default search action
IIH-MSP 2009: Kyoto, Japan
- Jeng-Shyang Pan, Yen-Wei Chen, Lakhmi C. Jain:
Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings. IEEE Computer Society 2009, ISBN 978-1-4244-4717-6
Intelligent Video Processing
- Deng-Yuan Huang, Wu-Chih Hu, Sung-Hsiang Chang:
Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVM. 1-4 - Chao-Yu Chen, Chao-Ho Chen, Yi-Li Kuo, Chin-Hsing Chen:
A Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics. 5-8 - Wen-Chia Lee, Chin-Hsing Chen:
A Fast Template Matching Method for Rotation Invariance Using Two-Stage Process. 9-12 - Ji-Hong Chen, Chin-Hsing Chen:
A Watermarking Scheme Using Code Division Multiple Access and DWT. 13-16 - Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Yi-Long Lin:
A Compression-Resistant Invisible Watermarking Scheme for H.264. 17-20 - Te Li, Susanto Rahardja, Haiyan Shu, Haibin Huang:
Information Embedding in MPEG-4 Scalable Lossless Audio. 21-24 - Jung-Yang Kao, Jih-Sheng Tu:
An Algorithm for Packing Bitstream of Scalable Video Coding. 25-29 - Bin Li, Kai-Kuang Ma:
Fisherface vs. Eigenface in the Dual-tree Complex Wavelet Domain. 30-33
Techniques and Algorithms for Multimedia Security
- Hirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, Ryôichi Sasaki:
Security Evaluation of Biometrics Authentications for Cellular Phones. 34-39 - Maki Yoshida, Toru Fujiwara:
Watermarking Cryptographic Data. 40-43 - Takaaki Yamada, Yoshiyasu Takahashi, Ryu Ebisawa, Yoshinori Sato, Seiichi Susaki:
Evaluation of Audio Watermark System Using Short Detection Time Frame. 44-47 - Shinta Nakayama, Hiroshi Yoshiura, Isao Echizen:
Preventing False Positives in Content-Based Phishing Detection. 48-51 - Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
XPROB - A Generalized Pool-Based Anonymous Communication Framework. 52-55 - Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-aware Delegation of Personal Data using Digital Watermarking. 56-59 - Hirohisa Hioki:
Web behind Web - A Steganographic Web Framework. 60-63 - Rongling Lang, Hui Lu:
Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded Message. 64-67
Advanced Data Hiding and Coding Techniques for Audio Signals
- Akio Ogihara, Harumi Murata, Motoi Iwata, Akira Shiozaki:
Multi-Layer Audio Watermarking Based on Amplitude Modification. 68-71 - Kotaro Sonoda, Osamu Takizawa:
Audio Watermarking Using QIM on Wavelet Packet Coefficients. 72-75 - Kotaro Yamamoto, Munetoshi Iwakiri:
Robust Audio Watermarking with Time and Frequency Division. 76-81 - Kuniaki Imabeppu, Daiki Hamada, Masashi Unoki:
Embedding Limitations with Audio-watermarking Method Based on Cochlear-delay Characteristics. 82-85 - Kazuhiro Kondo:
A Data Hiding Method for Stereo Audio Signals Using the Polarity of the Inter-Channel Decorrelator. 86-89 - Raúl Martínez-Noriega, Mariko Nakano, Kazuhiko Yamaguchi:
On the Channel Characteristic of Dither Modulation Data Hiding for MP3 Compression. 90-93 - Yuan-Gen Wang, Yanqiang Lei:
A Robust Content in DCT Domain for Image Authentication. 94-97 - Guo-An Jian, Jui-Chin Chu, Jiun-In Guo:
Optimization of AVS-M Video Decoder for Real-time Implementation on Embedded RISC Processors. 98-101
Visual Based Context Awareness Computing
- Jiann-Shu Lee, Fong-Ping Chuang, Kuen-Horng Tsai:
Image Watermarking Based on Multiple Objective Genetic Algorithm. 102-105 - Yi-Chun Lee, Chin-Hsing Chen:
Feature Extraction for Face Recognition Based on Gabor Filters and Two-Dimensional Locality Preserving Projections. 106-109 - Hsiao-Chen Kuo, Jiann-Shu Lee, Sho-Tsung Kao:
An Autonomous License Plate Detection Method. 110-113 - Yung-Lung Kuo, Jiann-Shu Lee, Sho-Tsung Kao:
Eye Tracking in Visible Environment. 114-117 - Kuo-Wei Lin, Pau-Choo Chung:
Aspect Ratio Waves for Gait Analysis. 118-121 - Heng Li, Yanchun Zhong:
Adaptive Reed - Solomon Code Protection of Data Partitioned H.264 Video. 122-127 - Myoung-Jin Kim, Min-Cheol Hong:
Adaptive Rate Control Scheme in Frame-layer for Real-time H.264. 128-131
Steganography and Watermarkin
- Ching-Yu Yang, Wu-Chih Hu, Po-Yen Chang, Chang-Min Hwang:
A Semi-fragile Reversible Data Hiding by Coefficient-Bias Algorithm. 132-135 - Chen-Tsung Kuo, Da-Chun Wu, Shyi-Chyi Cheng:
3D Triangular Mesh Watermarking for Copyright Protection Using Moment-Preserving. 136-139 - Qingtang Su, Xianxi Liu, Steve Zhang:
Quality Evaluation of Digital Image Watermarking. 140-143 - Xiuli Lv, Hongyu Bian, Bo Yu, Xinghui Quan:
Color Image Watermarking Scheme Based on Support Vector Regression. 144-147 - Yuta Goto, Osamu Uchida:
Digital Watermarking Method for Printed Materials Embedding in Hue Component. 148-152 - Xun Gong, Hai-Ming Lu:
Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 Frames. 153-156 - Ming-Quan Fan, Hong-Xia Wang:
Time-Scale Invariant Zero-Watermarking Scheme for Audio. 157-160 - Yunkai Gao, Xiaolong Li, Bin Yang:
Employing Optimal Matrix for Efficient Matrix Embedding. 161-165
Advanced Multimedia Processing and Retrievals
- Kenji Nakamura, Takashi Toriu, Shigeyoshi Nakajima, Hiromitsu Hama:
An Attention Focusing Tree Based on Saliency and a Display Method for Small Displays. 166-169 - Shigeyoshi Nakajima, Kana Sugimoto, Takashi Toriu:
Collision Detection of 4-legged Robots Using Acceleration Sensors. 170-173 - Shuhei Miyatake, Hideya Takahashi, Kenji Yamada:
Three-Dimensional Circular Camera System for the Three-Dimensional Display Based on the Reconstruction of Parallax Rays. 174-177 - Kenichi Hirose, Takashi Toriu, Hiromitsu Hama:
Detection of Tire-Road Contact Point for Vehicle Position Estimate Considering Shape Distortion in a Circular Fisheye Image. 178-181 - Hiromitsu Hama, Thi Thi Zin, Pyke Tin:
Optimal Crawling Strategies for Multimedia Search Engines. 182-185 - Thi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama:
Dominant Color Embedded Markov Chain Model for Object Image Retrieval. 186-189 - Luke K. Wang, Shan-Chih Hsieh, Kou-Yuan Huang, Wen-Cheng Chen:
Mobile Sensor for Target Tracking via Modified Particle Filter. 190-193 - Ching-Yu Wu, Po-Chyi Su:
A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance Videos. 194-197
Wired and Wireless Multimedia Networking and Applications
- Ningping Sun, Kentarou Okumura, Wenling Sun:
A New Approach to the Dynamic Timeline of Animation Engine. 198-201 - Ningping Sun, Satoshi Tanaka, Wenling Sun:
An Alternative Algorithm of Triangulation of Polygons with Holes. 202-205 - Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi:
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. 206-209 - Zhufang Kuang, Guogui Yang:
Multi Path Based on Cache Notification Algorithm in Wireless Sensor Networks. 210-213 - Jer-Min Tsai, I-Te Chen, Jengnan Tzeng:
Random Number Generated from White Noise of Webcam. 214-217 - Szu-Hong Wang, Shih-Chang Hsia:
Quantization Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVC. 218-221 - Long-Chang Chen, Tsair-Fwu Lee, Pei-Ju Chao, Wen-Cheng Chen:
An Observer-Based Method for Secure Communication. 222-225 - Shih-Wei Kau, Wei-Ting Lu, Wen-Ping Chen, Tsair-Fwu Lee, Cheng-Nan Tsai:
Performance Study of Asymmetric Traffic Load for OBS Ring Networks. 226-229
Intelligent Surveillance and Pattern Recognition
- Shing-Han Li, Kuo-Chung Wang:
Applications of Ontology in Management of Information Asset. 230-233 - Ping-Lin Fan, Shih-Ying Chen, Wei-Hsien Wu, Joey Lin, Su-Ju Lu, Hsueh-Wu Wang, Yuan-Fan Tsai:
High Dynamic Range Color Image Rendering with Human Visual Adaptation Simulation. 234-237 - Chung-Hsin Liu, Chih-Chieh Fan:
The Design of Remote Surveillance System for Digital Family. 238-241 - Chung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, Chuen-Lung Chen:
To Build Tele-care System Network Environment. 242-245 - Chang-Lung Tsai, Wei-Lieh Hsu:
Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM Algorithm. 246-249 - Chih-Jen Lee, I-Horng Jeng, Tai-Ning Yang, Chun-Jung Chen, Peng Su:
Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier Filters. 250-253 - Kuo-Kai Hsu, Dwen-Ren Tsai:
Build a Home Security Surveillance System Using LEGO MINDSTORMS NXT. 254-257 - I-Horng Jeng, Dwen-Ren Tsai, Hou-An Chen, Yi-Chun Yen, Chien-Kang Cheng:
Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based on Hamilton-connected Subgraph Recognition. 258-261
Multimedia in Ubiquitous Computing and Application Services (1)
- Tzong-Chen Wu, Hung-Yu Chien:
Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. 262-265 - Jau-Ji Shen, Jia-Chiuan Wu:
Meaningful Inner Link Objects for Automatic Text Categorization. 266-269 - Chou Chen Yang, Ju-Chun Hsiao, Hung-Wen Yang:
Identity-Based DRM in Ubiquitous Multimedia System. 270-273 - Chia-Chen Lin, Po-Hsuan Chiang:
A Novel Mutual Authentication Based on Data Embedding Technique. 274-277 - Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin:
Embedding Secret Messages Using Modified Huffman Coding. 278-281 - Zhenfei Zhao, Hao Luo, Zhe-Ming Lu:
Joint Secret Image Sharing and Progressive Transmission Based on Integer Discrete Cosine Transform. 282-285 - Pengyu Liu, Kebin Jia:
A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm for H.264/AVC Based on the Characteristics of Macro-block. 286-289
Multimedia in Ubiquitous Computing and Application Services (2)
- Kuo Lung Hung, Yih Cheng Tsay:
A Fast Image Retrieval Method Using Multi-Feature Dimension Technique. 290-294 - Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, Chao-Lung Chou:
Secret Sharing Method for Gray-level Images. 295-298 - Chin-Chen Chang, Chia-Chen Lin, Pei-Yan Pai, Yen-Chang Chen:
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector. 299-302 - Ming-Yen Lin, Sue-Chen Hsueh, Ming-Hong Chen, Hong-Yang Hsu:
Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia Systems. 303-306 - Li-Chun Liao, Shin-Jung Gu, Bin-Chyi Tseng:
Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise Detectors. 307-311 - Nan Zhang, Siwei Ma:
H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter. 312-315 - Nan Zhang, Siwei Ma, Wen Gao:
Shape-Based Depth Map Coding. 316-319
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography
- Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, Mingchu Li:
Reversible Steganography for VQ Indices Using the Modified State Codebook. 320-323 - The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, Mingchu Li:
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. 324-327 - Zhenxing Qian, Xinpeng Zhang, Shuozhong Wang:
Matrix Selection in High Payload Embedding. 328-331 - Zhi-Fang Yang, Po-Chen Lee, Wei-Hung Chen, Jia-Guu Leu:
Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks. 332-335 - Hsu-Hung Chiang, Ching-Chung Liu, Ying-Ming Chen, Ya-Fen Chang:
Security of Indirect-Authenticated Key Exchange Protocol. 336-339 - Shinfeng D. Lin, Chih-Yao Chuang, Hsiang-Cheng Meng:
A Video Watermarking in H.264/AVC Encoder. 340-343 - Kazuyo Yoneda, Shinichi Tamura, Yoshinori Nishino, Kazuki Nakamura, Takio Shimosakon, Kyohei Shimada, Rong Long Wang, Kozo Okazaki:
Electrical Impedance Tomography for Washing out Undergound Pollution. 344-347 - Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. 348-352
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (2)
- Tzung-Her Chen, Yao-Sheng Lee:
Yet Another Friendly Progressive Visual Secret Sharing Scheme. 353-356 - Zhi-Fang Yang, Chih-Jung Su, Ping-Chang Tseng, Chan-Ting Shu:
Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation Resistant Watermarking. 357-360 - Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang:
An Embedding Technique Based upon Block Prediction and Code Cascading Shift. 361-364 - Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. 365-368 - Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, Jason Lin:
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. 369-373 - Tzu-Chuen Lu, Cheng-Chun Huang, Siang-Ru Liao:
Lossless Information Hiding Scheme Based on Predictive Coding. 374-377 - Jin-Bao Liu, Zhi-Long Qiu, Hui Zhou, Bao-Hui Liu, Xiamu Niu:
A Schema for Multi-Signature Handling Based on Workflow Model. 378-381 - Zhaoqing Liu, Qiong Li, Shuai Guan, Xiyuan Peng:
A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed Video. 382-385
Circuit Techniques for Multimedia Signal Processing
- Wen-Kai Tsai, Ming-Hwa Sheu, Ching-Lung Su, Jun-Jie Lin, Shau-Yin Tseng:
Image Object Detection and Tracking Implementation for Outdoor Scenes on an Embedded Soc Platform. 386-389 - Chao-Lieh Chen, Chien-Hao Lai:
Implementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless Networks. 390-393 - Ya-Hsin Hsueh, Wei-Da Chen:
An Implementation of Frame Rate Control for Reducing Flicker in CSTN Panel. 394-397 - Yang-Chiuan Lin, Hung-Yu Wang, Wei-Jeng Cheng:
A Novel Vehicle Brake Light System. 398-401 - Roger Y. Chen, Ming-Jen Chang:
A CMOS Variable-gain Fully-differential Transimpedance Amplifier for Multimedia Data Links. 402-405 - Zhe-Mao Hsu, I-Yao Chuang, Wen-Chien Su, Jen-Chieh Yeh, Jen-Kuei Yang, Shau-Yin Tseng:
System Performance Analyses on PAC Duo ESL Virtual Platform. 406-409 - Marek R. Ogiela, Urszula Ogiela:
Secret Sharing Protocol for Linguistic Threshold Schemes. 410-413 - Shinichi Tamura, Yuko Mizuno-Matsumoto, Yen-Wei Chen, Kazuki Nakamura:
Association and Abstraction on Neural Circuit Loop and Coding. 414-417
Network-Aware Multimedia: QoS and Security
- Fenglin Qin, Ju Liu, Lina Zheng, Liansheng Ge:
An Effective Network-Aware Peer Selection Algorithm in BitTorrent. 418-421 - Boyang Zhang, Ju Liu, Jinyu Chu, Jianping Qiao:
A Mutual Information Based Sub-Pixel Registration Method for Image Super Resolution. 422-425 - Jie Ling, Ju Liu, Zhaowan Sun:
Performance Comparison of Several Watermarking Methods Based on ICA and AQIM. 426-429 - Xiushan Nie, Ju Liu, Xianqing Wang, Jiande Sun:
Watermarking for 3D Triangular Meshes Based on SVD. 430-433 - Chun-Xing Wang, Xiushan Nie, Xianqing Wan, Wenbo Wan, Feng Chao:
A Blind Video Watermarking Scheme Based on DWT. 434-437 - Rong-Song He:
Optimizing Constrained Mixed-Integer Nonlinear Programming Problems Using Nature Selection. 438-441 - Cagatay Karabat:
A Novel Secure RFID System to Ensure Privacy. 442-445 - Luke K. Wang, Shan-Chih Hsieh, Kou-Yuan Huang, Chien-Chang Wu:
Target Tracking in Clusters of Sensor Networks via Handoff Scheme with Extended Kalman Filter. 446-449
Semantic Annotation and Retrieval Techniques for Image and Video Databases
- Qingyong Li, Weitao Lu:
A Histogram Descriptor Based on Co-occurrence Matrix and its Application in Cloud Image Indexing and Retrieval. 450-454 - Lili Wan, Zhenjiang Miao:
3D Object Classification by Fuzzy KNN and Bayesian Decision. 455-458 - Tao Yang, Hongli Xu:
An Image Index Algorithm Based on Hierarchical Clustering. 459-462 - Guanghua Gu, Yao Zhao, Zhenfeng Zhu:
An Integrative Codebook for Natural Scene Categorization. 463-466 - Tao Zhang, Wenxue Hong, Jinjia Wang:
A Novel Texture Analysis Method Based on Graph Spectral Theory. 467-470 - Lin Li, Lingfu Kong:
Image Denoising Based on Non-local Means with Wiener Filtering in Wavelet Domain. 471-474 - Hung-Yi Lin, Shih-Ying Chen:
Indexing and Querying in Multimedia Databases. 475-478 - Jinwoo Kim, Robert Close, Hisashi Taketani, Rong Long Wang, Kozo Okazaki, Shinichi Tamura:
Orthogonal Functional Expansion Method of Optical Flow for Large Displacement. 479-482
Recent Technologies and Applications of Audio Data Hiding
- Akira Nishimura:
Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech Codec. 483-486 - Naofumi Aoki:
Improvement of a Band Extension Technique for G.711 Telephony Speech by Using Steganography. 487-490 - Akinori Ito, Hironori Handa, Yôiti Suzuki:
A Band Extension of G.711 Speech with Low Computational Cost for Data Hiding Application. 491-494 - Akinori Ito, Shozo Makino:
Data Hiding is a Better Way for Transmitting Side Information for MP3 Bitstream. 495-498 - Toshio Modegi:
Spatial and Temporal Position Information Delivery to Mobile Terminals Using Audio Watermarking Techniques. 499-502 - Yi Gao, John Han, Lei Lin, Congde Lu, Qin Yang:
Chinese Name Speech Classification Using Fisher Score Based on Continuous Density Hidden Markov Models. 503-506 - Kai-En Tsay, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang:
Personal Photo Organizer Based on Automated Annotation Framework. 507-510 - Jiann-Jone Chen, Chun-Rong Su:
Volume Image Segmentaton by Dual Multi-Scale Morphological Reconstructions. 511-514
Intelligent Image and Signal Processing
- Chuin-Mu Wang, Ming-Ju Wu, Jian-Hong Chen, Cheng-Yi Yu:
Extension Neural Network Approach to Classification of Brain MRI. 515-517 - Bao Rong Chang, Hsiu Fen Tsai:
Applying Visual Image and Satellite Positioning for Fast Vehicle Detection and Lane Marking Recognition. 518-521 - Chin-Ho Chung, Wen-Yuan Chen, Ching-Ming Tu:
Image Hidden Technique Using QR-Barcode. 522-525 - Lung-Tsai Li, Chin-Fu Tsai, Ming-Shing Young:
Design of a System with a Multielement Thermopile for Monitoring the Temperature of Indoor Objects. 526-529 - Chin-Fu Tsai, Lung-Tsai Li, Chin-Hao Li, Ming-Shing Young:
Implementation of Thermistor Linearization Using LabVIEW. 530-533 - Ching-Hwa Cheng, Chiou-Kou Tung, Shao-Hui Shieh, Yu-Cherng Hung:
Design High-Performance and Low-Power Adder Cores with Full-Swing Nodes for Embedded Systems. 534-537 - Yu-Cherng Hung, Min-Ming Kuo, Chiou-Kou Tung, Shao-Hui Shieh:
High-Speed CMOS Chip Design for Manchester and Miller Encoder. 538-541 - Ching-Hsi Lu, Hong-Yang Hsu, Lei Wang:
A New Contrast Enhancement Technique Implemented on FPGA for Real Time Image Processing. 542-545
Digital Forensics and Data Hiding Discovery
- Antonio Savoldi, Paolo Gubian, Isao Echizen:
A Comparison between Windows Mobile and Symbian S60 Embedded Forensics. 546-550 - Marina Ponomar:
On Acceptable Modification Limits of Electroacoustic Speech Signals for Data Hiding. 551-554 - Wen-Pinn Fang:
Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift Style. 555-558 - Chin-Lun Lai, Shu-Wen Chang:
An Image Processing Based Visual Compensation System for Vision Defects. 559-562 - Hirofumi Otori, Shigeru Kuriyama:
Robust Data Hiding on Texture Images. 563-566 - Joo-Yeon Hwang, Min-Cheol Hong:
An Adaptive Gradient-Projection Image Restoration Using Local Statistics and Estimated Noise Characteristics. 567-570 - Xiao Yi Yu, Aiming Wang:
Histogram Shifting Lossless Data Hiding Based on Space Filling Curves. 571-574 - Ali Ameri Mahabadi, Mohammad Eshghi:
Half-Zone Quantization Based Algorithm for Information Hiding. 575-578
Intelligent Document Processing and Management Systems
- Dominic Wong:
Adapting e-TOM Model to Improve Multimedia Network Management-A Case Study with a Taiwan Multimedia Service Provider. 579-582 - Yu-Fen Fu, Cheng-Seen Ho:
A Fast Text-Based Communication System for Handicapped Aphasiacs. 583-594 - Jiann-Gwo Doong:
Document Filing Approaches Using an Internal Based Folder Organization. 595-598 - Hung-Peng Lee, Kunta Hsiesh:
Fast Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue Code. 599-603 - Huifang Deng, Wen Deng:
Identity Authentication in RFID Based Logistics-Customs Clearance Service Platform. 604-607 - Jun-Bao Li, Longjiang Yu, Shize Guo:
Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object Description. 608-611 - Chung-Hong Lee, Hsin-Chang Yang, Chih-Hong Wu, Yi-Ju Li:
A Multilingual Patent Text-Mining Approach for Computing Relatedness Evaluation of Patent Documents. 612-615 - Mohammad Shahram Moin, Mehdi Parviz:
Exploring AUC Boosting Approach in Multimodal Biometrics Score Level Fusion. 616-619
Protection and Authentication for Multimedia Information
- Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, Chien-Ting Huang:
Palette Partition Based Data Hiding for Color Images. 620-623 - Chin-Chen Chang, Yung-Chen Chou, Ming-Huang Hsieh:
A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments. 624-627 - Wen-Chuan Wu, Guang-Ruei Ren:
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle. 628-631 - Chin-Feng Lee, Hsing-Ling Chen:
Data Concealment Scheme for HTML Documents Based on Color Code. 632-635 - Chih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang, Kuan-Ju Chen:
Multipurpose Watermarking Method Based on Blind Vector Quantization. 636-639 - Wei-Lieh Hsu, Chang-Lung Tsai, Po-Lun Chang:
Automatic Traffic Monitoring Method Based on Cellular Model. 640-643 - Mengbo Hou, Qiuliang Xu, Tao Ban:
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. 644-647 - Hassana Grema Kaganami, Beiji Zou, M. Sami Soliman:
Advanced Color Images Enhancement Using Wavelet and K-means Clustering. 648-652
Behavior Analysis and Abnormal Event Detection
- Duan-Yu Chen, Kuan-Yi Lin:
A Novel Viewer Counter for Digital Billboards. 653-656 - Sin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, Yung-Sheng Chen:
Vehicle Retrieval Using Eigen Color and Multiple Instance Learning. 657-660 - Chung-Chi Tsai, Chin-Song Wu, Ching-Yu Wu, Po-Chyi Su:
Towards Efficient Copy Detection for Digital Videos by Using Spatial and Temporal Features. 661-664 - Yu-Dun Lin, Wen-Yu Tseng, Cheng-Jie Hsu, Chia-Hung Yeh:
Driving Situations Understanding through Content Rhythm Analysis. 665-668 - Hao-Chung Shih, Chian C. Ho, Hsuan T. Chang, Chin-Song Wu:
Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling Verification. 669-672 - Yea-Shuan Huang, Wei-Cheng Liu:
Face Recognition Based on Complementary Matching of Single Image and Sequential Images. 673-676 - Tsair-Fwu Lee, Chang-Yu Lee, Pei-Ju Chao, Chang-Yu Wang:
Precision Segmentation Rendering for 3-D Coronary Angiography Medical Image. 677-680 - Yihun Alemu, Jong-bin Koh, Muhammad Ikram, Dong-Kyoo Kim:
Image Retrieval in Multimedia Databases: A Survey. 681-689
Statistical Image Processing and Application
- Huchuan Lu, Wenling Zhang, Fan Yang, Xiaojing Wang:
Robust Tracking Based on PSO and On-line AdaBoost. 690-693 - Haiyan Fu, Xiangwei Kong, Shijie Jia, Yanqing Guo:
Visual Search Based on Contour Salient. 694-697 - Nan Ding, Honglian Ma, Guozhen Tan:
The Parallelization Design of Chaotic Encryption System Based on Mulit-level Shuffle-Exchange Network. 698-701 - Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng:
Source Camera Identification Forensics Based on Wavelet Features. 702-705 - Bin Li, Xiangwei Kong, Zhe Wang, Haiyan Fu:
SIFT-Based Image Retrieval Combining the Distance Measure of Global Image and Sub-Image. 706-709 - Ying Hou, Yi Sun:
Level Set-Based Semiautomatic Bolus Segmentation in Bolus-Chasing CTA. 710-713 - Wenqi Liu, Jianhua Yang, Zhixin Li:
Fairness Analysis of Electronic Commerce Protocol Based on Strand Space. 714-717 - Jie He, Kebin Jia, Zhuoyi Lv:
A Fast and Robust Algorithm of Detection and Segmentation for Moving Object. 718-721
Human Information Processing and Its Applications
- Yoshihiro Nakamura:
Unskilled User Support for Network Operation Based on Service Composition Using Web Ontology Languages. 722-727 - Hironori Takimoto, Hironobu Fukai, Yasue Mitsukura, Minoru Fukumi:
An Analysis of the Influence of Facial Feature for Apparent Age Estimation. 728-731 - Tsukasa Nakamura, Shin-Ichi Ito, Yasue Mitsukura, Hiroto Setokawa:
A Method for Evaluating the Degree of Human's Preference Based on EEG Analysis. 732-735 - Koichiro Goya, Xiaoxue Zhang, Kouki Kitayama, Itaru Nagayama:
A Method for Automatic Detection of Crimes for Public Security by Using Motion Analysis. 736-741 - Seiji Ito, Yoshinari Oguro:
A High Speed Mixel Estimation Method by Using the Genetic Algorithm. 742-745 - Seiki Yoshimori, Hironori Takimoto, Yasue Mitsukura, Minoru Fukumi:
An Important Facial Parts Analysis for Evaluating the Impression - Difference by Gender. 746-749 - Ya-Fen Chang, Yen-Cheng Lai, Mu-Yen Chen:
Further Remarks on Identity-Based RSA Multi-signature. 750-753 - Yifeng Lu, Xiaolong Li, Bin Yang:
A ±1-Based Steganography by Minimizing the Distortion of First Order Statistics. 754-758
Multimedia Signal Processing for Plasma Diagnostics
- Teruhisa Hochin, Yoshihiro Yamauchi, Hiroki Nomiya, Hideya Nakanishi, Mamoru Kojima:
Fast Subsequence Matching in Plasma Waveform Databases. 759-762 - Eunjoo Choi, Jiayong Zhong, Shinsuke Fujioka, Hiroyuki Shiraga, Hiroshi Azechi:
Image Processing in Ultra Fast X-ray Imaging with Streak Cameras for Laser Fusion Research. 763-766 - Tatsuki Ueda, Shinsuke Fujioka, Shinya Nozaki, Yen-Wei Chen, Hiroaki Nishimura:
Improvements of Signal-to-noise Ratio Utilizing Penumbral Imaging with M-sequences Aperture and Its Heuristic Scheme. 767-770 - Shinya Nozaki, Yen-Wei Chen, Shinsuke Fujioka, Tatsuki Ueda, Yoshinori Namihira:
A Heuristic Decoding Method for Coded Images of Random Uniformly Redundant Array. 771-774 - Yen-Wei Chen, Chen-Lun Lin, Aya Mimori:
Particle Swarm Optimization for Reconstruction of Penumbral Images. 775-778 - Constantinos Patsakis, Evangellos Fountas:
Creating RSA Trapdoors Using Lagrange Four Square Theorem. 779-782 - Xiu-ying Ma, Jia-jun Lin:
Imperceptibility Evaluation for Color Stego Image. 783-786 - Seyed Mojtaba Seyedhosseini Tarzjani, Shahrokh Ghaemmaghami:
Detection of LSB Replacement and LSB Matching Steganography Using Gray Level Run Length Matrix. 787-790
Ubiquitous Multimedia Services and Applications for Residential Users (1)
- Jui-Fang Chang, Chi-Ming Kuan, Yu-Wen Lin:
Forecasting Exchange Rates by Genetic Algorithms Based Back Propagation Network Model. 791-794 - Feng-Cheng Chang, Hsiang-Cheh Huang:
A Study on the Cache Miss Rate in a Genetic Algorithm Implementation. 795-798 - Chuan-Yu Chang, Ru-Hao Jian, Hung-Jen Wang:
Two-phase Fuzzy-ART with Independent Component Analysis for Semantic Image Classification. 799-802 - Yuh-Ming Cheng:
Using ZigBee and Room-Based Location Technology to Constructing an Indoor Location-Based Service Platform. 803-806 - Minhao Liu, Yunbiao Guo, Linna Zhou:
Text Steganography Based on Online Chat. 807-810 - Qi Han, Qiong Li, Xiamu Niu:
Perceptual Content Authentication and Tamper Detection of Facial Image. 811-814 - Young-Ho Song, Taeck-Geun Kwon:
Fast Channel Change IPTV System for Enhanced User Experience. 815-818 - Toshihiko Sasama, Hiroshi Mitsumoto, Kazuyo Yoneda, Shinichi Tamura:
Mental Rotation by Neural Network. 819-822
Ubiquitous Multimedia Services and Applications for Residential Users (2)
- Yi-Ting Chen, Shu-Chuan Chu, Mong-Fong Horng, Jeng-Shyang Pan:
An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone Images. 823-827 - Jinn-Kwei Guo, Chun-Lin Lu, Ju-Yun Chang, Yi-Jing Li, Ya-Chi Huang, Fu-Jiun Lu, Ching-Wen Hsu:
Interactive Voice-Controller Applied to Home Automation. 828-831 - Zhi Chai, Kai-Kuang Ma, Zhengguang Liu:
Complex Wavelet-Based Face Recognition Using Independent Component Analysis. 832-835 - Hsiang-Cheh Huang, Feng-Cheng Chang:
Similarity-Based Watermarking for Sub-Sampling Images with Bacterial Foraging Techniques. 836-839 - Chun-Chieh Tseng, Jia-Hao Wu, Bin-Yih Liao:
Defect Detection of Skewed Images for Multilayer Ceramic Capacitors. 840-843 - Wei Kuang Lai, Mu-Lung Weng, Chien-Hua Lin, Chin-Shiuh Shieh:
Adaptive Multicast Routing Protocol for Wireless Mobile Ad Hoc Networks. 844-847 - Jing He, Yan Huang, Xinyu Xu:
An Efficient Architecture for Deblocking Filter in H.264/AVC. 848-851 - Mao Nakajima, Minoru Watanabe:
A 13.75 ns Holographic Reconfiguration of an Optically Differential Reconfigurable Gate Array. 852-855
Coding and Protocols in Security and Applications
- Chung-Huang Yang, Kuang-Li Ting:
Fast Deployment of Botnet Detection with Traffic Monitoring. 856-860 - Chung-Ming Ou, Chung-Ren Ou:
Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRM. 861-864 - Jen-Chun Chang, Hsin-Lung Wu:
A Hybrid RFID Protocol against Tracking Attacks. 865-868 - Narn-Yih Lee, Tzu-Yi Lee:
User Friendly Digital Rights Management System Based on Smart Cards. 869-872 - Wei-Chen Wu, Yi-Ming Chen:
TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks. 873-876 - Yasuhiro Matsuda, Tsuneshi Isomura:
Emotion Feature Vector of Finger Braille. 877-880 - Wenfa Qi, Xiaolong Li, Bin Yang:
Bilinear Coons Patch and its Application in Security Pattern Design. 881-884 - Jun-Da Txia, Chung-Lin Huang:
Age Estimation Using AAM and Local Facial Features. 885-888
Coding and Protocols in Security and Applications (2)
- Tzung-Her Chen, Yan-Ting Wu, Yue-Rong Lin:
Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression. 889-892 - Chien-Lung Chan, Chia-Li Lin:
Determinants of Satisfaction and Intention of Use Self-service Technology - Technology Readiness and Computer Self-efficacy. 893-897 - Yu-Wei Lai, Chin-Chen Chang, Shih-Chang Chang:
Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve. 898-901 - Chin-Chen Chang, Chia-Yin Lee, Wei-Bin Lee:
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. 902-904 - Gang-Zeng Mao, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang:
Real-Time Hand Detection and Tracking against Complex Background. 905-908 - Yosuke Horiuchi, Osamu Uchida:
A Falsification Prevention Method for Face Authentication Using Light. 909-912 - Ehsan Ehsani, M. Shahram Moin, Farbod Razzazi:
Image Watermarking in Face Recognition Systems Based on Contourlet Transform. 913-916 - Guang Xu, Hong An, Gu Liu, Ping Yao, Mu Xu, Wenting Han, Xiaoqiang Li, Xiurui Hao:
Performance and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream Processor Architectures. 917-920
Advanced Reversible Data Hiding and Steganalysis
- Xinshan Zhu, Yun Yang, Yanming Chen:
Novel Robust Image Watermarking Exploiting the Features of Double Domains. 921-924 - Yongge Liu, Yanqiang Ge:
Study on Digital Watermarking in the Oracle Bone Inscriptions Rubbings. 925-928 - Qinxia Wu, Weiping Li, Xiao Yi Yu:
Revisit Steganalysis on QIM-Based Data Hiding. 929-932 - Xiao Yi Yu, Aiming Wang:
Chain Coding Based Data Hiding in Binary Images. 933-936 - Brian K. Lien:
Robust Data Hiding by Hilbert Curve Decomposition. 937-940 - Xiangfei Sun, Qiuliang Xu, Tao Ban:
Identity Based Authenticated Key Agreement for Tree-Based Group. 941-944 - Mao Ye, Fenlin Liu, Chunfang Yang, Xiongfei He:
Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography. 945-948 - Shang-Kuan Chen, Sian-Jheng Lin:
Non-expansible Flip-flop Visual Cryptography with Perfect Security. 949-952
Intelligent Image Fusion and Its Application
- Naizhang Feng, Mingjian Sun, Liyong Ma, Jiachen Ma:
Curvelet Based Image Fusion for Ultrasound Contrast Harmonic Imaging. 953-956 - Liyong Ma, Yude Sun, Naizhang Feng, Zheng Liu:
Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity Detecting. 957-960 - Yuhao Gu, Qing Lin, Bo Hu, Xiao Bo:
A Fast Medical Image Registration Based on Steerable Pyramid. 961-964 - Miao Zhang, Qiang Wang, Yi Shen, Bo Zhang:
Hyperspectral Feature Selection Based on Mutual Information and Nonlinear Correlation Coefficient. 965-968 - Jiasheng Hao, Yi Shen, Hongbing Xu, Jianxiao Zou:
Generalized Local Priority Based Medical Image Fusion Scheme. 969-972 - Jiang Wang, Jian Qiu Zhang:
An Iterative Refinement DSA Image Registration Algorithm Using Structural Image Quality Measure. 973-976 - Ran-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang, Shyong Jian Shyu:
Multisecret Image Sharing. 977-980 - Weilan Wang:
Study of Thangka Image Retrieval and Multimedia Presentation Management System. 981-984
Internet Multimedia Technology and Applications
- Hung-Wei Lin, Kuo-Chih Chu, Wei-Tsong Lee, Jim-Min Lin:
Seamless Handover for Multimedia Applications between Heterogeneous Wireless Networks. 985-988 - Po-Chang Huang, Kuo-Chih Chu, Hsiang-Fu Lo, Wei-Tsong Lee, Tin Yu Wu:
A Novel Adaptive FEC and Interleaving Architecture for H.264/SVC Wireless Video Transmission. 989-992 - Chia-Ming Lee, Shang-Rong Tsai, Yu-Sheng Huang, Yuan-Liang Tai, Guang-Hung Huang, Hewijin Christine Jiau:
Information Objects Encapsulating Multimedia and Intelligence. 993-997 - Pang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang, Ting-Wei Hou:
A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java Processor. 998-1001 - Hewijin Christine Jiau, Ming Lun Lee:
Automatic Internet Media Clipper. 1002-1005 - Feng-Pu Yang, Hewijin Christine Jiau, Kuo-Feng Ssu:
IDEA: An Interest-DrivEn Architecture for Establishing Personalized Semantic Infrastructure. 1006-1009 - Yanan Wang, Di Wu, Hui Zhang, Xiamu Niu:
A Robust Contourlet Based Image Hash Algorithm. 1010-1013 - Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Reversible Secret Image Sharing Based on Shamir's Scheme. 1014-1017
Multimedia Signal Processing for Intelligent Applications
- Cheng-Chang Lien, Ya-Lin Huang, Chin-Chuan Han:
People Counting Using Multi-Mode Multi-Target Tracking Scheme. 1018-1021 - Fang-Hsuan Cheng, Cheng-Yuan Chang:
Human Behavior Description Model Based on Action Recognition. 1022-1025 - Jau-Ling Shih, Chang-Hsing Lee, Chih-Hsun Chou, Yu-Cheng Chang:
A New Feature Integration Approach and Its Application to 3D Model Retrieval. 1026-1029 - Chang-Hsing Lee, Hwai-San Lin, Chih-Hsun Chou, Jau-Ling Shih:
Modulation Spectral Analysis of Static and Transitional Information of Cepstral and Spectral Features for Music Genre Classification. 1030-1033 - Yuan-Kai Wang, Cai-Ren Huang:
Face Image Super-Resolution Using Two-dimensional Locality Preserving Projection. 1034-1037 - Jengnan Tzeng, I-Te Chen, Jer-Min Tsai:
Random Number Generator Designed by the Divergence of Scaling Functions. 1038-1041 - Hao Wang, Qiuliang Xu, Tao Ban:
A Provably Secure Two-Party Attribute-Based Key Agreement Protocol. 1042-1045 - Yifeng Lu, Xiaolong Li, Bin Yang:
A Secure Steganography: Noisy Region Embedding. 1046-1051
Advances in Biometrics (1)
- Martin Drahanský, Dana Lodrova:
Experiments with Optical Liveness Testing Method. 1052-1055 - Claudia Nickel, Christoph Busch, Xuebing Zhou:
Template Protection via Piecewise Hashing. 1056-1060 - Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper:
Feature Correlation Attack on Biometric Privacy Protection Schemes. 1061-1065 - Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog:
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. 1066-1071 - Patrick Bours, Christopher Johnsrud Fullu:
A Login System Using Mouse Dynamics. 1072-1077 - Xiuxin Chen, Kebin Jia, Zhipin Deng:
A Video Retrieval Algorithm Based on Spatio-temporal Feature Curves and Key Frames. 1078-1081 - Cagatay Karabat, Hakan Erdogan:
A Cancelable Biometric Hashing for Secure Biometric Verification System. 1082-1085 - Wei-Ho Tsai, Wei-Che Hsieh:
Blind Clustering of Music Recordings Based on Audio Fingerprinting. 1086-1089
Advances in Biometrics (2)
- Daniel Hartung, Christoph Busch:
Why Vein Recognition Needs Privacy Protection. 1090-1095 - Robert Mueller, Raul Sánchez-Reillo:
An Approach to Biometric Identity Management Using Low Cost Equipment. 1096-1100 - Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
Template Protection for Multimodal Biometric System. 1101-1104 - Stephen D. Wolthusen, Christoph Busch:
Non-Forensic Odontological Biometrics. 1105-1109 - Jakub Galka, Mariusz Ziólko:
Mean Best Basis Algorithm for Wavelet Speech Parameterization. 1110-1113 - Javad RavanJamJah, Soodeh Bakhshandeh, Seyed Bahram Zahir Azami:
A Steganalysis Algorithm Based on Denoising of Source Image Using ICA and SVM. 1114-1117 - Xiao Yi Yu, Aiming Wang:
An Investigation of Genetic Algorithm on Steganalysis Techniques. 1118-1121 - Satoshi Yairi, Yukio Iwaya, Maori Kobayashi, Makoto Otani, Yôiti Suzuki, Takeru Chiba:
The Effects of Ambient Sounds on the Quality of 3D Virtual Sound Space. 1122-1125
Digital Archives and Digital Heritages
- Fuminori Kimura, Akira Maeda:
Construction of Ancient-Modern Word Dictionary from Parallel Corpus of Ancient Writings and Their Translations in Modern Language. 1126-1129 - Kingkarn Sookhanaphibarn, Ruck Thawonmas:
A Framework for Design and Evaluation of Digital Museums in Second Life as Learning Institutions. 1130-1133 - Junichi Oda, Ruck Thawonmas, Kuan-Ta Chen:
Comparison of User Trajectories Based on Coordinate Data and State Transitions. 1134-1137 - Masakazu Sawai, Yuzuru Isoda, Akihiro Tsukamoto, Yoshihiro Kosaka, Kyoko Hasegawa, Susumu Nakata, Satoshi Tanaka:
Automatic Modeling of Virtual 3D Streets Based on GIS Data - Application to Generation of Kyoto in the Edo Era. 1138-1143 - Tsuyoshi Matsuoka, Asako Soga, Kazuhiro Fujita:
A Retrieval System for Ballet Steps Using Three-dimensional Motion Data. 1144-1147 - Masahito Shiba:
A Method of Managing Distributed Contents in Heterogeneous Servers. 1148-1151 - Hung-Min Sun, Cheng-Ta Yang, Yue-Hsun Lin, Mu-En Wu:
A Pair-wise Key Establishment for Wireless Sensor Networks. 1152-1155 - Guibin Zheng, Miao Li, Jiqing Han, Tieran Zheng:
A Fast Audio Retrieval Method Based on Negativity Judgment. 1156-1159
Digital Archives and Digital Heritages (2)
- Kohei Furukawa, Ryo Akama, Chisako Hirose, Kozaburo Hachimura:
Digital Reconstruction of a Historical Kabuki Theater. 1160-1163 - Woong Choi, Hiroyuki Sekiguchi, Kozaburo Hachimura:
Analysis of Gait Motion by Using Motion Capture in the Japanese Traditional Performing Arts. 1164-1167 - Xin Yin, Kazuyoshi Nomura, Hiromi T. Tanaka:
Extracting Tactile Sensation Information from Multi-illuminated Images of Tangible Cultural Property. 1168-1171 - Mamiko Sakata, Sayaka Wakamiya:
An Analysis of Body Movement on Music Expressivity Using Motion Capture. 1172-1176 - Woong Choi, Takatoshi Ono, Kozaburo Hachimura:
Body Motion Analysis for Similarity Retrieval of Motion Data and Its Evaluation. 1177-1180 - Jian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu:
An Automated On-line Traffic Flow Classification Scheme. 1181-1184 - Tanya Ignatenko, Frans M. J. Willems:
Achieving Secure Fuzzy Commitment Scheme for Optical PUFs. 1185-1188 - Ryouichi Nishimura:
Information Hiding into Interaural Phase Differences for Stereo Audio Signals. 1189-1192
Application of Intelligent Computing to Signal and Image Processing
- Chu-Zheng Wang, Xian-Hua Han, Masahiro Ito, Ikuko Nishikawa, Yen-Wei Chen:
Principal Component Analysis for Prediction of O-Linked Glycosylation Sites in Protein by Multi-Layered Neural Networks. 1193-1196 - Caifen Wang, Xiaodong Yang, Caihui Lan, Xiaojun Cao:
An Efficient Identity-Based Certified E-mail Protocol. 1197-1200 - Xiang-Yan Zeng, Yen-Wei Chen, Caixia Tao:
Denoising by Anisotropic Diffusion in ICA Subspace. 1201-1204 - Xiang-Yan Zeng, Yen-Wei Chen, Caixia Tao, Deborah van Alphen:
Feature Selection Using Recursive Feature Elimination for Handwritten Digit Recognition. 1205-1208 - Yukiko Nakajima, Kazutoshi Sakakibara, Masahiro Ito, Ikuko Nishikawa:
Prediction of the O-glycosylation by Support Vector Machines and Characteristics of the Crowded and Isolated O-glycosylation Sites. 1209-1212 - Xinyin Huang, Yan Zhang, Aibing Xu, Hisashi Kawabayashi, Yen-Wei Chen:
A Research on Social Anxiety Individuals' Emotion Recognition Using IEC. 1213-1216 - Hassana Grema Kaganami, Beiji Zou:
Region-Based Segmentation versus Edge Detection. 1217-1221 - Ying Dai:
Representing Meanings of Images Based on Associative Values with Lexicons. 1222-1227
Advances in Multimedia Signal Processing and Communications
- Chin-Feng Lai, Yi-Wei Ma, Chia-Cheng Hu, Yueh-Min Huang:
P2P Multimedia Streaming Schedule for Maximum Network Capacity. 1228-1231 - Jen-Wen Ding, Guan-Wei Wu, Der-Jiunn Deng:
Optimal Rate Allocation and Admission Control Policy for P2P On-Demand Streaming Systems. 1232-1235 - Ming-Fong Tsai, Chih-Heng Ke, Chun-I Kuo, Ce-Kuen Shieh:
Path Dependent Adaptive Forward Error Correction with Multipath Interleaving Control Scheme for Video Streaming over Wireless Networks. 1236-1239 - Kawuu Weicheng Lin, Ming-Hua Hsieh, Vincent S. Tseng:
Mining Temporal Region-Based Service Patterns for Cooperative Caching in Wireless Multimedia Sensor Networks. 1240-1244 - Mei-Yi Wu, Chuan-Chi Hsu, Jia-Hong Lee:
A GeoTagging Scheme Using Image Steganography and GPS Information Authentication. 1245-1248 - Huei-Yu Yang, Ya-Chun Li, Feng-Yi Chou, Tin Yu Wu, Wei-Tsong Lee:
Pre-Register Algorithm for SVC by Fast BSS Transition Wireless Networks. 1249-1252 - Chuen-Ching Wang, Ming-Jun Chi, Yao-Tang Chang:
New Watermarking Algorithm with Coding Efficiency Improvement and Authentication in Video Surveillance. 1253-1257 - Wen-Chien Yen, Yen-Yu Chen, Ying-Wen Chang:
An Enlargement Method Using Undecimated Wavelet Transform and Shape Function. 1258-1261
Multimedia Signal Processing and Application
- Menrit Samir Fahmy:
New Approach for Cancer Computer Aided Diagnosis and Treatment. 1262-1265 - Tomoko Tateyama, Amir Hossein Foruzan, Yen-Wei Chen:
2D-PCA Based Statistical Shape Model from few Medical Samples. 1266-1269 - Qi Xi, Xing Wu, Shensheng Zhang:
Compound Image Compression with Multi-step Text Extraction Method. 1270-1273 - Masataka Seo, Yen-Wei Chen:
Face Image Metamorphosis with an Improved Multilevel B-Spline Approximation. 1274-1277 - Hisashi Kawabayashi, Mohammad Khazab, Jeffrey Tweedale, Lakhmi C. Jain, Yen-Wei Chen:
Remote Control System of Artificial Fish School and Its Fast Implementation. 1278-1281 - Xian-Hua Han, Yen-Wei Chen:
Image Categorization by Learned PCA Subspace of Combined Visual-words and Low-level Features. 1282-1285 - Minoru Kuribayashi, Hiroshi Kato, Masakatu Morii:
A Study of Rounding Error on CDMA-Based Fingerprinting Scheme. 1286-1289 - Mariusz Ziólko, Bartosz Ziólko, Rafal Samborski:
Dual-Microphone Speech Extraction from Signals with Audio Background. 1290-1292
Multi-Dimensional Signal Processing, Modeling and Visualization
- Amir Hossein Foruzan, Yen-Wei Chen, Reza Aghaeizadeh Zoroofi, Akira Furukawa, Yoshinobu Sato, Masatoshi Hori:
Multi-mode Narrow-band Thresholding with Application in Liver Segmentation from Low-contrast CT Images. 1293-1296 - Farshid Babapour Mofrad, Reza Aghaeizadeh Zoroofi, Yen-Wei Chen, Ali Abbaspour Tehrani-Fard, Yoshinobu Sato, Akira Furukawa:
Evaluation of Liver Shape Approximation and Characterization. 1297-1300 - Hideo Nakajima, Kyoko Hasegawa, Susumu Nakata, Satoshi Tanaka:
Volume Visualization with Grid-Independent Adaptive Monte Carlo Sampling. 1301-1304 - Tomohiro Nakamichi, Gang Xu:
Detection and 3D Measurement of a Rectangular Solid in a Single Image. 1305-1309 - Pooneh R. Tabrizi, Reza Aghaeizadeh Zoroofi:
Drowsiness Detection Based on Brightness and Numeral Features of Eye Image. 1310-1313 - Alireza Ghahari, Y. Rakhshani Fatmehsari, Reza Aghaeizadeh Zoroofi:
A Novel Clustering-Based Feature Extraction Method for an Automatic Facial Expression Analysis System. 1314-1317 - Mohammad Hosntalab, Reza Aghaeizadeh Zoroofi, Ali Abbaspour Tehrani-Fard, Gholamreza Shirani:
Automated Dental Recognition in MSCT Images for Human Identification. 1318-1321 - Yu-Long Qiao, Chun-Yan Song:
Double-Density Dual-Tree Wavelet Transform Based Texture Classification. 1322-1325
Image Processing and VLSI Implementation
- Hiroki Sugano, Ryusuke Miyamoto:
Parallel Implementation of Good Feature Extraction for Tracking on the Cell Processor with OpenCV Interface. 1326-1329 - Ryoji Kadota, Hiroki Sugano, Masayuki Hiromoto, Hiroyuki Ochi, Ryusuke Miyamoto, Yukihiro Nakamura:
Hardware Architecture for HOG Feature Extraction. 1330-1333 - Jingbang Qiu, Ying Lu, Tianci Huang, Takeshi Ikenaga:
An FPGA-Based Real-Time Hardware Accelerator for Orientation Calculation Part in SIFT. 1334-1337 - Tianci Huang, Chengjiao Guo, Jingbang Qiu, Takeshi Ikenaga:
Temporal Information Cooperated Gaussian Mixture Models for Real-time Surveillance with Ghost Detection. 1338-1341 - Yohei Fukumizu, Tomoaki Takano, Yasuyuki Oshima, Toshihiko Terada, Hironori Yamauchi:
A Gabor Pseudo Fisherface Based Face Recognition Algorithm for LSI Implementation. 1342-1345 - Gen Fujita, Tomokazu Matsuno:
An Approach to Video Coding Using Parameter Estimation in the Decoding Process. 1346-1349 - Ali Ghorbanian, Amir Mousavinia:
Wavelet-Based Sequence Codec Implementation on TMS320DM642. 1350-1353 - Pachara V. Rao, Cyril Prasanna Raj, S. Ravi:
VLSI Design and Analysis of Multipliers for Low Power. 1354-1357
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.