Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MINES
MINES 2009
Generate Citations
Multimedia Information Networking and Security, International Conference on
Nov. 18 2009 to Nov. 20 2009
Hubei, China
ISBN: 978-0-7695-3843-3
Volume:
1
2
Table of Contents
Papers
Title Page i - Volume 2
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 2
Freely available from IEEE.
pp. iii
Papers
Copyright Page - Volume 2
Freely available from IEEE.
pp. iv
Papers
Table of Contents - Volume 2
Freely available from IEEE.
pp. v-xiv
Papers
Greetings from the General Chairs - Volume 2
Freely available from IEEE.
pp. xv-xvi
Papers
Greetings from the Technical Program Committee Chairs - Volume 2
Freely available from IEEE.
pp. xvii-xviii
Papers
Organizing Committee - Volume 2
Freely available from IEEE.
pp. xix-xxi
Papers
Keynote Addresses - Volume 2
Freely available from IEEE.
pp. xxii-xxv
Papers
How Digital Multifactor Service Model Changed Our Life
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-9
by
Hong Li
,
Rencheng Tong
,
John Rutledge
Papers
Research on Personalized Query Optimization Service in E-learning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-13
by
Xiaojian Li
,
Shihong Chen
Papers
Remote Controlling and Monitoring System with Voice Guide on Google Earth through Optimal Short Message Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-17
by
Xu Huaiyu
,
Ni Qing
,
Xu Yilai
,
Jiang Peng
Papers
Service Field Placement Problem Based on P2P Network Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-21
by
Yan-mei Zhang
,
Jian-ming Zhu
Papers
Study on Ecommerce-Based Innovation System of Chinese Timber Processing Manufacturing Enterprises
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-24
by
Hua Cai
,
Anna Shi
Papers
Technoloy Innovation and Imitation: A Survey about Software Outsourcing in East China
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Haiwei Zhou
,
Xiquan Wang
Papers
Combining HTML 5 with MVC Framework to Simplify Real-Time Collaboration for Web Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-32
by
Yuehui Yu
,
Lei Ning
,
Weizhong Liu
Papers
Image Semantics Recognition Based on Ontology and Description Logics
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-36
by
Chuan-yun Xu
,
Dan Yang
,
Yang Zhang
Papers
Study on Multi-dimentional Extendibility of Next-Generation Internet Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-40
by
Zhonglin He
Papers
Variational Video Mask Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Zhen-Long Du
,
Xiao-Li Li
Papers
Computer-Human Interaction: The Principles of User Interface in Chinese Website Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-49
by
Ye Zhang
,
Xiaoguang Huang
,
Hongfei Wang
Papers
Research on the Innovation of Marketing Channels for High-Tech Enterprises in the Background of E-commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-52
by
Hua Cai
,
Anna Shi
Papers
High Security Communication Protocol for SMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Songyang Wu
,
Chengxiang Tan
Papers
A GTBA algorithm for Aggregated Multicast
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Yanling Zhou
Papers
Ruputation-Based Semantic Service Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-64
by
Jing Yuan
,
Yuyan An
,
Hui Wang
Papers
Design and Implementation of a Mobile Phone Integrated Alarming-System
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-68
by
YunYan Liao
,
YinGen Yang
Papers
Watermarking 2D Vector Maps on Spatial Topology Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-74
by
Chuanjian Wang
,
Zhiyong Peng
,
Yuwei Peng
,
Liang Yu
Papers
A Fragile Software Watermarking Algorithm for Software Configuration Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Jianpeng Zhu
,
Jun Xiao
,
Ying Wang
Papers
Steganalysis Based on Neighbourhood Node Degree Histogram for LSB Matching Steganography
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-82
by
Bin Xia
,
Xingming Sun
,
Jiaohua Qin
Papers
Digital Image Watermarking Using Iterative Blending Based on Wavelet Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Shun-liao Yang
,
Zheng-bing Zhang
Papers
Perceptual Hash Functions Based on Contourlet Transform and Singular Value Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Ting-ting Zhu
,
Dong-hui Hu
,
Li-na Wang
Papers
Density Adjustable Pseudorandom Sequence and its Applications in Information Hiding
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-94
by
Chen Yu
,
Qu Fang
,
Hu Jianbin
,
Chen Zhong
Papers
A Biometric Templates Secure Transmission Method Based on Bi-layer Watermarking and PKI
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
ChunLei Li
,
YunHong Wang
,
LiNing Liu
Papers
A Partial Video Encryption Scheme for Mobile Handheld Devices with Low Power Consideration
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Dayong Wang
,
Yujie Zhou
,
Dandan Zhao
,
Jufa Mao
Papers
A Secure and Practical Buyer-Seller Watermarking Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-108
by
Defa Hu
,
Qiaoliang Li
Papers
A Novel DGW Scheme Based on 2D_PPCT and Permutation
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-113
by
Jianqi Zhu
,
Kexin Yin
,
Yanheng Liu
Papers
An Efficient Method to Hide Information in MPEG Video Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-117
by
Peng Zheng
,
Bo Zhao
,
Min-zhong Liu
Papers
A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-121
by
Li Li
,
Bin Luo
,
Qiang Li
,
Xiaojun Fang
Papers
A Novel Steganography Algorithm Based on CRC
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-125
by
Ling Wu
,
Li-Na Wang
Papers
A Novel Watermarking Algorithm in Entropy Coding Based on Image Complexity Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-129
by
Man Xuan
,
Jian-guo Jiang
Papers
Color Image Digital Watermarking Algorithm Based on Singular Value Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-133
by
Jianghua Deng
Papers
Digital Watermarking Algorithm Based on Chaotic Encryption and HVS
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-137
by
Ke-xin Yin
,
Li-juan Zhang
,
Ze-sheng Wang
,
Xiao-lin Fu
,
Liu Chang
Papers
A New Digital Watermarking Scheme Based on Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-140
by
Zhichao Yu
,
Xiaojun Liu
Papers
A Wavelet Watermarking Based on HVS and Watermarking Capacity Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Wang-sheng Fang
,
Kang Chen
Papers
The Images Encryption Algorithm Based on the Multi-chaotic Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-148
by
Tao Wang
,
Han Zhang
,
Zhaohui Li
,
Qing-hua Zhang
Papers
A New Fractal Watermarking Scheme Based on Image Normalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-153
by
Xi-kui Miao
,
Jin-guang Sun
,
Yu-han Zhang
Papers
A Watermark Extraction Model to Enhance the Correlation of Digimarc Plug-ins in Photoshop
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-158
by
Li Li
,
Hehuan Xu
,
Chin Chen Cheng
Papers
Blind Audio Watermarking Scheme for Copyright Protection of Multi-user
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-162
by
Tingting Xu
,
Zhen Yang
Papers
Finding Abnormal Behavior Based on Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-166
by
Yongpo Liu
,
Ji Wu
,
Haiyan Yang
,
Maozhong Jin
,
Xiaoxia Jia
,
Xuemei Liu
Papers
A Solution of Video Semi-fragile Watermarking of Authentication Based on Binary Characteristic Strings
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-170
by
Hua Jiang
,
Huijiao Wang
,
Xin Wang
Papers
A Digital Image Scrambling Method Based on Serpent
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-174
by
Jinzhu Zhang
,
Jiping Niu
Papers
An Extended Subsampling Based Reversible Data Hiding Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Xiao Yi Yu
,
Aiming Wang
Papers
A CAPTCHA Implementation Based on 3D Animation
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-182
by
Jing-Song Cui
,
Jing-Ting Mei
,
Xia Wang
,
Da Zhang
,
Wu-Zhou Zhang
Papers
Face and Facial Feature Localization Based on Color Segmentation and Symmetry Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-189
by
Cai Tao
,
Duan Shanxua
,
Liu Fangrui
,
Ren Ting
Papers
Speaker Recognition via Statistics of Acoustic Feature Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-192
by
Shaomei Li
,
Yunfei Guo
,
Hongquan Wei
Papers
An Image Indexing and Retrieval Model Using Reasoning Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-196
by
Suihua Wang
,
Ailing Zhao
Papers
SHC: A Spectral Algorithm for Hierarchical Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Xiaohong Li
,
Jingwei Huang
Papers
Domain Name Valuation Model Constructing and Emperical Evidence
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-204
by
Zu-guang Wu
,
Hai-yi He
Papers
An Improved Application MAC Model for Cross-Layer Optimized Wireless Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-208
by
Hai-qing Du
,
Yixi Liu
,
Chang Guo
,
Yong Liu
Papers
An Improved 3D Reconstruction Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Huiyan Jiang
,
Rui Zhang
,
Hongjuan Liu
,
Beilei Wang
,
Yuanfei Li
Papers
Differentiated Service Based Cross-Layer Coordinated Distributed Scheduling Algorithm for WMN
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Xuekang Sun
,
Li Gao
,
Jin Liang
,
Xuerong Gou
Papers
A New Framework of Scalable Video Compression with High Error Resilience Based on Wavelet Using Wyner-Ziv Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Zhe Li
,
Sheng Fang
,
Guofu Huang
,
Lan Bai
Papers
Error Protection of 3D Wavelet Video Streaming Using Wyner-Ziv Video Coding for Lossy Network Transmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Ke Xu
,
Sheng Fang
,
Zhe Li
Papers
Generating Side Information Using HVSBM for Wavelet-Based Distributed Video Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-229
by
Lan Bai
,
Sheng Fang
,
Zhe Li
Papers
A Clustering and Routing Algorithm with Combination Weight for Energy Consumption Balance of WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-233
by
Jin-rong Zhang
,
Yue Wang
,
Dong Wang
,
Jing Han
Papers
Optimization and Implementation of Speech Codec Based on Symmetric Multi-processor Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-237
by
Ouyang Kun
,
Ouyang Qing
,
Li Zhitang
,
Zhou Zhengda
Papers
The Design of Web Information Automatic Retrieval System Based on Multi-agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Qu Jubao
,
Liu Sheng
,
Ye Qiusun
Papers
Supplier Selection Mode of Aerospace Batch Production Based on Multiple Objective Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-245
by
Shengbin Zhao
,
Chunsheng Shi
Papers
An Optimized Method of De-blocking Filter in H.264/AVC
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-249
by
Guoxing Bao
,
Honghua Hu
Papers
The Comparisons Between Domestic and International Software Outsourcing Industry Growth Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Haiwei Zhou
,
Xiquan Wang
Papers
Analysis of Aggregation Characteristics of Streaming Media Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Xin Zhao
,
Xiaohui Zhang
,
Bin Wang
Papers
Realization of Communication Between DSP and PC Based on Modbus Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Zhi-qiang Zhang
,
Yu-lin Zhang
Papers
A New Waveform Speech Entropy Coding Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-265
by
Feng Mu
,
Fangqiang Hu
,
Weibo Zhong
Papers
Digital Image of Restoring Image Based on (7,4)Hamming Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-269
by
Zhixiong Fang
Papers
Extracting Region with Holes with Edge Expanding Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-273
by
Hai Han
,
Hui Cheng
Papers
A Novel Routing Algorithm for Ad Hoc Networks Based on the Downstream Nodes Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-280
by
Junjie Chen
,
Chang'en Zhou
,
Deli Chen
,
Bin Huang
,
Jiajun Hong
,
Chao Zhou
,
Xiao Yang
Papers
An Improved Method of Zero-Copy Data Transmission in the High Speed Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-284
by
Xiao Chen
Papers
Preliminary Study of the Virtual University Library's Building in Second life
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-287
by
Wei Feng
,
ChengWei Shan
Papers
Nutrition Catering System of Hospitals Based on Web Services Integrating Wireless and Wired Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-291
by
Hongzhen Xu
,
Hua Qin
,
Maolan Li
Papers
Access Security Based on Bayesian Trust Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-294
by
Yichun Liu
Papers
Mobile Internet Application to Geographical Information Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Jusuo Zhou
,
Anliang Ning
,
Rui Deng
,
Fanshun Meng
Papers
Dynamic Network Planning and Management in an End to End Reconfiguration Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-303
by
Ying Li
,
Feng-qin Wang
,
Bo Kong
,
Hong-da Fan
Papers
Study on Network QoS Evaluation Method Based on Nondimensionalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-307
by
Zhenjun Li
,
Yunting Lu
,
Suili Feng
Papers
The Strategic Path for the Growth of Software Outsourcing Firm in China
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Zhang Yang
,
Wang Xi Quan
Papers
Research on Strategic Management Innovation Based on E-commerce Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-316
by
Xiquan Wang
,
Haiwei Zhou
Papers
High-Security System Primitive for Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-321
by
Ou Qingyu
,
Luo Fang
,
Huang Kai
Papers
Research on Precise Synchronization for TMR Fault-Tolerant Embedded Computer
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-325
by
Wei-gong Zhang
,
Yong-xiang Zhang
,
Yuan-yuan Shang
,
Yong Guan
,
Qing-lin Qiu
,
Ming-rui Xin
Papers
An Improved AES Algorithm Based on Chaos
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-329
by
Yuan Kun
,
Zhang Han
,
Li Zhaohui
Papers
Anonymous Conference Key Distribution Scheme with Perfect Forward Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-333
by
Fang Li
,
Huanzhi Gao
Papers
Research on the Method of Choosing Parameters for NTRU
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-337
by
ShanYue Bu
,
Hui Zhang
Papers
An Improved Identity-Based Society Oriented Signature Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-341
by
Zuowen Tan
Papers
Design and Implementation of Portable TPM Device Driver Based on Extensible Firmware Interface
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-345
by
Shuanghe Peng
,
Zhen Han
Papers
The Research of Group Key Distribution Scheme in TNC
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Miao Zhang
,
Guo-ai Xu
,
Jing-jing Fang
Papers
Impossible Differential-Algebraic Cryptanalysis of Serpent
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-357
by
Zhihua Hu
,
Zhongping Qin
,
Haiqing Han
Papers
Discovering Host Anomalies in Multi-source Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-361
by
Cuixia Gao
,
Zhitang Li
Papers
Data Placement Based on Toleration on Twice Failures Array Codes in RAID
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-365
by
Wan Wunan
,
Suo Wang
,
Chen Yun
Papers
A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
Chuan-xiang Ma
,
Ze-ming Fang
,
Lei-chun Wang
,
Qing-hua Li
Papers
A SPIT Detection Method Using Voice Activity Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-373
by
Hai Huang
,
Hong-Tao Yu
,
Xiao-Lei Feng
Papers
A Concrete Certificateless Signature Scheme without Pairings
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-377
by
Aijun Ge
,
Shaozhen Chen
,
Xinyi Huang
Papers
Propagation Model of Non-scanning Active Worm in Unstructured P2P Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-381
by
Hua Li
,
Zheng Qin
,
Xiaohui Pan
,
Xiaosong Zhang
Papers
Intrusion Detection Based on Simulated Annealing and Fuzzy C-means Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-385
by
Jian Wu
,
GuoRui Feng
Papers
A Common On-board Hardware Architecture for Intrusion Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-389
by
Chao Kong
,
Bo Yang
,
Zhiping Jia
,
Zhenxiang Chen
Showing 100 out of 151
Load More
Load All