Default Cover Image

Multimedia Information Networking and Security, International Conference on

Nov. 18 2009 to Nov. 20 2009

Hubei, China

ISBN: 978-0-7695-3843-3

Volume:

Table of Contents

Papers
Title Page i - Volume 2Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 2Freely available from IEEE.pp. iii
Papers
Copyright Page - Volume 2Freely available from IEEE.pp. iv
Papers
Table of Contents - Volume 2Freely available from IEEE.pp. v-xiv
Papers
Greetings from the General Chairs - Volume 2Freely available from IEEE.pp. xv-xvi
Papers
Greetings from the Technical Program Committee Chairs - Volume 2Freely available from IEEE.pp. xvii-xviii
Papers
Organizing Committee - Volume 2Freely available from IEEE.pp. xix-xxi
Papers
Keynote Addresses - Volume 2Freely available from IEEE.pp. xxii-xxv
Papers
How Digital Multifactor Service Model Changed Our LifeFull-text access may be available. Sign in or learn about subscription options.pp. 5-9
Papers
Research on Personalized Query Optimization Service in E-learning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 10-13
Papers
Remote Controlling and Monitoring System with Voice Guide on Google Earth through Optimal Short Message ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 14-17
Papers
Service Field Placement Problem Based on P2P Network FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 18-21
Papers
Study on Ecommerce-Based Innovation System of Chinese Timber Processing Manufacturing EnterprisesFull-text access may be available. Sign in or learn about subscription options.pp. 22-24
Papers
Technoloy Innovation and Imitation: A Survey about Software Outsourcing in East ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 25-28
Papers
Combining HTML 5 with MVC Framework to Simplify Real-Time Collaboration for Web DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 29-32
Papers
Image Semantics Recognition Based on Ontology and Description LogicsFull-text access may be available. Sign in or learn about subscription options.pp. 33-36
Papers
Study on Multi-dimentional Extendibility of Next-Generation Internet ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 37-40
Papers
Variational Video Mask GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 41-45
Papers
Computer-Human Interaction: The Principles of User Interface in Chinese Website DesignFull-text access may be available. Sign in or learn about subscription options.pp. 46-49
Papers
Research on the Innovation of Marketing Channels for High-Tech Enterprises in the Background of E-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 50-52
Papers
High Security Communication Protocol for SMSFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Papers
A GTBA algorithm for Aggregated MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Papers
Ruputation-Based Semantic Service DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 61-64
Papers
Design and Implementation of a Mobile Phone Integrated Alarming-SystemFull-text access may be available. Sign in or learn about subscription options.pp. 65-68
Papers
Watermarking 2D Vector Maps on Spatial Topology DomainFull-text access may be available. Sign in or learn about subscription options.pp. 71-74
Papers
A Fragile Software Watermarking Algorithm for Software Configuration ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
Steganalysis Based on Neighbourhood Node Degree Histogram for LSB Matching SteganographyFull-text access may be available. Sign in or learn about subscription options.pp. 79-82
Papers
Digital Image Watermarking Using Iterative Blending Based on Wavelet TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
Perceptual Hash Functions Based on Contourlet Transform and Singular Value DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Papers
Density Adjustable Pseudorandom Sequence and its Applications in Information HidingFull-text access may be available. Sign in or learn about subscription options.pp. 91-94
Papers
A Biometric Templates Secure Transmission Method Based on Bi-layer Watermarking and PKIFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
Papers
A Partial Video Encryption Scheme for Mobile Handheld Devices with Low Power ConsiderationFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
Papers
A Secure and Practical Buyer-Seller Watermarking ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 105-108
Papers
A Novel DGW Scheme Based on 2D_PPCT and PermutationFull-text access may be available. Sign in or learn about subscription options.pp. 109-113
Papers
An Efficient Method to Hide Information in MPEG Video SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 114-117
Papers
A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel OperatorFull-text access may be available. Sign in or learn about subscription options.pp. 118-121
Papers
A Novel Steganography Algorithm Based on CRCFull-text access may be available. Sign in or learn about subscription options.pp. 122-125
Papers
A Novel Watermarking Algorithm in Entropy Coding Based on Image Complexity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 126-129
Papers
Color Image Digital Watermarking Algorithm Based on Singular Value DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 130-133
Papers
Digital Watermarking Algorithm Based on Chaotic Encryption and HVSFull-text access may be available. Sign in or learn about subscription options.pp. 134-137
Papers
A New Digital Watermarking Scheme Based on TextFull-text access may be available. Sign in or learn about subscription options.pp. 138-140
Papers
A Wavelet Watermarking Based on HVS and Watermarking Capacity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 141-144
Papers
The Images Encryption Algorithm Based on the Multi-chaotic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 145-148
Papers
A New Fractal Watermarking Scheme Based on Image NormalizationFull-text access may be available. Sign in or learn about subscription options.pp. 149-153
Papers
A Watermark Extraction Model to Enhance the Correlation of Digimarc Plug-ins in PhotoshopFull-text access may be available. Sign in or learn about subscription options.pp. 154-158
Papers
Blind Audio Watermarking Scheme for Copyright Protection of Multi-userFull-text access may be available. Sign in or learn about subscription options.pp. 159-162
Papers
Finding Abnormal Behavior Based on PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 163-166
Papers
A Solution of Video Semi-fragile Watermarking of Authentication Based on Binary Characteristic StringsFull-text access may be available. Sign in or learn about subscription options.pp. 167-170
Papers
A Digital Image Scrambling Method Based on SerpentFull-text access may be available. Sign in or learn about subscription options.pp. 171-174
Papers
An Extended Subsampling Based Reversible Data Hiding MethodFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
Papers
A CAPTCHA Implementation Based on 3D AnimationFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Papers
Face and Facial Feature Localization Based on Color Segmentation and Symmetry TransformFull-text access may be available. Sign in or learn about subscription options.pp. 185-189
Papers
Speaker Recognition via Statistics of Acoustic Feature DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 190-192
Papers
An Image Indexing and Retrieval Model Using Reasoning ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 193-196
Papers
SHC: A Spectral Algorithm for Hierarchical ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Papers
Domain Name Valuation Model Constructing and Emperical EvidenceFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Papers
An Improved Application MAC Model for Cross-Layer Optimized Wireless VideoFull-text access may be available. Sign in or learn about subscription options.pp. 205-208
Papers
An Improved 3D Reconstruction MethodFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
Differentiated Service Based Cross-Layer Coordinated Distributed Scheduling Algorithm for WMNFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
A New Framework of Scalable Video Compression with High Error Resilience Based on Wavelet Using Wyner-Ziv TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
Error Protection of 3D Wavelet Video Streaming Using Wyner-Ziv Video Coding for Lossy Network TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
Generating Side Information Using HVSBM for Wavelet-Based Distributed Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Papers
A Clustering and Routing Algorithm with Combination Weight for Energy Consumption Balance of WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
Papers
Optimization and Implementation of Speech Codec Based on Symmetric Multi-processor PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 234-237
Papers
The Design of Web Information Automatic Retrieval System Based on Multi-agentFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
Papers
Supplier Selection Mode of Aerospace Batch Production Based on Multiple Objective ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 242-245
Papers
An Optimized Method of De-blocking Filter in H.264/AVCFull-text access may be available. Sign in or learn about subscription options.pp. 246-249
Papers
The Comparisons Between Domestic and International Software Outsourcing Industry Growth ModelFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Papers
Analysis of Aggregation Characteristics of Streaming Media TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
Realization of Communication Between DSP and PC Based on Modbus ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 258-261
Papers
A New Waveform Speech Entropy Coding MethodFull-text access may be available. Sign in or learn about subscription options.pp. 262-265
Papers
Digital Image of Restoring Image Based on (7,4)Hamming CodeFull-text access may be available. Sign in or learn about subscription options.pp. 266-269
Papers
Extracting Region with Holes with Edge Expanding MethodFull-text access may be available. Sign in or learn about subscription options.pp. 270-273
Papers
A Novel Routing Algorithm for Ad Hoc Networks Based on the Downstream Nodes InformationFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Papers
An Improved Method of Zero-Copy Data Transmission in the High Speed Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Papers
Preliminary Study of the Virtual University Library's Building in Second lifeFull-text access may be available. Sign in or learn about subscription options.pp. 285-287
Papers
Nutrition Catering System of Hospitals Based on Web Services Integrating Wireless and Wired NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 288-291
Papers
Access Security Based on Bayesian Trust NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 292-294
Papers
Mobile Internet Application to Geographical Information ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Papers
Dynamic Network Planning and Management in an End to End Reconfiguration ContextFull-text access may be available. Sign in or learn about subscription options.pp. 300-303
Papers
Study on Network QoS Evaluation Method Based on NondimensionalizationFull-text access may be available. Sign in or learn about subscription options.pp. 304-307
Papers
The Strategic Path for the Growth of Software Outsourcing Firm in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
Papers
Research on Strategic Management Innovation Based on E-commerce EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 313-316
Papers
High-Security System Primitive for Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 319-321
Papers
Research on Precise Synchronization for TMR Fault-Tolerant Embedded ComputerFull-text access may be available. Sign in or learn about subscription options.pp. 322-325
Papers
An Improved AES Algorithm Based on ChaosFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
Papers
Anonymous Conference Key Distribution Scheme with Perfect Forward SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 330-333
Papers
Research on the Method of Choosing Parameters for NTRUFull-text access may be available. Sign in or learn about subscription options.pp. 334-337
Papers
An Improved Identity-Based Society Oriented Signature SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 338-341
Papers
Design and Implementation of Portable TPM Device Driver Based on Extensible Firmware InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 342-345
Papers
The Research of Group Key Distribution Scheme in TNCFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
Papers
Impossible Differential-Algebraic Cryptanalysis of SerpentFull-text access may be available. Sign in or learn about subscription options.pp. 353-357
Papers
Discovering Host Anomalies in Multi-source InformationFull-text access may be available. Sign in or learn about subscription options.pp. 358-361
Papers
Data Placement Based on Toleration on Twice Failures Array Codes in RAIDFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
Papers
A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Papers
A SPIT Detection Method Using Voice Activity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
Papers
A Concrete Certificateless Signature Scheme without PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 374-377
Papers
Propagation Model of Non-scanning Active Worm in Unstructured P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 378-381
Papers
Intrusion Detection Based on Simulated Annealing and Fuzzy C-means ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 382-385
Papers
A Common On-board Hardware Architecture for Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Showing 100 out of 151