


default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 7
Volume 7, Number 1, January 2016
- Raniyah Wazirali, Zenon Chaczko:

Hyper Edge Detection with Clustering for Data Hiding. 1-10 - Hsiang-Cheh Huang, Feng-Cheng Chang:

Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics. 11-20 - Pei-Wei Tsai, Shunmiao Zhang, Jing Zhang, Yuan Liu, Yao He, Jeng-Shyang Pan:

Undulating Swarm Intelligence Agents in Wave Increasing Evolved Bat Algorithm. 21-30 - Kenji Ozawa, Mayuko Mitsuki:

Effects of the Relation between Reproduced Sound Pressure Levels and Viewing Angles on the Sense of Presence in Audio-visual Content. 31-40 - Weixin Kang, Raja Asif Wagan, Jingde Li, Chengcheng Zhang:

Threshold Based Chain-Leader Election Scheme for Mobile Sink improved energy-efficient PEGASIS-based Routing Protocol. 41-49 - Baishan Zhao, Chengyu Qi:

Chaotic Signal Generator Design Based on Discrete System. 50-58 - Hongfeng Zhu, Dan Zhu, Yan Zhang:

A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model. 59-71 - Zhifang Wang, Meng Chen, Xiao Meng, Linlin Tang:

Bimodal Multi-feature Fusion based on Quaternion Fisher Discriminant Analysis. 72-79 - Bao-Rong Chang, Hsiu Fen Tsai, Hung-Ta Hsu:

Secondary Index to Big Data NoSQL Database ¡V Incorporating Solr to HBase Approach. 80-89 - Yapeng Li, Zhi Chai, Xiaodan Xie, Weishan Zhang, Zhenghao Li:

A Seat Position Labeling Algorithm Based on Improved Edge Operator and Gray Projection. 90-100 - Deng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Wu-Chih Hu, Yu-Lin Lin:

A Vehicle Flow Counting System in Rainy Environment Based on Vehicle Feature Analysis. 101-114 - Jinshui Wang, Xingsi Xue, Shu-Chuan Chu:

Towards Supporting Feature Location Using Syntactic Analysis. 115-126 - Gaoling Li, Yingli Wang, Hongbin Ma:

Audio Packet Encryption of Flow Control Base on stop-and-wait Protocol. 127-134 - Chien-Chang Chen, Yao-Hong Tsai:

An Expandable Essential Secret Image Sharing Structure. 135-144 - Yan-Jiao Wang, Xiao-Jie Li:

Targets Coverage Algorithm based on Three-dimensional Directional Sensing Model. 145-152 - Sijing Cai, Pei-Wei Tsai:

Echolocation Guided Evolved Bat Algorithm. 153-162 - Bing Zhao, Qun Ding, Lina Ding:

Performance Research of Multiband Parallel Transmission Cognitive Ultra Wideband System. 163-174 - Peng Geng, Song Tian, Kai Lu:

Multifocus Image Fusion by the Sum of Local Variance Energy. 175-183 - Chih-Chao Chung, Li-Chung Chao, Shi-Jer Lou:

Constructing the predictive model for strategy execution problems -the application of the two-stage Analytic Network Process. 184-197 - Wan-Li Lyu, Chin-Chen Chang:

An Image Compression Method Based on Block Truncation Coding and Linear Regression. 198-215 - Da-Jie Guo, Zhe-Ming Lu, Hao Luo:

Multi-Channel Adaptive Mixture Background Model for Real-time Tracking. 216-221
Volume 7, Number 2, March 2016
- Hongfeng Zhu, Tianhua Liu, Yu Xia:

A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server. 222-232 - Dora M. Ballesteros L., Diego Renza, Steven Camacho:

An Unconditionally Secure Speech Scrambling Scheme Based on An Imitation Process to A Gaussian Noise Signal. 233-242 - Xiangdong Yin, Linping Tang, Na Wang:

Extremely Randomized Clustering Forest Based Scene Recognition Algorithm in Mobile Devices. 243-253 - Yong Jin, Ruigang Li:

Opportunistic Cooperative QoS Guarantee Protocol Based on GOP-length and Video Frame-diversity for Wireless Multimedia Sensor Networks. 254-265 - Yu-Jia Ma, Yuesheng Zhu, Xiyao Liu:

A Novel Reversible Watermarking Scheme for Relational Databases Protection Based on Histogram Shifting. 266-276 - Tingting Xie, Jishi Zheng, Shu-Chuan Chu:

A Joint Attitude Control Method for Small Unmanned Aerial Vehicles Based on Prediction Incremental Backstepping. 277-285 - Yibing Wang:

The Encryption Scheme for DICOM Based on the Homomorphic Higher Degree Residue System in Cloud Storage. 286-295 - Xiaodan Xie, Bo-Hu Li, Xudong Chai:

A Unified Framework of Multiple Kernels Learning for Hyperspectral Remote Sensing Big Data. 296-303 - Wangshu Li, Ziheng Yang, Qun Ding:

Synchronous Digital Signal Communication System Based on Chaotic Masking. 304-316 - Li Jiang, Xingsi Xue, Pei-Wei Tsai, Jeng-Shyang Pan:

A Novel Ontology Matching Technology Based on NSGA-II. 317-324 - Rong Gao, Yi-Xiong Yang:

Consumers' Decision: Fashion Omni-channel Retailing. 325-342 - Yan Xu, Hong Zhong, Jie Cui:

An Improved Identity-Based Multi-Proxy Multi-Signature Scheme. 343-351 - Dilmurat Tursun, Li Kai, Gulxax Halelbek, Askar Hamdulla:

A Joint Approach of Harris Corners Detection and Baseline Searching for Localization of Uyghur Text Lines in Image Sequences. 352-361 - Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. 362-375 - Yang Sun, Hongfeng Zhu, Xueshuai Feng:

An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps. 376-385 - Chuan Qin, Haoran Ren, Chin-Chen Chang, Qingkui Chen:

Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis. 386-398 - Yi Fan, Yue-Sheng Zhu, Zhen Liu:

An Improved SIFT-Based Copy-Move Forgery Detection Method Using T-Linkage and Multi-Scale Analysis. 399-408 - Bing Zhao, Zhifang Wang, Qun Ding, Linlin Tang:

Optimizing Multiband Orthogonal Transmission of Low-Energy and Efficient Cognitive Ultra Wideband System. 409-418 - Shun-Peng Hsu, Yi-Nung Chung, Young-Chi Hsu, Chao-Hsing Hsu:

Applying Power Management and Wireless Sensing System to Plant Factory. 419-424 - Zuoxian Nie, Mao-Hsiung Hung, Jing Huang:

A Novel Algorithm of Rebar Counting on Conveyor Belt Based on Machine Vision. 425-437 - Rui Xu:

A Multistage Method for Road Extraction from Optical Remotely Sensed Imagery. 438-447 - Jingli Yang, Fudan Li, Zhen Sun, Shouda Jiang:

A Small Target Detection Method based on Human Visual System and Confidence Measurement. 448-459
Volume 7, Number 3, May 2016
- Wan-Li Lyu, Chin-Chen Chang, Feng Wang:

Image Authentication and Self-Recovery Scheme Based on The Rehashing Model. 460-474 - Hongfeng Zhu, Dan Zhu, Yifeng Zhang, Yan Zhang:

A Novel On-Demand Password Scheme Based on BAN Logic. 475-488 - Hejin Yuan, Chunhong Duo, Wei-hua Niu:

A Human Behavior Recognition Method Based on Latent Semantic Analysis. 489-498 - Lian-Lei Lin, Yang Wu, Gang Wang:

A Simulation Method of Atmospheric Turbulence Based on Von Karman Model. 499-509 - Jiaqi Zhen, Zhifang Wang, Bing Zhao, Linlin Tang:

A Novel Super-Resolution Direction Finding Method for Wideband Signals Based on Multiple Small Aperture Subarrays. 510-520 - Lin Liu, Fumin Zou:

Research on the Data Collection Methods for Pavement Maintenance Based on the Internet of Vehicles. 521-529 - Zhengwei Zhang, Lifa Wu, Haiguang Lai, Huabo Li, Chenghui Zheng:

Double Reversible Watermarking Algorithm for Image Tamper Detection. 530-542 - Chen Cui, Shen Wang, Xiamu Niu:

A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape. 543-557 - Xin-Ling Guo, Zhe-Ming Lu:

Urban Road Network and Taxi Network Modeling Based on Complex Network Theory. 558-568 - Xiao Chen, Zhe-Ming Lu:

Protection on Complex Networks with Geometric and Scale-Free Properties. 569-575 - Qi Zhang, Yuchao Guo, Wangshu Li, Qun Ding:

Image Encryption Method Based on Discrete Lorenz Chaotic Sequences. 576-586 - Mingqian Wang, Xianfeng Liu, Wei-jie Gu:

A DWT-Based Covert Timing Channel of High Concealment. 587-598 - Feng-Cheng Chang, Hsiang-Cheh Huang:

Reversible Data Hiding with Difference Prediction and Content Characteristics. 599-609 - Lifei Zhan, Yuesheng Zhu, Zhiwei Mo:

An Image Splicing Detection Method Based on PCA Minimum Eigenvalues. 610-619 - Qingzhu Wang, Wanjun Kang:

Lossy Compression for Compressive Sensing of Three-Dimensional Images. 620-628 - Nong Si, Ke-Bin Jia:

One Communication Key Udate with Whitelist Attribute in SCADA System. 629-636 - Nan Jia, Songyan Liu, Qun Ding, Shangru Wu, Xuming Pan:

A New Method of Encryption Algorithm Based on Chaos and ECC. 637-644 - Jia Zhao, Li Lv, Hui Wang, Dekun Tan, Jun Ye, Hui Sun, Yin-Tai Hu:

Artifcial Bee Colony Based on Special Central and Adapt Number of Dimensions Learning. 645-652 - Wei-Liang Tai, Ya-Fen Chang, Ti-Sheng Kwang:

An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems. 653-658 - Meiling Li, Anhong Wang, Gang-Fei Wang:

An Analysis Model for OFDMA-Based Inter-cell Interference. 659-673
Volume 7, Number 4, July 2016
- Chong-Ming Zhao, Zhenfeng Zhu, Yao Zhao:

Text Detection Based On Discriminative Dictionary Learning. 674-684 - Yohan Suryanto, Suryadi, Kalamullah Ramli:

A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding. 697-713 - Liquan Chen, Zijuan Fan, Miao Lu, Aiqun Hu:

Information Hiding Capacities in Different Multiple Antennas Systems. 714-728 - Dingxin Song, Degen Huang, Lishuang Li, Hong-Lei He:

Biomedical Named Entity Recognition Based on Feature Selection and Word Representations. 729-740 - Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:

A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing. 741-753 - Li Li, Dejie Zheng, Jianfeng Lu, Xiaoyang Mao, Chin-Chen Chang:

An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images. 754-770 - Miaomiao Liu, Jingfeng Guo, Xu Luo:

Link Prediction Based on the Similarity of Transmission Nodes of Multiple Paths in Weighted Social Networks. 771-780 - Shuyi Lin, Xiaosheng Huang:

Full Simulation of AC Contactor in the Dynamic Process Based on Finite Element Method. 781-790 - Jeng-Shyang Pan, Chen Wang, Tien-Wen Sung:

Road Network Modeling with Layered Abstraction for Path Discovery in Vehicle Navigation Systems. 791-801 - Chun-Ming Wu, Qiang-Huan Song, Long-Long Jiao:

Collaborative Image Compression Algorithm In Wireless Multimedia Sensor Networks. 802-809 - Xiaodan Xie, Bohu Li, Xudong Chai:

Quasiconformal-Matrix-Based Multikernels Learning for Sensory Data Classification. 810-817 - Rongjin Zheng, Xiaosheng Huang, Huiqiong Deng:

Design of Substation and Distribution Station Monitoring System Based on DELPHI and Intelligent Modules. 818-825 - Juan Wang, Qun Ding:

Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication. 826-835 - Binbin Xia, Anhong Wang, Chin-Chen Chang, Li Liu:

An Image Steganography Scheme Using 3D-Sudoku. 836-845 - Xiaorong Cheng, Tianqi Li, Sizu Hou, Huilan Zhao, Hongyu Wang:

Research on Credibility Measurement Method of Data In Big Data. 846-857 - Ye Yuan, Kebin Jia:

A Semi-supervised Approach for Water Quality Detection based on IoT Network. 858-866 - Jeng-Shyang Pan, Hongfeng Zhu:

An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices. 867-880 - Ying Zhou, Yongsheng Liang, Wei Liu, Cheng He, Yue Zhu:

Saliency Region and Motion Characteristics Combined Video Quality Assessment. 881-888 - Diego A. Rojas, Olga L. Ramos, Jorge E. Saby:

Recognition of Spanish Vowels through Imagined Speech by using Spectral Analysis and SVM. 889-897 - Chun-Ming Wu, Qiang-Huan Song:

Fault Diagnosis of Wind Turbine Vibration Based on Wavelet Transform And Neural Network. 898-905
Volume 7, Number 5, September 2016
- Pengyu Liu, Yueying Wu, Yuan Gao, Kebin Jia:

Hierarchical Coding Algorithm for Medical Video Based on H.265/HEVC. 906-915 - Rong-San Lin:

A Synchronization Scheme for Hiding Information in Encoded Bitstream of Inactive Speech Signal. 916-929 - Chun-Ming Wu, Tao Yang:

A New Refinement Method for Mirror Error in WSN Localization. 930-937 - Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, Qun Ding:

Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks. 938-948 - Qingzhou Ye, Maolin Zhang, Ming-Yong Lin:

Design of a High Sensitivity and Non-contact Planar Capacitance Sensor. 949-959 - Wei-Liang Tai, Ya-Fen Chang, Yung-Chi Chen:

A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks. 960-969 - Zhihong Li, Qiang Jin, Chin-Chen Chang, Anhong Wang, Li Liu:

A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization. 970-982 - Qingzhu Wang, Wanjun Kang:

Truncation Strategy of Tensor Compressive Sensing for Noisy Video Sequences. 983-992 - Bao-Rong Chang, Hsiu Fen Tsai, Cin-Long Guo:

High Performance Remote Cloud Datacenter Backup in Big Data Environment. 993-1005 - Yang Sun:

An Improved Password Authentication Scheme for Telecare Medical Information Systems Based on Chaotic Maps with Privacy Protection. 1006-1019 - Shan-Qing Zhang, Wen-Lei Wang, Jianfeng Lu, Qili Zhou, Li-Li:

Image Segmentation Using A New Scalar Texture Descriptor based on Extended Structure Tensor. 1020-1030 - Qiu-Yu Zhang, Shuang Yu, Ning Chen, Wen-Jin Hu, Si-Bin Qiao:

An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream. 1031-1040 - Lihua Zhang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:

Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes. 1041-1051 - Jeng-Shyang Pan, Lijun Yan, Shu-Chuan Chu, John F. Roddick:

Contourlet and Nearest Feature Line Based Feature Extraction Approach for One Prototype Sample Problem. 1052-1059 - Yanfei Jia, Shanshan Liu, Xiaodong Yang:

A New Undetermined Blind Source Separation Method based on Orthogonal Projection. 1060-1068 - Rui Xu:

A Novel Method for Road Centerline Extraction from High Spatial Resolution Satellite Images. 1069-1080 - Yonghong Tan, Xuhui Wang, Xiangdong Yin:

Optimal Beamforming Design for Secure Transmission with Channel Covariance Uncertainty. 1081-1091 - Lijian Zhou, Hui Wang, Zhe-Ming Lu, Tingyuan Nie, Kun Zhao:

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method. - Shuqiang Guo, Liqun Wang, Honghui Fan:

An Image Segmentation Method for Eliminating Illumination Influence. 1100-1109 - Jilin Zhang, Yongzeng Lai, Pei-Wei Tsai:

Analysis of Volatilities and Correlations for Chinese Stock Markets. 1110-1125 - Qiu-Yu Zhang, Shuang Yu, Wen-Jin Hu, Si-Bin Qiao, Tao Zhang:

An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System. 1126-1135 - Jianfeng Lu, Xiaoyan Xu, Li Li, Chin-Chen Chang, Qiang Wang:

A Robust Image Copy Detection Method Based On Feature Extraction Algorithm. 1136-1146
Volume 7, Number 6, November 2016
- P. Senatore, Alessandro Piva, Fabio Garzia, Roberto Cusani:

A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform. 1147-1167 - Qian Mao, K. Bharanitharan, Chin-Chen Chang:

Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images. 1168-1184 - Zhao Kai, Tang Xian:

Virtual Host Dynamic Cooperative Transfer Mechanism Based on Service Driven and Content Aware for Cloud Computing. 1185-1193 - Dao-cheng Qu, Jeng-Shyang Pan, Shaowei Weng, Shaoqiu Xu:

A Novel Reversible Data Hiding Method for Color Images Based on Dynamic Payload Partition and Cross-Channel Correlation. 1194-1205 - Jia Zhao, Xuefeng Fu, Li Lv, Runxiu Wu, Hui Wang, Xiang Yu, Tanghuai Fan:

Opposition-Based Artificial Bee Colony Using Different Learning Models. 1206-1214 - Shoulin Yin, Jie Liu:

A K-means Approach for Map-Reduce Model and Social Network Privacy Protection. 1215-1221 - Jiangtao Zhai, Fang Yang, Yuewei Dai, Mingqian Wang:

A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence. 1222-1230 - Lin You, Jiawan Wang, Bin Yan:

A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping. 1231-1242 - Zhe-Ming Lu, Ya-Pei Feng:

Information Entropy and Cross Information Entropy Based Attacking Methods for Complex Networks. 1243-1253 - Truong-Giang Ngo, Trong-The Nguyen, Ngo Quoc Tao, Duc-Dung Nguyen, Shu-Chuan Chu:

Similarity Shape Based on Skeleton Graph Matching. 1254-1264 - Qingzhu Wang, Wanjun Kang, Yan-Jiao Wang:

Support Tensor Machine Image Classification Algorithm Based on Tensor Principal Component Analysis. 1265-1273 - Shoulin Yin, Hang Li, Jie Liu:

A New Provable Secure Certificateless Aggregate Signcryption Scheme. 1274-1281 - Xiao-Long Liu, Chia-Chen Lin, Chin-Chen Chang, Shyan-Ming Yuan:

A Survey of Fragile Watermarking-based Image Authentication Techniques. 1282-1292 - Nai-Chung Yang, Chang-Ming Kuo, Chung-Ming Kuo, Liang-Kang Huang:

Image Retrieval Using Macro- and Micro-Based Visual Vocabulary. 1293-1305 - Lu Tang, Leida Li, Jiansheng Qian, Jianying Zhang, Jeng-Shyang Pan:

NSCT-Based Multimodal Medical Image Fusion With Sparse Representation and Pulse Coupled Neural Network. 1306-1316 - Lian-Lei Lin, Daming Pei, Xiaobin Zhao, Yan-xi Jia:

Modeling of Laser Transmission in The Atmosphere For Virtual Test. 1317-1329 - Jianneng Chen, Qunshan Chen, Fumin Zou:

Certificate-Based Aggregate Signature Scheme without Bilinear Pairings. 1330-1336 - Jeng-Shyang Pan, Lijun Yan, Xingming Liu, Keke Wu:

Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification. 1337-1344 - Xiuyuan Chen, Xiyuan Peng, Yu Peng, Jun-Bao Li:

The Classification of Synthetic Aperture Radar Image Target Based on Deep Learning. 1345-1353 - Jing Zhang, Min Chen, Pei-Wei Tsai, Longmei Tang, Xiaorong Ji:

A Coverage Loopholes Recovery Algorithm in Wireless Sensor Networks. 1354-1364 - Yu Chen, Chien-Ming Chen, Jeng-Shyang Pan, Tsu-Yang Wu, Shuai Liu:

Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps. 1365-1372 - Zongliang Gan, Changhong Chen, Ziguan Cui, Feng Liu:

Novel Frame Rate Up-Conversion Method Through Weight Matching Criterion and Motion Vector Refinement. 1373-1383 - Chin-Chen Chang, Wan-Ting Tseng, Hao-Chuan Tsai:

A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks. 1384-1394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














