default search action
IIH-MSP 2006: Pasadena, California, USA
- Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2745-0
New Data Hiding and Secreting Techniques for Sound Signals
- Hosei Matsuoka:
Spread Spectrum Audio Steganography Using Sub-band Phase Shifting. 3-6 - Akira Nishimura:
Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise. 7-10 - Ryuta Fujimoto, Mamoru Iwaki, Tohru Kiryu:
A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation. 11-14 - Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto:
Information Hiding on Lossless Data Compression. 15-18 - Akinori Ito, Shozo Makino:
Multiple Description Coding of an Audio Stream by Optimum Recovery Transform. 19-22 - Yôiti Suzuki, Ryouichi Nishimura, Hao Tao:
Audio Watermark Enhanced by LDPC Coding for Air Transmission. 23-26 - Ming Li, Yun Lei, Jian Liu, Yonghong Yan:
A Novel Audio Watermarking in Wavelet Domain. 27-32 - Saeed Sedghi, Morteza Khademi, Nedeljko Cvejic:
Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments. 33-36 - Gui-jun Nian, Zhiyuan Xie, Shuxun Wang:
Audio Watermarking Based on Reverberation. 37-40 - Zhao Xu, Ke Wang, Xiao-hua Qiao:
Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. 41-46
Digital Watermarking (I)
- Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin:
A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. 47-50 - Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi:
An Information Hiding Scheme for OFDM Wireless Networks. 51-54 - Kai Wang, Wenjiang Pei, Zhenya He, Yiu-ming Cheung:
A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme. 55-58 - Zhao Xu, Ke Wang, Xiao-hua Qiao:
A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. 59-62 - Xiao-hua Qiao, Shuxun Wang, Quan Wen, Zhao Xu:
A Robust Watermarking Algorithm Adopting Double Embedding. 63-66 - Ying-Tzu Shih, Feng-Cheng Chang, Hsueh-Ming Hang:
A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems. 67-70 - Cong Jin, Feng Tao, Yu Fu:
Image Watermarking Based HVS Characteristic of Wavelet Transform. 71-74 - Deyun Peng, Jiazhen Wang, Sumin Yang, Suzhen Wang, Aizhen Liu:
CDMA Based Multiple-User Digital Watermarking. 75-78 - Zheng Fang, Yao Zhao:
Image Watermarking Resisting to Geometrical Attacks Based on Histogram. 79-82 - Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li:
A New Watermarking Protocol of Copyright Protection. 83-88
Techniques and Algorithms for Multimedia Security
- Takanobu Masubuchi, Mitsuyuki Takatsuka, Ryôichi Sasaki:
A Digital Document Flexible Sanitizing Scheme. 89-92 - Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura:
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. 93-96 - Akiomi Kunisa, Kousuke Tsujita:
Improved Guided Position Scrambling for Digital Watermarking. 97-100 - Maki Yoshida, Takaaki Fujita, Toru Fujiwara:
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. 101-104 - Zhiyu Zhang, Wei Huang, Jiulong Zhang, Hai-yan Yu, Yanjun Lu:
Digital Image Watermark Algorithm in the Curvelet Domain. 105-108 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Bin-Yih Liao:
Joint Halftoning and Visible Watermarking. 109-112 - Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao:
A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. 113-116 - Li Weng, Karel Wouters, Bart Preneel:
Extending the Selective MPEG Encryption Algorithm PVEA. 117-120 - Niansheng Liu, Donghui Guo, Gerard Parr:
A New Image Steganography for Internet Communications Based on Chaotic Sequences. 121-124 - Feng Huang, Yong Feng:
An Image Encryption Approach Based on a New Two-Dimensional Map. 125-130
Image Processing
- Longjiang Yu, Sheng-He Sun:
Image Robust Hashing Based on DCT Sign. 131-134 - Shengbing Che, Da Huang, Guang Li:
A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System. 135-138 - Junding Sun, Xiaosheng Wu:
Chain Code Distribution-Based Image Retrieval. 139-142 - Kewen Xia, Guan Xu, Naixun Xu:
Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique. 143-146 - Lin Ma, Zhongzhao Zhang, Xuezhi Tan:
A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System. 147-150 - Jianping Qiao, Ju Liu:
A Novel Log-WT Based Super-Resolution Algorithm. 151-154 - Jinye Peng, Wanhai Yang, Yichun Wang:
Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement. 155-158 - Qiang He, Chee-Hung Henry Chu:
Recovering Intrinsic Images from Weighted Edge Maps. 159-162 - Nan Zhang, Xianchuan Yu, Guosheng Ding:
An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data. 163-166 - Bian Yang, Fan Gu, Xiamu Niu:
Block Mean Value Based Image Perceptual Hashing. 167-172
IP Multimedia Services
- Pei-Chen Tseng, Ching-Tuey Sung, Wen-Shyang Hwang:
Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway. 173-176 - Yung-Li Chang, Hsiang-Kai Liao, Ce-Kuen Shieh, Yu-Ben Miao:
KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis. 177-180 - Ku-Lan Kao, Chih-Heng Ke, Ce-Kuen Shieh:
Video Transmission Performance Evaluation of Ad Hoc Routing Protocols. 181-184 - Mong-Fong Horng, Hung-Wei Hsu, Wan-Ling Du, Yi-Hsiang Hung, Ming-Harng Lee:
A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks. 185-188 - Hong-Peng Wang, Tie-Jun Zhang, Xiao-Zong Yang:
Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks. 189-192 - Takuo Nakashima:
Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment. 193-196 - Xue-Guang Wang:
Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism. 197-200 - Yongjin Cho, Do-Kyoung Kwon, C.-C. Jay Kuo, Renxiang Huang, Claudio Lima, Jim D. Black, James J. Pan:
Video Streaming over 3G Networks with GOP-Based Priority Scheduling. 201-204 - Nongluk Eiamjumrus, Supavadee Aramvith:
Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint. 205-210
Evolutionary and Soft Computing
- Lei Zhang, Qiuguang Wang, Jiping Qi:
Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition. 211-214 - Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang:
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. 215-218 - JinFei Wu, DongXing Qin, HongPing Yu:
Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm. 219-222 - Mehdi Rezaei, Moncef Gabbouj, Imed Bouazizi:
Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H. 223-227 - Te-Jen Su, Jyun-Wei Jhang:
Medical Image Noise Reduction Using Cellular Neural Networks. 228-231 - Dingxue Zhang, Xinzhi Liu, Zhi-Hong Guan:
A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification. 232-235 - Binglong Li, QingXian Wang, Junyong Luo:
Forensic Analysis of Document Fragment Based on SVM. 236-239 - Wei Fang, Jun Sun, Wenbo Xu:
Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization. 240-243 - Qiong Li, Zhaoqing Liu, Xiamu Niu:
Analysis and Problems on Fuzzy Vault Scheme. 244-250
Multimedia Networking and Communications in Dynamic Heterogeneous Environments
- Junghun Park, Hsiao-Rong Tyan, C.-C. Jay Kuo:
GA-Based Internet Traffic Classification Technique for QoS Provisioning. 251-254 - Hsien-Po Shiang, Mihaela van der Schaar:
Multi-user Video Streaming over Multi-hop Wireless Networks: A Cross-Layer Priority Queuing Scheme. 255-258 - Yuh-Chou Tsai, Chia-Ming Tsai, Chia-Wen Lin:
H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh. 259-262 - Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto, Enrico Magli:
Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications. 263-266 - Deepa Kundur, Unoma Ndili Okorafor, William Luh:
HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. 267-270 - Wenhui Zhao, Daxin Liu, Yu Jiang:
Positioning Algorithm of Wireless Sensor Network Nodes. 271-273 - Hao Wang, Yanying Wang, Jikun Guo, Dianwu Gao:
Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation. 274-277 - Fenhua Cheng, Jin Zhang, Zheng Ma:
Curve-Based Secure Routing Algorithm for Sensor Network. 278-281 - Guomin Zhang, Yong Zhang, Ming Chen, Huan Xiong:
Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. 282-288
Pattern Recognition
- Jingyi Qu, Haoshan Shi:
Symmetrical Color-Spatial Feature for Medical Image Retrieval. 289-292 - Qian Zhang, Zhi-Jing Liu:
Face Detection Based on Complexional Segmentation and Feature Extraction. 293-296 - Yu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun:
Gabor Filter Based Text Extraction from Digital Document Images. 297-300 - Jun-Bao Li, Shu-Chuan Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan:
Discriminant Feature Fusion Strategy for Supervised Learning. 301-304 - Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan, Jiun-Huei Ho:
A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images. 305-308 - Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He:
A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree. 309-312 - Chi Cui:
An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices. 313-316 - Bo Qian, Yanping Li, Limin Xu, Zhenmin Tang:
A Method of Biomimetic Pattern Recognition for Speaker Recognition. 317-320 - Xiaopeng Hong, Hongxun Yao, Yuqi Wan, Rong Chen:
A PCA Based Visual DCT Feature Extraction Method for Lip-Reading. 321-326
Recognizing Humans and Human Behavior in Video
- Duan-Yu Chen, Sheng-Wen Shih, Hong-Yuan Mark Liao:
Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework. 327-330 - Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao:
Understanding Human Behavior Using a Language Modeling Approach. 331-334 - Yu-Chun Lai, Hong-Yuan Mark Liao:
Human Motion Recognition Using Clay Representation of Trajectories. 335-338 - Yung-Tai Hsu, Jun-Wei Hsieh:
Boosted String Representation and Its Application to Video Surveillance. 339-342 - Yong Xu, Yingnan Zhao:
Comparison Study on SVD-Based Face Classification. 343-346 - Junding Sun:
Image Retrieval Based on Improved Entropy and Moments. 347-350 - Yuhua Jiao, Bian Yang, He Wang, Xiamu Niu:
SVD Based Robust Image Content Retrieval. 351-354 - Lan Li, Ji-hua Chen:
Emotion Recognition Using Physiological Signals from Multiple Subjects. 355-358 - Ping-He Huang, Jing-Yong Su, Zhe-Ming Lu, Jeng-Shyang Pan:
A Fire-Alarming Method Based on Video Processing. 359-364
Steganography
- Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang, Jianchao Sun:
A New Steganalysis Method for Adaptive Spread Spectrum Steganography. 365-368 - Xin-guang Sui, Hui Luo, Zhong-liang Zhu:
A Steganalysis Method Based on the Distribution of First Letters of Words. 369-372 - Antonio Savoldi, Paolo Gubian:
A Methodology to Improve the Detection Accuracy in Digital Steganalysis. 373-376 - Cui-Qing Liu, Xijian Ping, Tao Zhang, Linna Zhou, Yun-He Wang:
A Research on Steganography Method Based on Error-Correcting Codes. 377-380 - Jinhong Luo, Haiyi Shi:
Research of Chaos Encryption Algorithm Based on Logistic Mapping. 381-383 - Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. 384-387 - Mohammad Shirali-Shahreza:
Java Applets Copy Protection by Steganography. 388-391 - Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh:
Novel Steganographic Schemes Based on Row-Major Mapping Relation. 392-395 - Ping Wang, Xiangyang Luo, Fenlin Liu:
An Improved Secret Key Estimation Method for Sequential Steganography. 396-402
Video Surveillance
- Chia-Te Chou, Sheng-Wen Shih, Duan-Yu Chen:
Design of Gabor Filter Banks for Iris Recognition. 403-406 - Chun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang:
Abnormal Event Detection in Video Using N-cut Clustering. 407-410 - Chih-Chung Hsu, Hsuan-Ting Chang, Ting Cheng Chang:
Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video. 411-414 - Kai-Li Chiang, Wen-Hsiang Tsai:
Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information. 415-418 - Cheng-Chang Lien, Yang-Kai Chang, Chih-Chiang Tien:
A Fast Facial Expression Recognition Method at Low-Resolution Images. 419-422 - Yining Qi, Mingyuan Dai:
The Effect of Frame Freezing and Frame Skipping on Video Quality. 423-426 - Thou-Ho Chen, Yen-Hui Yin, Shi-Feng Huang, Yan-Ting Ye:
The Smoke Detection for Early Fire-Alarming System Base on Video Processing. 427-430 - Tsong-Yi Chen, Thou-Ho Chen, Shi-Feng Huang, Yi-Fan Li:
An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation. 431-434 - Shahryar Karimi-Ashtiani, C.-C. Jay Kuo:
Automatic Real-Time Moving Target Detection from Infrared Video. 435-440
Digital Watermarking (II)
- Ping-Sung Liao, Cheng-Yi Chen, Chun-Chi Chen, Jeng-Shyang Pan:
Interlacing Domain Partition for Fractal Watermarking. 441-444 - Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura:
Improved Video Verification Method Using Digital Watermarking. 445-448 - M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai:
Blind Watermarking in Contourlet Domain with Improved Detection. 449-452 - Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. 453-456 - Jie Liu, Xiamu Niu, Wenhai Kong:
Image Watermarking Based on Singular Value Decomposition. 457-460 - Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang:
A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. 461-464 - Dan Wang, Peizhong Lu:
Geometrically Invariant Watermark Using Fast Correlation Attacks. 465-468 - Michael Gulbis, Erika Müller, Martin Steinebach:
Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks. 469-472 - Pei-wei Tsai, Shu-Chuan Chu, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao:
The Attacking Method for DC Components Watermarking. 473-478
Advanced Algorithms and Systems for Multimedia Processing and Networking
- Wai-Chi Fang, Jaw-Chyng L. Lue:
VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition. 479-482 - Chua-Chin Wang, Gang-Neng Sung, Jia-Hao Li:
Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263. 483-486 - Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Hsiang-Cheh Huang:
Reversible Data Hiding for 3D Point Cloud Model. 487-490 - Huihui Bai, Yao Zhao:
Multiple Description Image Coding Using Shifted Lattice Vector Quantization. 491-494 - Joseph Kolibal, Daniel Howard:
Implications of a Novel Family of Stochastic Methods for Function Recovery. 495-498 - Chun-Ting Hung, Jin-Jang Leou:
A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission. 499-502 - Hongjun Wang, Yong-Jian Huang, Hua Li:
H.264/AVC Video Encoder Implementation Based on TI TMS320DM642. 503-506 - Do-Kyoung Kwon, Mei-Yin Shen, C.-C. Jay Kuo:
R-D Optimized Frame-Layer Bit Allocation for H.264. 507-510 - Yu Hu, Qing Li, Siwei Ma, C.-C. Jay Kuo:
Fast H.264/AVC Inter-Mode Decision with RDC Optimization. 511-516
Signal Processing and Data Compression
- Baishan Zhao, Yi-Sheng Zhu:
Chaotic Signal Design with Selected Parameters. 517-520 - Melvin A. Breuer, Haiyang (Henry) Zhu:
Error-Tolerance and Multi-Media. 521-524 - Namgook Cho, Yu Shiu, C.-C. Jay Kuo:
An Improved Technique for Blind Audio Source Separation. 525-528 - Thou-Ho Chen, Shi-Feng Huang, Chao-Yu Chen, Zhi-Hong Lin:
Adaptive Working Window for Impulse Noise Reduction. 529-532 - Wan-Chi Lee, C.-C. Jay Kuo:
Improved Linear Prediction Technique for Musical Onset Detection. 533-536 - Hui Ding, Bo Qian, Yanping Li, Zhenmin Tang:
A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection. 537-540 - Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li:
Improved SMVQ Scheme with Edge-Directed Prediction. 541-544 - Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. 545-548 - Chin-Chen Chang, Yung-Chen Chou:
Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. 549-554
System Implementation
- Song Qiu, Wai-yun Li, Jin-gao Liu, Wen-jing Hu:
Design of AC-PDP Signal Processor for SoC Application. 555-558 - Lingjun Xu, Qiang Wang, Jiansong Gao, Yong Wang, Ping Zhang:
A Novel Low-IF Topology for High Performance Integrated Receivers. 559-562 - Ru Yang, Gang Feng, Donghai Li:
Power Optimization for Bus on Multimedia SoC. 563-566 - Min-Hong Chen, Feng-Cheng Chang, Hsueh-Ming Hang:
Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform. 567-570 - Yuan-Long Jeang, Tzuu-Shaang Wey, Hung-Yu Wang, Chih-Chung Tai:
A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors. 571-574 - Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen:
Research on Applying Java Card to Database Encryption Systems. 575-578 - Wai-Chi Fang, Sharon Kedar, Susan Owen, Gu-Yeon Wei, David M. Brooks, Jonathan Lees:
System-on-Chip Architecture Design for Intelligent Sensor Networks. 579-582 - Wai-Chi Fang, Tsung-Hsien Lin:
Low-Power Radio Design for Wireless Smart Sensor Networks. 583-586 - Zheng Shen, Hu He, Yanjun Zhang, Yihe Sun:
VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design. 587-592
Data Hiding and Security
- Zhen Sun, Zhe-Ming Lu, Zhen Li:
Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain. 593-596 - Imtiaz Awan, Syed Asif Mahmood Gilani, S. A. Shah:
Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication. 597-600 - Liehuang Zhu, Wenzhuo Li, Lejian Liao, Hong Li:
A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. 601-604 - Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu:
Focus on the Generalized Information Hiding Technology. 605-608 - Linna Zhou, Cui-Qing Liu, Xijian Ping, Tao Zhang, Yun-He Wang:
Information Hiding Method in Digital Audio Signal Based on Perfect Codes. 609-612 - Yaqin Zhao, Nan Zhao, Guanghui Ren, Bo Zhang:
A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences. 613-616 - Chia-Chen Lin, Chin-Chen Chang:
An Image Hiding Scheme Based on Du's Disk Allocation Method. 617-620 - Xin-guang Zou, Sheng-He Sun:
Analysis of Anonymity on the Signatures of Knowledge. 621-624 - Xiaoyong Li, Chang-xiang Shen, Xiao-Dong Zuo:
An Efficient Attestation for Trustworthiness of Computing Platform. 625-630
Signal Processing and Coding
- Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong:
Effects on Statistical Features for Image by Quantization. 631-634 - Beibei Li, Xin Li, Shuxun Wang, Haifeng Li:
A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform. 635-638 - Byung-Ho Cha, C.-C. Jay Kuo:
Design of Collusion-Free Codes Based on MAI-Free Principle. 639-642 - Zhenyu Wu, Hongyang Yu, Bin Tang, Hong Hu:
Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2. 643-646 - Behnaz Ghoraani, Sridhar Krishnan:
Chirp-Based Image Watermarking as Error-Control Coding. 647-650 - Chun-Hsien Chou, Kuo-Cheng Liu:
Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces. 651-654 - Qi Zhang, Yunyang Dai, Siwei Ma, C.-C. Jay Kuo:
Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding. 655-658 - Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee:
Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors. 659-662 - Jianjun Lei, Jian Wang, Jun Guo, Gang Liu, Haifeng Shen:
Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition. 663-668
Cross-Discipline Technology
- Qiusheng He, Wending Liu, Fuzeng Wang, Jianjun Hao, Hui Li, Yaqi Cheng:
Fast Algorithm of Trigonometric Function of Specific Angle. 669-672 - Omar U. Flórez-Choque:
Voice2SQL: A Hybrid Intelligent System for the Recovery of Information from Databases by Means of Spoken Natural Language. 673-676 - Cong Jin, Yu Fu, Feng Tao:
The Watermarking Model for Relational Database Based on Watermarking Sharing. 677-680 - Chin-Chen Chang, Jun-Chou Chuang:
Progressive Image Transmission Using Significant Features and Linear Regression Prediction. 681-684 - Xiaojun Tong, Minggen Cui, Wei Jiang:
The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System. 685-688 - Fang Pu, Daoqing Sun, Qiying Cao, Haibin Cai, Fan Yang:
Pervasive Computing Context Access Control Based on UCON_ABC Model. 689-692 - Qi Han, Zhifang Wang, Xiamu Niu:
A Non-uniform Quantizing Approach to Protect Biometric Templates. 693-698 - Jianlong Yang, Jianmin Wang, Deyi Li:
Detecting the Theft of Natural Language Text Using Birthmark. 699-702 - Yong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, Rui Chen:
A Context-Aware AmI System Based on MAS Model. 703-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.