Default Cover Image

Intelligent Information Hiding and Multimedia Signal Processing, International Conference on

Sept. 12 2009 to Sept. 14 2009

Kyoto, Japan

ISBN: 978-0-7695-3762-7

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-xxvii
Papers
Conference InformationFreely available from IEEE.pp. xxviii-xxxix
Papers
A Two-Pass Filter for Impulse Noise Reduction Based on Edge CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Papers
Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVMFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
A Fast Template Matching Method for Rotation Invariance Using Two-Stage ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 9-12
Papers
A Watermarking Scheme Using Code Division Multiple Access and DWTFull-text access may be available. Sign in or learn about subscription options.pp. 13-16
Papers
A Compression-Resistant Invisible Watermarking Scheme for H.264Full-text access may be available. Sign in or learn about subscription options.pp. 17-20
Papers
Information Embedding in MPEG-4 Scalable Lossless AudioFull-text access may be available. Sign in or learn about subscription options.pp. 21-24
Papers
An Algorithm for Packing Bitstream of Scalable Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
Papers
Fisherface vs. Eigenface in the Dual-tree Complex Wavelet DomainFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Papers
Security Evaluation of Biometrics Authentications for Cellular PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
Papers
Watermarking Cryptographic DataFull-text access may be available. Sign in or learn about subscription options.pp. 40-43
Papers
Evaluation of Audio Watermark System Using Short Detection Time FrameFull-text access may be available. Sign in or learn about subscription options.pp. 44-47
Papers
Preventing False Positives in Content-Based Phishing DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
Papers
XPROB - A Generalized Pool-Based Anonymous Communication FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 52-55
Papers
On Privacy-aware Delegation of Personal Data using Digital WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 56-59
Papers
Web behind Web - A Steganographic Web FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 60-63
Papers
Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded MessageFull-text access may be available. Sign in or learn about subscription options.pp. 64-67
Papers
Multi-Layer Audio Watermarking Based on Amplitude ModificationFull-text access may be available. Sign in or learn about subscription options.pp. 68-71
Papers
Audio Watermarking Using QIM on Wavelet Packet CoefficientsFull-text access may be available. Sign in or learn about subscription options.pp. 72-75
Papers
Robust Audio Watermarking with Time and Frequency DivisionFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Papers
Embedding Limitations with Audio-watermarking Method Based on Cochlear-delay CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 82-85
Papers
A Data Hiding Method for Stereo Audio Signals Using the Polarity of the Inter-Channel DecorrelatorFull-text access may be available. Sign in or learn about subscription options.pp. 86-89
Papers
On the Channel Characteristic of Dither Modulation Data Hiding for MP3 CompressionFull-text access may be available. Sign in or learn about subscription options.pp. 90-93
Papers
A Robust Content in DCT Domain for Image AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 94-97
Papers
Optimization of AVS-M Video Decoder for Real-time Implementation on Embedded RISC ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 98-101
Papers
Image Watermarking Based on Multiple Objective Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 102-105
Papers
Feature Extraction for Face Recognition Based on Gabor Filters and Two-Dimensional Locality Preserving ProjectionsFull-text access may be available. Sign in or learn about subscription options.pp. 106-109
Papers
An Autonomous License Plate Detection MethodFull-text access may be available. Sign in or learn about subscription options.pp. 110-113
Papers
Eye Tracking in Visible EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 114-117
Papers
Aspect Ratio Waves for Gait AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 118-121
Papers
Adaptive ReedFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Papers
Adaptive Rate Control Scheme in Frame-layer for Real-time H.264Full-text access may be available. Sign in or learn about subscription options.pp. 128-131
Papers
A Semi-fragile Reversible Data Hiding by Coefficient-Bias AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 132-135
Papers
3D Triangular Mesh Watermarking for Copyright Protection Using Moment-PreservingFull-text access may be available. Sign in or learn about subscription options.pp. 136-139
Papers
Quality Evaluation of Digital Image WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 140-143
Papers
Color Image Watermarking Scheme Based on Support Vector RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 144-147
Papers
Digital Watermarking Method for Printed Materials Embedding in Hue ComponentFull-text access may be available. Sign in or learn about subscription options.pp. 148-152
Papers
Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 FramesFull-text access may be available. Sign in or learn about subscription options.pp. 153-156
Papers
Time-Scale Invariant Zero-Watermarking Scheme for AudioFull-text access may be available. Sign in or learn about subscription options.pp. 157-160
Papers
Employing Optimal Matrix for Efficient Matrix EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Papers
An Attention Focusing Tree Based on Saliency and a Display Method for Small DisplaysFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
Papers
Collision Detection of 4-legged Robots Using Acceleration SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
Papers
Optimal Crawling Strategies for Multimedia Search EnginesFull-text access may be available. Sign in or learn about subscription options.pp. 182-185
Papers
Dominant Color Embedded Markov Chain Model for Object Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 186-189
Papers
Mobile Sensor for Target Tracking via Modified Particle FilterFull-text access may be available. Sign in or learn about subscription options.pp. 190-193
Papers
A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance VideosFull-text access may be available. Sign in or learn about subscription options.pp. 194-197
Papers
A New Approach to the Dynamic Timeline of Animation EngineFull-text access may be available. Sign in or learn about subscription options.pp. 198-201
Papers
An Alternative Algorithm of Triangulation of Polygons with HolesFull-text access may be available. Sign in or learn about subscription options.pp. 202-205
Papers
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port NumberFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Papers
Multi Path Based on Cache Notification Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Papers
Random Number Generated from White Noise of WebcamFull-text access may be available. Sign in or learn about subscription options.pp. 214-217
Papers
Quantization Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVCFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
An Observer-Based Method for Secure CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
Performance Study of Asymmetric Traffic Load for OBS Ring NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Papers
Applications of Ontology in Management of Information AssetFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
Papers
High Dynamic Range Color Image Rendering with Human Visual Adaptation SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 234-237
Papers
The Design of Remote Surveillance System for Digital FamilyFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
Papers
To Build Tele-care System Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 242-245
Papers
Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 246-249
Papers
Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier FiltersFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Papers
Build a Home Security Surveillance System Using LEGO MINDSTORMS NXTFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
Comments on Gateway-Oriented Password-Based Authenticated Key Exchange ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 262-265
Papers
Meaningful Inner Link Objects for Automatic Text CategorizationFull-text access may be available. Sign in or learn about subscription options.pp. 266-269
Papers
Identity-Based DRM in Ubiquitous Multimedia SystemFull-text access may be available. Sign in or learn about subscription options.pp. 270-273
Papers
A Novel Mutual Authentication Based on Data Embedding TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 274-277
Papers
Embedding Secret Messages Using Modified Huffman CodingFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
Papers
Joint Secret Image Sharing and Progressive Transmission Based on Integer Discrete Cosine TransformFull-text access may be available. Sign in or learn about subscription options.pp. 282-285
Papers
A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm for H.264/AVC Based on the Characteristics of Macro-blockFull-text access may be available. Sign in or learn about subscription options.pp. 286-289
Papers
A Fast Image Retrieval Method Using Multi-Feature Dimension TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 290-294
Papers
Secret Sharing Method for Gray-level ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 295-298
Papers
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 299-302
Papers
Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 303-306
Papers
Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise DetectorsFull-text access may be available. Sign in or learn about subscription options.pp. 307-311
Papers
H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filterFull-text access may be available. Sign in or learn about subscription options.pp. 312-315
Papers
Shape-Based Depth Map CodingFull-text access may be available. Sign in or learn about subscription options.pp. 316-319
Papers
Reversible Steganography for VQ Indices Using the Modified State CodebookFull-text access may be available. Sign in or learn about subscription options.pp. 320-323
Papers
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful ShadowsFull-text access may be available. Sign in or learn about subscription options.pp. 324-327
Papers
Matrix Selection in High Payload EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 328-331
Papers
Enlargement of Balanced-Incomplete-Block-Designs-Based WatermarksFull-text access may be available. Sign in or learn about subscription options.pp. 332-335
Papers
Security of Indirect-Authenticated Key Exchange ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 336-339
Papers
A Video Watermarking in H.264/AVC EncoderFull-text access may be available. Sign in or learn about subscription options.pp. 340-343
Papers
Improved EMD Steganography with Great Embedding Rate and High Embedding EfficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
Papers
Yet Another Friendly Progressive Visual Secret Sharing SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 353-356
Papers
Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation Resistant WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 357-360
Papers
An Embedding Technique Based upon Block Prediction and Code Cascading ShiftFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
Papers
A Scheme of Modulo-Based Capacity-improvement upon EMD SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 365-368
Papers
A Novel Secure Data Hiding Scheme Using a Secret Reference MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 369-373
Papers
Lossless Information Hiding Scheme Based on Predictive CodingFull-text access may be available. Sign in or learn about subscription options.pp. 374-377
Papers
A Schema for Multi-Signature Handling Based on Workflow ModelFull-text access may be available. Sign in or learn about subscription options.pp. 378-381
Papers
A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed VideoFull-text access may be available. Sign in or learn about subscription options.pp. 382-385
Papers
Image Object Detection and Tracking Implementation for Outdoor Scenes on an Embedded Soc PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Papers
Implementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Showing 100 out of 332