Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IAS
IAS 2009
Generate Citations
Information Assurance and Security, International Symposium on
Aug. 18 2009 to Aug. 20 2009
Xi'An China
ISBN: 978-0-7695-3744-3
Volume:
1
2
Table of Contents
Papers
Title Page i - Volume 1
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii
Papers
Copyright Page - Volume 1
Freely available from IEEE.
pp. iv
Papers
Table of Contents - Volume 1
Freely available from IEEE.
pp. v-xvii
Papers
Preface - Volume 1
Freely available from IEEE.
pp. xviii
Papers
Committee Lists - Volume 1
Freely available from IEEE.
pp. xix-xxii
Papers
A Dynamic Graph Watermark Scheme of Tamper Resistance
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
XiaoJiang Chen
,
DingYi Fang
,
JingBo Shen
,
Feng Chen
,
WenBo Wang
,
Lu He
Papers
Trusted Computing Based Mobile DRM Authentication Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-10
by
Zhen Yang
,
Kefeng Fan
,
Yingxu Lai
Papers
An Authenticating Algorithm with Multi-compression Compatible in DCT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-14
by
Xiaoyuan Yang
,
Yao Guo
,
Ke Niu
,
Xiang Wu
Papers
Audio Digital Signature Algorithm with Tamper Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-18
by
Xiaoyuan Yang
,
Xiang Wu
,
Minqing Zhang
Papers
Key Binding Based on Biometric Shielding Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-22
by
Li Huixian
,
Wang Man
,
Pang Liaojun
,
Zhang Weidong
Papers
A Deep Copy Protection Framework for Electronic Devices within Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-26
by
Yang Zhan
,
Haibo Tian
,
Qingqi Pei
,
Yueyu Zhang
,
Yumin Wang
,
Weidong Zhang
Papers
Attacks on a Universal Designated Verifier Signature Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Li Yanping
,
Pang Liaojun
,
Wang Yuming
Papers
Image Enhancement Based on Nonsubsampled Contourlet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-34
by
Yuxin Ma
,
Jiancang Xie
,
Jungang Luo
Papers
Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-40
by
Mn-Ta Lee
,
Hsuan T. Chang
,
Mu-Liang Wang
Papers
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-44
by
Iuon-Chang Lin
,
Shu-Yan Huang
Papers
An Adaptable Threshold Decision Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-48
by
Meng-Hsiun Tsai
,
Ming-Hung Wang
,
Ting-Yuan Chang
,
Pei-Yan Pai
,
Yung-Kuan Chan
Papers
Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-52
by
Ching-Lung Chang
,
Jia-Yi Syu
,
Yuan-Sun Chu
Papers
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Shin-Jia Hwang
,
Ming-Jhang Chai
Papers
Economical Dental Stereoradiography in Digital Era
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Hsien-Huang P. Wu
,
Shih-Hsin Chang
,
Ping-Kuo Weng
,
Soon-Lin Chen
Papers
A Resistant Secret Sharing Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-64
by
Chin-Chen Chang
,
Yen-Chang Chen
,
Chia-Chen Lin
Papers
A Modified Feature Based Image Watermarking Scheme in NSCT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-70
by
Liu Yang
,
Baolong Guo
,
Jianmin Lv
Papers
Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-74
by
Liqiang Liu
,
Xianjue Luo
,
Tao Niu
,
Kai Wang
Papers
Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Jun Ma
,
Guanzhong Dai
,
Jing Zhou
Papers
An Enhanced Block Mode Selection Method for Surveillance Video Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-82
by
Jie Jiang
,
Wei Mo
,
Jianmin Lv
Papers
The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Wang Mei
,
Zhang Huifeng
,
Yan Yong
Papers
Application of Rough Set Theory in Coal Gangue Image Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Xian-Min Ma
,
Che Liang
Papers
GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-95
by
Yu Han
,
Aidong Men
,
Kan Chang
,
Ziyi Quan
Papers
Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-99
by
Cheng Deng
,
Jie Li
,
Meng Jia
,
Xinbo Gao
Papers
Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-106
by
Fuqiang Zhang
,
Junli Li
,
Gang Chen
,
Jiaju Man
Papers
Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
Min Li
,
Bo Wang
Papers
Whole Frame Loss Recovery Algorithm for H.264 Decoders
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-114
by
Min Li
,
Bo Wang
Papers
A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-118
by
Bo Wang
,
Dichen Liu
Papers
A Novel Video Shot Segmentation Based on Textural Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-122
by
Yin Wang
,
Xiangming Wen
,
Xinqi Lin
,
Peizhou He
,
Wei Zheng
Papers
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-126
by
Zhaopeng Cui
,
Dujuan Wang
,
Guang Jiang
,
Chengke Wu
Papers
A Two-Description Distributed Video Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-130
by
Anhong Wang
,
Yao Zhao
,
Zhihong Li
Papers
Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
XiMing Li
,
Bo Yang
,
YuBin Guo
Papers
Encrypted Fuzzy Vault Based on Fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-140
by
Feng Quan
,
Su Fei
,
Cai Anni
Papers
An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Qiuqin Lu
,
Guangqiu Huang
Papers
Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-148
by
Xuyan Wu
,
Huiling Gu
,
Xujie Hu
,
Yuhong Dong
Papers
An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-153
by
Xian-Bo He
,
Li Yang
,
Xian-hua Zeng
,
Gang-yuan Zhang
,
Xing-qiang Zhao
Papers
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-157
by
Mohammad Akbarpour Sekeh
,
Mohd. Aizani Bin Maarof
Papers
Application of Particle Swarm Optimization in Fussy Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-161
by
Qingnian Wang
,
Kun Yan
,
Xiaofeng Wan
,
Meiling Yuan
Papers
Full System Simulation and Verification Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-168
by
Jing-Wun Lin
,
Chen-Chieh Wang
,
Chin-Yao Chang
,
Chung-Ho Chen
,
Kuen-Jong Lee
,
Yuan-Hua Chu
,
Jen-Chieh Yeh
,
Ying-Chuan Hsiao
Papers
Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
Yin-Tsung Hwang
,
Hua-Hsin Luo
Papers
Moving Object Tracking Using Symmetric Mask-Based Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Chih-Hsien Hsia
,
Ding-Wei Huang
,
Jen-Shiun Chiang
,
Zong-Jheng Wu
Papers
Hardware/Software Codesign of Resource Constrained Real-Time Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-180
by
Chia-Cheng Lo
,
Jung-Guan Luo
,
Ming-Der Shieh
Papers
Design and Integration for Background Subtraction and Foreground Tracking Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
Tsung-Han Tsai
,
Chung-Yuan Lin
,
De-Zhang Peng
,
Giua-Hua Chen
Papers
Parallel 3-Pixel Labeling Method and its Hardware Architecture Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Shyue-Wen Yang
,
Ming-Hwa Sheu
,
Jun-Jie Lin
,
Chuang-Chun Hu
,
Tzu-Hsiung Chen
,
Shau-Yin Tseng
Papers
Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-193
by
Kan Chang
,
Bo Yang
,
Wenhao Zhang
Papers
Majority-Parity-Guided Watermarking for Block-Truncated Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Jing-Ming Guo
,
Yun-Fu Liu
Papers
Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-204
by
Jing-Ming Guo
,
Jia-Jin Tsai
Papers
Improving the Modified Matrix Encoding on Steganography Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-208
by
YongSoo Choi
,
HyoungJoong Kim
Papers
Reversible Information Hiding Considering Hierarchical Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Masaaki Fujiyoshi
,
Seungwu Han
,
Hitoshi Kiya
Papers
The Reversible Network Cascade Based on Reversible Logic Gate Coding Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-216
by
Hui Li
,
Zhijin Guan
,
Shanli Chen
,
Yuxin Chen
Papers
Image Compression Algorithm Based on Decreasing Bits Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-220
by
Shengbing Che
,
Zuguo Che
,
Haiyang Wang
,
Qiangbo Huang
Papers
A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-224
by
He Xiang
,
Liu Jianjun
Papers
Redundant Ridgelet Transform and its Application to Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-228
by
Yan Li
,
Shengqian Wang
,
Chengzhi Deng
Papers
Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM)
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Xiao Gang
,
Xie Jiancang
Papers
Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-238
by
Pang Baomao
,
Shi Haoshan
Papers
A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-242
by
Xin-Wei Li
,
Bao-Long Guo
,
Lei-Da Li
,
Hong-Xin Shen
Papers
An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-246
by
Ming-Xiang Zang
,
Na Zhang
,
Jian-Guo Jiang
Papers
An Improved Iris Recognition Method Based on Gray Surface Matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-249
by
Dong-Mei Wu
,
Jiang-Nan Wang
Papers
Image Retrieval Based on 2D Histogram of Interest Points
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Fan-jie Meng
,
Bao-long Guo
,
Lei Guo
Papers
An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Mei Wang
,
Li Wang
Papers
An Active Defense Model and Framework of Insider Threats Detection and Sense
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Hongbin Zhang
,
Jianfeng Ma
,
Yinchuan Wang
,
Qingqi Pei
Papers
The Application and Study of Graph Cut in Motion Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-268
by
Ye Hou
,
Bao-long Guo
,
Jeng-Shyang Pan
Papers
A Dynamic Layering Scheme of Multicast Key Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-272
by
Fan Yang
,
Xiao-ping Li
,
Qing-kuan Dong
,
Yan-ming Liu
Papers
Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-276
by
Zhanli Li
,
Yuan Wang
Papers
Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-280
by
Yang Qiu
,
Jin Tian
,
Liuyu Qian
Papers
A New Multiple-Objects Tracking Method with Particle Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-284
by
Long Chen
,
Bao-long Guo
,
Wei Sun
Papers
Support Vector Machine Based on Possibility Degrees and Fault Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-288
by
Du Jingyi
,
Wang Mei
,
Cai Wenhao
Papers
Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-293
by
Yu Han
,
Bo Yang
,
Kan Chang
,
Ziyi Quan
Papers
Distributed Video Coding Based on Multiple Description
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-297
by
Hongxia Ma
,
Yao Zhao
,
Chunyu Lin
,
Anhong Wang
Papers
A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-304
by
Guosheng Cheng
,
Jianwei Yang
Papers
Watermarking Relational Databases for Ownership Protection Based on DWT
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-308
by
Chuanxian Jiang
,
Xiaowei Chen
,
Zhi Li
Papers
A Fragile Software Watermarking for Tamper-Proof
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-312
by
Changle Zhang
,
Hong Peng
,
Xianzhong Long
,
Zheng Pan
,
Ying Wu
Papers
Curvelet Domain Watermark Detection Using Alpha-Stable Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-316
by
Chengzhi Deng
,
Huasheng Zhu
,
Shengqian Wang
Papers
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-321
by
Enke Li
,
Shangqian Liu
,
Shimin Yin
,
Xiaoning Fu
Papers
The SOBER Family Ciphers Reconfigurable Processing Architecture Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-326
by
Wang Zhiyuan
,
Huang Jianhua
,
Guan Ziming
Papers
Webpage Encryption Based on Polymorphic Javascript Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-330
by
Bai Zhongying
,
Qin Jiancheng
Papers
The Improving of IKE with PSK for Using in Mobile Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-334
by
Dingguo Yu
,
Nan Chen
Papers
Common Friends Discovery with Privacy and Authenticity
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-340
by
Shin-Yan Chiou
,
Shih-Ying Chang
,
Hung-Min Sun
Papers
Known Signature Attack of ID-Based Multisignature Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-343
by
Wu-Chuan Yang
,
Jhih-Syue Jhou
Papers
A Generalization of de Weger's Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-347
by
Chien-Yuan Chen
,
Chih-Cheng Hsueh
,
Yu-Feng Lin
Papers
New Strategy of Efficient SPA-resistant Exponentiations
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-351
by
Wu-Chuan Yang
Papers
Browser-Side Countermeasures for Deceptive Phishing Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-355
by
Huajun Huang
,
Shaohong Zhong
,
Junshan Tan
Papers
An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-359
by
He Lu
,
Lin JianBin
,
Li TianZhi
,
Fang DingYi
Papers
Research on Attack Intention Recognition Based on Graphical Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-363
by
Wu Peng
,
Zhigang Wang
,
Junhua Chen
Papers
Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-367
by
Jing-pei Wang
,
Shui-fa Sun
,
Ming Jiang
,
Dan-gui Xie
,
Bang-jun Lei
Papers
Intra-mode Dependent Coding Method for Image Compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-374
by
Yung-Chiang Wei
,
Jui-Che Teng
,
Chien-Wen Chung
Papers
Dynamically Constrained One-Bit Transform for Motion Vector Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-378
by
Fu-Kun Chen
,
Jui-Che Teng
,
Yue-Dar Jou
,
Wen-Yuan Liao
Papers
A Name Recommendation Photo Album Using Probability Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-382
by
Ding-Hrong Chen
,
Shiang-En Tang
Papers
Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-386
by
Jiann-Shu Lee
,
Hsing-Hsien Wu
,
Ming-Zheng Yuan
Papers
The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-390
by
Jun-qiao Qi
,
Chang-long Wang
,
Yan-ming Qi
Papers
Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-395
by
Qun-ting Yang
,
Tie-gang Gao
,
Li Fan
,
Qiao-lun Gu
Papers
The Sync Tracing Based on Improved Genetic Algorithm Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-399
by
Yuanbin Hou
,
Chunfeng Song
,
Ning Li
Papers
Research on Intrusion Detection Based on an Improved SOM Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-403
by
Dianbo Jiang
,
Yahui Yang
,
Min Xia
Papers
Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-410
by
Liu Hua
Papers
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-414
by
Xuedou Yu
Showing 100 out of 186
Load More
Load All