


default search action
11th IIH-MSP 2015: Adelaide, Australia
- Jeng-Shyang Pan, Ivan Lee, Hsiang-Cheh Huang, Ching-Yu Yang:

2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, Adelaide, Australia, September 23-25, 2015. IEEE 2015, ISBN 978-1-5090-0188-0
Session 1: Cross-Discipline Techniques in Signal Processing and Networking
- Yuh-Yih Lu, Shih-Chieh Dai, Hsiang-Cheh Huang

:
Design of Triple-Band Planar Antenna for LTE/WLAN Applications. 1-4 - Hsiang-Cheh Huang

, Jiun Lin, Yuh-Yih Lu:
Ownership Protection for Progressive Transmission of Color Images with Reversible Data Hiding. 5-8 - Liou Chu:

An Auxiliary Teaching Management System by Applying Six Sigma Method. 9-12 - Hsiang-Cheh Huang

, Chuan-Chang Lin, Yueh-Hong Chen:
Fidelity Enhancement of Reversible Data Hiding for Images with Prediction-Based Concepts. 13-16 - Kun Xie, Po-Ju Li, Wei-Kai Chiu, Po-Yen Liu, Yao-Wei Chuang, Feng-Cheng Chang

, Hsiang-Cheh Huang
:
Design of an Adapter Service for Web Application Transition. 17-20 - Hsiang-Cheh Huang

, Feng-Cheng Chang
:
Visual Cryptography for Compressed Sensing of Images with Transmission over Multiple Channels. 21-24 - Yueh-Hong Chen, Hsiang-Cheh Huang

:
Progressive Watermarking for Images with Regions of Interest. 25-28
Session 2: Wearable Computing and Information Security
- Ching-Yu Yang, Wen-Fong Wang:

High-Performance Digital Watermarking with L2-Norm Centroid for Colour Images. 29-32 - Wen-Fong Wang, Ching-Yu Yang, Hao-Xiang Wang:

Study on the Relationship between Stair's Slope and Upward/Downward Gaits in Stairs. 33-36 - Rong-San Lin:

An Imperceptible Information Hiding in Encoded Bits of Speech Signal. 37-40 - Wen Yen Lin, Kuang-Po Hsueh, Pai-Shan Pa:

The Development of Emergency Communication APP Using Ad Hoc Network with IPv6. 41-44 - Ching-Fu Huang, Yan-Haw Chen:

Efficient Software Method for Decoding of the (71, 36, 11) Quadratic Residue Code. 45-48
Session 3: Ergonomic Information and Control Systems
- Bor-Shing Lin, Huey-Dong Wu

, Sao-Jie Chen
, Gene Eu Jan, Bor-Shyh Lin
:
Using Back-Propagation Neural Network for Automatic Wheezing Detection. 49-52 - Nan-Chun Lin:

Wearable and Wireless Human Body Electrostatic Monitoring System. 53-56 - Chang-Ting Chen, Yi-Chien Liao, Chien-Fu Lai, Bor-Shyh Lin

, Che-Chuan Wang, Jinn-Rung Kuo:
Optical Technique for Estimating Cerebral Perfusion Pressure. 57-59
Session 4: Intelligent Video Processing
- Tsong-Yi Chen, Chao-Ho Chen, Guan-Ming Luo, Wu-Chih Hu, Johng-Chern Chern:

Vehicle Detection in Nighttime Environment by Locating Road Lane and Taillights. 60-63 - Bing-Hong Liu, Van-Trung Pham, Ngoc-Tu Nguyen

:
A Virtual Backbone Construction Heuristic for Maximizing the Lifetime of Dual-Radio Wireless Sensor Networks. 64-67
Session 5: Security and Privacy Protection in Computer Forensic Applications
- Bowen Xue, Xiaolong Li, Zongming Guo:

A New SDCS-based Content-adaptive Steganography Using Iterative Noise-Level Estimation. 68-71 - Wenfa Qi, Zongming Guo:

Data Hiding Based on Chinese Text Automatic Proofread. 72-75 - Xin Liao

, Liping Ding:
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational. 76-80 - Yang Yang, Weiming Zhang, Nenghai Yu:

Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement. 81-84 - Yuan Zhang, Xinpeng Zhang, Chuan Qin

, Jiang Yu:
Multiple Description Coding for Encrypted Images. 85-88 - Jianjun Li, Lijuan Meng, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:

A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets. 89-92 - Jianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:

Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction. 93-96 - Chia-Chen Lin

, Cheng-Han Lin, Xiao-Long Liu, Shyan-Ming Yuan
:
Fragile Watermarking-Based Authentication Scheme for Demosaicked Images. 97-100
Session 6: Multimedia Signal Processing and Network Technology
- Meng-Hsin Liu, Tai-Hung Lin, Chih-Wen Su:

Fingertip Detection Using Two-Stage Random Decision Forest. 101-104 - Yi-Hung Lu, Yu-Hsi Chen, Hsueh-Yi Sean Lin:

A Multiresolution Approach to Recovering Colors and Details of Clipped Image Regions. 105-108
Session 7: Multimedia Security and Copyright Protection
- Tzu-Chuen Lu, Ying-Hsuan Huang:

Combined Prediction-Based Reversible Data Embedding Methods for High Image Quality. 109-112 - Chin-Feng Lee, Si-Ting Chen, Jau-Ji Shen:

Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix. 113-116 - Chin-Feng Lee, Yu-Ju Tseng:

An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation. 117-120 - Chun-Hsiu Yeh, Jau-Ji Shen, Jinn-Ke Jan:

Equalized CR-dropping for Image Compression. 121-124 - Chiung-Chen Tseng, Yu-Hsuan Chiu, Yung-Chen Chou:

A Histogram Shifting-Based Reversible Data Hiding Scheme Using Multi-pattern Strategy. 125-128
Session 8: Multimedia Innovative Technology
- Chieh-Ling Huang, Yu-Hsiang Huang, Jwu-Jenq Chen:

Life Events Segmentation Based on Lifelog Recorded by Wearable Device. 129-132 - Yu-Chi Chung, I-Fang Su, Chiang Lee, Pin-Chieh Huang:

Finding All Competitive Products Using the Dominant Relationship Analysis. 133-137 - Chang-Yi Yang:

Channel Estimation for Inverse Power Control in Wireless Communication Networks. 138-141
Session 9: Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals
- Tetsuya Kojima, Akihiro Oizumi, Udaya Parampalli

:
Properties of an Emergency Broadcasting System Based on Audio Data Hiding. 142-145 - Tsukasa Nishino, Takashi Nose

, Akinori Ito
:
Tempo Modification of Mixed Music Signal by Nonlinear Time Scaling and Sinusoidal Modeling. 146-149 - Chengxiang Yin, Jin Hu, Xuejun Zhang, Xiang Xie:

Advertising System Based on Cloud Computing and Audio Watermarking. 150-155 - Harumi Murata, Akio Ogihara:

An Audio Watermarking Method Using Tones of Diatonic Chord. 156-159 - Erick Christian Garcia Alvarez, Shengbei Wang, Masashi Unoki

:
An Automatic Watermarking in CELP Speech Codec Based on Formant Tuning. 160-163 - Tatsuya Matsumoto, Kotaro Sonoda

:
Audible Secret Keying for Time-Spread-Echo Based Audio Watermarking. 164-167
Session 10: Public Key Cryptography and Applications
- Liyang Yu, Qi Han, Xiamu Niu:

Detecting Duplicated Frames by Mapping Frames to 3D Skeletons. 168-171 - Xin Liu, Shen Wang, Weizhe Zhang, Xiamu Niu:

A Novel (2, 2) Visual Secret Sharing without the Pixel Expansion. 172-175 - Bin Cai:

Formalized Description and Analysis of FTP on Petri Net. 176-179 - Shu-Jian Han, Li Zhu, Zheng Li:

Modeling and Analysis of Intelligence Assurance System Based on the Complex Networks Theory. 180-184 - Zhenzhen Gong, Shaozhang Niu, Hongli Han:

Tamper Detection Method for Clipped Double JPEG Compression Image. 185-188 - Chunli Yang, Peigang Qiu, Shihui Zheng, Licheng Wang:

An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor. 189-194 - Feng Wang, Li Xu, Jeng-Shyang Pan

:
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model". 195-198
Session 11: Technologies for Next-Generation Network Environments
- Chia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung, Che-Wei Lin:

Automatic NIDS Rule Generating System for Detecting HTTP-like Malware Communication. 199-202 - Jeng-Shyang Pan

, Tsu-Yang Wu
, Chien-Ming Chen
, Eric Ke Wang:
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. 203-206 - Yuan-Yuan Su, Yu-Tzu Chang, Hung-Min Sun:

A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices. 207-210 - Chia-Hung Wang

, Mu-En Wu, Chien-Ming Chen
:
Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints. 211-214 - Dan Le, Qiong Li, Lu Shan, Xiamu Niu:

A New Reduced-Latency SC Decoder for Polar Codes. 215-218 - Xianyan Wu, Qi Han, Xiamu Niu:

Improving Weights for Graph-Based Image Fragment Reassembly. 219-222 - Nai-Wei Lo, Cheng-Tsung Liu:

An Accountable Identity-Based Billing Protocol for Cloud Environment. 223-226 - Jerry Chun-Wei Lin

, Qiankun Liu, Philippe Fournier-Viger
, Tzung-Pei Hong
, Jeng-Shyang Pan
:
A Swarm-Based Sanitization Approach for Hiding Confidential Itemsets. 227-230 - Jeng-Shyang Pan

, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen
, Chwei-Shyong Tsai:
A KL Divergence Function for Randomized Secret Shares. 231-234 - Jianwei Li, Yao Zhao, Rongrong Ni:

Detection of Seam Carving and Contrast Enhancement Operation Chain. 235-238
Session 12: Signal Processing, Optimization and Robust Evaluation
- Wei Sun, Dajian Li, Wei Jia, Penghui Li, Chunyu Zhao, Xumeng Chen:

Small Moving Object Tracking in Dynamic Video. 239-242 - Xin Wang:

Exploring Research of Algorithm in Signal Coning Error Compensation. 243-246 - Xin Wang:

Research on Imaging Detection Based on Digital Reflection Device. 247-250 - Guochang Zhou, Baolong Guo, Xiang Gao, Jing Ma, Hongjie He, Yunyi Yan

:
A FPGA Power Estimation Method Based on an Improved BP Neural Network. 251-254 - Juanjuan Zhu, Cheng Li

, Jinli Xu:
Digital Image Stabilization for Cameras on Moving Platform. 255-258 - Jun Ma, Jianguo Yao, Yunyi Yan

:
Network Anomaly Detection with Compression. 259-262 - Lei Shi, Xiaoping Li, Yanming Liu, Lei Zhao:

An Efficient Weighting Method for Nakagami-m Envelope Distribution Simulation. 263-265 - Haixu Li, Yunyi Yan

, Baolong Guo:
A Method to Search Fallible Branch in FPGA Programs. 266-269 - Fanjie Meng, Miao Song, Baolong Guo:

Image Retrieval by Salient Region Detection. 270-273 - Miao Miao, Wei Zhou, Zhiqi Li, Xueping Zhang, Zongqiang Xuan:

Design for PLL of Maintenance System in Satellites. 274-277
Session 13: Image Processing and Classfication
- Yunxia Liu, Tie Cai, Guowei Huang:

Extended Discriminant Nearest Feature Line Analysis for Feature Extraction. 278-281 - Jiangang Chen, Xuefeng Bai, Guowei Huang:

Two-Dimensional Extended Feature Line Space for Feature Extraction. 282-285 - Lijun Yan, Jianhui Zhang, Jeng-Shyang Pan

, Lin-Lin Tang:
Bilinear Feature Line Analysis for Face Recognition. 286-289 - Jeng-Shyang Pan

, Shu-Chuan Chu
, Lijun Yan, Lin-Lin Tang:
Fuzzy Extended Feature Line Classifier for Image Classification. 290-293
Session 14: Information Processing and Complex Network
- Yi-Jia Zhang, Rui-Ying Liu, Hua-jun Song:

A Method of the Detection of Frequency-Hopping Signal Based on Channelized Receiver in the Complicated Electromagnetic Environment. 294-297 - Yi-Jia Zhang, Zhong-Jian Kang, Zhen Wu, Zhe-Ming Lu:

Application of Dichotomy to Network Partition Based on Sub Network Exchange Gain. 298-301
Session 15: 2D/3D Video Coding and Image/Video Information Processing
- Guandong Gao, Kebin Jia, Bin Jiang:

An Automatic Geometric Features Extracting Approach for Facial Expression Recognition Based on Corner Detection. 302-305 - Liya Zhao, Kebin Jia:

Deep Feature Learning with Discrimination Mechanism for Brain Tumor Segmentation and Diagnosis. 306-309 - Ye Yuan, Kebin Jia:

A Distributed Anomaly Detection Method of Operation Energy Consumption Using Smart Meter Data. 310-313 - Qite Wang, Kebin Jia, Pengyu Liu:

Design and Implementation of Remote Facial Expression Recognition Surveillance System Based on PCA and KNN Algorithms. 314-317 - Zhonghua Sun, Miaojie Sang, Kebin Jia:

Video Annotation Based on Video Structure Information and Key Frames Semantic Description. 318-321
Session 16: Big Data Security Analytics
- Yong Peng, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun Zhang:

Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment. 322-326 - Xianghui Zhao, Yong Peng, Zan Zhai, Yi Jin, Yuangang Yao:

Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining. 327-332 - Binjie Gu, Yong Fang

, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. 333-336 - Haihui Gao, Yong Peng, Kebin Jia, Zhe Wen, Hanjing Li:

Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network. 337-340 - Yiling Zheng, Song Zheng:

Cyber Security Risk Assessment for Industrial Automation Platform. 341-344 - Lei Zhang, Yong Peng, Jie Liang, Xifeng Liu, Jin Yi, Zhe Wen:

An Improved String Matching Algorithm for HTTP Data Reduction. 345-348
Session 17: Artificial Intelligence and Its Applications
- Xingsi Xue:

Optimizing Ontology Alignments through NSGA-II Using an Aggregation Strategy and a Mapping Extraction Approach. 349-352 - Lyu-Chao Liao

, Xin-Hua Jiang, Fumin Zou, Pei-wei Tsai
, Yan-Ling Deng:
A Method of Latent Semantic Information Mining for Trajectory Data. 353 - Hu Rong, Xia Ye, Xu Xiang:

A Self Adaptive Incremental Learning Fuzzy Neural Network Based on the Influence of a Fuzzy Rule. 354-359 - Pei-wei Tsai

, Chia-Han Liu, Lyu-Chao Liao
, Jui-Fang Chang:
Using Consumer Confidence Index in the Foreign Exchange Rate Forecasting. 360-363 - Jing Zhang, Li Xu, Hong Yang:

A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks. 364-367
Session 18: Enrichment of Acoustic Spatial Information for Future Ultra-Realistic Communications over Internet
- Yukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li:

Virtual Auditory Display on a Smartphone for High-Resolution Acoustic Space by Remote Rendering. 368-371 - Jorge Treviño, Shichao Hu, César D. Salvador

, Shuichi Sakamoto, Junfeng Li, Yôiti Suzuki:
A Compact Representation of the Head-Related Transfer Function Inspired by the Wavelet Transform on the Sphere. 372-375 - Shuichi Sakamoto, Arif Wicaksono, Jorge Treviño, César D. Salvador

, Yôiti Suzuki:
Prediction Method for Compression of Spherical Microphone Array Signals Using Geometric Information. 376-379 - Qianqian Fang, Huaxing Xu, Risheng Xia, Junfeng Li, Yonghong Yan:

Equalization of Sound Reproduction System Based on the Human Perception Characteristics. 380-383 - Daisuke Morikawa, Masaru Ando, Masashi Unoki

:
Feasibility of Estimating Direction of Arrival Based on Monaural Modulation Spectrum. 384-387 - Jing Wang, Xin Liu, Zedong Wang, Zhikun Wu, Xiang Xie, Zesong Fei, Jingming Kuang:

Objective Measurement of Spatial Audio Coding Quality Based on MNLR Mapping Model. 388-392
Session 19: Miscellaneous Topics
- Ram Pal Singh

, Neelam Dabas, Nagendra
, Vikash Chaudhary:
Weighted Extreme Learning Machine for Digital Watermarking in DWT Domain. 393-396 - Ran Hu, Wenfa Qi, Zongming Guo:

Feature Reduction of Multi-scale LBP for Texture Classification. 397-400 - Qing Wang, Rong Zhang, Ke Qing:

Passive Detection of Tampered JPEG Image Based on First Digit Statistics. 401-404 - Zhenglin Wang, Ivan Lee

:
Iterative Weighted DCT-SVD for Compressive Imaging. 405-408 - Chuntao Wang, Jiangqun Ni:

Compressing Encrypted Images Using the Integer Lifting Wavelet. 409-412 - Ping Ping, Feng Xu, Md Shaiful Islam Babu

, Xin Lv, Yingchi Mao:
Image Scrambling Scheme Based on Bit-Level Permutation and 2-D Cellular Automata. 413-416 - Yuechuan Li, Yidong Li

:
On Preserving Private Geosocial Networks against Practical Attacks. 417-420 - Feng Guo, Deshun Yang, Xiaoou Chen:

Using Deep Belief Network to Capture Temporal Information for Audio Event Classification. 421-424 - Yuxin Liu, Wenfa Qi, Zongming Guo:

An Information Hiding Method Based on EMF Files Carrier. 425-428 - Yousra Ahmed Fadil, Jean-François Couchot, Raphaël Couturier

, Christophe Guyeux
:
Steganalyzer Performances in Operational Contexts. 429-432 - Yuki Saito, Takashi Nose

, Takahiro Shinozaki, Akinori Ito
:
Conversion of Speaker's Face Image Using PCA and Animation Unit for Video Chatting. 433-436 - Cheng-Chang Lien, Wang Jian Xiang:

Amphibious Target Tracking with Single PTZ Camera. 437-440 - Huajian Liu

, Sang-Heon Lee
:
Stitching of Video Sequences for Weed Mapping. 441-444 - Zhen Wu, Guohua Feng, Hao Luo, Xiaofeng Wu

:
Development of a Visual Reality Headset and Its Applications in 3D Interactive Bike Race Games. 445-448 - Jui-Chuan Cheng, Te-Jen Su, Tsung-Ying Li, Chia-Hua Wu:

The Noise Reduction of Speech Signals Based on RBFN. 449-452

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














