


default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 4
Volume 4, Number 1, January 2013
- Cheng Guo, Chin-Chen Chang:

A Construction for Secret Sharing Scheme with General Access Structure. 1-8 - Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Christine Pascu:

New Images Watermarking Scheme Based on Singular Value Decomposition. 9-18 - Shih-Lun Lin, Chien-Feng Huang, Meng-Huan Liou, Chien-Yuan Chen:

Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme. 19-33 - Tianhua Liu, Si-chao Yi, Xiao-wei Wang:

A Fault Management Protocol for Low-Energy and Efficient Wireless Sensor Networks. 34-45 - Leida Li, Shushang Li, Hancheng Zhu, Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan:

An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns. 46-56 - Chien-Ming Chen, Yue-Hsun Lin, Yao-Hsin Chen, Hung-Min Sun:

SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN. 57-72
Volume 4, Number 2, April 2013
- Yuyao Wang, Zhengming Li, Long Wang, Min Wang:

A Scale Invariant Feature Transform Based Method. 73-89 - Shaowei Weng, Shu-Chuan Chu, Nian Cai, Rongxin Zhan:

Invariability of Mean Value Based Reversible Watermarking. 90-98 - Cheng Guo, Chin-Chen Chang, Chin-Yu Sun:

Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications. 99-109 - Hongfeng Zhu, Tianhua Liu, Dan Zhu, Haiyang Li:

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme. 110-118 - Xuehu Yan, Shen Wang, Li Li, Ahmed A. Abd El-Latif, Zhiqiang Wei, Xiamu Niu:

A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques. 119-127
Volume 4, Number 3, July 2013
- Wen-Chung Kuo:

Image Hiding by Square Fully Exploiting Modification Directions. 128-137 - Bin Jiang, Kebin Jia:

Semi-supervised Facial Expression Recognition Algorithm on the Condition of Multi-pose. 138-146 - Yu-Chi Chen, Raylin Tso, Gwoboa Horng:

Security Analysis of Choi et al.'s Certificateless Short Signature Scheme. 147-154 - Kun Zhan, Jicai Teng, Yide Ma:

Spiking Cortical Model for Rotation and Scale Invariant Texture Retrieval. 155-165 - Xu Zhuang, Zhi-Hui Wang, Chin-Chen Chang, Yan Zhu:

Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement. 166-177 - Qingxiang Feng, Chun-Ta Huang, Lijun Yan:

Representation-based Nearest Feature Plane for Pattern Recognition. 178-191 - Bao Rong Chang, Hsiu Fen Tsai, Chi-Ming Chen:

Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System. 192-200
Volume 4, Number 4, October 2013
- Chun-Wei Lin, Tzung-Pei Hong, Chia-Ching Chang, Shyue-Liang Wang:

A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion. 201-214 - Shiau-Rung Tsui, Cheng-Ta Huang, Wei-Jen Wang:

A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization. 215-224 - Qian Kong, Peng Li, Yanpeng Ma:

On the Feasibility and Security of Image Secret Sharing Scheme to Identify Cheaters. 225-232 - Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin:

An Indicator Elimination Method for Side-match Vector Quantization. 233-249 - Alimohammad Latif:

An Adaptive Digital Image Watermarking Scheme using Fuzzy Logic and Tabu Search. 250-271 - Zhifang Wang, Chao Liu, Taibin Shi, Qun Ding:

Face-Palm Identication System on Feature Level Fusion based on CCA. 272-279 - Jiaqing Qiao, Hongtao Yin:

Optimizing kernel function with applications to kernel principal analysis and locality preserving projection for feature extraction. 280-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














