


default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 5
Volume 5, Number 1, January 2014
- Chin-Chen Chang, Ting-Fang Cheng:

A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature. 1-12 - Qi Han, Liyang Yu, Wenchao Zheng, Na Cheng, Xiamu Niu:

A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching. 13-19 - Constantinos Patsakis, Nikolaos Aroukatos:

LSB and DCT steganographic detection using compressive sensing. 20-32 - Mao-Hsiung Hung, Jeng-Shyang Pan, Chaur-Heh Hsieh:

A Fast Algorithm of Temporal Median Filter for Background Subtraction. 33-40 - Yan Xu, Miaomiao Tian, Liusheng Huang, Wei Yang:

Improvement of a Lattice-based Signature Scheme. 41-46 - Zhi-Hui Wang, Marcos Segalla Pizzolatti, Chin-Chen Chang:

Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation. 47-60 - Feng-Cheng Chang, Hsiang-Cheh Huang:

A Framework for Prototyping Telecare Applications. 61-71 - Delong Zhang, Jiaqing Qiao, Jun-Bao Li, Liyan Qiao, Shu-Chuan Chu, John F. Roddick:

Optimizing Matrix Mapping with Data Dependent Kernel for Image Classification. 72-79 - Lian-Lei Lin, Ling-Yu Li, Yue Ma:

Design of Data Archive in Virtual Test Architecture. 80-89 - Taghaddos Danial, Alimohammad Latif:

Visual cryptography for grayscale images using bit-level. 90-97 - Xue Zhang, Anhong Wang, Bing Zeng, Lei Liu:

Adaptive Distributed Compressed Video Sensing. 98-106 - Chin-Chen Chang, Ya-Chieh Huang, Hao-Chuan Tsai:

Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks. 107-116
Volume 5, Number 2, April 2014
- Takashi Mihara:

A New Framework of Steganography Using the Content of Cover Data. 117-123 - Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen:

A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images. 124-143 - Zhi-Wei Zhang, Ming-Hui Wang, Zhe-Ming Lu, Yong Zhang:

A Skin Color Model Based on Modified GLHS Space for Face Detection. 144-151 - Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:

(k, n)-Image Reversible Data Hiding. 152-164 - Tian-Hua Liu, Qian Wang, Hong-Feng Zhu:

A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving. 165-178 - Guo-Liang Zhang, Chun-Ling Yang:

Anomaly Detection for Hypaerspectral Imagery Using Analytical Fusion and RX. 179-186 - Cheng Luo, Yong Zhang, Weixin Xie:

Traffic Regulation based Congestion Control algorithm in Sensor Networks. 187-198 - Chia-Mei Chen, Ming-Zong Huang, Ya-Hui Ou:

Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain. 263-274 - Hsiang-Cheh Huang, Feng-Cheng Chang:

Robust Image Watermarking Based on Compressed Sensing Techniques. 275-285 - Takeshi Nagano, Akinori Ito:

Packet Loss Concealment of Voice-over IP Packet using Redundant Parameter Transmission Under Severe Loss Conditions. 286-295 - Mengmeng Yang, Jie Liu:

A Maximum Lifetime Coverage Algorithm Based on Linear Programming. 296-301 - Baoxiang Du, Qun Ding, Xiaoli Geng:

Analysis and Elimination of Digital Chaotic Key Sequence¡¦s Autocorrelation. 302-309 - Deng-Yuan Huang, Chun-Jih Lin, Shr-Huan Dai:

Face Recognition Using the Diagonal Relative Gradient Method in a Low Illumination Environment. 310-323
Volume 5, Number 3, July 2014
- Nhut Minh Ngo, Masashi Unoki, Ryota Miyauchi, Yôiti Suzuki:

Data Hiding Scheme for Amplitude Modulation Radio Broadcasting Systems. 324-341 - Chin-Chen Chang, Yi-Hui Chen, Lin-Yi Chuang:

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques. 342-352 - Peng Li, Qian Kong, Yanpeng Ma:

Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation. 353-366 - Hao-Kuan Tso, Tsung-Ming Lo, Wei-Kuei Chen:

Friendly Medical Image Sharing Scheme. 367-378 - Xin-Wei Li, Kang Sun, Lei-Da Li:

Accelerated Tracing Scheme for Gaussian Fingerprinting. 379-390 - Ying Cui, Hui-Qin Liu, Tong Wang:

Target Coverage Research Based on Improved Binary Differential Algorithm. 391-398 - Lijian Zhou, Yukai Xu, Zhe-Ming Lu, Tingyuan Nie:

Face Recognition Based on Multi-Wavelet and Sparse Representation. 399-407 - Sagar Gujjunoori, B. B. Amberker:

Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients. 408-419 - Wen-Chung Kuo, Sheng-Yi Chang:

Hybrid GEMD Data Hiding. 420-430 - Xun-Fei Liu, Xiang-xian Zhu:

Kernel-optimized Based Fisher Classification of Hyperspectral Imagery. 431-438 - Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu:

A Novel Frequency Billing Service in Digital Television System. 439-450 - John Marin, Frank Y. Shih:

Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification. 451-460 - Chun-Hung Richard Lin, Kuan-Hua Tseng, Yu-Hsiu Huang, Cheng-Yi Lin:

Implementation of IP-over-DVB Network as a Wireless Internet Backbone. 461-474 - Mei Zhao, Anhong Wang, Lei Liu, Bing Zeng, Huihui Bai:

Depth Coding Based on Compressed Sensing with Optimized Measurement and Quantization. 475-484 - Chang Duan, Qi-Hong Huang, Xue Gang Wang, Shuai Wang:

Remote Image Fusion Based on PCA and Dual Tree Compactly Supported Shearlet Transform. 485-496 - Wei-Chun Lin, Tsair-Fwu Lee, Shu-Yuan Lin, Li-Fu Wu, Hung-Yu Wang, Liyun Chang, Jia-Ming Wu, Jing-Chuan Jiang, Chiu-Ching Tuan, Mong-Fong Horng, Chin-Shiuh Shieh, Pei-Ju Chao:

Non-invasive Knee Osteoarthritis Diagnosis via Vibroarthrographic Signal Analysis. 497-507 - Xiaoxia Wang, Liangyu Ma:

A Compact K Nearest Neighbor Classification cation for Power Plant Fault Diagnosis. 508-517 - Hai Cheng, Qun Ding, Chunguang Huang, Shuxia Zhai, Lianzhong Fang:

Improvements of SM4 Algorithm and Application in Ethernet Encryption System Based on FPGA. 518-526 - ShaoWei Weng, Jeng-Shyang Pan:

Reversible Watermarking Based on Eight Improved Prediction Modes. 527-533 - Chuan Qin, Chin-Chen Chang, Szu-Ting Wang:

A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files. 534-545 - Zhenfeng Zhu, Linlin Du, Lei Zhang, Yao Zhao:

Shared Subspace Learning for Latent Representation of Multi-View Data. 546-554 - Jiajia Zhang, Xuan Wang, Lin Yao, Jingpeng Li, Shen-Xeu Dong:

Using Risk Dominance Strategy in Poker. 555-566 - Jie Sun, Zhe-Ming Lu, Lijian Zhou:

Iris Recognition Using Curvelet Transform Based on Principal Component Analysis and Linear Discriminant Analysis. 567-573
Volume 5, Number 4, October 2014
- Xianhua Song, Shen Wang, Xiamu Niu:

Multi-Channel Quantum Image Representation Based on Phase Transform and Elementary Transformations. 574-585 - Sunita Vikrant Dhavale, Rajendra S. Deodhar, Debashish Pradhan, L. M. Patnaik:

High Payload Adaptive Audio Watermarking based on Cepstral Feature Modification. 586-602 - Yanjun Liu, Chin-Chen Chang:

A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem. 603-613 - Bao Rong Chang, Hsiu Fen Tsai, Yun-Che Tsai:

High-Performed Virtualization Services for In-Cloud Enterprise Resource Planning System. 614-624 - Dongning Zhao, Weixin Xie, Zhe-Ming Lu:

High Efficiency Reversible Data Hiding for Two-stage Vector Quantization Compressed Images. 625-641 - Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang, Hung-Min Sun:

Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID. 642-648 - Hongfeng Zhu:

Structured and Efficient Password-Based Group Key Agreement Protocol. 649-665 - Kai Chain, Wen-Chung Kuo, Jyun-Pei Siang, Jiin-Chiou Cheng:

A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity. 666-671 - Hongfeng Zhu, Xin Hao, Yang Sun:

Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant. 672-689 - Hao-Xian Wang, Zhe-Ming Lu, Yong Zhang:

A sparse representation based super-resolution image reconstruction scheme utilizing dual dictionaries. 690-700 - Wei Zhang, Leida Li, Hancheng Zhu, Deqiang Cheng, Shu-Chuan Chu, John F. Roddick:

No-reference Quality Metric of Blocking Artifacts Based on Orthogonal Moments. 701-708 - Yanjun Liu, Chin-Chen Chang:

A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem. 709-718 - Kun Zhao, Jie Sun, Zhe-Ming Lu, Jian Wang, Lijian Zhou:

Non-rigid Video Object Segmentation Based on Semantic Multi-level Framework. 719-730 - Hongtao Yin, Jiaqing Qiao, Ping Fu, XinYuan Xia:

Face Feature Selection with Binary Particle Swarm Optimization and Support Vector Machine. 731-739 - Samaa M. Shohieb, Hamdy K. Elminir, Alaa Mohamed Riad:

A Multi-Modal Oculography-Based Mouse Controlling System: Via Facial Expressions & Eye Movement. 740-756 - Junping Dai, Yazhong Liu, Jianfeng Lu, Jiayi Xu, Chin-Chen Chang, Li Li:

Watermarking Marbled Image Based on Linear Enhancement Hologram. 757-768 - Weiwei Liu, Guangjie Liu, Yuewei Dai:

Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity. 769-777 - Ping Wang, Jia-Chi Liu:

Threat Analysis of Cyber Attacks with Attack Tree+. 778-788 - Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Chia-Ming Liu:

A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution. 789-805 - Juanjuan Zhu, Bao-Long Guo, Chuang Ge:

Real-Time Digital Image Stabilization Algorithm using Sage-Husa Filter. 806-813

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














