


Остановите войну!
for scientists:


default search action
IIH-MSP 2008: Harbin, China
- Jeng-Shyang Pan, Xiamu Niu, Hsiang-Cheh Huang, Lakhmi C. Jain:
4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3278-3
Digital Crime and Forensics
- Emmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh:
Challenges of Location Tracking Techniques in Wireless Forensics. 3-6 - Rong Xiao, Xingming Sun, Ying Yang:
Copyright Protection in Wireless Sensor Networks by Watermarking. 7-10 - Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao:
File-Update Based Steganography for Microsoft PowerPoint Files. 11-15 - Chang-Tsun Li
, Yue Li:
Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images. 16-19 - Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang:
A Steganography Scheme in P2P Network. 20-24 - Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan:
A Fragile Document Watermarking Technique Based on Wet Paper Code. 25-28 - Te-Cheng Hsu, Wen-Shyong Hsieh, Tung-Shih Su:
A New Watermark Attacking Method Based on Eigen-Image Energy. 29-32
Ubiquitous Multimedia Services and Applications for Residential Users
- Yuh-Ming Cheng, Peng-Fei Chen:
Building an Online Game-Based Learning System for Elementary School. 35-38 - Chun-Ting Huang:
The Study of Balance Traffic Load with Genetic Algorithm for PON. 39-42 - Chien-Ming You, Mong-Fong Horng, Yau-Hwang Kuo, Wan-Ling Du:
A Hybrid Fast Approach to Secure Group-Oriented Management of Key Trees on Internet. 43-46 - Han Xiao, Chao Wang, Na Feng:
Research on Remote Monitoring and Control System Key Techniques Based on Data Point Table. 47-51 - Xiuyuan Li, Xiaojuan Wu, Wenming Li, Xiaogang Wang:
An Adaptive Cross-Layer Scheduling Algorithm for Multimedia Networks. 52-55 - Junfeng Man, Lu-Ming Yang, Wen-qiu Zhu, Qianqian Li:
A Model of Smart Home Fusing Multi-intelligence. 56-59 - Jih-Hsin Ho, Wen-Shyang Hwang:
Supporting Multiple Classes of Services in IP over WDM Ring Network. 60-63 - Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. 64-67
Information Retrieval (1)
- Gang Zhang, Zong Min Ma
, Qiang Tong, Ying He, Tie-Nan Zhao:
Shape Feature Extraction Using Fourier Descriptors with Brightness in Content-Based Medical Image Retrieval. 71-74 - Kai-xing Wu, Qiang Xu:
Image Retrieval Based on Fuzzy Color Histogram. 75-78 - Kejun Wang, Zhen Ren, Xinyan Xiong:
Combination of Wavelet snd SIFT Features for Image Classification Using Trained Gaussion Mixture Model. 79-82 - Tian-Yun Huang:
Media Adaptation in MPEG-21 DIA, Framework, Activities and Open Issues. 83-86 - Qi Han, Chen Song, Meihui Zhang, Xiamu Niu:
A Novel Facial Image Retrieval Algorithm Based on PLT-PCA. 87-90 - Feng-Cheng Chang
, Hsueh-Ming Hang:
An Improved Presentation Method for Relevance Feedback in a Content-Based Image Retrieval System. 91-94 - Feng-Cheng Chang
, Chin-Yuan Chang, Hsueh-Ming Hang:
A Study on the Meta-data Design for Long-Term Digital Multimedia Preservation. 95-98
Wired and Wireless Multimedia Networking and Applications
- Takuo Nakashima, Akari Ono, Toshinori Sueyoshi:
Performance Framework for P2P Overlay Network. 101-104 - Takuo Nakashima, Yusuke Shomura, Toshinori Sueyoshi:
Queueing Property for Different Type of Self-Similar Traffics. 105-108 - Ningping Sun, Toru Ayabe, Kentarou Okumura:
An Animation Engine with the Cubic Spline Interpolation. 109-112 - Ningping Sun, Kaori Suigetsu, Toru Ayabe:
An Approach to Speech Driven Animation. 113-116 - Jin-Yu Zhang, Man-Gui Liang:
IPTV QoS Implement Mechanism in WLAN. 117-120 - Ye Yao, Wandong Cai, Vincent Hilaire
, Abder Koukam
:
Location Scheme in Wireless Sensor Networks. 121-125 - Wei Song, Yuelong Zhao:
Secure Peer Joining Process in Structured P2P System. 126-129 - Jiemin Liu, Jingxin Dou, Hongxing Zou, Yuan Gao:
Reducing Signaling cost with Simplifed mSCTP In Fast Mobile IPv6. 130-133
Techniques and Algorithms for Multimedia Security (1)
- Kenshi Uematsu, Ryôichi Sasaki:
A Proposal of Falsification Detection System in Structural Design. 137-142 - Katsunari Yoshioka
, Tsutomu Matsumoto:
Fingerprinting Traffic Log. 143-146 - Maki Yoshida, Toru Fujiwara:
Expiration Dated Fingerprinting. 147-150 - Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda:
Lossless Data Hiding Using Bit-Depth Embedding for JPEG2000 Compressed Bit-Stream. 151-154 - Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
Performance Improvement of JPEG2000 Steganography Using QIM. 155-158 - Shengbing Che, Bin Ma, Zuguo Che:
An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System. 159-162 - Xiaoming Zhang, Xiong Yin, Zhaoyang Yu:
Robust Audio Watermarking Algorithm Based on Histogram Specification. 163-166 - Shao-Cheng Qu, Mei-jing Gong, Xiaoyan Wang:
Parameter Modulation Secure Communication Based on Active Control. 167-170
Event Analysis in Videos
- Yuan-Kai Wang
, Chin-Fa Wang:
Face Detection with Automatic White Balance for Digital Still Camera. 173-178 - Chi-Hung Chuang, Jun-Wei Hsieh, Luo-Wei Tsai, Kuo-Chin Fan:
Human Action Recognition Using Star Templates and Delaunay Triangulation. 179-182 - Yueh-Shiun Lee, Jinn Ho, Wen-Liang Hwang, Chung-Lin Huang:
Iris Recognition Based on Matching Pursuits. 183-187 - Duan-Yu Chen, Hsiao-Rong Tyan, Sheng-Wen Shih, Hong-Yuan Mark Liao:
Dynamic Visual Saliency Modeling for Video Semantics. 188-191 - Xin Wang, Bo Xuan, Silong Peng:
Digital Image Forgery Detection Based on the Consistency of Defocus Blur. 192-195 - Zhonghua Sun, Kebin Jia, Hexin Chen:
Video Key Frame Extraction Based on Spatial-Temporal Color Distribution. 196-199 - Jing Bi, Shu-Chang Liu:
A Speaker Identification System for Video Content Analysis. 200-203 - Tien-Ying Kuo
, Yi-Chung Lo:
Detection of H.264 Shot Change Using Intra Predicted Direction. 204-207
Fingerprinting
- Yanzhen Ren, Ruimin Hu, Haojun Ai:
An Asymmetric Multicast Fingerprinting Scheme Based on Secret Sharing. 211-214 - Wansu Bao, Yun Wei:
A Forward Secure Ring Signature Scheme. 215-218 - Lifen Li:
Trust Derivation and Recommendation Management in a Trust Model. 219-222 - Yongjian Hu, Heung-Kyu Lee, Huafei Zeng:
Curve Watermarking Technique for Fingerprinting Digital Maps. 223-226 - Xinghua Yu, Tiejun Huang:
An Image Fingerprinting Method Robust to Complicated Image Modifications. 227-230 - Hsiang-Cheh Huang
, Yueh-Hong Chen:
Multicast Video Fingerprinting Scheme with Genetic Algorithm. 231-234 - Yongjian Liao, Qing Lu, Zhiguang Qin:
Designated Verifier Proxy Signature Scheme. 235-238 - Hsiang-Cheh Huang
, Yueh-Hong Chen, Shin-Chang Chen:
Copyright Protection for Images with EXIF Metadata. 239-242
Data Hiding and Steganography (1)
- Hedieh Sajedi
, Mansour Jamzad:
A Steganalysis Method Based on Contourlet Transform Coefficients. 245-248 - Diqun Yan
, Rangding Wang:
Reversible Data Hiding for Audio Based on Prediction Error Expansion. 249-252 - Kensuke Naoe, Yoshiyasu Takefuji
:
Damageless Information Hiding Technique Using Neural Network. 253-256 - Huajun Huang, Shaohong Zhong, Xingming Sun:
An Algorithm of Webpage Information Hiding Based on Attributes Permutation. 257-260 - Farzin Yaghmaee, Mansour Jamzad:
Estimating Data Hiding Capacity of Gray Scale Images Based on Its bitplanes Structure. 261-264 - Chih-Cheng Lo, Chien-Ming Lee, Bin-Yih Liao, Jeng-Shyang Pan
:
Halftone Image Data Hiding with Reference to Original Multitone Image. 265-268 - Jianquan Xie, Chunhua Yang
, Dazu Huang:
High Capacity Information Hiding Algorithm for DCT Domain of Image. 269-272 - Hai-Ying Gao:
A Blind Steganalysis Algorithm of QIM-Based Hiding. 273-276
Cryptography (1)
- Changji Wang, Rongbo Lu:
A Certificateless Restrictive Partially Blind Signature Scheme. 279-282 - Jing Liu, Fei Gao, Haiyan Ma:
A Speech Chaotic Encryption Algorithm Based on Network. 283-286 - Dawei Zhang, Wenrui Ding, Ding Ding:
Fast Implementation of SMS4 Cryptographic Algorithms on Smart Card. 287-290 - Tao Meng, Xiaoqian Wu, Shenghe Sun:
A Method of Big Prime Number Generator Based on NTL. 291-293 - Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo:
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. 294-297 - Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Myong-Soon Park:
An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network. 298-303 - Chun-Yan Song, Yu-Long Qiao, Xing-Zhou Zhang:
Data Study on the Chaotic Synchronization Driven by External Chaotic Signal. 304-307 - Xiamu Niu, Chongqing Zhou, Jianghua Ding, Bian Yang:
JPEG Encryption with File Size Preservation. 308-311
Techniques and Algorithms for Multimedia Security (2)
- Yusuke Atomori, Isao Echizen, Hiroshi Yoshiura:
Picture Watermarks Surviving General Affine Transformation and Random Distortion. 315-318 - Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai:
Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed Documents. 319-322 - Kitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, Seiichiro Hangai:
A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile Sizes. 323-326 - Kosuke Kamiya, Takuma Mori, Keiichi Iwamura:
Development of Benchmark Tool for Digital Watermarking. 327-330 - Xuping Huang, Ryota Kawashima
, Norihisa Segawa, Yoshihiko Abe:
Design and Implementation of Synchronized Audio-to-Audio Steganography Scheme. 331-334 - Qingcheng Li, Jin Zhang, Zhenhua Zhang, Jia-xin Liu:
A Chinese Text Watermarking Based on Statistic of Phrase Frequency. 335-338 - Xiaofeng Huang, Fei Peng
, Tao Deng:
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System. 339-342 - Yi Xiao, Lee-Ming Cheng
, L. L. Cheng:
A Robust Image Watermarking Scheme Based on a Novel HVS Model in Curvelet Domain. 343-347
Pattern Recognition (1)
- Xiaochun Shi:
Comparison of Two Modern Pattern Recognition Methods. 351-353 - Xiaoyu Wang, Feng Jiang, Hongxun Yao:
Sign Language Synthesis of Individuation Based on Data Model. 354-357 - Pham Anh Phuong, Ngo Quoc Tao, Chi Mai Luong:
An Efficient Model for Isolated Vietnamese Handwritten Recognition. 358-361 - Tong-Yan Li, Xing-Ming Li:
New Criterion for Mining Strong Association Rules in Unbalanced Events. 362-365 - Tao Peng, Minghua Jiang, Ming Hu:
Using Semantics for Dynamic Access Control of XML Documents in Dynamic Coalition Environment. 366-369 - JianLiang Meng, WeiXiang Cheng:
MST Clustering Algorithm Based on Optimized Grid. 370-373 - Qianwen Wang, Wenjun Huang, Xiamu Niu, Xiuzhan Jiang:
A Template Protection Scheme For Statistic Feature-based 2D Face Recognition. 374-377 - Yung-Mao Lu, Bin-Yih Liao, Jeng-Shyang Pan
:
A Face Recognition Algorithm Decreasing the Effect of Illumination. 378-381
Image and Speech Processing
- Renlong Wang, Yanling Hao, Ying Liu, Jin Xi:
An Embedded and Efficient Low Memory Hierarchical Image Coder. 385-388 - Wenzhe Lv, Zhe Zhang, Xixian Niu:
Improved Hidden Markov Tree Model and Its Application in Image Denoising. 389-392 - Chung Ming Kuo, Nai-Chung Yang, Wei-Han Chang, Chi-Lin Wu:
Image Recovery Based on Effective Image Completion. 393-396 - Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. 397-401 - Huiyan Jiang, Yudong Zhao, Ning Li:
The Study of 3D Reconstruction Method Based on Dynamic Threshold Method and Improved Ray Casting Algorithm. 402-405 - Lihua Liu, Mingyu Li, Qiong Li, Yan Liang:
Perceptually Transparent Information Hiding in G.729 Bitstream. 406-409 - Yuhua Jiao, Qiong Li, Xiamu Niu:
Compressed Domain Perceptual Hashing for MELP Coded Speech. 410-413 - Chang'an Wei, Shouda Jiang:
Automatic Target Detection and Tracking in FLIR Image Sequences Using Morphological Connected Operator. 414-417
Video Signal Processing (1)
- Yunpeng Zhang, Zhengjun Zhai, Xuan Nie, Chunyan Ma, Fei Zuo:
An Extended Self-Adaptive Kalman Filtering Object Motion Prediction Model. 421-424 - Zhuoyi Lv, Kebin Jia:
A Novel Algorithm of Fast Detection and Segmentation of Moving Object. 425-428 - Chia-Hung Yeh, Shih-Meng Chen, Shiunn-Jang Chern:
Content-Aware Video Transcoding via Visual Attention Model Analysis. 429-432 - Yuan-Qing He, Shi-Xin Sun:
A Data Layout and Access Control Strategies of the Video Storage Server Based Disk Array. 433-437 - Guiguang Ding:
A Multi-view Video Coding Method Based on Distributed Source Coding for Free Viewpoint Switching. 438-441 - Tien-Ying Kuo
, Chung-Hsin Wang:
Fast Local Motion Estimation and Robust Global Motion Decision for Digital Image Stabilization. 442-445 - Zu-jue Chen, Zhi-xiong Zhang, Xing Luo:
Efficient Block-Matching Motion Estimation Algorithm Based on Temporal and Spatial Correlation for H.264. 446-449 - Wei Ren, Yuesheng Zhu:
A Video Summarization Approach Based on Machine Learning. 450-453
Watermarking Applications (1)
- Elham Salahi, M. Shahram Moin
, Ahmad Salahi:
A New Visually Imperceptible and Robust Image Watermarking Scheme in Contourlet Domain. 457-460 - Xiaohong Deng, Guowen Xu, Guang Sun, Junfeng Man:
Software Watermarking Based on Dynamic Program Slicing. 461-464 - H. Y. Leung, Lee-Ming Cheng
, L. L. Cheng:
A Robust Watermarking Scheme Using Selective Curvelet Coefficients. 465-468 - Chih-Chin Lai, Hsiang-Cheh Huang
, Cheng-Chih Tsai:
Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. 469-472 - Larbi Boubchir, Ayoub Otmani
, Nadia Zerida:
The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking. 473-476 - Qian Zhang, Nigel Boston:
Stylometric Watermarking. 477-480 - Tianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang:
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity. 481-484 - Jing-Ming Guo, Chung-Te Yang, Jiann-Der Lee:
Mean-Classified and Hierarchical Block Matching Watermarking in Fractal Coding. 485-488
Networking Applications (1)
- Ye Yao, Vincent Hilaire
, Abder Koukam
, Wandong Cai:
A Holonic Model in Wireless Sensor Networks. 491-495 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesAsymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia Transport. 496-499
- Kai Li, Shijue Zheng, Zhenhua Zheng, Xiaoyan Chen:
Research on Three-Dimensional Localization Algorithm in Wireless Sensor Network. 500-503 - Yuan-Bo Chen, Chih-Jen Yang, Gwo-Jia Jong:
Intelligent Campus Multi-application RFID Integration System. 504-507 - Wenying Zeng, Yuelong Zhao, Wei Song, Wenfeng Wang:
Wireless Grid and Storage System Design. 508-511 - Haohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo:
A Metrics Suite for Static Structure of Large-Scale Software Based on Complex Networks. 512-515 - Zhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo:
On the Security of WAI Protocol in the Third Version of WAPI. 516-519 - Chin-Shiuh Shieh, Che-Wei Hsu, Wei Kuang Lai:
Application-Layer Implementation of Service Migration. 520-525
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian:
Symbian Forensics: An Overview. 529-533 - Lei Pan
, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. 534-537 - Keun-Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung-Soo Lim, Seokhee Lee, Sangjin Lee:
Methodologies for Detecting Covert Database. 538-541 - Sunmi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, Sangjin Lee:
Design and Implementation of a Tool for System Restore Point Analysis. 542-546 - Yeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim:
Design and Implementation of a Tool to Detect Accounting Frauds. 547-552 - Ya-Jing Zhang, Shuan-Hu Wu:
A Gene Immune Detection Algorithm with Complement Operator on the Basis of Biological Immune Principles. 553-556 - Xiaoyi Yu, Noboru Babaguchi:
An Improved Steganalysis Method of LSB Matching. 557-560