


default search action
IIH-MSP 2006: Pasadena, California, USA
- Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2745-0

New Data Hiding and Secreting Techniques for Sound Signals
- Hosei Matsuoka:

Spread Spectrum Audio Steganography Using Sub-band Phase Shifting. 3-6 - Akira Nishimura:

Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise. 7-10 - Ryuta Fujimoto, Mamoru Iwaki, Tohru Kiryu:

A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation. 11-14 - Katsunari Yoshioka

, Kotaro Sonoda
, Osamu Takizawa, Tsutomu Matsumoto:
Information Hiding on Lossless Data Compression. 15-18 - Akinori Ito

, Shozo Makino:
Multiple Description Coding of an Audio Stream by Optimum Recovery Transform. 19-22 - Yôiti Suzuki, Ryouichi Nishimura, Hao Tao:

Audio Watermark Enhanced by LDPC Coding for Air Transmission. 23-26 - Ming Li, Yun Lei, Jian Liu, Yonghong Yan:

A Novel Audio Watermarking in Wavelet Domain. 27-32 - Saeed Sedghi, Morteza Khademi, Nedeljko Cvejic:

Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments. 33-36 - Gui-jun Nian, Zhiyuan Xie, Shuxun Wang:

Audio Watermarking Based on Reverberation. 37-40 - Zhao Xu, Ke Wang, Xiao-hua Qiao:

Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. 41-46
Digital Watermarking (I)
- Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin:

A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. 47-50 - Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi:

An Information Hiding Scheme for OFDM Wireless Networks. 51-54 - Kai Wang, Wenjiang Pei, Zhenya He, Yiu-ming Cheung:

A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme. 55-58 - Zhao Xu, Ke Wang, Xiao-hua Qiao:

A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. 59-62 - Xiao-hua Qiao, Shuxun Wang, Quan Wen, Zhao Xu:

A Robust Watermarking Algorithm Adopting Double Embedding. 63-66 - Ying-Tzu Shih, Feng-Cheng Chang

, Hsueh-Ming Hang:
A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems. 67-70 - Cong Jin, Feng Tao, Yu Fu:

Image Watermarking Based HVS Characteristic of Wavelet Transform. 71-74 - Deyun Peng, Jiazhen Wang, Sumin Yang, Suzhen Wang, Aizhen Liu:

CDMA Based Multiple-User Digital Watermarking. 75-78 - Zheng Fang, Yao Zhao:

Image Watermarking Resisting to Geometrical Attacks Based on Histogram. 79-82 - Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li:

A New Watermarking Protocol of Copyright Protection. 83-88
Techniques and Algorithms for Multimedia Security
- Takanobu Masubuchi, Mitsuyuki Takatsuka, Ryôichi Sasaki:

A Digital Document Flexible Sanitizing Scheme. 89-92 - Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura:

Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. 93-96 - Akiomi Kunisa, Kousuke Tsujita:

Improved Guided Position Scrambling for Digital Watermarking. 97-100 - Maki Yoshida, Takaaki Fujita, Toru Fujiwara:

A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. 101-104 - Zhiyu Zhang, Wei Huang, Jiulong Zhang, Hai-yan Yu, Yanjun Lu:

Digital Image Watermark Algorithm in the Curvelet Domain. 105-108 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Bin-Yih Liao:

Joint Halftoning and Visible Watermarking. 109-112 - Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao:

A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. 113-116 - Li Weng, Karel Wouters, Bart Preneel:

Extending the Selective MPEG Encryption Algorithm PVEA. 117-120 - Niansheng Liu, Donghui Guo, Gerard Parr

:
A New Image Steganography for Internet Communications Based on Chaotic Sequences. 121-124 - Feng Huang, Yong Feng

:
An Image Encryption Approach Based on a New Two-Dimensional Map. 125-130
Image Processing
- Longjiang Yu, Sheng-He Sun:

Image Robust Hashing Based on DCT Sign. 131-134 - Shengbing Che, Da Huang, Guang Li:

A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System. 135-138 - Junding Sun, Xiaosheng Wu:

Chain Code Distribution-Based Image Retrieval. 139-142 - Kewen Xia, Guan Xu

, Naixun Xu:
Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique. 143-146 - Lin Ma, Zhongzhao Zhang, Xuezhi Tan:

A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System. 147-150 - Jianping Qiao, Ju Liu:

A Novel Log-WT Based Super-Resolution Algorithm. 151-154 - Jinye Peng, Wanhai Yang, Yichun Wang:

Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement. 155-158 - Qiang He, Chee-Hung Henry Chu:

Recovering Intrinsic Images from Weighted Edge Maps. 159-162 - Nan Zhang, Xianchuan Yu, Guosheng Ding:

An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data. 163-166 - Bian Yang, Fan Gu, Xiamu Niu:

Block Mean Value Based Image Perceptual Hashing. 167-172
IP Multimedia Services
- Pei-Chen Tseng, Ching-Tuey Sung, Wen-Shyang Hwang:

Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway. 173-176 - Yung-Li Chang, Hsiang-Kai Liao, Ce-Kuen Shieh, Yu-Ben Miao:

KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis. 177-180 - Ku-Lan Kao, Chih-Heng Ke, Ce-Kuen Shieh:

Video Transmission Performance Evaluation of Ad Hoc Routing Protocols. 181-184 - Mong-Fong Horng, Hung-Wei Hsu, Wan-Ling Du, Yi-Hsiang Hung, Ming-Harng Lee:

A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks. 185-188 - Hong-Peng Wang, Tie-Jun Zhang, Xiao-Zong Yang:

Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks. 189-192 - Takuo Nakashima:

Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment. 193-196 - Xue-Guang Wang:

Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism. 197-200 - Yongjin Cho, Do-Kyoung Kwon, C.-C. Jay Kuo

, Renxiang Huang, Claudio Lima, Jim D. Black, James J. Pan:
Video Streaming over 3G Networks with GOP-Based Priority Scheduling. 201-204 - Nongluk Eiamjumrus, Supavadee Aramvith

:
Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint. 205-210
Evolutionary and Soft Computing
- Lei Zhang, Qiuguang Wang, Jiping Qi:

Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition. 211-214 - Rongrong Ji, Hongxun Yao, Shaohui Liu

, Liang Wang:
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. 215-218 - JinFei Wu, DongXing Qin, HongPing Yu:

Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm. 219-222 - Mehdi Rezaei

, Moncef Gabbouj
, Imed Bouazizi:
Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H. 223-227 - Te-Jen Su, Jyun-Wei Jhang:

Medical Image Noise Reduction Using Cellular Neural Networks. 228-231 - Dingxue Zhang, Xinzhi Liu, Zhi-Hong Guan:

A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification. 232-235 - Binglong Li, QingXian Wang, Junyong Luo:

Forensic Analysis of Document Fragment Based on SVM. 236-239 - Wei Fang

, Jun Sun
, Wenbo Xu:
Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization. 240-243 - Qiong Li, Zhaoqing Liu, Xiamu Niu:

Analysis and Problems on Fuzzy Vault Scheme. 244-250
Multimedia Networking and Communications in Dynamic Heterogeneous Environments
- Junghun Park, Hsiao-Rong Tyan, C.-C. Jay Kuo

:
GA-Based Internet Traffic Classification Technique for QoS Provisioning. 251-254 - Hsien-Po Shiang, Mihaela van der Schaar:

Multi-user Video Streaming over Multi-hop Wireless Networks: A Cross-Layer Priority Queuing Scheme. 255-258 - Yuh-Chou Tsai, Chia-Ming Tsai, Chia-Wen Lin

:
H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh. 259-262 - Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto

, Enrico Magli:
Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications. 263-266 - Deepa Kundur, Unoma Ndili Okorafor, William Luh:

HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. 267-270 - Wenhui Zhao, Daxin Liu, Yu Jiang:

Positioning Algorithm of Wireless Sensor Network Nodes. 271-273 - Hao Wang, Yanying Wang, Jikun Guo, Dianwu Gao:

Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation. 274-277 - Fenhua Cheng, Jin Zhang, Zheng Ma:

Curve-Based Secure Routing Algorithm for Sensor Network. 278-281 - Guomin Zhang, Yong Zhang, Ming Chen, Huan Xiong:

Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. 282-288
Pattern Recognition
- Jingyi Qu, Haoshan Shi:

Symmetrical Color-Spatial Feature for Medical Image Retrieval. 289-292 - Qian Zhang, Zhi-Jing Liu:

Face Detection Based on Complexional Segmentation and Feature Extraction. 293-296 - Yu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun:

Gabor Filter Based Text Extraction from Digital Document Images. 297-300 - Jun-Bao Li, Shu-Chuan Chu

, Jung-Chou Harry Chang, Jeng-Shyang Pan:
Discriminant Feature Fusion Strategy for Supervised Learning. 301-304 - Jun-Bao Li, Shu-Chuan Chu

, Jeng-Shyang Pan, Jiun-Huei Ho:
A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images. 305-308 - Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He:

A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree. 309-312 - Chi Cui:

An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices. 313-316 - Bo Qian, Yanping Li, Limin Xu, Zhenmin Tang:

A Method of Biomimetic Pattern Recognition for Speaker Recognition. 317-320 - Xiaopeng Hong, Hongxun Yao, Yuqi Wan, Rong Chen:

A PCA Based Visual DCT Feature Extraction Method for Lip-Reading. 321-326
Recognizing Humans and Human Behavior in Video
- Duan-Yu Chen, Sheng-Wen Shih, Hong-Yuan Mark Liao:

Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework. 327-330 - Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao:

Understanding Human Behavior Using a Language Modeling Approach. 331-334 - Yu-Chun Lai, Hong-Yuan Mark Liao:

Human Motion Recognition Using Clay Representation of Trajectories. 335-338 - Yung-Tai Hsu, Jun-Wei Hsieh:

Boosted String Representation and Its Application to Video Surveillance. 339-342 - Yong Xu, Yingnan Zhao:

Comparison Study on SVD-Based Face Classification. 343-346 - Junding Sun:

Image Retrieval Based on Improved Entropy and Moments. 347-350 - Yuhua Jiao, Bian Yang, He Wang, Xiamu Niu:

SVD Based Robust Image Content Retrieval. 351-354 - Lan Li, Ji-hua Chen:

Emotion Recognition Using Physiological Signals from Multiple Subjects. 355-358 - Ping-He Huang, Jing-Yong Su, Zhe-Ming Lu, Jeng-Shyang Pan:

A Fire-Alarming Method Based on Video Processing. 359-364
Steganography
- Rongrong Ji, Hongxun Yao, Shaohui Liu

, Liang Wang, Jianchao Sun:
A New Steganalysis Method for Adaptive Spread Spectrum Steganography. 365-368 - Xin-guang Sui, Hui Luo, Zhong-liang Zhu:

A Steganalysis Method Based on the Distribution of First Letters of Words. 369-372 - Antonio Savoldi, Paolo Gubian:

A Methodology to Improve the Detection Accuracy in Digital Steganalysis. 373-376 - Cui-Qing Liu, Xijian Ping, Tao Zhang, Linna Zhou, Yun-He Wang:

A Research on Steganography Method Based on Error-Correcting Codes. 377-380 - Jinhong Luo, Haiyi Shi:

Research of Chaos Encryption Algorithm Based on Logistic Mapping. 381-383 - Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:

Analysis of Current Steganography Tools: Classifications & Features. 384-387 - Mohammad Shirali-Shahreza:

Java Applets Copy Protection by Steganography. 388-391 - Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh:

Novel Steganographic Schemes Based on Row-Major Mapping Relation. 392-395 - Ping Wang, Xiangyang Luo, Fenlin Liu:

An Improved Secret Key Estimation Method for Sequential Steganography. 396-402
Video Surveillance
- Chia-Te Chou, Sheng-Wen Shih, Duan-Yu Chen:

Design of Gabor Filter Banks for Iris Recognition. 403-406 - Chun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang:

Abnormal Event Detection in Video Using N-cut Clustering. 407-410 - Chih-Chung Hsu

, Hsuan-Ting Chang, Ting Cheng Chang:
Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video. 411-414 - Kai-Li Chiang, Wen-Hsiang Tsai:

Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information. 415-418 - Cheng-Chang Lien, Yang-Kai Chang, Chih-Chiang Tien:

A Fast Facial Expression Recognition Method at Low-Resolution Images. 419-422 - Yining Qi, Mingyuan Dai:

The Effect of Frame Freezing and Frame Skipping on Video Quality. 423-426 - Thou-Ho Chen, Yen-Hui Yin, Shi-Feng Huang, Yan-Ting Ye:

The Smoke Detection for Early Fire-Alarming System Base on Video Processing. 427-430 - Tsong-Yi Chen, Thou-Ho Chen, Shi-Feng Huang, Yi-Fan Li:

An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation. 431-434 - Shahryar Karimi-Ashtiani, C.-C. Jay Kuo

:
Automatic Real-Time Moving Target Detection from Infrared Video. 435-440
Digital Watermarking (II)
- Ping-Sung Liao, Cheng-Yi Chen, Chun-Chi Chen, Jeng-Shyang Pan:

Interlacing Domain Partition for Fractal Watermarking. 441-444 - Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura:

Improved Video Verification Method Using Digital Watermarking. 445-448 - M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai:

Blind Watermarking in Contourlet Domain with Improved Detection. 449-452 - Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. 453-456 - Jie Liu, Xiamu Niu, Wenhai Kong:

Image Watermarking Based on Singular Value Decomposition. 457-460 - Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang:

A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. 461-464 - Dan Wang, Peizhong Lu:

Geometrically Invariant Watermark Using Fast Correlation Attacks. 465-468 - Michael Gulbis, Erika Müller, Martin Steinebach:

Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks. 469-472 - Pei-wei Tsai

, Shu-Chuan Chu
, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao:
The Attacking Method for DC Components Watermarking. 473-478
Advanced Algorithms and Systems for Multimedia Processing and Networking
- Wai-Chi Fang, Jaw-Chyng L. Lue:

VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition. 479-482 - Chua-Chin Wang, Gang-Neng Sung, Jia-Hao Li:

Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263. 483-486 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Hsiang-Cheh Huang

:
Reversible Data Hiding for 3D Point Cloud Model. 487-490 - Huihui Bai, Yao Zhao:

Multiple Description Image Coding Using Shifted Lattice Vector Quantization. 491-494 - Joseph Kolibal, Daniel Howard:

Implications of a Novel Family of Stochastic Methods for Function Recovery. 495-498 - Chun-Ting Hung, Jin-Jang Leou:

A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission. 499-502 - Hongjun Wang, Yong-Jian Huang, Hua Li:

H.264/AVC Video Encoder Implementation Based on TI TMS320DM642. 503-506 - Do-Kyoung Kwon, Mei-Yin Shen, C.-C. Jay Kuo

:
R-D Optimized Frame-Layer Bit Allocation for H.264. 507-510 - Yu Hu, Qing Li

, Siwei Ma, C.-C. Jay Kuo
:
Fast H.264/AVC Inter-Mode Decision with RDC Optimization. 511-516
Signal Processing and Data Compression
- Baishan Zhao, Yi-Sheng Zhu:

Chaotic Signal Design with Selected Parameters. 517-520 - Melvin A. Breuer, Haiyang (Henry) Zhu:

Error-Tolerance and Multi-Media. 521-524 - Namgook Cho, Yu Shiu, C.-C. Jay Kuo

:
An Improved Technique for Blind Audio Source Separation. 525-528 - Thou-Ho Chen, Shi-Feng Huang, Chao-Yu Chen, Zhi-Hong Lin:

Adaptive Working Window for Impulse Noise Reduction. 529-532 - Wan-Chi Lee, C.-C. Jay Kuo

:
Improved Linear Prediction Technique for Musical Onset Detection. 533-536 - Hui Ding, Bo Qian, Yanping Li, Zhenmin Tang:

A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection. 537-540 - Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li:

Improved SMVQ Scheme with Edge-Directed Prediction. 541-544 - Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:

A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. 545-548 - Chin-Chen Chang, Yung-Chen Chou:

Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. 549-554
System Implementation
- Song Qiu, Wai-yun Li, Jin-gao Liu, Wen-jing Hu:

Design of AC-PDP Signal Processor for SoC Application. 555-558 - Lingjun Xu, Qiang Wang, Jiansong Gao, Yong Wang, Ping Zhang:

A Novel Low-IF Topology for High Performance Integrated Receivers. 559-562 - Ru Yang, Gang Feng, Donghai Li:

Power Optimization for Bus on Multimedia SoC. 563-566 - Min-Hong Chen, Feng-Cheng Chang

, Hsueh-Ming Hang:
Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform. 567-570 - Yuan-Long Jeang, Tzuu-Shaang Wey, Hung-Yu Wang, Chih-Chung Tai:

A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors. 571-574 - Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen:

Research on Applying Java Card to Database Encryption Systems. 575-578 - Wai-Chi Fang, Sharon Kedar, Susan Owen

, Gu-Yeon Wei, David M. Brooks, Jonathan Lees
:
System-on-Chip Architecture Design for Intelligent Sensor Networks. 579-582 - Wai-Chi Fang, Tsung-Hsien Lin

:
Low-Power Radio Design for Wireless Smart Sensor Networks. 583-586 - Zheng Shen, Hu He, Yanjun Zhang, Yihe Sun:

VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design. 587-592
Data Hiding and Security
- Zhen Sun, Zhe-Ming Lu, Zhen Li:

Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain. 593-596 - Imtiaz Awan, Syed Asif Mahmood Gilani, S. A. Shah

:
Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication. 597-600 - Liehuang Zhu, Wenzhuo Li, Lejian Liao, Hong Li:

A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. 601-604 - Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu:

Focus on the Generalized Information Hiding Technology. 605-608 - Linna Zhou, Cui-Qing Liu, Xijian Ping, Tao Zhang, Yun-He Wang:

Information Hiding Method in Digital Audio Signal Based on Perfect Codes. 609-612 - Yaqin Zhao

, Nan Zhao, Guanghui Ren, Bo Zhang:
A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences. 613-616 - Chia-Chen Lin

, Chin-Chen Chang:
An Image Hiding Scheme Based on Du's Disk Allocation Method. 617-620 - Xin-guang Zou, Sheng-He Sun:

Analysis of Anonymity on the Signatures of Knowledge. 621-624 - Xiaoyong Li, Chang-xiang Shen, Xiao-Dong Zuo:

An Efficient Attestation for Trustworthiness of Computing Platform. 625-630
Signal Processing and Coding
- Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong:

Effects on Statistical Features for Image by Quantization. 631-634 - Beibei Li, Xin Li, Shuxun Wang, Haifeng Li:

A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform. 635-638 - Byung-Ho Cha, C.-C. Jay Kuo

:
Design of Collusion-Free Codes Based on MAI-Free Principle. 639-642 - Zhenyu Wu, Hongyang Yu, Bin Tang, Hong Hu:

Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2. 643-646 - Behnaz Ghoraani, Sridhar Krishnan

:
Chirp-Based Image Watermarking as Error-Control Coding. 647-650 - Chun-Hsien Chou, Kuo-Cheng Liu:

Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces. 651-654 - Qi Zhang, Yunyang Dai, Siwei Ma

, C.-C. Jay Kuo
:
Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding. 655-658 - Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee:

Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors. 659-662 - Jianjun Lei, Jian Wang, Jun Guo, Gang Liu, Haifeng Shen:

Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition. 663-668
Cross-Discipline Technology
- Qiusheng He, Wending Liu, Fuzeng Wang, Jianjun Hao, Hui Li, Yaqi Cheng:

Fast Algorithm of Trigonometric Function of Specific Angle. 669-672 - Omar U. Flórez-Choque:

Voice2SQL: A Hybrid Intelligent System for the Recovery of Information from Databases by Means of Spoken Natural Language. 673-676 - Cong Jin, Yu Fu, Feng Tao:

The Watermarking Model for Relational Database Based on Watermarking Sharing. 677-680 - Chin-Chen Chang, Jun-Chou Chuang:

Progressive Image Transmission Using Significant Features and Linear Regression Prediction. 681-684 - Xiaojun Tong, Minggen Cui, Wei Jiang:

The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System. 685-688 - Fang Pu, Daoqing Sun, Qiying Cao

, Haibin Cai, Fan Yang:
Pervasive Computing Context Access Control Based on UCON_ABC Model. 689-692 - Qi Han, Zhifang Wang, Xiamu Niu:

A Non-uniform Quantizing Approach to Protect Biometric Templates. 693-698 - Jianlong Yang, Jianmin Wang

, Deyi Li:
Detecting the Theft of Natural Language Text Using Birthmark. 699-702 - Yong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, Rui Chen:

A Context-Aware AmI System Based on MAS Model. 703-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














