Default Cover Image

2015 Third International Conference on Image Information Processing (ICIIP)

Dec. 21 2015 to Dec. 24 2015

Waknaghat, India

Table of Contents

[Title page]Freely available from IEEE.pp. I-I
Table of contentsFreely available from IEEE.pp. II-XI
[Copyright notice]Freely available from IEEE.pp. XII-XII
Conference organizing committeesFreely available from IEEE.pp. XIII-XV
International technical programme committeeFreely available from IEEE.pp. XVI-XIX
PrefaceFreely available from IEEE.pp. XX-XX
MessagesFreely available from IEEE.pp. XXI-XXVIII
Keynote addressesFull-text access may be available. Sign in or learn about subscription options.pp. XXIX-XXXII
Conference tracks and session chairsFreely available from IEEE.pp. XXXIII-XXXV
Conference scheduleFreely available from IEEE.pp. XXXVI-XXXVII
Author indexFreely available from IEEE.pp. XXXVIII-XLI
Image enhancement using combined ICA and PCA based filtering in HSV domainFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Prognosis of epileptic seizures using EEG signalsFull-text access may be available. Sign in or learn about subscription options.pp. 12-16
A new hand gesture recognition scheme for similarity measurement in a vision based barehanded approachFull-text access may be available. Sign in or learn about subscription options.pp. 17-22
Depth filtering using total variation based video decompositionFull-text access may be available. Sign in or learn about subscription options.pp. 23-26
Energy aware diffusion in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
Adaptive Pattern Attack Recognition technique (APART) against EDoS attacks in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 31-34
Edge distortion removal in depth map using alpha mattingFull-text access may be available. Sign in or learn about subscription options.pp. 35-39
LANDSAT Enhanced Thematic Mapper plus image registration using SIFTFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Remote capturing of water meter reading using DSP processorFull-text access may be available. Sign in or learn about subscription options.pp. 45-49
A database of printed Jawi character imageFull-text access may be available. Sign in or learn about subscription options.pp. 56-59
An innovative method of Text SteganographyFull-text access may be available. Sign in or learn about subscription options.pp. 60-64
Face recognition for cattleFull-text access may be available. Sign in or learn about subscription options.pp. 65-72
Random-valued impulse denoising using sparse regularizationsFull-text access may be available. Sign in or learn about subscription options.pp. 79-85
A new LSB-S image steganography method blend with Cryptography for secret communicationFull-text access may be available. Sign in or learn about subscription options.pp. 86-90
Hilbert curve based steganographic scheme for large data hidingFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
Analysis & implementation of high cascaded integrated comb for software defined radios applicationFull-text access may be available. Sign in or learn about subscription options.pp. 97-101
Formalization of digital forensic theory by using Buchi AutomatonFull-text access may be available. Sign in or learn about subscription options.pp. 102-108
Predicting student placements using Bayesian classificationFull-text access may be available. Sign in or learn about subscription options.pp. 109-112
A DTW and Fourier Descriptor based approach for Indian Sign Language recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Robust digital watermarking using Contourlet Transform for coloured imagesFull-text access may be available. Sign in or learn about subscription options.pp. 119-123
Biometric watermarking using partial DCT-Walsh wavelet and SVDFull-text access may be available. Sign in or learn about subscription options.pp. 124-129
On-line handwritten Gujarati character Recognition using low level strokeFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
Image registration in presence of multiplicative noise by Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 135-140
Posture recognition for safe drivingFull-text access may be available. Sign in or learn about subscription options.pp. 141-146
Novel method for automatic generation of fundus maskFull-text access may be available. Sign in or learn about subscription options.pp. 147-151
Modified demons registration for highly deformed medical imagesFull-text access may be available. Sign in or learn about subscription options.pp. 152-156
On Block Compressed Sensing far end reconstruction using OFDMFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Investigation of energy efficient routing parameters & protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
A QoS-based service discovery using meta-heuristic optimization in federated cloudFull-text access may be available. Sign in or learn about subscription options.pp. 174-178
Optimized Face Recognition Algorithm using Spatial and Transform Domain TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
Two new approaches for image steganography using cryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
Secure e-Governance: From observation to policy formulationFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
FKP based personal authentication using SIFT features extracted from PIP jointFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
Cluster-based coordinated checkpointing protocol in wireless ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
A vision based human - elepahant collision detection systemFull-text access may be available. Sign in or learn about subscription options.pp. 225-229
Extreme learning machine based novelty detection for incremental semi-supervised learningFull-text access may be available. Sign in or learn about subscription options.pp. 230-235
Automated ball tracking in tennis videosFull-text access may be available. Sign in or learn about subscription options.pp. 236-240
Detection of forest fires using machine learning technique: A perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
Bharatna̅~yam Adavu Recognition from Depth DataFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Still image processing techniques for intelligent traffic monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
Power aware resource virtual machine allocation policy for cloud infrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 256-260
An improved DCT-based phase correlation method for image mosaicingFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
DC scanner: Detecting phishing attackFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
A hybrid approach for feature selectionFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
A comparative study of modified crossover operatorsFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
IoT based power efficient system design using automation for classroomsFull-text access may be available. Sign in or learn about subscription options.pp. 285-289
A study on Segmentation of renal scintigraphy using Level Sets algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 290-294
A survey on issues of concern in Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Evaluation of image forensic cues for fusionFull-text access may be available. Sign in or learn about subscription options.pp. 301-305
Dynamic background subtraction using Local Binary Pattern and Histogram of oriented GradientsFull-text access may be available. Sign in or learn about subscription options.pp. 306-311
A framework for hand gesture recognition based on fusion of Flex, Contact and accelerometer sensorFull-text access may be available. Sign in or learn about subscription options.pp. 312-319
A dynamic segment based statistical derived PNN model for noise robust Speech RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Capturing the spied image-video data using a flexi-controlled spy-robotFull-text access may be available. Sign in or learn about subscription options.pp. 330-335
Power aware resource allocation policy for hybrid cloudFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
Proposed algorithms for effective real time stream analysis in big dataFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
Wireless body control moduleFull-text access may be available. Sign in or learn about subscription options.pp. 353-357
Image content modeling and retrieval using sparse representationFull-text access may be available. Sign in or learn about subscription options.pp. 358-361
Image processing for mango ripening stage detection: RGB and HSV methodFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
An image-compression decomposition analysis of sub-bands using threshold implementationFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Lane departure warning system based on Hough transform and Euclidean distanceFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
Double handed Indian Sign Language to speech and textFull-text access may be available. Sign in or learn about subscription options.pp. 374-377
Indian Sign Language gesture classification as single or double handed gesturesFull-text access may be available. Sign in or learn about subscription options.pp. 378-381
Metric based efficiency analysis of educational ERP system usability-using fuzzy modelFull-text access may be available. Sign in or learn about subscription options.pp. 382-386
Development of a kinect-based physical rehabilitation systemFull-text access may be available. Sign in or learn about subscription options.pp. 387-392
Image fusion on digital images using Laplacian pyramid with DWTFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Real-time security solution for automatic detection and tracking of intrusionFull-text access may be available. Sign in or learn about subscription options.pp. 399-402
LSB modification based Audio Steganography using Trusted Third Party Key Indexing methodFull-text access may be available. Sign in or learn about subscription options.pp. 403-406
Evaluation of cost function for the oct tree segmentation of video cubeFull-text access may be available. Sign in or learn about subscription options.pp. 407-410
Texture modeling and labeling using divide and conquerFull-text access may be available. Sign in or learn about subscription options.pp. 411-414
Hyper spectral images restoration approach using LRMR and LDAFull-text access may be available. Sign in or learn about subscription options.pp. 415-418
Face recognition accuracy enhancement in Consumer devicesFull-text access may be available. Sign in or learn about subscription options.pp. 419-421
Comparative study of WSN Protocols (LEACH, PEGASIS and TEEN)Full-text access may be available. Sign in or learn about subscription options.pp. 422-427
Algorithm for de-noising of color images based on median filterFull-text access may be available. Sign in or learn about subscription options.pp. 428-432
A Web-based Bilingual Natural Language Interface to DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
Convolution based Face Recognition using DWT and feature vector compressionFull-text access may be available. Sign in or learn about subscription options.pp. 444-449
Push notification as a business enhancement technique for e-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 450-454
WSF-RBF based mining model to identify eye-Glasses worn people from face-images poolFull-text access may be available. Sign in or learn about subscription options.pp. 462-467
Showing 100 out of 117