default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 5
Volume 5, Number 1, January 2014
- Chin-Chen Chang, Ting-Fang Cheng:
A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature. 1-12 - Qi Han, Liyang Yu, Wenchao Zheng, Na Cheng, Xiamu Niu:
A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching. 13-19 - Constantinos Patsakis, Nikolaos Aroukatos:
LSB and DCT steganographic detection using compressive sensing. 20-32 - Mao-Hsiung Hung, Jeng-Shyang Pan, Chaur-Heh Hsieh:
A Fast Algorithm of Temporal Median Filter for Background Subtraction. 33-40 - Yan Xu, Miaomiao Tian, Liusheng Huang, Wei Yang:
Improvement of a Lattice-based Signature Scheme. 41-46 - Zhi-Hui Wang, Marcos Segalla Pizzolatti, Chin-Chen Chang:
Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation. 47-60 - Feng-Cheng Chang, Hsiang-Cheh Huang:
A Framework for Prototyping Telecare Applications. 61-71 - Delong Zhang, Jiaqing Qiao, Jun-Bao Li, Liyan Qiao, Shu-Chuan Chu, John F. Roddick:
Optimizing Matrix Mapping with Data Dependent Kernel for Image Classification. 72-79 - Lian-Lei Lin, Ling-Yu Li, Yue Ma:
Design of Data Archive in Virtual Test Architecture. 80-89 - Taghaddos Danial, Alimohammad Latif:
Visual cryptography for grayscale images using bit-level. 90-97 - Xue Zhang, Anhong Wang, Bing Zeng, Lei Liu:
Adaptive Distributed Compressed Video Sensing. 98-106 - Chin-Chen Chang, Ya-Chieh Huang, Hao-Chuan Tsai:
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks. 107-116
Volume 5, Number 2, April 2014
- Takashi Mihara:
A New Framework of Steganography Using the Content of Cover Data. 117-123 - Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen:
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images. 124-143 - Zhi-Wei Zhang, Ming-Hui Wang, Zhe-Ming Lu, Yong Zhang:
A Skin Color Model Based on Modified GLHS Space for Face Detection. 144-151 - Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:
(k, n)-Image Reversible Data Hiding. 152-164 - Tian-Hua Liu, Qian Wang, Hong-Feng Zhu:
A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving. 165-178 - Guo-Liang Zhang, Chun-Ling Yang:
Anomaly Detection for Hypaerspectral Imagery Using Analytical Fusion and RX. 179-186 - Cheng Luo, Yong Zhang, Weixin Xie:
Traffic Regulation based Congestion Control algorithm in Sensor Networks. 187-198 - Chia-Mei Chen, Ming-Zong Huang, Ya-Hui Ou:
Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain. 263-274 - Hsiang-Cheh Huang, Feng-Cheng Chang:
Robust Image Watermarking Based on Compressed Sensing Techniques. 275-285 - Takeshi Nagano, Akinori Ito:
Packet Loss Concealment of Voice-over IP Packet using Redundant Parameter Transmission Under Severe Loss Conditions. 286-295 - Mengmeng Yang, Jie Liu:
A Maximum Lifetime Coverage Algorithm Based on Linear Programming. 296-301 - Baoxiang Du, Qun Ding, Xiaoli Geng:
Analysis and Elimination of Digital Chaotic Key Sequence¡¦s Autocorrelation. 302-309 - Deng-Yuan Huang, Chun-Jih Lin, Shr-Huan Dai:
Face Recognition Using the Diagonal Relative Gradient Method in a Low Illumination Environment. 310-323
Volume 5, Number 3, July 2014
- Nhut Minh Ngo, Masashi Unoki, Ryota Miyauchi, Yôiti Suzuki:
Data Hiding Scheme for Amplitude Modulation Radio Broadcasting Systems. 324-341 - Chin-Chen Chang, Yi-Hui Chen, Lin-Yi Chuang:
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques. 342-352 - Peng Li, Qian Kong, Yanpeng Ma:
Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation. 353-366 - Hao-Kuan Tso, Tsung-Ming Lo, Wei-Kuei Chen:
Friendly Medical Image Sharing Scheme. 367-378 - Xin-Wei Li, Kang Sun, Lei-Da Li:
Accelerated Tracing Scheme for Gaussian Fingerprinting. 379-390 - Ying Cui, Hui-Qin Liu, Tong Wang:
Target Coverage Research Based on Improved Binary Differential Algorithm. 391-398 - Lijian Zhou, Yukai Xu, Zhe-Ming Lu, Tingyuan Nie:
Face Recognition Based on Multi-Wavelet and Sparse Representation. 399-407 - Sagar Gujjunoori, B. B. Amberker:
Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients. 408-419 - Wen-Chung Kuo, Sheng-Yi Chang:
Hybrid GEMD Data Hiding. 420-430 - Xun-Fei Liu, Xiang-xian Zhu:
Kernel-optimized Based Fisher Classification of Hyperspectral Imagery. 431-438 - Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu:
A Novel Frequency Billing Service in Digital Television System. 439-450 - John Marin, Frank Y. Shih:
Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification. 451-460 - Chun-Hung Richard Lin, Kuan-Hua Tseng, Yu-Hsiu Huang, Cheng-Yi Lin:
Implementation of IP-over-DVB Network as a Wireless Internet Backbone. 461-474 - Mei Zhao, Anhong Wang, Lei Liu, Bing Zeng, Huihui Bai:
Depth Coding Based on Compressed Sensing with Optimized Measurement and Quantization. 475-484 - Chang Duan, Qi-Hong Huang, Xue Gang Wang, Shuai Wang:
Remote Image Fusion Based on PCA and Dual Tree Compactly Supported Shearlet Transform. 485-496 - Wei-Chun Lin, Tsair-Fwu Lee, Shu-Yuan Lin, Li-Fu Wu, Hung-Yu Wang, Liyun Chang, Jia-Ming Wu, Jing-Chuan Jiang, Chiu-Ching Tuan, Mong-Fong Horng, Chin-Shiuh Shieh, Pei-Ju Chao:
Non-invasive Knee Osteoarthritis Diagnosis via Vibroarthrographic Signal Analysis. 497-507 - Xiaoxia Wang, Liangyu Ma:
A Compact K Nearest Neighbor Classification cation for Power Plant Fault Diagnosis. 508-517 - Hai Cheng, Qun Ding, Chunguang Huang, Shuxia Zhai, Lianzhong Fang:
Improvements of SM4 Algorithm and Application in Ethernet Encryption System Based on FPGA. 518-526 - ShaoWei Weng, Jeng-Shyang Pan:
Reversible Watermarking Based on Eight Improved Prediction Modes. 527-533 - Chuan Qin, Chin-Chen Chang, Szu-Ting Wang:
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files. 534-545 - Zhenfeng Zhu, Linlin Du, Lei Zhang, Yao Zhao:
Shared Subspace Learning for Latent Representation of Multi-View Data. 546-554 - Jiajia Zhang, Xuan Wang, Lin Yao, Jingpeng Li, Shen-Xeu Dong:
Using Risk Dominance Strategy in Poker. 555-566 - Jie Sun, Zhe-Ming Lu, Lijian Zhou:
Iris Recognition Using Curvelet Transform Based on Principal Component Analysis and Linear Discriminant Analysis. 567-573
Volume 5, Number 4, October 2014
- Xianhua Song, Shen Wang, Xiamu Niu:
Multi-Channel Quantum Image Representation Based on Phase Transform and Elementary Transformations. 574-585 - Sunita Vikrant Dhavale, Rajendra S. Deodhar, Debashish Pradhan, L. M. Patnaik:
High Payload Adaptive Audio Watermarking based on Cepstral Feature Modification. 586-602 - Yanjun Liu, Chin-Chen Chang:
A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem. 603-613 - Bao Rong Chang, Hsiu Fen Tsai, Yun-Che Tsai:
High-Performed Virtualization Services for In-Cloud Enterprise Resource Planning System. 614-624 - Dongning Zhao, Weixin Xie, Zhe-Ming Lu:
High Efficiency Reversible Data Hiding for Two-stage Vector Quantization Compressed Images. 625-641 - Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang, Hung-Min Sun:
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID. 642-648 - Hongfeng Zhu:
Structured and Efficient Password-Based Group Key Agreement Protocol. 649-665 - Kai Chain, Wen-Chung Kuo, Jyun-Pei Siang, Jiin-Chiou Cheng:
A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity. 666-671 - Hongfeng Zhu, Xin Hao, Yang Sun:
Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant. 672-689 - Hao-Xian Wang, Zhe-Ming Lu, Yong Zhang:
A sparse representation based super-resolution image reconstruction scheme utilizing dual dictionaries. 690-700 - Wei Zhang, Leida Li, Hancheng Zhu, Deqiang Cheng, Shu-Chuan Chu, John F. Roddick:
No-reference Quality Metric of Blocking Artifacts Based on Orthogonal Moments. 701-708 - Yanjun Liu, Chin-Chen Chang:
A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem. 709-718 - Kun Zhao, Jie Sun, Zhe-Ming Lu, Jian Wang, Lijian Zhou:
Non-rigid Video Object Segmentation Based on Semantic Multi-level Framework. 719-730 - Hongtao Yin, Jiaqing Qiao, Ping Fu, XinYuan Xia:
Face Feature Selection with Binary Particle Swarm Optimization and Support Vector Machine. 731-739 - Samaa M. Shohieb, Hamdy K. Elminir, Alaa Mohamed Riad:
A Multi-Modal Oculography-Based Mouse Controlling System: Via Facial Expressions & Eye Movement. 740-756 - Junping Dai, Yazhong Liu, Jianfeng Lu, Jiayi Xu, Chin-Chen Chang, Li Li:
Watermarking Marbled Image Based on Linear Enhancement Hologram. 757-768 - Weiwei Liu, Guangjie Liu, Yuewei Dai:
Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity. 769-777 - Ping Wang, Jia-Chi Liu:
Threat Analysis of Cyber Attacks with Attack Tree+. 778-788 - Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Chia-Ming Liu:
A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution. 789-805 - Juanjuan Zhu, Bao-Long Guo, Chuang Ge:
Real-Time Digital Image Stabilization Algorithm using Sage-Husa Filter. 806-813
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.