


default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 1
Volume 1, Number 1, January 2010
- Zhi-Hui Wang, The Duc Kieu, Chin-Chen Chang, Mingchu Li:

A Novel Information Concealing Method Based on Exploiting Modification Direction. 1-9 - Akinori Ito, Shozo Makino:

Designing Side Information of Multiple Description Coding. 10-19 - Gang Cao, Yao Zhao, Rongrong Ni:

Edge-based Blur Metric for Tamper Detection. 20-27 - Shen Wang, Bian Yang, Xiamu Niu:

A Secure Steganography Method based on Genetic Algorithm. 28-35 - Hui Wang, Joyce Liang, C.-C. Jay Kuo:

Overview of Robust Video Streaming with Network Coding. 36-50 - Hsiang-Cheh Huang, Yueh-Hong Chen, Ajith Abraham:

Optimized Watermarking Using Swarm-Based Bacterial Foraging. 51-58
Volume 1, Number 2, April 2010
- Kotaro Yamamoto, Munetoshi Iwakiri:

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument. 59-71 - Xuping Huang, Yoshihiko Abe, Isao Echizen:

Capacity Adaptive Synchronized Acoustic Steganography Scheme. 72-90 - Ching-Yu Yang, Wu-Chih Hu, Chih-Hung Lin:

Reversible Data Hiding by Coefficient-bias Algorithm. 91-100 - Halim Sayoud, Siham Ouamour:

Proposal of a New Confidence Parameter Estimating the Number of Speakers -An experimental investigation-. 101-109 - Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, Yi-Fan Li:

Multipath Flatted-Hexagon Search for Block Motion Estimation. 110-131 - Jian Lou, Shan Liu, Anthony Vetro, Ming-Ting Sun:

Trick-Play Optimization for H.264 Video Decoding. 132-144
Volume 1, Number 3, July 2010
- Abdelrahman Desoky:

NORMALS: Normal Linguistic Steganography Methodology. 145-171 - Zhe-Ming Lu, Yue-Nan Li:

Image Compression Based on Mean Value Predictive Vector Quantization. 172-178 - Hameed Al-Qaheri, Abhijit Mustafi, Soumya Banerjee:

Digital Watermarking using Ant Colony Optimization in Fractional Fourier Domain. 179-189 - Tzu-Chuen Lu, Chin-Chen Chang:

A Survey of VQ Codebook Generation. 190-203 - Ryouichi Nishimura, Shun'ichiro Abe, Norihiro Fujita, Yôiti Suzuki:

Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme. 204-219 - Chia-Chen Lin, Pei-Feng Shiu:

HighCapacity Data Hiding Scheme for DCT-based Images. 220-240 - Stelios Krinidis, Ioannis Pitas:

Statistical Analysis of Human Facial Expressions. 241-260 - Xiaohong Zhou, Zhe Nie, Yueping Li:

Fast Algorithm for Searching Adjacent Communities and Its Application in Hierarchical Community Discovery. 261-268
Volume 1, Number 4, October 2010
- Hoseok Wey, Akinori Ito, Takuma Okamoto, Yôiti Suzuki:

Multiple Description Coding Using Time Domain Division for MP3 coded Sound Signal. 269-285 - Fa-Xin Yu, Yanqiang Lei, Yuan-Gen Wang, Zhe-Ming Lu:

Robust Image Hashing Based on Statistical Invariance of DCT Coefficients. 286-291 - Chao-Hsing Hsu, Wen-Jye Shyr, Kun-Huang Kuo:

Optimizing Multiple Interference Cancellations of Linear Phase Array Based on Particle Swarm Optimization. 292-300 - Martin Drahanský, Dana Hejtmankova:

New Experiments with Optical Liveness Testing Methods. 301-309 - Chin-Feng Lee, Wan-Ting Chang:

Recovery of Color Images by Composed Associative Mining and Edge Detection. 310-324 - Milind Khanapurkar, Jayant Y. Hande, Preeti R. Bajaj:

Approach for VHDL and FPGA Implementation of Communication Controller of FlexRay Controller. 325-336 - M. B. Ould Medeni, El Mamoun Souidi:

A Novel Steganographic Protocol from Error-correcting Codes. 337-343 - Halim Sayoud, Siham Ouamour:

Speaker Clustering of Stereo Audio Documents Based on Sequential Gathering Process. 344-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














