


default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 6
Volume 6, Number 1, January 2015
- Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:

An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map. 1-28 - Wei-Han Chang, Ming-Cheng Cheng, Chung-Ming Kuo, Guan-Da Huang:

Feature-Oriented Artistic Styles Transfer Based on Effective Texture Synthesis. 29-46 - Chin-Chen Chang, Chia-Chen Lin, Chih-Yang Lin:

Compressing Vector Quantization Index Table Using Side Match State Codebook. 47-58 - Chih-Chao Chung, Li-Chung Chao, Shi-Jer Lou, Nguyen Quang Vinh:

Benchmarking-based Analytic Network Process Model for Strategic Management. 59-73 - Xu Ding, Zhe-Ming Lu, Tingyuan Nie, Jie Sun:

A Robust Blind Image Watermarking Scheme Based on Classified Vector Quantization. 74-80 - Hongfeng Zhu, Man Jiang, Xin Hao, Yan Zhang:

Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture. 81-98 - Chi-Kien Tran, Tsair-Fwu Lee, Pei-Ju Chao:

Improving face recognition performance using similarity feature-based selection and classification algorithm. 99-112 - Yu-Hsiu Huang, Kai-Hsun Fan, Wen-Shyong Hsieh:

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU. 113-122 - Mohamed Khalil Krichi, Adnan Cherif:

Improvements of Arabic database and Noise Reduction of Speech Signal using Wavelet for Arabic speech synthesis system using HMM: HTS_ARAB_TALK. 123-130 - Feifei Liu, Lijian Zhou, Zhe-Ming Lu, Tingyuan Nie:

Palmprint Feature Extraction Based on Curvelet Transform. 131-139 - Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management. 140-153 - Ying Cui, Jiaqi Wang, Shubin Liu, Liguo Wang:

Hyperspectral image feature reduction based on Tabu Search Algorithm. 154-162 - Peipei Zhao, Shushang Li, Linlin Zhou, Leida Li, Xingge Guo:

Detecting Affine-Distorted Duplicated Regions in Images by Color Histograms. 163-174 - Hejin Yuan:

A Semi-supervised Human Action Recognition Algorithm Based on Skeleton Feature. 175-182
Volume 6, Number 2, March 2015
- Xuedan Jia, Ya-Fen Chang, Chin-Chen Chang, Liang-Min Wang:

A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks. 183-188 - Yanping Liao, Aya Abouzaid:

Resolution Improvement for MUSIC and ROOT MUSIC Algorithms. 189-197 - Fengying He, Tianshun Chen, Shangping Zhong:

A Classifier Ensemble Algorithm Based on Improved RSM for High Dimensional Steganalysis. 198-210 - Hongfeng Zhu, Xin Hao, Yifeng Zhang, Man Jiang:

A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem. 211-224 - Ying Zhou, Ji-Hong Zhang, Yongsheng Liang, Wei Liu:

Video Motion Characteristics based Spatial-Temporal Salient Region Extraction Method. 225-233 - Shouda Jiang, Zhong Bo, Chao Sun, Yuqi Liu:

A Hybrid Narrowband Active Noise Control System for Uncorrelated Narrowband Disturbance. 234-245 - Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Jinbo Liu:

A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability. 246-253 - Alexandros Iosifidis, Ermioni Marami, Anastasios Tefas, Ioannis Pitas:

The MOBISERV-AIIA Eating and Drinking multi-view database for vision-based assisted living. 254-273 - Hongfeng Zhu, Yifeng Zhang, Yan Zhang:

A One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture. 274-287 - Hsiao-Ling Wu, Chin-Chen Chang:

A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems. 288-296 - Thi-Kien Dao, Tien-Szu Pan, Trong-The Nguyen, Shu-Chuan Chu:

A Compact Articial Bee Colony Optimization for Topology Control Scheme in Wireless Sensor Networks. 297-310 - Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:

An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition. 311-322 - Rongrong Ni, Yao Zhao, Xiaobo Zhai:

Recaptured Images Forensics Based On Color Moments and DCT Coefficients Features. 323-333 - Zhimin Fang, Zhe-Ming Lu, Xin-Feng Li, Meilei Lv, Lu Zhang:

Deterministic Small-World Network Extended From Triangles. 334-339 - Jianzhi Sang, Shen Wang, Xianhua Song, Xuehu Yan, Xiamu Niu:

A novel representation for Multi-Channel log-polar quantum images. 340-350 - Salam Abdul-Nabi Thajeel, Ghazali Sulong:

A Novel Approach for Detection of Copy Move Forgery using Completed Robust Local Binary Pattern. 351-364 - Wen-Pinn Fang:

A Data Hiding Method which the Secret Image Exist After Cropping Style Image Resizing. 365-370 - You-Wei Wang, Chii-Jen Chen, Sheng-Fang Huang, Yi-Shiung Horng:

Segmentation of Median Nerve by Greedy Active Contour Detection Framework on Strain Ultrasound Images. 371-378 - Yanpeng Wu, Xiaoqi Peng, Yanpo Song:

The Algorithm of Estimating the Bubble Size Distribution Characteristics of the Foam Image. 379-388 - Zuowen Tan:

An Improved Anonymous Authentication Scheme for Roaming Services. 389-397 - Win-Bin Huang, Mong-Fong Horng:

Speed up Video Coders with Only Examining the Predicted Modes in a Coding Block. 398-408
Volume 6, Number 3, May 2015
- Chunlei Fan, Songyan Liu, Qun Ding:

Design of Embedded Ethernet Interface Based on Chaotic Stream Cipher. 409-415 - Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:

A Secure and Efficient Scheme for Digital Gift Certificates. 416-429 - Hsiang-Cheh Huang, Feng-Cheng Chang, Yueh-Hong Chen, Shu-Chuan Chu:

Survey of Bio-inspired Computing for Information Hiding. 430-443 - Hongfeng Zhu, Yu Xia, Hui Li:

An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet. 444-457 - Jianfeng Lu, Meng Wang, Junping Dai, Qianru Huang, Li Li, Chin-Chen Chang:

Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images. 458-472 - Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:

SkyLen: a Skype-based length covert channel. 473-481 - Hao Cai, Leida Li, Jiansheng Qian, Jeng-Shyang Pan:

Image Blur Assessment with Feature Points. 482-490 - Jie Sun, Zhe-Ming Lu, Lijian Zhou:

The Elimination Eyelash Iris Recognition Based on Local Median Frequency Gabor Filters. 491-499 - Hongfeng Zhu, Xin Hao, Huiyan Liu:

An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card. 500-510 - Wen-Fong Wang, Ching-Yu Yang, Sheng-Jia Shih:

Study on a Computational Model of Food Intake for a Body Weight Management System. 511-522 - Wan-Li Lyu, Chin-Chen Chang, Feng Wang:

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method. 523-533 - Yulong Qiao, Ying Zhao:

Rotation Invariant Texture Classification Using Principal Direction Estimation and Random Projection. 534-543 - Lihua Zhang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:

Improving Reliability of Covert Timing Channel to Packet Loss. 544-553 - Yi-Bing Wang, Tian-Yun Zhou, Bang-Jun Hu:

A Step-wise Refinement Algorithm for Face Recognition Based on Blocking Wavelet Transforms. 554-567 - Li Liu, Anhong Wang, Chin-Chen Chang, Qiang Jin, Binbin Xia:

Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction. 568-576 - Ching-Yu Yang, Wen-Fong Wang, Yih-Fuh Wang, Ran-Zan Wang:

A Simple Watermarking Scheme with High Perceptual Quality for Still Color Images Based on RWM and Centroid. 577-590 - Xiaodan Xie, Bohu Li, Xudong Chai:

Kernel-Based Nonparametric Fisher Classifier for Hyperspectral Remote Sensing Imagery. 591-599 - Kun Zhan, Jicai Teng, Qiaoqiao Li, Jinhui Shi:

A Novel Explicit Multi-focus Image Fusion Method. 600-612 - Wenmin Song, Xiuyan Sun, Cheng Liu, Linlin Tang:

A New Watermarking Frame Based on the Genetic Algorithms and Wavelet Packet Decomposition. 613-621 - Yanchao Xing, Enqing Sun, Yang Lu, Zhe-Ming Lu:

Multi-scale Shot Segmentation Based on Weighted Subregion Color Histogram. 622-628
Volume 6, Number 4, July 2015
- Zhi-Hui Wang, Ying-Hsuan Huang, Chin-Chen Chang, Hai-Rui Yang:

Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy. 629-638 - Thi Thi Zin, Pyke Tin, Hiromitsu Hama, Takashi Toriu:

A Matrix-Geometric Method for Web Page Ranking Systems. 639-647 - Lili Meng, Huaxiang Zhang:

MDC-Based Robust Stereo Video Coding Using ICP. 648-654 - Tianhua Liu:

A Simple and Robust Biometrics-based One-Time Identity-Password Authenticated Key Agreement Scheme. 655-665 - Chun-Yu Zhang, Wenxiang Zhang, Shaowei Weng:

Comparison of two kinds of image scrambling methods based on LSB steganalysis. 666-673 - Zhihui Wang, Qiong Wu, Zhongxuan Luo, Chin-Chen Chang:

A novel information hiding scheme based on line segments. 674-685 - Wan-Li Lyu, Chin-Chen Chang, Yeh-Chieh Chou, Chia-Chen Lin:

Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. 686-696 - Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen:

MAPMP: A Mutual Authentication Protocol for Mobile Payment. 697-707 - Fuxiang Lu, Jun Huang, Kun Zhan:

Boosting Classifiers for Scene Category Recognition. 708-717 - Wen-Chung Kuo, Ming-Chih Kao, Chin-Chen Chang:

A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme. 718-727 - Jin Tang, Bo Jiang, Bin Luo, Chin-Chen Chang:

An Outlier Detection Method for Feature Point Matching Problem. 728-739 - Guoyong Wang, Bing-Lei Guan:

Fuzzy Adaptive Variational Bayesian Unscented Kalman Filter. 740-749 - Hao Wang, Guangjie Liu, Yuewei Dai, Jin Shi:

A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size. 750-759 - Ying-Hsuan Huang, Chin-Chen Chang, Meng-Chieh Lin, Gwoboa Horng:

Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification. - Yi Mao, Baolong Guo, Yunyi Yan, Wei Sun:

Multiple structure based saliency detection and its application in image retrieval. 771-782 - Yanping Liao, Hua Han, Qiang Guo:

Design of Robust Near-field Multi-beam forming Based on improved LCMV algorithm. 783-791 - Yuh-Yih Lu, Jun-Yi Kuo, Hsiang-Cheh Huang:

Design and Application of Triple-Band Planar Dipole Antennas. 792-805 - Yihan Xiao, Liwei Chen, Mingyao Zhang, Mingkui Li:

Gas Turbine Blades Fault Diagnosis Method with EMD Energy Entropy and Related Vector Machine. 806-814 - Ching-Yu Yang, Wen-Fong Wang:

High-Capacity Steganographic Method for Color Images using Progressive Pixel-Alignment. 815-823 - Xiaodan Xie, Bohu Li, Xudong Chai:

Adaptive Sparse Kernel Principal Component Analysis for Computation and Store Space Constrained-based Feature Extraction. 824-832
Volume 6, Number 5, September 2015
- Ming Zhao, Jeng-Shyang Pan, Shuo-Tsung Chen:

Optimal SNR of Audio Watermarking by Wavelet and Compact PSO Methods. 833-846 - Hsiang-Cheh Huang, Feng-Cheng Chang:

Error Resilience for Compressed Sensing with Multiple-Channel Transmission. 847-856 - Taisong Xiong, Yuanyuan Huang:

Robust Gaussian Mixture Modelling Based on Spatially Constraints for Image Segmentation. 857-868 - Feng-Cheng Chang, Duen-Kai Chen, Hsiang-Cheh Huang:

Future Classroom with the Internet of Things - A Service-Oriented Framework. 869-881 - Bin Yan, Ya-Fei Wang, Lingyun Song, Hong-Mei Yang:

Power Spectrum Compliant QIM Watermarking for Autoregressive Host Signals. 882-888 - Shuliang Sun, Yongning Guo:

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher. 889-897 - Jen-Chang Liu, Tsung-Min Lin:

Location and Image-Based Plant Recognition and Recording System. 898-910 - Po-Yuan Hsu, Yi-Lung Yeh:

Study on Flood Para-Tank Model Parameters with Particle Swarm Optimization. 911-923 - Yeong-Chin Chen, Huiyu Shen, Chao-Hsing Hsu:

Fundamental Frequency Analysis on a Harmonic Power Signal Using Fourier Series and Zero Crossing Algorithms. 924-937 - Yu-Ze Jheng, Chien-Yuan Chen, Chien-Feng Huang:

Reversible Data Hiding Based on Histogram Modification over Ternary Computers. 938-955 - Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:

Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. 956-967 - Chang-An Wei, Yunlong Sheng, Shou-Da Jiang, Jianfeng Wang:

Combinatorial Test Suites Generation Method Based on Fuzzy Genetic Algorithm. 968-976 - Xun-Fei Liu, Xiang-xian Zhu:

Parallel Feature Extraction through Preserving Global and Discriminative Property for Kernel-Based Image Classification. 977-986 - Fei Guo, Hui Wang:

Multi-wavelet Feature Extraction Method for Variable Illumination Face Recognition. 987-996 - Hongfeng Zhu, Yu Xia, Yan Zhang:

A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model. 997-1008 - Xiao Chen, Zhe-Ming Lu, Hong-Wa Yang, Gaofeng Pan:

A New Approach to Constructing a Minimum Edge Cut Set Based on Maximum Flow. 1009-1014 - Guangjia Song, Zhenzhou Ji:

A Novel Address Resolution Process Based on the Seek Secret Man Protocol. 1015-1028 - Jeng-Shyang Pan, Sen Ma, Shi-Huang Chen, Chun-Sheng Yang:

Vision-based Vehicle Forward Collision Warning System Using Optical Flow Algorithm. 1029-1042 - Janusz Pawel Kowalski, Jakub Peksinski, Grzegorz Mikolajczak:

Use of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests. 1043-1052 - Ruituo Wang, Yao Zhao, Chunyu Lin, Huihui Bai, Meiqin Liu:

Image Set Compression Based on Undirected Weighted Graph. 1053-1061
Volume 6, Number 6, November 2015
- Zhe-Ming Lu, Ya-Pei Feng:

Critical Nodes and Links Evaluation with Multi-Criteria Based on Entropy-Weighted Method. 1062-1076 - Hongfeng Zhu, Huiyan Liu, Yi-Feng Zhang, Yan Zhang:

Three-party Authentication Key Agreement Protocol Based on Chaotic Maps in the Standard Model with Privacy Preserving. 1077-1087 - Mao-Hsiung Hung, Jeng-Shyang Pan:

A Real-time Action Detection System for Surveillance Videos Using Template Matching. 1088-1099 - Jorge Treviño, Yôiti Suzuki, Takuma Okamoto, Yukio Iwaya, Junfeng Li:

A Spatial Extrapolation Method to Derive High-Order Ambisonics Data from Stereo Sources. 1100-1116 - Ziyi You, Shiguo Chen, Yi Wang:

An effcient traffic data aggregation scheme for WSN based intelligent transportation systems. 1117-1129 - Ju-Chin Chen, Tzung-Hua Wu:

Framework for Automatic Face Makeup Rendering for Fixing Flaws in Images. 1130-1144 - Rung-Shiang Cheng, Chia Peng Lin, Kawuu W. Lin, Weijun Hong:

NFC Based Equipment Management Inventory System. 1145-1155 - Dora M. Ballesteros L., Diego Renza, Ramiron Rincon:

Gray-scale Images within Color Images using Similarity Histogram-Based Selection and Replacement Algorithm. 1156-1166 - Wen-Chung Kuo, Po-Yu Lai, Chun-Cheng Wang, Lih-Chyau Wuu:

A Formula Diamond Encoding Data Hiding Scheme. 1167-1176 - Jie Cui, Hong Zhong, Runhua Shi, Liangmin Wang:

A New AES S-Box Equation System Based on BES. 1177-1184 - Bo Hu, Yu Zhou, Leida Li, Jianying Zhang, Jeng-Shyang Pan:

Polar Linear Canonical Transform in Quaternion Domain. 1185-1193 - Pei-Wei Tsai, Jing Zhang, Shunmiao Zhang, Vaci Istanda, Lyu-Chao Liao, Jeng-Shyang Pan:

Improving Swarm Intelligence Accuracy with Cosine Functions for Evolved Bat Algorithm. 1194-1202 - Wen Tian, Jiangtao Zhai, Mingqian Wang:

SkyLen: a Simple covert timing channel based on Huffman encoding. 1203-1214 - Hsin-Wen Wei, Tin-Yu Wu, Wei-Tsong Lee, Che-Wei Hsu:

Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing. 1215-1230 - Qiu-Yu Zhang, Shuang Yu, Peng-Fei Xing, Yi-Bo Huang, Zhan-Wei Ren:

An Improved Phase Coding-Based Watermarking Algorithm for Speech Perceptual Hashing Authentication. 1231-1241 - Yuan Ni, Zongquan Deng, Junbao Li, Xiang Wu, Long Li:

An improving analytical model with high accuracy for a micro manipulator. 1242-1249 - Guanghua Gu, Jiaojiao Zhu, Zexia Liu, Yao Zhao:

Visual Saliency Detection Based Object Recognition. 1250-1263 - Shengbei Wang, Ryota Miyauchi, Masashi Unoki, Nam Soo Kim:

Tampering Detection Scheme for Speech Signals using Formant Enhancement based Watermarking. 1264-1283 - Wen-Hua Ren, Zhe-Ming Lu:

Error Reduction for Temperature Detection Unit of Sigma-Delta High Resolution Temperature Sensor. 1284-1294 - Hongfeng Zhu, Yan Zhang:

Enhanced Graphical Captcha Framework and Applications to Strong Security Authenticated Scheme without Password Table. 1295-1309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














