default search action
11th IIH-MSP 2015: Adelaide, Australia
- Jeng-Shyang Pan, Ivan Lee, Hsiang-Cheh Huang, Ching-Yu Yang:
2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, Adelaide, Australia, September 23-25, 2015. IEEE 2015, ISBN 978-1-5090-0188-0
Session 1: Cross-Discipline Techniques in Signal Processing and Networking
- Yuh-Yih Lu, Shih-Chieh Dai, Hsiang-Cheh Huang:
Design of Triple-Band Planar Antenna for LTE/WLAN Applications. 1-4 - Hsiang-Cheh Huang, Jiun Lin, Yuh-Yih Lu:
Ownership Protection for Progressive Transmission of Color Images with Reversible Data Hiding. 5-8 - Liou Chu:
An Auxiliary Teaching Management System by Applying Six Sigma Method. 9-12 - Hsiang-Cheh Huang, Chuan-Chang Lin, Yueh-Hong Chen:
Fidelity Enhancement of Reversible Data Hiding for Images with Prediction-Based Concepts. 13-16 - Kun Xie, Po-Ju Li, Wei-Kai Chiu, Po-Yen Liu, Yao-Wei Chuang, Feng-Cheng Chang, Hsiang-Cheh Huang:
Design of an Adapter Service for Web Application Transition. 17-20 - Hsiang-Cheh Huang, Feng-Cheng Chang:
Visual Cryptography for Compressed Sensing of Images with Transmission over Multiple Channels. 21-24 - Yueh-Hong Chen, Hsiang-Cheh Huang:
Progressive Watermarking for Images with Regions of Interest. 25-28
Session 2: Wearable Computing and Information Security
- Ching-Yu Yang, Wen-Fong Wang:
High-Performance Digital Watermarking with L2-Norm Centroid for Colour Images. 29-32 - Wen-Fong Wang, Ching-Yu Yang, Hao-Xiang Wang:
Study on the Relationship between Stair's Slope and Upward/Downward Gaits in Stairs. 33-36 - Rong-San Lin:
An Imperceptible Information Hiding in Encoded Bits of Speech Signal. 37-40 - Wen Yen Lin, Kuang-Po Hsueh, Pai-Shan Pa:
The Development of Emergency Communication APP Using Ad Hoc Network with IPv6. 41-44 - Ching-Fu Huang, Yan-Haw Chen:
Efficient Software Method for Decoding of the (71, 36, 11) Quadratic Residue Code. 45-48
Session 3: Ergonomic Information and Control Systems
- Bor-Shing Lin, Huey-Dong Wu, Sao-Jie Chen, Gene Eu Jan, Bor-Shyh Lin:
Using Back-Propagation Neural Network for Automatic Wheezing Detection. 49-52 - Nan-Chun Lin:
Wearable and Wireless Human Body Electrostatic Monitoring System. 53-56 - Chang-Ting Chen, Yi-Chien Liao, Chien-Fu Lai, Bor-Shyh Lin, Che-Chuan Wang, Jinn-Rung Kuo:
Optical Technique for Estimating Cerebral Perfusion Pressure. 57-59
Session 4: Intelligent Video Processing
- Tsong-Yi Chen, Chao-Ho Chen, Guan-Ming Luo, Wu-Chih Hu, Johng-Chern Chern:
Vehicle Detection in Nighttime Environment by Locating Road Lane and Taillights. 60-63 - Bing-Hong Liu, Van-Trung Pham, Ngoc-Tu Nguyen:
A Virtual Backbone Construction Heuristic for Maximizing the Lifetime of Dual-Radio Wireless Sensor Networks. 64-67
Session 5: Security and Privacy Protection in Computer Forensic Applications
- Bowen Xue, Xiaolong Li, Zongming Guo:
A New SDCS-based Content-adaptive Steganography Using Iterative Noise-Level Estimation. 68-71 - Wenfa Qi, Zongming Guo:
Data Hiding Based on Chinese Text Automatic Proofread. 72-75 - Xin Liao, Liping Ding:
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational. 76-80 - Yang Yang, Weiming Zhang, Nenghai Yu:
Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement. 81-84 - Yuan Zhang, Xinpeng Zhang, Chuan Qin, Jiang Yu:
Multiple Description Coding for Encrypted Images. 85-88 - Jianjun Li, Lijuan Meng, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:
A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets. 89-92 - Jianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:
Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction. 93-96 - Chia-Chen Lin, Cheng-Han Lin, Xiao-Long Liu, Shyan-Ming Yuan:
Fragile Watermarking-Based Authentication Scheme for Demosaicked Images. 97-100
Session 6: Multimedia Signal Processing and Network Technology
- Meng-Hsin Liu, Tai-Hung Lin, Chih-Wen Su:
Fingertip Detection Using Two-Stage Random Decision Forest. 101-104 - Yi-Hung Lu, Yu-Hsi Chen, Hsueh-Yi Sean Lin:
A Multiresolution Approach to Recovering Colors and Details of Clipped Image Regions. 105-108
Session 7: Multimedia Security and Copyright Protection
- Tzu-Chuen Lu, Ying-Hsuan Huang:
Combined Prediction-Based Reversible Data Embedding Methods for High Image Quality. 109-112 - Chin-Feng Lee, Si-Ting Chen, Jau-Ji Shen:
Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix. 113-116 - Chin-Feng Lee, Yu-Ju Tseng:
An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation. 117-120 - Chun-Hsiu Yeh, Jau-Ji Shen, Jinn-Ke Jan:
Equalized CR-dropping for Image Compression. 121-124 - Chiung-Chen Tseng, Yu-Hsuan Chiu, Yung-Chen Chou:
A Histogram Shifting-Based Reversible Data Hiding Scheme Using Multi-pattern Strategy. 125-128
Session 8: Multimedia Innovative Technology
- Chieh-Ling Huang, Yu-Hsiang Huang, Jwu-Jenq Chen:
Life Events Segmentation Based on Lifelog Recorded by Wearable Device. 129-132 - Yu-Chi Chung, I-Fang Su, Chiang Lee, Pin-Chieh Huang:
Finding All Competitive Products Using the Dominant Relationship Analysis. 133-137 - Chang-Yi Yang:
Channel Estimation for Inverse Power Control in Wireless Communication Networks. 138-141
Session 9: Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals
- Tetsuya Kojima, Akihiro Oizumi, Udaya Parampalli:
Properties of an Emergency Broadcasting System Based on Audio Data Hiding. 142-145 - Tsukasa Nishino, Takashi Nose, Akinori Ito:
Tempo Modification of Mixed Music Signal by Nonlinear Time Scaling and Sinusoidal Modeling. 146-149 - Chengxiang Yin, Jin Hu, Xuejun Zhang, Xiang Xie:
Advertising System Based on Cloud Computing and Audio Watermarking. 150-155 - Harumi Murata, Akio Ogihara:
An Audio Watermarking Method Using Tones of Diatonic Chord. 156-159 - Erick Christian Garcia Alvarez, Shengbei Wang, Masashi Unoki:
An Automatic Watermarking in CELP Speech Codec Based on Formant Tuning. 160-163 - Tatsuya Matsumoto, Kotaro Sonoda:
Audible Secret Keying for Time-Spread-Echo Based Audio Watermarking. 164-167
Session 10: Public Key Cryptography and Applications
- Liyang Yu, Qi Han, Xiamu Niu:
Detecting Duplicated Frames by Mapping Frames to 3D Skeletons. 168-171 - Xin Liu, Shen Wang, Weizhe Zhang, Xiamu Niu:
A Novel (2, 2) Visual Secret Sharing without the Pixel Expansion. 172-175 - Bin Cai:
Formalized Description and Analysis of FTP on Petri Net. 176-179 - Shu-Jian Han, Li Zhu, Zheng Li:
Modeling and Analysis of Intelligence Assurance System Based on the Complex Networks Theory. 180-184 - Zhenzhen Gong, Shaozhang Niu, Hongli Han:
Tamper Detection Method for Clipped Double JPEG Compression Image. 185-188 - Chunli Yang, Peigang Qiu, Shihui Zheng, Licheng Wang:
An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor. 189-194 - Feng Wang, Li Xu, Jeng-Shyang Pan:
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model". 195-198
Session 11: Technologies for Next-Generation Network Environments
- Chia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung, Che-Wei Lin:
Automatic NIDS Rule Generating System for Detecting HTTP-like Malware Communication. 199-202 - Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. 203-206 - Yuan-Yuan Su, Yu-Tzu Chang, Hung-Min Sun:
A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices. 207-210 - Chia-Hung Wang, Mu-En Wu, Chien-Ming Chen:
Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints. 211-214 - Dan Le, Qiong Li, Lu Shan, Xiamu Niu:
A New Reduced-Latency SC Decoder for Polar Codes. 215-218 - Xianyan Wu, Qi Han, Xiamu Niu:
Improving Weights for Graph-Based Image Fragment Reassembly. 219-222 - Nai-Wei Lo, Cheng-Tsung Liu:
An Accountable Identity-Based Billing Protocol for Cloud Environment. 223-226 - Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Jeng-Shyang Pan:
A Swarm-Based Sanitization Approach for Hiding Confidential Itemsets. 227-230 - Jeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen, Chwei-Shyong Tsai:
A KL Divergence Function for Randomized Secret Shares. 231-234 - Jianwei Li, Yao Zhao, Rongrong Ni:
Detection of Seam Carving and Contrast Enhancement Operation Chain. 235-238
Session 12: Signal Processing, Optimization and Robust Evaluation
- Wei Sun, Dajian Li, Wei Jia, Penghui Li, Chunyu Zhao, Xumeng Chen:
Small Moving Object Tracking in Dynamic Video. 239-242 - Xin Wang:
Exploring Research of Algorithm in Signal Coning Error Compensation. 243-246 - Xin Wang:
Research on Imaging Detection Based on Digital Reflection Device. 247-250 - Guochang Zhou, Baolong Guo, Xiang Gao, Jing Ma, Hongjie He, Yunyi Yan:
A FPGA Power Estimation Method Based on an Improved BP Neural Network. 251-254 - Juanjuan Zhu, Cheng Li, Jinli Xu:
Digital Image Stabilization for Cameras on Moving Platform. 255-258 - Jun Ma, Jianguo Yao, Yunyi Yan:
Network Anomaly Detection with Compression. 259-262 - Lei Shi, Xiaoping Li, Yanming Liu, Lei Zhao:
An Efficient Weighting Method for Nakagami-m Envelope Distribution Simulation. 263-265 - Haixu Li, Yunyi Yan, Baolong Guo:
A Method to Search Fallible Branch in FPGA Programs. 266-269 - Fanjie Meng, Miao Song, Baolong Guo:
Image Retrieval by Salient Region Detection. 270-273 - Miao Miao, Wei Zhou, Zhiqi Li, Xueping Zhang, Zongqiang Xuan:
Design for PLL of Maintenance System in Satellites. 274-277
Session 13: Image Processing and Classfication
- Yunxia Liu, Tie Cai, Guowei Huang:
Extended Discriminant Nearest Feature Line Analysis for Feature Extraction. 278-281 - Jiangang Chen, Xuefeng Bai, Guowei Huang:
Two-Dimensional Extended Feature Line Space for Feature Extraction. 282-285 - Lijun Yan, Jianhui Zhang, Jeng-Shyang Pan, Lin-Lin Tang:
Bilinear Feature Line Analysis for Face Recognition. 286-289 - Jeng-Shyang Pan, Shu-Chuan Chu, Lijun Yan, Lin-Lin Tang:
Fuzzy Extended Feature Line Classifier for Image Classification. 290-293
Session 14: Information Processing and Complex Network
- Yi-Jia Zhang, Rui-Ying Liu, Hua-jun Song:
A Method of the Detection of Frequency-Hopping Signal Based on Channelized Receiver in the Complicated Electromagnetic Environment. 294-297 - Yi-Jia Zhang, Zhong-Jian Kang, Zhen Wu, Zhe-Ming Lu:
Application of Dichotomy to Network Partition Based on Sub Network Exchange Gain. 298-301
Session 15: 2D/3D Video Coding and Image/Video Information Processing
- Guandong Gao, Kebin Jia, Bin Jiang:
An Automatic Geometric Features Extracting Approach for Facial Expression Recognition Based on Corner Detection. 302-305 - Liya Zhao, Kebin Jia:
Deep Feature Learning with Discrimination Mechanism for Brain Tumor Segmentation and Diagnosis. 306-309 - Ye Yuan, Kebin Jia:
A Distributed Anomaly Detection Method of Operation Energy Consumption Using Smart Meter Data. 310-313 - Qite Wang, Kebin Jia, Pengyu Liu:
Design and Implementation of Remote Facial Expression Recognition Surveillance System Based on PCA and KNN Algorithms. 314-317 - Zhonghua Sun, Miaojie Sang, Kebin Jia:
Video Annotation Based on Video Structure Information and Key Frames Semantic Description. 318-321
Session 16: Big Data Security Analytics
- Yong Peng, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun Zhang:
Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment. 322-326 - Xianghui Zhao, Yong Peng, Zan Zhai, Yi Jin, Yuangang Yao:
Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining. 327-332 - Binjie Gu, Yong Fang, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. 333-336 - Haihui Gao, Yong Peng, Kebin Jia, Zhe Wen, Hanjing Li:
Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network. 337-340 - Yiling Zheng, Song Zheng:
Cyber Security Risk Assessment for Industrial Automation Platform. 341-344 - Lei Zhang, Yong Peng, Jie Liang, Xifeng Liu, Jin Yi, Zhe Wen:
An Improved String Matching Algorithm for HTTP Data Reduction. 345-348
Session 17: Artificial Intelligence and Its Applications
- Xingsi Xue:
Optimizing Ontology Alignments through NSGA-II Using an Aggregation Strategy and a Mapping Extraction Approach. 349-352 - Lyu-Chao Liao, Xin-Hua Jiang, Fumin Zou, Pei-wei Tsai, Yan-Ling Deng:
A Method of Latent Semantic Information Mining for Trajectory Data. 353 - Hu Rong, Xia Ye, Xu Xiang:
A Self Adaptive Incremental Learning Fuzzy Neural Network Based on the Influence of a Fuzzy Rule. 354-359 - Pei-wei Tsai, Chia-Han Liu, Lyu-Chao Liao, Jui-Fang Chang:
Using Consumer Confidence Index in the Foreign Exchange Rate Forecasting. 360-363 - Jing Zhang, Li Xu, Hong Yang:
A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks. 364-367
Session 18: Enrichment of Acoustic Spatial Information for Future Ultra-Realistic Communications over Internet
- Yukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li:
Virtual Auditory Display on a Smartphone for High-Resolution Acoustic Space by Remote Rendering. 368-371 - Jorge Treviño, Shichao Hu, César D. Salvador, Shuichi Sakamoto, Junfeng Li, Yôiti Suzuki:
A Compact Representation of the Head-Related Transfer Function Inspired by the Wavelet Transform on the Sphere. 372-375 - Shuichi Sakamoto, Arif Wicaksono, Jorge Treviño, César D. Salvador, Yôiti Suzuki:
Prediction Method for Compression of Spherical Microphone Array Signals Using Geometric Information. 376-379 - Qianqian Fang, Huaxing Xu, Risheng Xia, Junfeng Li, Yonghong Yan:
Equalization of Sound Reproduction System Based on the Human Perception Characteristics. 380-383 - Daisuke Morikawa, Masaru Ando, Masashi Unoki:
Feasibility of Estimating Direction of Arrival Based on Monaural Modulation Spectrum. 384-387 - Jing Wang, Xin Liu, Zedong Wang, Zhikun Wu, Xiang Xie, Zesong Fei, Jingming Kuang:
Objective Measurement of Spatial Audio Coding Quality Based on MNLR Mapping Model. 388-392
Session 19: Miscellaneous Topics
- Ram Pal Singh, Neelam Dabas, Nagendra, Vikash Chaudhary:
Weighted Extreme Learning Machine for Digital Watermarking in DWT Domain. 393-396 - Ran Hu, Wenfa Qi, Zongming Guo:
Feature Reduction of Multi-scale LBP for Texture Classification. 397-400 - Qing Wang, Rong Zhang, Ke Qing:
Passive Detection of Tampered JPEG Image Based on First Digit Statistics. 401-404 - Zhenglin Wang, Ivan Lee:
Iterative Weighted DCT-SVD for Compressive Imaging. 405-408 - Chuntao Wang, Jiangqun Ni:
Compressing Encrypted Images Using the Integer Lifting Wavelet. 409-412 - Ping Ping, Feng Xu, Md Shaiful Islam Babu, Xin Lv, Yingchi Mao:
Image Scrambling Scheme Based on Bit-Level Permutation and 2-D Cellular Automata. 413-416 - Yuechuan Li, Yidong Li:
On Preserving Private Geosocial Networks against Practical Attacks. 417-420 - Feng Guo, Deshun Yang, Xiaoou Chen:
Using Deep Belief Network to Capture Temporal Information for Audio Event Classification. 421-424 - Yuxin Liu, Wenfa Qi, Zongming Guo:
An Information Hiding Method Based on EMF Files Carrier. 425-428 - Yousra Ahmed Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux:
Steganalyzer Performances in Operational Contexts. 429-432 - Yuki Saito, Takashi Nose, Takahiro Shinozaki, Akinori Ito:
Conversion of Speaker's Face Image Using PCA and Animation Unit for Video Chatting. 433-436 - Cheng-Chang Lien, Wang Jian Xiang:
Amphibious Target Tracking with Single PTZ Camera. 437-440 - Huajian Liu, Sang-Heon Lee:
Stitching of Video Sequences for Weed Mapping. 441-444 - Zhen Wu, Guohua Feng, Hao Luo, Xiaofeng Wu:
Development of a Visual Reality Headset and Its Applications in 3D Interactive Bike Race Games. 445-448 - Jui-Chuan Cheng, Te-Jen Su, Tsung-Ying Li, Chia-Hua Wu:
The Noise Reduction of Speech Signals Based on RBFN. 449-452
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.