


default search action
ISBAST 2013: Chengdu, Sichuan, China
- International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China. IEEE 2013

Session 1A
- Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu:

A Blog Clustering Approach Based on Queried Keywords. 1-9 - Nan-Han Lu, Chung-Ming Kuo, Hueisch-Jy Ding:

Automatic ROI Segmentation in B-Mode Ultrasound Image for Liver Fibrosis Classification. 10-13 - Jianhua Kang, Fangyi She, Weidong Zhang, Jie Ping:

Application of Network Analyzer Based on the Automatic Control of LabVIEW in Radio and Television Test. 14-19 - Muzzamil Noor, Haider Abbas

:
Anticipating Dormant Functionality in Malware: A Semantics Based Approach. 20-23
Session 1B
- Rong-Jian Chen, Yu-Cha Chen, Jui-Lin Lai, Shi-Jinn Horng:

Data Hiding Using Flexible Multi-bit MER. 24-31 - Chyouhwa Chen, Po-Chung Tung, Wei-Chung Teng:

Exploiting Unsupervised Learning in Publish Subscribe System Design. 32-39 - Zeeshan-ul-hassan Usmani, Sarah Irum, Hassan Afzal, S. Mahmud:

How to Build an Automated Fingerprint Identification System. 40-47 - Zeeshan-ul-hassan Usmani, Sarah Irum, Hassan Afzal, S. Mahmud:

Plug-n-Play AFIS Development for Criminal and Civil Applications. 48-55
Session 2A
- Jiann-Shu Lee, Fei-Hsiang Huang, Hsiao-Chen Kuo:

A New Image Watermarking Scheme Using Non-dominated Sorting Genetic Algorithm II. 56-61 - Ping-Chin Wang, Chow-Sing Lin:

Enhanced Backward Error Concealment for H.264/AVC Videos on Error-Prone Networks. 62-66 - Chi-Chou Kao:

E-Health Design of EEG Signal Classification for Epilepsy Diagnosis. 67-71 - Ding-Horng Chen, Yi-Chen Chang, Pai-Jun Huang, Chia-Hung Wei:

The Correlation Analysis between Breast Density and Cancer Risk Factor in Breast MRI Images. 72-76
Session 2B
- Tz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung:

A Geocasting Forwarding Scheme for Mobile Nodes in VANETs. 77-81 - Wu-Chuan Yang, Shyh-Yih Wang, Shu-Ling Liu:

Efficient Implementation of Block Cipher in JCA. 82-84 - Ing-Chau Chang, Hung-Ta Tai, Dung-Lin Hsieh, Feng-Han Yeh, Siao-Hui Chang:

Design and Implementation of the Travelling Time- and Energy-Efficient Android GPS Navigation App with the VANET-Based A* Route Planning Algorithm. 85-92 - Zong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin:

Interactive Multimedia Technology in Case-Based Medical E-Learning. 93-96
Session 3A
- Jia-Ning Luo

, Ming-Hour Yang, Ming-Chien Yang:
An Anonymous Car Rental System Based on NFC. - Xiong Li

, Jianwei Niu
, Muhammad Khurram Khan
, Junguo Liao:
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement. 105-110 - Johannes K. Chiang

, Eric Yen, Yu-Long Lin:
On Interoperation of Hybrid Cloud. 111-115 - Johannes K. Chiang

, Eric H.-W. Yen, Yen-Hua Chen:
Authentication, Authorization and File Synchronization in Hybrid Cloud: On Case of Google Docs, Hadoop and Linux Local Hosts. 116-123
Session 3B
- Qi Xie, Mengjie Bao, Na Dong, Bin Hu, Duncan S. Wong:

Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks. - Abdul Haseeb Ahmed, Hafiz Malik

:
Security of Biometrics Using Multimodal Approach. - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:

New Identity-Based Sequential Aggregate Signature Scheme from RSA. - Martin Henzl, Petr Hanácek

:
Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding.
Session 4A
- Xiong Li

, Jianwei Niu
, Muhammad Khurram Khan
, Junguo Liao:
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards. - Po-Chun Chang, Kuo-Liang Chung, Wei-Ning Yang, Yong-Huai Huang:

Bitrate-Saving Intra Coding for Depth Video Compression in H.264/MVC Based on D-NOSE Models. - Yanling Chen, E. Heimark, Danilo Gligoroski:

Personal Threshold in a Small Scale Text-Dependent Speaker Recognition. 162-170 - Chi-Kao Chang, Min-Yuan Fang, I-Chang Jou, Nai-Chung Yang, Chung-Ming Kuo:

Subsampling Based Computation-Aware Motion Estimation. 171-175 - Shinfeng D. Lin, Jia-Jen Lin, Chin-Yao Chung:

Sleepy Eye's Recognition for Drowsiness Detection. 176-179
Session 4B
- Junbo Zhang, Jian-Syuan Wong, Yi Pan

, Tianrui Li
:
H2T: A Simple Hadoop-to-Twister Translator for Cloud Computing. 180-186 - Wei-Ting Liao, Wen-Yen Lin

, Wen-Cheng Cheng, Kin Fong Lei
, Ming-Yih Lee:
Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers. 187-192 - F. Alsaade, M. Zahrani, Turki Ali Alghamdi

:
Score-Level Fusion in Biometric Verification. 193-197
Session 5A
- Jui-Lin Lai, Kuo-Hung Liao, Yi-Te Lai, Rong-Jian Chen:

Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte Transformation. 198-202 - Chun-Rong Su, Jiann-Jone Chen, Kai-Lin Chang:

Content-Based Image Retrieval on Reconfigurable Peer-to-Peer Networks. 203-211 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:

A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones. 212-216 - Ning Wang, Qiong Li, Ahmed A. Abd El-Latif

, Xuehu Yan, Xiamu Niu:
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. 217-223
Session 5B
- Hanzhou Wu

, Hongxia Wang:
Multibit Color-Mapping Steganography Using Depth-First Search. 224-229 - Lu Leng, Andrew Beng Jin Teoh

, Ming Li, Muhammad Khurram Khan
:
Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code. 230-234 - Chih-Hua Tai, Jen-Wei Huang

, Meng-Hao Chung:
Privacy Preserving Frequent Pattern Mining on Multi-cloud Environment. 235-240 - Fajri Kurniawan, Mohammed Sayim Khalil

, Muhammad Khurram Khan
:
Core-Point Detection on Camera-Based Fingerprint Image. 241-246
Session 6A
- Saru Kumari

, Fahad Bin Muhaya, Muhammad Khurram Khan
, R. Kumar:
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme". 247-250 - Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Hsien-Hsin Chou

, Xian Wang, Minyi Guo:
Adaptive Non-Local Means for Image Denoising using Turbulent PSO with No-Reference Measures. 251-258 - Ching-Nung Yang

, Jia-Bin Lai:
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing. 259-266
Session 6B
- Jyhjong Lin, Shin-Jer Yang:

An Architecture and Application of Cloud-Based Customer Knowledge Management Information Systems. 267-272 - Shin-Jer Yang, Pei-Ci Lai, Jyhjong Lin:

Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services. 273-279 - M. Anwar Hossain, Sk. Md. Mizanur Rahman

:
Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design. 280-285 - Shaohua Wan

, Hua Yang:
Comparison among Methods of Ensemble Learning. 286-290 - Fajri Kurniawan, Mohammed Sayim Khalil

, Muhammad Khurram Khan
, Yasser M. Alginahi:
Authentication and Tamper Detection of Digital Holy Quran Images. 291-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














