default search action
IAS 2009: Xi'An, China
- Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3744-3
Volume I
Digital Rights Management
- Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He:
A Dynamic Graph Watermark Scheme of Tamper Resistance. 3-6 - Zhen Yang, Kefeng Fan, Yingxu Lai:
Trusted Computing Based Mobile DRM Authentication Scheme. 7-10 - Xiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu:
An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. 11-14 - Xiaoyuan Yang, Xiang Wu, Minqing Zhang:
Audio Digital Signature Algorithm with Tamper Detection. 15-18 - Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang:
Key Binding Based on Biometric Shielding Functions. 19-22 - Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang:
A Deep Copy Protection Framework for Electronic Devices within Home. 23-26 - Yanping Li, Liaojun Pang, Yuming Wang:
Attacks on a Universal Designated Verifier Signature Scheme. 27-30 - Yuxin Ma, Jiancang Xie, Jungang Luo:
Image Enhancement Based on Nonsubsampled Contourlet Transform. 31-34
Multimedia in Ubiquitous Computing and Security Services
- Mn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang:
Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet Domain. 37-40 - Iuon-Chang Lin, Shu-Yan Huang:
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. 41-44 - Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan:
An Adaptable Threshold Decision Method. 45-48 - Ching-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu:
Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks. 49-52 - Shin-Jia Hwang, Ming-Jhang Chai:
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. 53-56 - Hsien-Huang P. Wu, Shih-Hsin Chang, Ping-Kuo Weng, Soon-Lin Chen:
Economical Dental Stereoradiography in Digital Era. 57-60 - Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin:
A Resistant Secret Sharing Scheme. 61-64
Image Processing and Intelligent Control
- Liu Yang, Baolong Guo, Jianmin Lv:
A Modified Feature Based Image Watermarking Scheme in NSCT Domain. 67-70 - Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang:
Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity. 71-74 - Jun Ma, Guanzhong Dai, Jing Zhou:
Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern. 75-78 - Jie Jiang, Wei Mo, Jianmin Lv:
An Enhanced Block Mode Selection Method for Surveillance Video Communication. 79-82 - Mei Wang, Huifeng Zhang, Yong Yan:
The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation. 83-86 - Xian-Min Ma, Che Liang:
Application of Rough Set Theory in Coal Gangue Image Process. 87-90 - Yu Han, Aidong Men, Kan Chang, Ziyi Quan:
GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks. 91-95 - Cheng Deng, Jie Li, Meng Jia, Xinbo Gao:
Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain. 96-99
Video Coding Schemes
- Fuqiang Zhang, Junli Li, Gang Chen, Jiaju Man:
Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix. 103-106 - Min Li, Bo Wang:
Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams. 107-110 - Min Li, Bo Wang:
Whole Frame Loss Recovery Algorithm for H.264 Decoders. 111-114 - Bo Wang, Dichen Liu:
A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC. 115-118 - Yin Wang, Xiangming Wen, Xinqi Lin, Peizhou He, Wei Zheng:
A Novel Video Shot Segmentation Based on Textural Features. 119-122 - Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu:
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264. 123-126 - Anhong Wang, Yao Zhao, Zhihong Li:
A Two-Description Distributed Video Coding. 127-130
Fuzzy Applications
- Ximing Li, Bo Yang, Yubin Guo:
Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. 133-136 - Quan Feng, Fei Su, Anni Cai:
Encrypted Fuzzy Vault Based on Fingerprint. 137-140 - Qiuqin Lu, Guangqiu Huang:
An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net. 141-144 - Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong:
Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project. 145-148 - Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xing-qiang Zhao:
An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems. 149-153 - Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof:
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. 154-157 - Qingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan:
Application of Particle Swarm Optimization in Fussy Neural Networks. 158-161
System-on-Chip for Signal Processing
- Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee, Yuan-Hua Chu, Jen-Chieh Yeh, Ying-Chuan Hsiao:
Full System Simulation and Verification Framework. 165-168 - Yin-Tsung Hwang, Hua-Hsin Luo:
Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs. 169-172 - Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu:
Moving Object Tracking Using Symmetric Mask-Based Scheme. 173-176 - Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh:
Hardware/Software Codesign of Resource Constrained Real-Time Systems. 177-180 - Tsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, Giua-Hua Chen:
Design and Integration for Background Subtraction and Foreground Tracking Algorithm. 181-184 - Shyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, Shau-Yin Tseng:
Parallel 3-Pixel Labeling Method and its Hardware Architecture Design. 185-188 - Kan Chang, Bo Yang, Wenhao Zhang:
Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC. 189-193
Digital Rights Management
- Jing-Ming Guo, Yun-Fu Liu:
Majority-Parity-Guided Watermarking for Block-Truncated Images. 197-200 - Jing-Ming Guo, Jia-Jin Tsai:
Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table. 201-204 - Yongsoo Choi, Hyoung Joong Kim:
Improving the Modified Matrix Encoding on Steganography Method. 205-208 - Masaaki Fujiyoshi, Seungwu Han, Hitoshi Kiya:
Reversible Information Hiding Considering Hierarchical Access Control. 209-212 - Hui Li, Zhijin Guan, Shanli Chen, Yuxin Chen:
The Reversible Network Cascade Based on Reversible Logic Gate Coding Method. 213-216 - Shengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang:
Image Compression Algorithm Based on Decreasing Bits Coding. 217-220 - Xiang He, Jianjun Liu:
A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. 221-224 - Yan Li, Shengqian Wang, Chengzhi Deng:
Redundant Ridgelet Transform and its Application to Image Processing. 225-228 - Xiao Gang, Jiancang Xie:
Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM). 231-235 - Pang Baomao, Shi Haoshan:
Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain. 236-238 - Xin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen:
A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks. 239-242 - Ming-Xiang Zang, Na Zhang, Jian-Guo Jiang:
An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet. 243-246 - Dong-Mei Wu, Jiang-Nan Wang:
An Improved Iris Recognition Method Based on Gray Surface Matching. 247-249 - Fan-jie Meng, Bao-Long Guo, Lei Guo:
Image Retrieval Based on 2D Histogram of Interest Points. 250-253 - Mei Wang, Li Wang:
An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval. 254-257 - Hongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei:
An Active Defense Model and Framework of Insider Threats Detection and Sense. 258-261
Image Processing and Intelligent Control
- Ye Hou, Bao-Long Guo, Jeng-Shyang Pan:
The Application and Study of Graph Cut in Motion Segmentation. 265-268 - Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu:
A Dynamic Layering Scheme of Multicast Key Management. 269-272 - Zhanli Li, Yuan Wang:
Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement. 273-276 - Yang Qiu, Jin Tian, Liuyu Qian:
Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation. 277-280 - Long Chen, Bao-Long Guo, Wei Sun:
A New Multiple-Objects Tracking Method with Particle Filter. 281-284 - Du Jingyi, Wang Mei, Cai Wenhao:
Support Vector Machine Based on Possibility Degrees and Fault Diagnosis. 285-288 - Yu Han, Bo Yang, Kan Chang, Ziyi Quan:
Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application. 289-293 - Hongxia Ma, Yao Zhao, Chunyu Lin, Anhong Wang:
Distributed Video Coding Based on Multiple Description. 294-297
Cryptography and Watermarking
- Guosheng Cheng, Jianwei Yang:
A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization. 301-304 - Chuanxian Jiang, Xiaowei Chen, Zhi Li:
Watermarking Relational Databases for Ownership Protection Based on DWT. 305-308 - Changle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu:
A Fragile Software Watermarking for Tamper-Proof. 309-312 - Chengzhi Deng, Huasheng Zhu, Shengqian Wang:
Curvelet Domain Watermark Detection Using Alpha-Stable Models. 313-316 - Enke Li, Shangqian Liu, Shimin Yin, Xiaoning Fu:
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling. 317-321 - Zhiyuan Wang, Jianhua Huang, Ziming Guan:
The SOBER Family Ciphers Reconfigurable Processing Architecture Design. 322-326 - Bai Zhongying, Qin Jiancheng:
Webpage Encryption Based on Polymorphic Javascript Algorithm. 327-330 - Dingguo Yu, Nan Chen:
The Improving of IKE with PSK for Using in Mobile Computing Environments. 331-334
Cryptography and its Applications
- Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun:
Common Friends Discovery with Privacy and Authenticity. 337-340 - Wu-Chuan Yang, Jhih-Syue Jhou:
Known Signature Attack of ID-Based Multisignature Schemes. 341-343 - Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin:
A Generalization of de Weger's Method. 344-347 - Wu-Chuan Yang:
New Strategy of Efficient SPA-resistant Exponentiations. 348-351 - Huajun Huang, Shaohong Zhong, Junshan Tan:
Browser-Side Countermeasures for Deceptive Phishing Attack. 352-355 - Lu He, Jianbin Lin, Tianzhi Li, Dingyi Fang:
An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text. 356-359 - Wu Peng, Zhigang Wang, Junhua Chen:
Research on Attack Intention Recognition Based on Graphical Model. 360-363 - Jing-pei Wang, Shuifa Sun, Ming Jiang, Dan-gui Xie, Bang Jun Lei:
Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD. 364-367
Image Retrieval and Image Analysis
- Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung:
Intra-mode Dependent Coding Method for Image Compression. 371-374 - Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao:
Dynamically Constrained One-Bit Transform for Motion Vector Estimation. 375-378 - Ding-Hrong Chen, Shiang-En Tang:
A Name Recommendation Photo Album Using Probability Neural Network. 379-382 - Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan:
Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models. 383-386 - Jun-qiao Qi, Chang-long Wang, Yan-ming Qi:
The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural Network. 387-390 - Qunting Yang, Tiegang Gao, Li Fan, Qiaolun Gu:
Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network. 391-395 - Yuanbin Hou, Chunfeng Song, Ning Li:
The Sync Tracing Based on Improved Genetic Algorithm Neural Network. 396-399 - Dianbo Jiang, Yahui Yang, Min Xia:
Research on Intrusion Detection Based on an Improved SOM Neural Network. 400-403
Clustering and Target Detection
- Liu Hua:
Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora. 407-410 - Xuedou Yu:
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. 411-414 - Lijian Lu, Xiaojun Ye:
An Improved Weighted-Feature Clustering Algorithm for K-anonymity. 415-418 - Xiaolong Deng, Pingfang Zhou:
A New Interacting Multiple Model Algorithm Based on the Unscented Particle Filter. 419-422 - Xiaokang Zhang, Jianmei Shuai:
A New Feature Selection Method for Malcodes Detection. 423-426 - Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang:
A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection. 427-430 - Gaoyu Zhang:
Infrared Small Weak Target Detection via HOSA. 431-434 - Jun Li, Youdong Ding, Yunyu Shi, Qingyue Zeng:
DWT-Based Shot Boundary Detection Using Support Vector Machine. 435-438
Swarm Intelligence and Data Mining
- Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai:
A Model of Intrusion Prevention Base on Immune. 441-444 - Ming Li, Kunpeng Wang:
New Greedy Algorithm for Computing Double-Base Chains. 445-450 - Tongrang Fan, Yan Sun, Yongbin Zhao:
An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile Agents. 451-454 - Youchan Zhu, Xueying Guo, Jing Li:
An Improved Genetic Algorithm for Power Grid. 455-458 - Jing Zhou, Guanzhong Dai, De-Quan He, Jun Ma, Xiao-Yan Cai:
Swarm Intelligence: Ant-Based Robot Path Planning. 459-463 - Hsiang-Cheh Huang, Yueh-Hong Chen, Guan-Yu Lin:
DCT-Based Robust Watermarking with Swarm Intelligence Concepts. 464-467 - Jianming Zhu:
A New Scheme to Privacy-Preserving Collaborative Data Mining. 468-471 - Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng:
Information Security Monitoring System Based on Data Mining. 472-475
Internet Techniques
- Wei-Min Shi:
ID-Based Non-interactive Deniable Authentication Protocol. 479-482 - Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang:
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. 483-486 - Mengbo Hou, Qiuliang Xu:
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. 487-490 - Yanping Li, Liaojun Pang:
Multi-party Non-repudiation Protocol with Different Message Exchanged. 491-494 - Yang Jian:
An Improved Scheme of Single Sign-on Protocol. 495-498 - Qingfeng Cheng, Guangguo Han, Chuangui Ma:
A New Efficient and Strongly Secure Authenticated Key Exchange Protocol. 499-502 - Yahui Yang, Yunfei Chen, Min Xia, Juan Ma:
An Automated Mechanism of Security Test on Network Protocols. 503-506 - Jian Liu, Fangmin Li:
An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. 507-510
Information Security
- Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo:
Zero-Collision RFID Tags Identification Based on CDMA. 513-516 - Chun-Ta Li:
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. 517-520 - Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen:
Security Enhancement of the Authentication Protocol for RFID Systems.