Default Cover Image

Information Assurance and Security, International Symposium on

Aug. 18 2009 to Aug. 20 2009

Xi'An China

ISBN: 978-0-7695-3744-3

Volume:

Table of Contents

Papers
Title Page i - Volume 1Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 1Freely available from IEEE.pp. iii
Papers
Copyright Page - Volume 1Freely available from IEEE.pp. iv
Papers
Table of Contents - Volume 1Freely available from IEEE.pp. v-xvii
Papers
Preface - Volume 1Freely available from IEEE.pp. xviii
Papers
Committee Lists - Volume 1Freely available from IEEE.pp. xix-xxii
Papers
A Dynamic Graph Watermark Scheme of Tamper ResistanceFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
Trusted Computing Based Mobile DRM Authentication SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 7-10
Papers
An Authenticating Algorithm with Multi-compression Compatible in DCT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Papers
Audio Digital Signature Algorithm with Tamper DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 15-18
Papers
Key Binding Based on Biometric Shielding FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 19-22
Papers
A Deep Copy Protection Framework for Electronic Devices within HomeFull-text access may be available. Sign in or learn about subscription options.pp. 23-26
Papers
Attacks on a Universal Designated Verifier Signature SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
Papers
Image Enhancement Based on Nonsubsampled Contourlet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 31-34
Papers
Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet DomainFull-text access may be available. Sign in or learn about subscription options.pp. 37-40
Papers
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 41-44
Papers
An Adaptable Threshold Decision MethodFull-text access may be available. Sign in or learn about subscription options.pp. 45-48
Papers
Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 49-52
Papers
A New Authenticated Key Agreement Protocol for Wireless Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Papers
Economical Dental Stereoradiography in Digital EraFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Papers
A Resistant Secret Sharing SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 61-64
Papers
A Modified Feature Based Image Watermarking Scheme in NSCT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 67-70
Papers
Grounding Grid Corrosion Diagnosis Based on Large Change SensitivityFull-text access may be available. Sign in or learn about subscription options.pp. 71-74
Papers
Anomalous Payload Detection System Using Analysis of Frequent Sequential PatternFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
An Enhanced Block Mode Selection Method for Surveillance Video CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 79-82
Papers
The Detection of Bi-frequency Weak Signal Based on Chaos and CorrelationFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
Application of Rough Set Theory in Coal Gangue Image ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Papers
GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 91-95
Papers
Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 96-99
Papers
Assessment of Color Video Quality with Singular Value Decomposition of Complex MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 103-106
Papers
Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 107-110
Papers
Whole Frame Loss Recovery Algorithm for H.264 DecodersFull-text access may be available. Sign in or learn about subscription options.pp. 111-114
Papers
A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVCFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Papers
A Novel Video Shot Segmentation Based on Textural FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 119-122
Papers
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264Full-text access may be available. Sign in or learn about subscription options.pp. 123-126
Papers
A Two-Description Distributed Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 127-130
Papers
Fuzzy Identity Based Encryption Scheme with Some Assigned AttributesFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
Papers
Encrypted Fuzzy Vault Based on FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 137-140
Papers
An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 141-144
Papers
Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 145-148
Papers
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System CallsFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
Papers
Application of Particle Swarm Optimization in Fussy Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 158-161
Papers
Full System Simulation and Verification FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 165-168
Papers
Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC DesignsFull-text access may be available. Sign in or learn about subscription options.pp. 169-172
Papers
Moving Object Tracking Using Symmetric Mask-Based SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 173-176
Papers
Hardware/Software Codesign of Resource Constrained Real-Time SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 177-180
Papers
Design and Integration for Background Subtraction and Foreground Tracking AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
Papers
Parallel 3-Pixel Labeling Method and its Hardware Architecture DesignFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Papers
Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVCFull-text access may be available. Sign in or learn about subscription options.pp. 189-193
Papers
Majority-Parity-Guided Watermarking for Block-Truncated ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Papers
Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up TableFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Papers
Improving the Modified Matrix Encoding on Steganography MethodFull-text access may be available. Sign in or learn about subscription options.pp. 205-208
Papers
Reversible Information Hiding Considering Hierarchical Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
The Reversible Network Cascade Based on Reversible Logic Gate Coding MethodFull-text access may be available. Sign in or learn about subscription options.pp. 213-216
Papers
Image Compression Algorithm Based on Decreasing Bits CodingFull-text access may be available. Sign in or learn about subscription options.pp. 217-220
Papers
A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Papers
Redundant Ridgelet Transform and its Application to Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 225-228
Papers
Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM)Full-text access may be available. Sign in or learn about subscription options.pp. 231-235
Papers
Research on Improved Algorithm for Chinese Word Segmentation Based on Markov ChainFull-text access may be available. Sign in or learn about subscription options.pp. 236-238
Papers
A New Histogram Based Image Watermarking Scheme Resisting Geometric AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 239-242
Papers
An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-waveletFull-text access may be available. Sign in or learn about subscription options.pp. 243-246
Papers
An Improved Iris Recognition Method Based on Gray Surface MatchingFull-text access may be available. Sign in or learn about subscription options.pp. 247-249
Papers
Image Retrieval Based on 2D Histogram of Interest PointsFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Papers
An Improved Fusion Algorithm of the Weighted Features and its Application in Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
An Active Defense Model and Framework of Insider Threats Detection and SenseFull-text access may be available. Sign in or learn about subscription options.pp. 258-261
Papers
The Application and Study of Graph Cut in Motion SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 265-268
Papers
A Dynamic Layering Scheme of Multicast Key ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 269-272
Papers
Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece MeasurementFull-text access may be available. Sign in or learn about subscription options.pp. 273-276
Papers
Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude ModulationFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Papers
A New Multiple-Objects Tracking Method with Particle FilterFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Papers
Support Vector Machine Based on Possibility Degrees and Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 285-288
Papers
Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 289-293
Papers
Distributed Video Coding Based on Multiple DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 294-297
Papers
A Watermarking Scheme Based on Two-dimensional Wavelet Filter ParametrizationFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
Papers
Watermarking Relational Databases for Ownership Protection Based on DWTFull-text access may be available. Sign in or learn about subscription options.pp. 305-308
Papers
A Fragile Software Watermarking for Tamper-ProofFull-text access may be available. Sign in or learn about subscription options.pp. 309-312
Papers
Curvelet Domain Watermark Detection Using Alpha-Stable ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 313-316
Papers
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source ScalingFull-text access may be available. Sign in or learn about subscription options.pp. 317-321
Papers
The SOBER Family Ciphers Reconfigurable Processing Architecture DesignFull-text access may be available. Sign in or learn about subscription options.pp. 322-326
Papers
Webpage Encryption Based on Polymorphic Javascript AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
Papers
The Improving of IKE with PSK for Using in Mobile Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 331-334
Papers
Common Friends Discovery with Privacy and AuthenticityFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Papers
Known Signature Attack of ID-Based Multisignature SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 341-343
Papers
A Generalization of de Weger's MethodFull-text access may be available. Sign in or learn about subscription options.pp. 344-347
Papers
New Strategy of Efficient SPA-resistant ExponentiationsFull-text access may be available. Sign in or learn about subscription options.pp. 348-351
Papers
Browser-Side Countermeasures for Deceptive Phishing AttackFull-text access may be available. Sign in or learn about subscription options.pp. 352-355
Papers
An Anti-attack Watermarking Based on Synonym Substitution for Chinese TextFull-text access may be available. Sign in or learn about subscription options.pp. 356-359
Papers
Research on Attack Intention Recognition Based on Graphical ModelFull-text access may be available. Sign in or learn about subscription options.pp. 360-363
Papers
Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVDFull-text access may be available. Sign in or learn about subscription options.pp. 364-367
Papers
Intra-mode Dependent Coding Method for Image CompressionFull-text access may be available. Sign in or learn about subscription options.pp. 371-374
Papers
Dynamically Constrained One-Bit Transform for Motion Vector EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 375-378
Papers
A Name Recommendation Photo Album Using Probability Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 379-382
Papers
Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 383-386
Papers
Analysis of One-way Alterable Length Hash Function Based on Cell Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 391-395
Papers
The Sync Tracing Based on Improved Genetic Algorithm Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 396-399
Papers
Research on Intrusion Detection Based on an Improved SOM Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 400-403
Papers
Words Clustering Based on Keywords Indexing from Large-scale Categorization CorporaFull-text access may be available. Sign in or learn about subscription options.pp. 407-410
Papers
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of KernelFull-text access may be available. Sign in or learn about subscription options.pp. 411-414
Showing 100 out of 186