Jeang, Ko-Yen Hu:
A Pipelined Program Decompression Engine Generator Based on Partial Field-Partitioned (PFP) Compression Technique for Embedded Systems. 296-299 - Chuen-Ching Wang, Te-Yuan Wang, Tien-Hao Lien, Rong-Ming Su:
A Simple and Efficient Anti-collision Algorithm for RFID System. 300-305
New Biometric Modalities and Capture Devices
- Mohammad Omar Derawi, Claudia Nickel, Patrick Bours, Christoph Busch:
Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. 306-311 - Mohammad Omar Derawi, Patrick Bours, Kjetil Holien:
Improved Cycle Detection for Accelerometer Based Gait Authentication. 312-317 - J. Enrique Suarez Pascual, Jaime Uriarte-Antonio, Raul Sánchez-Reillo
, Michael G. Lorenz:
Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost Devices. 318-322 - Danish Mairaj, Stephen D. Wolthusen, Christoph Busch:
Teeth Segmentation and Feature Extraction for Odontological Biometrics. 323-328 - Xuebing Zhou, Silvia Araujo Sánchez, Arjan Kuijper
:
3D Face Recognition with Local Binary Patterns. 329-332 - Belen Fernandez-Saavedra, Raul Alonso-Moreno, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo
:
Usability Evaluation of Fingerprint Based Access Control Systems. 333-336
Privacy and Security in Biometrics
- Julien Bringer, Hervé Chabanne, Koen Simoens:
Blackbox Security of Biometrics (Invited Paper). 337-340 - Haiyun Xu, Raymond N. J. Veldhuis:
Spectral Minutiae Representations for Fingerprint Recognition. 341-345 - Ileana Buhan, Emile Kelkboom, Koen Simoens:
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems. 346-351 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval:
Privacy Preserving Identification: Order Statistics List Decoding Perspective. 352-355 - Davrondzhon Gafurov, Christoph Busch, Patrick Bours, Bian Yang:
Fusion in Fingerprint Authentication: Two Finger Scenarios. 356-359 - Javier Guerra Casanova, Carmen Sánchez Ávila
, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera:
Acceleration Axis Selection in Biometric Technique Based on Gesture Recognition. 360-363 - Alberto de Santos Sierra, Carmen Sánchez Ávila
, Javier Guerra Casanova, Gonzalo Bailador del Pozo, Vicente Jara Vera:
Two Stress Detection Schemes Based on Physiological Signals for Real-Time Applications. 364-367 - Yasuhiro Matsuda, Tsuneshi Isomura:
Teaching of Emotional Expression Using Finger Braille. 368-371 - Cho-Yan Chen, Chih-Jen Wang
, E-Liang Chen, Chi-Keng Wu, Yen-Kuang Yang, Jeen-Shing Wang, Pau-Choo Chung:
Detecting Sustained Attention during Cognitive Work Using Heart Rate Variability. 372-375 - Yanchuan Huang, Mingchu Li, Chuang Lin, Linlin Tian:
Gabor-Based Kernel Independent Component Analysis for Face Recognition. 376-379 - Shenyu Liu, Xi He, Daofu Gong:
Bayesian Decision Based Method for Assets Recognition of Risk Assessment. 380-383 - Muhammad Imran Razzak
, Muhammad Khurram Khan, Khaled Alghathbar:
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. 384-388 - Jeen-Shing Wang, Pau-Choo Chung, Wei-Hsin Wang, Che-Wei Lin:
Driving Conditions Recognition Using Heart Rate Variability Indexes. 389-392 - Mohammad Ibrahim Khan, Md. Al-Amin Bhuiyan
:
Facial Features Approximation for Expression Detection in Human-Robot Interface. 393-397
Multimedia Contents Analysis and Applications
- Qingsheng Li
, Aimin Wang, Jinyu Kai, Jipeng Wang:
Research on Multimedia Intelligence Course and Intelligence Classroom Based on Multiple Intelligence Theory. 398-401 - Qingsheng Li
, Jipeng Wang, Xiaona Jiang:
Design and Implementation of Personalized and Visual Web Page Editor. 402-405 - Xiao Yi Yu, Aiming Wang:
Genetic Algorithm Based Bayesian Network for Customers' Behavior Analysis. 406-409 - Xiao Yi Yu, Aiming Wang:
Revisit LSB Matching. 410-413
Internet Multimedia Technology and Applications
- Shang Rong Tsai, Y. S. Huang, U. L. Dai, Guang-Hung Huang, Chia-Ming Lee, J. Y. Fang, Y. T. Chen, J. N. Lee:
An Object-Based Web System for Building a Virtual Community. 414-417 - Chin-Yang Lin, Ting-Wei Hou, Fuh-Gwo Chen:
A Snapshot-Based Evaluation Method for Garbage Collection. 418-421 - Chia-Feng Kang, Kai-Hua Kuo, Ya-Chun Li, Tin Yu Wu, Wei-Tsong Lee, Jim-Min Lin:
Enhancing UPnP Quality of Service by Intelligent Access Point. 422-425 - Chuan-Yu Chang, Hung-Jen Wang, Ru-Hao Jian:
Color-Based Semantic Image Retrieval with Fuzzy-ART. 426-429
Image/Video Watermarking and Forensics
- Zhaoqing Liu, Qiong Li, Hui Zhang, Xiyuan Peng:
An Image Structure Information Based Robust Hash for Tamper Detection and Localization. 430-433 - Xian-zhe Meng, Shao-Zhang Niu, Jian-Cheng Zou:
Tamper Detection for Shifted Double JPEG Compression. 434-437 - Jiancheng Zou, Xin Yang, Shaozhang Niu:
A Novel Robust Watermarking Method for Certificates Based on DFT and Hough Transforms. 438-441 - Huawei Tian, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan:
Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform. 442-445 - Bo Ou
, Yao Zhao, Rongrong Ni, Gang Cao:
A High Payload Histogram-Based Reversible Wartermarking Using Linear Prediction. 446-449 - Chuanjun Wang, Zhenfeng Shi, Xiamu Niu:
An Error Driven 3D Face Modeling Scheme Based on Partial Differential Equations. 450-453 - Zhe-Ming Lu, Wei-Min Zheng, Jing Wang:
Image Retrieval Based on RST Invariant Features Extracted from Scale Invariant Keypoints. 454-457
Digital Forensics and Security
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang, Rui Xue:
ASM-SPV: A Model Checker for Security Protocols. 458-461 - Ming Liu, Nenghai Yu, Weihai Li:
Camera Model Identification for JPEG Images via Tensor Analysis. 462-465 - Chuanrong Zhang, Long Chi, Yuqing Zhang:
Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA. 466-469 - Qingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo:
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields. 470-473 - Chunling Wang, Jingyu Feng:
A Study of Mutual Authentication for P2P Trust Management. 474-477 - Li Li, Qi Han, Xiamu Niu:
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network. 478-481 - Shen Wang, Qiong Li, Bian Yang, Xiamu Niu:
A Novel and Secure Image Interpolation Methods for Image Disguise. 482-485