


default search action
IIH-MSP 2011: Dalian, China
- Xiamu Niu, Mingchu Li, Yôiti Suzuki, Jeng-Shyang Pan, Lakhmi C. Jain:

Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1397-2
Cross-Discipline Techniques in Signal Processing and Networking
- Jong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang:

Design of 3-D FIR Cone-Shaped Filters by McClellan Transformation and Least-Squares Contour Mapping. 1-4 - Yuh-Yih Lu, Shih-Chiang Wei, Chun-Yi Li, Hsiang-Cheh Huang

:
Design of 2.45GHz Planar Meander Dipole Antenna. 5-8 - Feng-Cheng Chang

, Hsiang-Cheh Huang
:
A Study on ENF Discontinuity Detection Techniques. 9-12 - Hsiang-Cheh Huang

, Yuh-Yih Lu, Yueh-Hong Chen:
Reversible Data Hiding with Difference Modification and Rhombus Relationships in Quadtree Decomposition. 13-16 - Liou Chu, Shih-Jung Wu:

An Integrated Building Fire Evacuation System with RFID and Cloud Computing. 17-20 - Yueh-Hong Chen, Hsiang-Cheh Huang

:
A Copyright Information Embedding System for Android Platform. 21-24 - Shih-Jung Wu, Liou Chu:

A Novel Packet Scheduling Scheme for Downlink LTE System. 25-28 - Hsiang-Cheh Huang

, Wei-Hao Lai, Feng-Cheng Chang
:
Content-Adaptive Multi-level Data Embedding for Lossless Data Hiding. 29-32 - Feng-Cheng Chang

, Duen-Kai Chen:
The Design of an XMPP-based Service Integration Scheme. 33-36 - Hsiang-Cheh Huang

, Yueh-Hong Chen, Yuh-Yih Lu:
Histogram-Based Difference Expansion for Reversible Data Hiding with Content Statistics. 37-40 - Xiaojing Meng, Weidong Liu, Enjie Ding:

The Research of Acoustic Emission Signal Classification. 41-44
Techniques and Algorithms for Multimedia Security
- Ryusuke Mayuzumi, Tetsuya Kojima:

A Blind Digital Steganography Scheme Based on Complete Complementary Codes. 45-48 - Nao Teranishi, Masaki Kawamura

:
Asynchronous Stochastic Decoder for Spread Spectrum Digital Watermarking. 49-52 - Tomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama

, Hiroshi Yoshiura:
Content-Based De-anonymisation of Tweets. 53-56 - Viktor Monarev, Andrey Pestunov

:
A New Compression-Based Method for Estimating LSB Replacement Rate in Color and Grayscale Images. 57-60 - Shuo-Tsung Chen, Huang-Nan Huang

, Chih-Yu Hsu
, Kuo-Kun Tseng, Chun-Hua Wu, Jeng-Shyang Pan:
Wavelet-Based Entropy for Digital Audio Watermarking. 61-64
Data Hiding, Visual Cryptography, and Secret Image Sharing
- Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:

Prediction-Based Lossless Data Hiding by Adaptive Coefficient-Bias Algorithm. 65-68 - Kuang Tsan Lin:

Data Encrypting in a Binary Image Base on Modified Data Hiding Method. 69-72 - Brian K. Lien, Zhi-Lin Lan:

Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood Toggling. 73-76 - Shang-Kuan Chen, Chiu-Jian Hsu, Yen-Wu Ti:

Hierarchical Three-Dimension Mesh Model Sharing. 77-80 - Min-Jeong Lee, Ji Won Lee, Heung-Kyu Lee:

Perceptual Watermarking for 3D Stereoscopic Video Using Depth Information. 81-84 - Ji Won Lee, Tae-Woo Oh, Min-Jeong Lee, Hae-Yeoun Lee, Heung-Kyu Lee:

Video Watermarking on Overlay Layer. 85-88 - Wen-Pinn Fang:

Offline QR Code Authorization Based on Visual Cryptography. 89-92 - Yung-Yi Lin, Ran-Zan Wang

:
Improved Invertible Secret Image Sharing with Steganography. 93-96 - Wen-Chung Kuo, Yi-Lin Chen, Shuen-Chih Tsai, Jung-Shian Li:

Single-Packet IP Traceback with Less Logging. 97-100 - Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif

, Xiamu Niu:
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault. 101-104 - Rong Huang, Kouichi Sakurai:

A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing. 105-108
Multimedia Signal Processing and Networking
- Meiqiang Zhu, Jun Wang, Ming Li, Dong Li:

Design and Research on the Control of Biped Robot System Based on RUP. 109-112 - Meiqiang Zhu, Jun Wang, Ming Li, Yajing Lin:

Static Gait Analysis and Planning of Biped Robot. 113-116 - Hanjun Li:

The Research on the Module of Bipedal Robot Balance Adjustment. 117-120 - Jianping Qiao, Huamei Xin, Xiaojuan Yang:

Super-resolution Reconstruction Based on Irregular Sample and Local Statistics. 121-124 - Fang Liu, Lee-Ming Cheng

:
A Novel Image Hashing Scheme Based on Wave Atoms. 125-128 - Xin He, Huiyun Jing, Qi Han, Xiamu Niu:

A Saliency Detection Approach to Combine LSK and Color for Color Image. 129-132
Intelligent Watermarking Techniques, Image Authentication, and Visual Cryptography
- Chih-Yang Lin, Chao-Chin Chang, Yi-Hui Chen, Panyaporn Prangjarote:

Multimedia Privacy Protection System for Mobil Environments. 133-136 - Jau-Ji Shen, Ya-Hsin Lo:

A New Approach of Image Compression Based on Difference Vector Quantization. 137-140 - Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Chia-Chi Yang:

An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table. 141-144 - Jen-Ho Yang, Chin-Chen Chang, Shih-Yi Lin:

An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices. 145-148 - Wen-Pinn Fang:

Fast Decoding Method for On-line Visual Secret Sharing by Parallel Processing Approach. 149-152 - Xin Liao

, Qiao-Yan Wen, Sha Shi:
Distributed Steganography. 153-156 - Chin-Chen Chang, Kuo-Nan Chen, Ying-Hsuan Huang:

Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing. 157-160 - Chia-Chen Lin

, Li-Cheng Yang, Yi-Hui Chen:
Data Hiding Scheme Based on Features of Chinese Text. 161-164 - Anahita Shojaei-Hashemi, Mostafa Mehdipour-Ghazi

, Shahrokh Ghaemmaghami, Hamid Soltanian-Zadeh
:
Universal Steganalysis Based on Local Prediction Error in Wavelet Domain. 165-168 - Constantinos Patsakis

, Nikolaos Aroukatos:
A DCT Steganographic Classifier Based on Compressive Sensing. 169-172 - Gundeep Singh Bindra:

Invisible Communication through Portable Document File (PDF) Format. 173-176 - Charu Agarwal, Anurag Mishra, Arpita Sharma:

Genetic Algorithm-Backpropagation Network Hybrid Architecture for Grayscale Image Watermarking in DCT Domain. 177-180 - Pranab Kumar Dhar, Isao Echizen:

Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data. 181-184 - Sen-Ren Jan, Steen J. Hsu, Chuan-Feng Chiu, Shu-Lin Chang:

An Improved Data Hiding Method Using Image Interpolation. 185-188 - Peyman Rahmani

, Ehsan Rahmani
, Gholamhossein Dastghaibyfard:
A Location Map Free Reversible Data Hiding Scheme for VQ-Compressed Images Based on Search Order Coding. 189-192
Multimedia Signal Processing and Stegarnography
- Cai-Hua Li, Zhe-Ming Lu:

Graph-Based Features for Image Retrieval. 193-195 - Tatsuya Tanaka, Toshifumi Kai, Yusuke Tamura, Ryôichi Sasaki:

Development and Evaluation of Defaced Sites Automatic Detection System DICE. 196-201 - Tiejun Zhang, Xuefeng Bai, Xianhua Song, Xiamu Niu:

An Improved Algorithm for Multiple Closed Contour Detection. 202-205 - Xinsheng Wang, Mingyan Yu:

Power Research of JPEG Circuits in FPGA. 206-208 - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

:
Steganography: A Class of Algorithms having Secure Properties. 209-212 - Salih Ergün

:
IC Postprocessing Stage for Random Number Generators and an Alternative Design Methodology. 213-217 - Chunxia Gao, Tianqi Zhang, Fangqing Tan, Chao Wang:

DOA Estimation of Coherent NLFM Signals. 218-221
Digital Rights Management in Cloud Computing
- Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian

:
Compressing Encrypted Image Using Compressive Sensing. 222-225 - Qian Mao, Boqing Xu, Yanping Qin:

A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes. 226-229 - Chia-Min Lin, Shyh-Chang Tsaur, Yeong-Chin Chen, Iuon-Chang Lin:

HB Family RFID Mutual Authentication Protocol. 230-235 - Lu-Lu Wang, Kebin Jia, Zhuo-Yi Lu:

A Multi-stage Fast Intra Mode Decision Algorithm in H.264. 236-239 - Jiande Sun, Jie Zhang, Hua Yan, Likun Zhang, Wei Liu:

Visual Attention Model with Cross-Layer Saliency Optimization. 240-243 - Cheng Guo, Chin-Chen Chang:

General Threshold Signature Based on the Chinese Remainder Theorem. 244-247 - Guojun Ma, Qingqi Pei, Yuchen Wang, Xiaohong Jiang:

A General Sharing Model Based on Proxy Re-encryption. 248-251 - Chin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, Ching-Hsiang Chang:

A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol. 252-255 - Chin-Feng Lee, Kai-Chin Chen:

Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method. 256-259 - Bee Yan Hiew, Andrew Teoh Beng Jin

:
Secure Template Protection in Touch-less Based Fingeprint Verification System. 260-265 - Yue Wang, Tian-qi Zhang, Juan Bai, Rui Bao:

Modulation Recognition Algorithms for Communication Signals Based on Particle Swarm Optimization and Support Vector Machines. 266-269
Robust Image/Video Coding and Transmission
- Jianchao Du, Song Xiao, Chengke Wu, Jianlong Zhang:

A Video Transmission Framework Based on Packet Criticality Model. 270-273 - Lei Quan, Song Xiao, Jianchao Du, Janli Zhou:

A Threshold-Based Coefficients Cutting Method for Compressive Imaging. 274-277 - Xuesong Sun, Song Xiao, Jianchao Du, Min Hu:

Fast Mode Decision Algorithm for H.264/SVC Based on Motion Vector Relation Analysis. 278-281 - Ying Kang, Song Xiao, Ji Lu, Chengke Wu:

A Rate Distortion-Based Network Coding Design for Video Transmission. 282-285 - Jianlong Zhang, Xinbao Gao, Song Xiao, Jianchao Du:

An Error Concealment Algorithm Based on Non-uniform Lagrange Interpolation. 286-289 - Li Zhang, Song Xiao, Ning Cai, Jianchao Du:

An Opportunistic Network Coding Algorithm Based on the Queue State and Network Topology. 290-293
New Possibility of Audio Information Processing Based on Information Hiding and Enrichment Techniques
- Kazuhiro Kondo

:
The Effect of Speaker and Noise Type on the Accuracy of Estimated Speech Intelligibility Using Objective Measures. 294-297 - Yuto Sasaki, Seongjun Hahm, Akinori Ito

:
Manipulating Vocal Signal in Mixed Music Sounds Using Small Amount of Side Information. 298-301 - Ryouichi Nishimura, Hiroaki Kato, Parham Mokhtari, Hironori Takemoto:

Median Plane Mislocalization of Virtual Sound Presented through Headphones. 302-305 - Naofumi Aoki:

Audio Trick Art Based on Information Misreading Technique. 306-309 - Wai-Lin Chan, Chi-Man Pun

:
Robust Character Recognition Using Connected-Component Extraction. 310-313 - Masashi Unoki

, Ryota Miyauchi:
Reversible Watermarking for Digital Audio Based on Cochlear Delay Characteristics. 314-317 - Akira Nishimura:

Reversible Audio Data Hiding Using Linear Prediction and Error Expansion. 318-321 - Kitahiro Kaneda, Yuta Kito, Keiichi Iwamura:

Information Hiding Based on the Artificial Fiber Pattern with Improved Robustness against Foregound Objects. 322-329 - Kitahiro Kaneda, Yoshiaki Tachibana, Keiichi Iwamura:

Information Hiding Based on a Single Dot Pattern Method with Improved Extraction and Robustness against Foreground Objects. 330-335 - Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai:

An Efficient Key Generation Method in Audio Zero-Watermarking. 336-339
Intelligent Video Processing
- Chao-Ho Chen, Tsong-Yi Chen, Chi-Ming Huang, Da-Jinn Wang:

License Plate Location for Vehicles Passing through a Gate. 340-343 - Chun Wang, Zhonghua Sun, Kebin Jia:

Abrupt Cut Detection Based on Motion Information. 344-347 - Wei-Lieh Hsu, Kun-Fong Lin, Chang-Lung Tsai:

Crowd Density Estimation Based on Frequency Analysis. 348-351 - Pengyu Liu, Kebin Jia:

Low-Complexity Encoding Method for H.264/AVC Based on Visual Perception. 352-355 - Xuefeng Bai, Tiejun Zhang, Xianhua Song, Xiamu Niu:

Playfield Detection Using Color Ratio and Local Entropy. 356-359 - Yongcheng Wang, You Ling, Mi Liang:

A Joint Approach to Frame Synchronization in Presence of Frequency Offset. 360-364
Digital Forensics
- Shidou Yan, Yatao Yang, Zichen Li:

Design of U Disk Remote Monitoring System in Trusted Computing Environment. 365-368 - Ahmed A. Abd El-Latif

, Li Li, Ning Wang, Xiamu Niu:
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. 369-373 - Xueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Sockpuppet Detection in Online Discussion Forums. 374-377 - Shuhui Hou, Tetsutaro Uehara

, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers. 378-383 - Yuk-Ming Lai, Xueling Zheng, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Automatic Online Monitoring and Data-Mining Internet Forums. 384-387 - Rongsheng Xu, Kam-Pui Chow, Ying Yang:

Development of Domestic and International Computer Forensics. 388-394 - Fang Cheng, Lei Tian, Jinfeng Xie:

Research on Path ID and VPI/VCI Relating Guess Solution for TD-SCDMA Network Centralized Monitoring System. 395-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














