The Community for Technology Leaders
Intelligent Information Hiding and Multimedia Signal Processing, International Conference on (2006)
Pasadena, California, USA
Dec. 18, 2006 to Dec. 20, 2006
ISBN: 0-7695-2745-0
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. xv

Organizing Committee (PDF)

pp. xvi-xxii
Session A1: New Data Hiding and Secreting Techniques for Sound Signals

A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation (Abstract)

Tohru Kiryu , Niigata University, Japan
Mamoru Iwaki , Niigata University, Japan
Ryuta Fujimoto , Niigata University, Japan
pp. 11-14

Information Hiding on Lossless Data Compression (Abstract)

Osamu Takizawa , National Institute of Information and Communications Technology, Japan
Katsunari Yoshioka , National Institute of Information and Communications Technology, Japan
Kotaro Sonoda , National Institute of Information and Communications Technology, Japan
Tsutomu Matsumoto , Yokohama National University, Japan
pp. 15-18

Multiple Description Coding of an Audio Stream by Optimum Recovery Transform (Abstract)

Akinori Ito , Tohoku University, Japan
Shozo Makino , Tohoku University, Japan
pp. 19-22

Audio Watermark Enhanced by LDPC Coding for Air Transmission (Abstract)

Yoiti Suzuki , Tohoku University, Japan
Hao Tao , Tohoku University, Japan
Ryouichi Nishimura , Tohoku University, Japan
pp. 23-26

A Novel Audio Watermarking in Wavelet Domain (Abstract)

Yun Lei , Chinese Academy of Sciences, China
Yonghong Yan , Chinese Academy of Sciences, China
Jian Liu , Chinese Academy of Sciences, China
Ming Li , Chinese Academy of Sciences, China
pp. 27-32

Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments (Abstract)

Saeed Sedghi , Ferdowsi University of Mashhad, Iran
Nedeljko Cvejic , University of Bristol, United Kingdom
Morteza Khademi , Ferdowsi University of Mashhad, Iran
pp. 33-36

Audio Watermarking Based on Reverberation (Abstract)

Shu-xun Wang , Jilin University, China
Zhiyuan Xie , Chinese Academy of Sciences, China
Gui-jun Nian , Jilin University, China
pp. 37-40

Digital Audio Watermarking Algorithm Based on Quantizing Coefficients (Abstract)

Ke Wang , Jilin University, China
Xiao-hua Qiao , Jilin University, China
Zhao Xu , Jilin University, China
pp. 41-46
Session A2: Digital Watermarking (I)

A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking (Abstract)

Chuang Lin , Harbin Institute of Technology, China
Te-hui Kuo , Cheng Shiu University, Taiwan
Chia An Huang , National Kaohsiung University of Applied Sciences, Taiwan
Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Jaw-Shyang Wu , National Kaohsiung University of Applied Sciences, Taiwan
pp. 47-50

An Information Hiding Scheme for OFDM Wireless Networks (Abstract)

Peng Shi , University of Glamorgan, Wales UK
Chuang Lin , Harbin Institute of Technology, China
Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Chin-Shiuh Shieh , National Kaohsiung University of Applied Sciences, Taiwan
pp. 51-54

A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme (Abstract)

Kai Wang , Southeast University, China
Zhenya He , Southeast University, China
Wenjiang Pei , Southeast University, China
Yiu-ming Cheung , Hong Kong Baptist University, Hong Kong
pp. 55-58

A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis (Abstract)

Zhao Xu , Jilin University, China
Ke Wang , Jilin University, China
Xiao-hua Qiao , Jilin University, China
pp. 59-62

A Robust Watermarking Algorithm Adopting Double Embedding (Abstract)

Zhao Xu , Jilin University, China
Quan Wen , Jilin University, China
Xiao-hua Qiao , Jilin University, China
Shu-xun Wang , Jilin University, China
pp. 63-66

A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems (Abstract)

Feng-Cheng Chang , National Chiao Tung University, Taiwan
Hsueh-Ming Hang , National Chiao Tung University, Taiwan
Ying-Tzu Shih , National Chiao Tung University, Taiwan
pp. 67-70

Image Watermarking Based HVS Characteristic of Wavelet Transform (Abstract)

Cong Jin , Central China Normal University, China
Feng Tao , Central China Normal University, China
Yu Fu , Central China Normal University, China
pp. 71-74

CDMA Based Multiple-User Digital Watermarking (Abstract)

Deyun Peng , Mechanical Engineering College, China
Jiazhen Wang , Mechanical Engineering College, China
Aizhen Liu , Mechanical Engineering College, China
Suzhen Wang , Mechanical Engineering College, China
Sumin Yang , Mechanical Engineering College, China
pp. 75-78

Image Watermarking Resisting to Geometrical Attacks Based on Histogram (Abstract)

Yao Zhao , Beijing Jiaotong University, China
Zheng Fang , Beijing Jiaotong University, China
pp. 79-82

A New Watermarking Protocol of Copyright Protection (Abstract)

Hong-peng Li , China Electronics Engineering Design Institute, China
Xiao-gang Yu , Beijing University of Posts and Telecommunication, China
Ru Zhang , Beijing University of Posts and Telecommunication, China
Lin-na Zhou , Beijing Application Institute of Electronic Technology, China
pp. 83-88
Session A3: Techniques and Algorithms for Multimedia Security

A Digital Document Flexible Sanitizing Scheme (Abstract)

Ryoichi Sasaki , Tokyo Denki University, Japan
Mitsuyuki Takatsuka , Tokyo Denki University, Japan
Takanobu Masubuchi , Tokyo Denki University, Japan
pp. 89-92

Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending (Abstract)

Masanori Dainaka , The University of Electro-Communications, Japan
Hiroshi Yoshiura , The University of Electro-Communications, Japan
Shinta Nakayama , The University of Electro-Communications, Japan
Isao Echizen , Hitachi, Ltd., Japan
pp. 93-96

Improved Guided Position Scrambling for Digital Watermarking (Abstract)

Kousuke Tsujita , SANYO Electric Co., Ltd., Japan
Akiomi Kunisa , SANYO Technology Center, USA
pp. 97-100

A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain (Abstract)

Maki Yoshida , Osaka University, Japan
Toru Fujiwara , Osaka University, Japan
Takaaki Fujita , Osaka University, Japan
pp. 101-104

Digital Image Watermark Algorithm in the Curvelet Domain (Abstract)

Wei Huang , Xi'an University of Technology, China
Zhi-yu Zhang , Xi'an University of Technology, China
Jiu-long Zhang , Xi'an University of Technology, China
Hai-yan Yu , Xi'an University of Technology, China
Yan-jun Lu , Xi'an University of Technology, China
pp. 105-108

Joint Halftoning and Visible Watermarking (Abstract)

Hao Luo , Harbin Institute of Technology Shenzhen Graduate School, China; National Kaohsiung University of Applied Sciences, Taiwan
Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Bin-Yih Liao , National Kaohsiung University of Applied Sciences, Taiwan
Zhe-Ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
pp. 109-112

A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking (Abstract)

Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Ping-Sung Liao , Cheng Shiu University, Taiwan
Chin-Shiuh Shieh , National Kaohsiung University of Applied Sciences, Taiwan
Chuang Lin , Harbin Institute of Technology, China
pp. 113-116

Extending the Selective MPEG Encryption Algorithm PVEA (Abstract)

Li Weng , Katholieke Universiteit Leuven, Belgium
Karel Wouters , Katholieke Universiteit Leuven, Belgium
Bart Preneel , Katholieke Universiteit Leuven, Belgium
pp. 117-120

A New Image Steganography for Internet Communications Based on Chaotic Sequences (Abstract)

Gerard Parr , University of Ulster, UK
Niansheng Liu , Jimei University, China
Donghui Guo , Xiamen University, China
pp. 121-124

An Image Encryption Approach Based on a New Two-Dimensional Map (Abstract)

Yong Feng , Harbin Institute of Technology, China
Feng Huang , Harbin Institute of Technology, China
pp. 125-130
Session A4: Image Processing

Image Robust Hashing Based on DCT Sign (Abstract)

Shenghe Sun , Harbin Institute of Technology, China
Longjiang Yu , Harbin Institute of Technology, China
pp. 131-134

A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System (Abstract)

Guang Li , Central South University of Forestry & Technology, China
Da Huang , Central South University of Forestry & Technology, China
Sheng-bing Che , Central South University of Forestry & Technology, China
pp. 135-138

Chain Code Distribution-Based Image Retrieval (Abstract)

Junding Sun , Henan Polytechnic University, China
Xiaosheng Wu , Henan Polytechnic University, China
pp. 139-142

Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique (Abstract)

Guan Xu , Hebei University of Technology, China
Kewen Xia , Hebei University of Technology, China
Naixun Xu , Chest Hospital of Tianjin City, China
pp. 143-146

A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System (Abstract)

Xuezhi Tan , Harbin Institute of Technology, China
Zhongzhao Zhang , Harbin Institute of Technology, China
Lin Ma , Harbin Institute of Technology, China
pp. 147-150

A Novel Log-WT Based Super-Resolution Algorithm (Abstract)

Ju Liu , Shandong University, China
Jianping Qiao , Shandong University, China
pp. 151-154

Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement (Abstract)

Yichun Wang , Northwest University, China
Jinye Peng , Xidian University, China; Northwest University, China
Wanhai Yang , Xidian University, China
pp. 155-158

Recovering Intrinsic Images from Weighted Edge Maps (Abstract)

Chee-Hung Henry Chu , The University of Louisiana at Lafayette, USA
Qiang He , The University of Louisiana at Lafayette, USA
pp. 159-162

An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data (Abstract)

Xianchuan Yu , Beijing Normal University, China
Guosheng Ding , Beijing Normal University, China
Nan Zhang , Beijing Normal University, China
pp. 163-166

Block Mean Value Based Image Perceptual Hashing (Abstract)

Xiamu Niu , Harbin Institute of Technology, China; Shenzhen Graduate School, Harbin Institute of Technology, China
Fan Gu , University of New Hampshire, USA
Bian Yang , Harbin Institute of Technology, China
pp. 167-172
Session A5: IP Multimedia Services

Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway (Abstract)

Ching-Tuey Sung , Tainan University of Technology, Taiwan
Pei-Chen Tseng , National Kaohsiung University of Applied Sciences, Taiwan
Wen-Shyang Hwang , National Kaohsiung University of Applied Sciences, Taiwan
pp. 173-176

KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis (Abstract)

Yu-Ben Miao , Industrial Technology Research Institute, Taiwan
Ce-Kuen Shieh , National Cheng Kung University, Taiwan
Hsiang-Kai Liao , National Cheng Kung University, Taiwan
Yung-Li Chang , National Cheng Kung University, Taiwan
pp. 177-180

Video Transmission Performance Evaluation of Ad Hoc Routing Protocols (Abstract)

Ce-Kuen Shieh , National Cheng Kung University, Taiwan
Ku-Lan Kao , National Cheng Kung University, Taiwan
Chih-Heng Ke , National Cheng Kung University, Taiwan
pp. 181-184

A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks (Abstract)

Ming-Harng Lee , She-Te University, Taiwan
Yi-Hsiang Hung , She-Te University, Taiwan
Mong-Fong Horng , She-Te University, Taiwan
Wan-Ling Du , She-Te University, Taiwan
Hung-Wei Hsu , She-Te University, Taiwan
pp. 185-188

Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks (Abstract)

Hong-Peng Wang , Harbin Institute of Technology, China
Tie-Jun Zhang , Harbin Institute of Technology, China
Xiao-Zong Yang , Harbin Institute of Technology, China
pp. 189-192

Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism (Abstract)

Xue-Guang Wang , East China University of Politics and Law, China
pp. 197-200

Video Streaming over 3G Networks with GOP-Based Priority Scheduling (Abstract)

Jim D. Black , Sprint Advanced Technology Laboratory, USA
Claudio Lima , Sprint Advanced Technology Laboratory, USA
Yongjin Cho , University of Southern California, Los Angeles, USA
James J. Pan , Sprint Advanced Technology Laboratory, USA
C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Do-Kyoung Kwon , University of Southern California, Los Angeles, USA
Renxiang Huang , Sprint Advanced Technology Laboratory, USA
pp. 201-204

Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint (Abstract)

N. Eiamjumrus , Chulalongkorn University, Thailand
S. Aramvith , Chulalongkorn University, Thailand
pp. 205-210
Session A6: Evolutionary and Soft Computing

Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition (Abstract)

Jiping Qi , Harbin Medical University, China
Qiuguang Wang , Harbin University of Science & Technology, China
Lei Zhang , Harbin University of Science & Technology, China
pp. 211-214

Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution (Abstract)

Shaohui Liu , Harbin Institute of Technology, China
Liang Wang , Harbin Institute of Technology, China
Hongxun Yao , Harbin Institute of Technology, China
Rongrong Ji , Harbin Institute of Technology, China
pp. 215-218

Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm (Abstract)

HongPing Yu , University of Electronics Sciences and Technology of China, China
DongXing Qin , University of Electronics Sciences and Technology of China, China
JinFei Wu , University of Electronics Sciences and Technology of China, China
pp. 219-222

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H (Abstract)

Moncef Gabbouj , Tampere University of Technology, Finland
Mehdi Rezaei , Tampere University of Technology, Finland
Imed Bouazizi , Nokia Research Center, Finland
pp. 223-227

Medical Image Noise Reduction Using Cellular Neural Networks (Abstract)

Jyun-Wei Jhang , National Kaohsiung University of Applied Sciences, Taiwan
Te-Jen Su , National Kaohsiung University of Applied Sciences, Taiwan
pp. 228-231

A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification (Abstract)

Dingxue Zhang , Huazhong University of Science & Technology, China
Xinzhi Liu , Huazhong University of Science & Technology, China
Zhihong Guan , Huazhong University of Science & Technology, China
pp. 232-235

Forensic Analysis of Document Fragment Based on SVM (Abstract)

Binglong Li , Information Engineering University, China
Junyong Luo , Information Engineering University, China
Qingxian Wang , Information Engineering University, China
pp. 236-239

Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization (Abstract)

Wei Fang , Southern Yangtze University, China
Wenbo Xu , Southern Yangtze University, China
Jun Sun , Southern Yangtze University, China
pp. 240-243

Analysis and Problems on Fuzzy Vault Scheme (Abstract)

Zhaoqing Liu , Harbin Institute of Technology, China
Qiong Li , Harbin Institute of Technology, Shenzhen Graduate School, China; Harbin Institute of Technology, China
Xiamu Niu , Harbin Institute of Technology, Shenzhen Graduate School, China; Harbin Institute of Technology, China
pp. 244-250
Session B1: Multimedia Networking and Communications in Dynamic Heterogeneous Environments

GA-Based Internet Traffic Classification Technique for QoS Provisioning (Abstract)

Hsiao-Rong Tyan , Chung Yung Christian University, Taiwan
C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Junghun Park , University of Southern California, Los Angeles, USA
pp. 251-254

H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh (Abstract)

Yuh-Chou Tsai , National Chung Cheng University, Taiwan
Chia-Wen Lin , National Chung Cheng University, Taiwan
Chia-Ming Tsai , National Chung Cheng University, Taiwan
pp. 259-262

Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications (Abstract)

Pasquale Cataldi , Politecnico di Torino, Italy
Miquel Pedros Shatarski , Politecnico di Torino, Italy
Marco Grangetto , Politecnico di Torino, Italy
Enrico Magli , Politecnico di Torino, Italy
pp. 263-266

HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing (Abstract)

William Luh , Department of Electrical & Computer Engineering
Unoma Ndili Okorafor , Department of Electrical & Computer Engineering
Deepa Kundur , Department of Electrical & Computer Engineering
pp. 267-270

Positioning Algorithm of Wireless Sensor Network Nodes (Abstract)

Daxin Liu , Harbin Engineering University, China
Wenhui Zhao , Harbin Engineering University, China
Yu Jiang , Harbin Engineering University, China
pp. 271-273

Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation (Abstract)

Jikun Guo , Heilongjiang Institute of Science and Technology, China
Hao Wang , Heilongjiang Institute of Science and Technology, China
Dianwu Gao , Heilongjiang Institute of Science and Technology, China
Yanying Wang , Heilongjiang Institute of Science and Technology, China
pp. 274-277

Curve-Based Secure Routing Algorithm for Sensor Network (Abstract)

Zheng Ma , Hunan University, China
Fen-hua Cheng , Hunan Science Vocational College, China
Jin Zhang , Hunan University, China; Zhejiang University, China
pp. 278-281

Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application (Abstract)

Yong Zhang , Harbin Institute of Technology Shenzhen Graduate School, China
Ming Chen , PLA University of Science and Technology, China
Huan Xiong , PLA University of Science and Technology, China
Guo-min Zhang , PLA University of Science and Technology, China
pp. 282-288
Session B2: Pattern Recognition

Symmetrical Color-Spatial Feature for Medical Image Retrieval (Abstract)

Hao-shan Shi , Northwestern Polytechnical University, China
Jing-yi Qu , Northwestern Polytechnical University, China
pp. 289-292

Face Detection Based on Complexional Segmentation and Feature Extraction (Abstract)

Qian Zhang , XiDian University, China
Zhi-Jing Liu , XiDian University, China
pp. 293-296

Gabor Filter Based Text Extraction from Digital Document Images (Abstract)

Sheng-He Sun , Harbin Institute of Technology, China
Meng Li , Harbin Institute of Technology, China
Yu-Long Qiao , Harbin Institute of Technology, China; Harbin Engineering University, China
Zhe-Ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
pp. 297-300

Discriminant Feature Fusion Strategy for Supervised Learning (Abstract)

Shu-Chuan Chu , Cheng Shiu University, Taiwan
Jung-Chou Harry Chang , Viswis, Inc., Taiwan
Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Jun-Bao Li , Harbin Institute of Technology, China
pp. 301-304

A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images (Abstract)

Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Jiun-Huei Ho , Cheng Shiu University, Taiwan
Shu-Chuan Chu , Cheng Shiu University, Taiwan
Jun-Bao Li , Harbin Institute of Technology, China
pp. 305-308

A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree (Abstract)

Luxi Yang , Southeast University, China
Wenjiang Pei , Southeast University, China
Pinzheng Zhang , Southeast University, China
Zhenya He , Southeast University, China
Qinzhen Xu , Southeast University, China
pp. 309-312

A Method of Biomimetic Pattern Recognition for Speaker Recognition (Abstract)

Yanping Li , Nanjing University of S&T, China
Bo Qian , Nanjing University of S&T, China
Limin Xu , Nanjing University of S&T, China
Zhenmin Tang , Nanjing University of S&T, China
pp. 317-320

A PCA Based Visual DCT Feature Extraction Method for Lip-Reading (Abstract)

Hongxun Yao , Harbin Institute of Technology, China
Rong Chen , Harbin Institute of Technology, China
Xiaopeng Hong , Harbin Institute of Technology, China
Yuqi Wan , Harbin Institute of Technology, China
pp. 321-326
Session B3: Recognizing Humans and Human Behavior in Video

Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework (Abstract)

Hong-Yuan Mark Liao , Academia Sinica, Taiwan
Sheng-Wen Shih , National Chi Nan University, Taiwan
Duan-Yu Chen , Academia Sinica, Taiwan
pp. 327-330

Understanding Human Behavior Using a Language Modeling Approach (Abstract)

Hong-Yuan Mark Liao , National Chiao Tung University, Taiwan; Academia Sinica, Taiwan
Sheng-Wen Shih , National Chi Nan University, Taiwan
Yu-Ming Liang , National Chiao Tung University, Taiwan
Arthur Chun-Chieh Shih , Academia Sinica, Taiwan
pp. 331-334

Human Motion Recognition Using Clay Representation of Trajectories (Abstract)

Yu-Chun Lai , National Chiao-Tung University, Taiwan
Hong-Yuan Mark Liao , National Chiao-Tung University, Taiwan; Academia Sinica, Taiwan
pp. 335-338

Boosted String Representation and Its Application to Video Surveillance (Abstract)

Jun-Wei Hsieh , Yuan Ze University, Taiwan
Yung-Tai Hsu , Yuan Ze University, Taiwan
pp. 339-342

Comparison Study on SVD-Based Face Classification (Abstract)

Yingnan Zhao , Jishou University, China
Yong Xu , Shenzhen graduate school, Harbin Institute of Technology, China
pp. 343-346

Image Retrieval Based on Improved Entropy and Moments (Abstract)

Junding Sun , Henan Polytechnic University, China
pp. 347-350

SVD Based Robust Image Content Retrieval (Abstract)

Xiamu Niu , Harbin Institute of Technology, China; Shenzhen Graduate School, Harbin Institute of Technology, China
He Wang , Harbin Institute of Technology, China
Bian Yang , Harbin Institute of Technology, China
Yuhua Jiao , Harbin Institute of Technology, China
pp. 351-354

Emotion Recognition Using Physiological Signals from Multiple Subjects (Abstract)

Lan Li , Jiangsu University, China
Ji-hua Chen , JiangSu University, China
pp. 355-358

A Fire-Alarming Method Based on Video Processing (Abstract)

Zhe-Ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Jing-Yong Su , Harbin Institute of Technology Shenzhen Graduate School, China
Jeng-Shyang Pan , Kaohsiung University of Applied Sciences, Taiwan
Ping-He Huang , TingYing Industry Corporation Ltd., Taiwan
pp. 359-364
Session B4: Steganography

A New Steganalysis Method for Adaptive Spread Spectrum Steganography (Abstract)

Rongrong Ji , Harbin Institute of Technology, China
Hongxun Yao , Harbin Institute of Technology, China
Shaohui Liu , Harbin Institute of Technology, China
Jianchao Sun , Harbin Institute of Technology, China
Liang Wang , Harbin Institute of Technology, China
pp. 365-368

A Steganalysis Method Based on the Distribution of First Letters of Words (Abstract)

Xin-guang Sui , National Key Lab. of Blind Signals Processing, China
Hui Luo , National Key Lab. of Blind Signals Processing, China
Zhong-liang Zhu , National Key Lab. of Blind Signals Processing, China
pp. 369-372

A Methodology to Improve the Detection Accuracy in Digital Steganalysis (Abstract)

Paolo Gubian , University of Brescia, Italy
Antonio Savoldi , University of Brescia, Italy
pp. 373-376

A Research on Steganography Method Based on Error-Correcting Codes (Abstract)

Lin-Na Zhou , Beijing Application Institute of Electronic Technology, China
Yun-He Wang , Chinese People's Public Security University, China
Cui-Qing Liu , Zhengzhou Information Science and Technology Institute, China
Tao Zhang , Zhengzhou Information Science and Technology Institute, China
Xi-Jian Ping , Zhengzhou Information Science and Technology Institute, China
pp. 377-380

Research of Chaos Encryption Algorithm Based on Logistic Mapping (Abstract)

Jinhong Luo , South China Univ. of Tech., China
Haiyi Shi , South China Univ. of Tech., China
pp. 381-383

Analysis of Current Steganography Tools: Classifications & Features (Abstract)

Ming Chen , Beijing University of Posts & Telecomm, China
Ru Zhang , Beijing University of Posts & Telecomm, China
Yixian Yang , Beijing University of Posts & Telecomm, China
Xinxin Niu , Beijing University of Posts & Telecomm, China
pp. 384-387

Java Applets Copy Protection by Steganography (Abstract)

Mohammad Shirali-Shahreza , Sharif University of Technology, Iran
pp. 388-391

Novel Steganographic Schemes Based on Row-Major Mapping Relation (Abstract)

Chung-Chuan Wang , National Chung Hsing University, Taiwan
Jinn-Ke Jan , National Chung Hsing University, Taiwan
Jieh-Shan Yeh , Providence University, Taiwan
Chin-Chen Chang , Feng Chia University, Taiwan
pp. 392-395

An Improved Secret Key Estimation Method for Sequential Steganography (Abstract)

Fenlin Liu , Information Science and Technology Institute, China
Xiangyang Luo , Information Science and Technology Institute, China
Ping Wang , Information Science and Technology Institute, China
pp. 396-402
Session B5: Video Surveillance

Design of Gabor Filter Banks for Iris Recognition (Abstract)

Duan-Yu Chen , Academia Sinica, Taiwan
Chia-Te Chou , Department of Computer Science and Information Engineering, Taiwan
Sheng-Wen Shih , Department of Computer Science and Information Engineering, Taiwan
pp. 403-406

Abnormal Event Detection in Video Using N-cut Clustering (Abstract)

Chun-Ku Lee , National Tsing Hua University, Taiwan
Chung-Lin Huang , National Tsing Hua University, Taiwan
Wu-Sheng Wen , National Tsing Hua University, Taiwan
Meng-Fen Ho , National Tsing Hua University, Taiwan
pp. 407-410

Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video (Abstract)

Ting-Cheng Chang , Lin Tung University, Taiwan
Chih-Chung Hsu , National Yunlin University of Science & Technology, Taiwan
Hsuan T. Chang , National Yunlin University of Science & Technology, Taiwan
pp. 411-414

Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information (Abstract)

Kai-Li Chiang , National Chiao Tung University, Taiwan
Wen-Hsiang Tsai , National Chiao Tung University, Taiwan; Asia University, Taiwan
pp. 415-418

A Fast Facial Expression Recognition Method at Low-Resolution Images (Abstract)

Yang-Kai Chang , Chung Hua University, Taiwan
Chih-Chiang Tien , Chung Hua University, Taiwan
Cheng-Chang Lien , Chung Hua University, Taiwan
pp. 419-422

The Effect of Frame Freezing and Frame Skipping on Video Quality (Abstract)

Yining Qi , Tong Ji University, China
Mingyuan Dai , Tong Ji University, China
pp. 423-426

The Smoke Detection for Early Fire-Alarming System Base on Video Processing (Abstract)

Yan-Ting Ye , National Kaohsiung University of Applied Sciences, Taiwan
Yen-Hui Yin , National Kaohsiung University of Applied Sciences, Taiwan
Thou-Ho (Chao-Ho) Chen , National Kaohsiung University of Applied Sciences, Taiwan
Shi-Feng Huang , National Kaohsiung University of Applied Sciences, Taiwan
pp. 427-430

An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation (Abstract)

Shi-Feng Huang , National Kaohsiung University of Applied Sciences, Taiwan
Tsong-Yi Chen , National Kaohsiung University of Applied Sciences, Taiwan
Thou-Ho (Chao-Ho) Chen , National Kaohsiung University of Applied Sciences, Taiwan
Yi-Fan Li , National Kaohsiung University of Applied Sciences, Taiwan
pp. 431-434

Automatic Real-Time Moving Target Detection from Infrared Video (Abstract)

C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Shahryar Karimi-Ashtiani , University of Southern California, Los Angeles, USA
pp. 435-440
Session B6: Digital Watermarking (II)

Interlacing Domain Partition for Fractal Watermarking (Abstract)

Chun-Chi Chen , National Kaohsiung University of Applied Sciences
Cheng-Yi Chen , Cheng-Shiu University
Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences
Ping-Sung Liao , Cheng-Shiu University
pp. 441-444

Improved Video Verification Method Using Digital Watermarking (Abstract)

Stephan Singh , Swiss Institute of Technology-Eurecom, France
Takaaki Yamada , Hitachi, Ltd., Japan
Hiroshi Yoshiura , The University of Electro-Communications, Japan
Satoru Tezuka , Hitachi, Ltd., Japan
Isao Echizen , Hitachi, Ltd., Japan
pp. 445-448

Blind Watermarking in Contourlet Domain with Improved Detection (Abstract)

U.B. Desai , Indian Institute of Technology, India
S.N. Merchant , Indian Institute of Technology, India
M. Jayalakshmi , Indian Institute of Technology, India
pp. 449-452

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images (Abstract)

Yung-Chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Chin-Chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Jau-Ji Shen , National Chung Hsing University, Taiwan
pp. 453-456

Image Watermarking Based on Singular Value Decomposition (Abstract)

Xiamu Niu , Shenyang Normal University, China; Harbin Institute of Technology, China
Wenhai Kong , Harbin Institute of Technology, China
Jie Liu , Shenyang Normal University, China
pp. 457-460

A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication (Abstract)

Xiamu Niu , Harbin Institute of Technology, China; Shenzhen Graduate School, Harbin Institute of Technology, China
Bian Yang , Harbin Institute of Technology, China
Zhifang Wang , Harbin Institute of Technology, China
Yijia Zhang , Harbin Institute of Technology, China
pp. 461-464

Geometrically Invariant Watermark Using Fast Correlation Attacks (Abstract)

Peizhong Lu , Fudan University, China
Dan Wang , Fudan University, China
pp. 465-468

Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks (Abstract)

Erika Muller , University of Rostock, Germany
Michael Gulbis , University of Rostock, Germany
Martin Steinebach , Fraunhofer IPSI, Germany
pp. 469-472

The Attacking Method for DC Components Watermarking (Abstract)

Shu-Chuan Chu , Tajen University
Jui-Fang Chang , National Kaohsiung University of Applied Sciences
Pei-Wei Tsai , National Kaohsiung University of Applied Sciences, Taiwan
Hsing-Yuan Liao , College of Electrical Engineering and Computer Science
Ching-Sung Lu , Tajen University
pp. 473-478
Session C1: Advanced Algorithms and Systems for Multimedia Processing and Networking

VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition (Abstract)

Jaw-Chyng L. Lue , University of Southern California, Los Angeles, USA
Wai-Chi Fang , California Institute of Technology, USA
pp. 479-482

Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263 (Abstract)

Chua-Chin Wang , Senior Member, IEEE; National Sun Yat-Sen University, Taiwan
Gang-Neng Sung , National Sun Yat-Sen University, Taiwan
Jia-Hao Li , National Sun Yat-Sen University, Taiwan
pp. 483-486

Reversible Data Hiding for 3D Point Cloud Model (Abstract)

Zhe-Ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Hao Luo , Harbin Institute of Technology Shenzhen Graduate School, China; National Kaohsiung University of Applied Sciences, Taiwan
Jeng-Shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Hsiang-Cheh Huang , National University of Kaohsiung, Taiwan
pp. 487-490

Multiple Description Image Coding Using Shifted Lattice Vector Quantization (Abstract)

Huihui Bai , Beijing Jiaotong University, China
Yao Zhao , Beijing Jiaotong University, China
pp. 491-494

Implications of a Novel Family of Stochastic Methods for Function Recovery (Abstract)

Daniel Howard , Senior Member IEEE, UK
Joseph Kolibal , University of Southern Mississippi, USA
pp. 495-498

A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission (Abstract)

Chun-Ting Hung , National Chung Cheng University, Taiwan
Jin-Jang Leou , National Chung Cheng University, China
pp. 499-502

H.264/AVC Video Encoder Implementation Based on TI TMS320DM642 (Abstract)

Hong-Jun Wang , Shandong University, China
Yong-Jian Huang , Qufu Normal University, China
Hua Li , Tianjin University, China
pp. 503-506

R-D Optimized Frame-Layer Bit Allocation for H.264 (Abstract)

Do-Kyoung Kwon , University of Southern California, Los Angeles, USA
C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Mei-Yin Shen , University of Southern California, Los Angeles, USA
pp. 507-510

Fast H.264/AVC Inter-Mode Decision with RDC Optimization (Abstract)

C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Qing Li , University of Southern California, Los Angeles, USA
Yu Hu , University of Southern California, Los Angeles, USA
Siwei Ma , University of Southern California, Los Angeles, USA
pp. 511-516
Session C2: Signal Processing and Data Compression

Chaotic Signal Design with Selected Parameters (Abstract)

Yi-Sheng Zhu , Dalian Maritime University, China
Baishan Zhao , Dalian Maritime University, China
pp. 517-520

Error-Tolerance and Multi-Media (Abstract)

Melvin A. Breuer , University of Southern California, Los Angeles, USA
Haiyang (Henry) Zhu , University of Southern California, Los Angeles, USA
pp. 521-524

An Improved Technique for Blind Audio Source Separation (Abstract)

Namgook Cho , University of Southern California, Los Angeles, USA
Yu Shiu , University of Southern California, Los Angeles, USA
C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 525-528

Adaptive Working Window for Impulse Noise Reduction (Abstract)

Shi-Feng Huang , National Kaohsiung University of Applied Sciences, Taiwan
Chao-Yu Chen , National Cheng Kung University, Taiwan
Zhi-Hong Lin , National Cheng Kung University, Taiwan
Thou-Ho(Chao-Ho) Chen , National Kaohsiung University of Applied Sciences, Taiwan
pp. 529-532

Improved Linear Prediction Technique for Musical Onset Detection (Abstract)

C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Wan-Chi Lee , University of Southern California, Los Angeles, USA
pp. 533-536

A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection (Abstract)

Bo Qian , Nanjing University of S&T, China
Zhenmin Tang , Nanjing University of S&T, China
Yanping Li , Nanjing University of S&T, China
Hui Ding , Nanjing University of S&T, China; JiaXing University, China
pp. 537-540

Improved SMVQ Scheme with Edge-Directed Prediction (Abstract)

Chin-Chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Kuan-Ming Li , National Chung Cheng University, Taiwan
Yi-Hui Chen , National Chung Cheng University, Taiwan
pp. 541-544

A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords (Abstract)

Yung-Chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Jau-Ji Shen , National Chung Hsing University, Taiwan
Chin-Chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
pp. 545-548

Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search (Abstract)

Yung-Chen Chou , National Chung Cheng University, Taiwan
Chin-Chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
pp. 549-554
Session C3: System Implementation

Design of AC-PDP Signal Processor for SoC Application (Abstract)

Jin-gao Liu , East China Normal University, China
Song Qiu , East China Normal University, China
Wai-yun Li , East China Normal University, China
Wen-jing Hu , Hunan Institute of Science and Technology, China
pp. 555-558

A Novel Low-IF Topology for High Performance Integrated Receivers (Abstract)

Jiansong Gao , Beijing University of Posts and Telecommunications, China
Yong Wang , Beijing University of Posts and Telecommunications, China
Lingjun Xu , Beijing University of Posts and Telecommunications, China
Qiang Wang , Beijing University of Posts and Telecommunications, China
Ping Zhang , Beijing University of Posts and Telecommunications, China
pp. 559-562

Power Optimization for Bus on Multimedia SoC (Abstract)

Donghai Li , Harbin Engineering University, China
Ru Yang , Heilongjiang Institute of Technology, China
Gang Feng , Harbin Engineering University, China
pp. 563-566

Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform (Abstract)

Feng-Cheng Chang , National Chiao Tung University, Taiwan
Hsueh-Ming Hang , National Chiao Tung University, Taiwan
Min-Hong Chen , National Chiao Tung University, Taiwan
pp. 567-570

A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors (Abstract)

Hung-Yu Wang , National Kaohsiung University of Applied Sciences
Chih-Chung Tai , National Kaohsiung University of Applied Sciences
Yuan-Long Jeang , Kun Shan University
Tzuu-Shaang Wey , Kun Shan University
pp. 571-574

Research on Applying Java Card to Database Encryption Systems (Abstract)

Han Yu , PLA Information Engineering University, China
Xiamu Niu , Harbin Institute of Technology, Shenzhen Graduate School, China
Changxiang Shen , PLA Information Engineering University, China
Duohe Ma , Harbin Institute of Technology, Shenzhen Graduate School, China
pp. 575-578

System-on-Chip Architecture Design for Intelligent Sensor Networks (Abstract)

Wai-Chi Fang , California Institute of Technology, USA
Gu-Yeon Wei , Harvard University, USA
Susan Owen , California Institute of Technology, USA
Jonathan Lees , University of North Carolina, USA
Sharon Kedar , California Institute of Technology, USA
David Brooks , Harvard University, USA
pp. 579-582

Low-Power Radio Design for Wireless Smart Sensor Networks (Abstract)

Tsung-Hsien Lin , National Taiwan University, Taiwan
Wai-Chi Fang , California Institute of Technology, USA
pp. 583-586

VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design (Abstract)

Yihe Sun , Tsinghua University, China
Hu He , Tsinghua University, China
Zheng Shen , Tsinghua University, China
Yanjun Zhang , Tsinghua University, China
pp. 587-592
Session C4: Data Hiding and Security

Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain (Abstract)

Zhe-Ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Zhen Sun , Harbin Institute of Technology, China
Zhen Li , Harbin Institute of Technology, China
pp. 593-596

Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication (Abstract)

Imtiaz Awan , GIK Institute of Engineering Sciences & Technology Topi, Pakistan
S.A. Shah , GIK Institute of Engineering Sciences & Technology Topi, Pakistan
S.A.M. Gilani , GIK Institute of Engineering Sciences & Technology Topi, Pakistan
pp. 597-600

A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping (Abstract)

Liehuang Zhu , Beijing Institute of Technology, China
Wenzhuo Li , Beijing Institute of Technology, China
Lejian Liao , Beijing Institute of Technology, China
Hong Li , Beijing Institute of Technology, China
pp. 601-604

Focus on the Generalized Information Hiding Technology (Abstract)

Yun-biao Guo , Beijing Institute of Electronic Technology Application, China
Xia-mu Niu , Information Countermeasure Technique Research Institute, China
Dai-mao Lin , Beijing Institute of Electronic Technology Application, China
Lin-na Zhou , Beijing Institute of Electronic Technology Application, China
Lan Hu , Beijing Institute of Electronic Technology Application, China
pp. 605-608

Information Hiding Method in Digital Audio Signal Based on Perfect Codes (Abstract)

Yun-he Wang , Chinese People's Public Security University, China
Tao Zhang , ZhengZhou Information Science Technology Institute, China
Lin-na Zhou , Beijing University of Posts and Telecommunication, China
Cui-qing Liu , ZhengZhou Information Science Technology Institute, China
Xi-jian Ping , ZhengZhou Information Science Technology Institute, China
pp. 609-612

A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences (Abstract)

Yaqin Zhao , Harbin Institute of Technology, China
Nan Zhao , Harbin Institute of Technology, China
Bo Zhang , Harbin Institute of Technology, China
Guanghui Ren , Harbin Institute of Technology, China
pp. 613-616

An Image Hiding Scheme Based on Du's Disk Allocation Method (Abstract)

Chia-Chen Lin , Providence University, Taiwan
Chin-Chen Chang , Feng Chia University, Taiwan
pp. 617-620

Analysis of Anonymity on the Signatures of Knowledge (Abstract)

Shenghe Sun , Harbin Institute of Technology, China
Xinguang Zou , Harbin Institute of Technology, China
pp. 621-624

An Efficient Attestation for Trustworthiness of Computing Platform (Abstract)

Xiao-Dong Zuo , Graduate School of CAS, China
Xiao-Yong Li , Beijing Jiaotong University, China
Chang-Xiang Shen , Naval Institute of Computing Technology, China
pp. 625-630
Session C5: Signal Processing and Coding

Effects on Statistical Features for Image by Quantization (Abstract)

Xiangwei Kong , Dalian University of Technology, China
Xingang You , Dalian University of Technology, China
Yanqing Guo , Dalian University of Technology, China
Weiwei Quan , Dalian University of Technology, China
Yanwu Zhu , Dalian University of Technology, China
pp. 631-634

A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform (Abstract)

Bei-bei Li , Jilin University, China
Shu-xun Wang , Jilin University, China
Xin Li , Jilin University, China
Hai-feng Li , Jilin University, China
pp. 635-638

Design of Collusion-Free Codes Based on MAI-Free Principle (Abstract)

Byung-Ho Cha , University of Southern California, Los Angeles, USA
C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 639-642

Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2 (Abstract)

Zhenyu Wu , University of Electronic Science and Technology of China, China
Hongyang Yu , University of Electronic Science and Technology of China, China
Hong Hu , University of Electronic Science and Technology of China, China
Bin Tang , University of Electronic Science and Technology of China, China
pp. 643-646

Chirp-Based Image Watermarking as Error-Control Coding (Abstract)

Sridhar Krishnan , Ryerson University, Canada
Behnaz Ghoraani , Ryerson University, Canada
pp. 647-650

Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces (Abstract)

Chun-Hsien Chou , Tatung University, Taiwan
Kuo-Cheng Liu , Tatung University, Taiwan; Taiwan Hospitality and Tourism College, Taiwan
pp. 651-654

Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding (Abstract)

Qi Zhang , University of Southern California, Los Angeles, USA
Siwei Ma , University of Southern California, Los Angeles, USA
C.-C. Jay Kuo , University of Southern California, Los Angeles, USA
Yunyang Dai , University of Southern California, Los Angeles, USA
pp. 655-658

Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors (Abstract)

Chun-Chieh Tseng , National Kaohsiung University of Applied Sciences, Taiwan
Por-Song Lee , I-Shou University, Taiwan
Mao-Fu Lai , Tung Nan Institute of Technology, Taiwan
pp. 659-662

Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition (Abstract)

Jianjun Lei , Beijing University of Posts and Telecommunications, China
Haifeng Shen , Beijing University of Posts and Telecommunications, China
Gang Liu , Beijing University of Posts and Telecommunications, China
Jun Guo , Beijing University of Posts and Telecommunications, China
Jian Wang , Beijing University of Posts and Telecommunications, China
pp. 663-668
Session C6: Cross-Discipline Technology

Fast Algorithm of Trigonometric Function of Specific Angle (Abstract)

Yaqi Cheng , China Academy of Science Institute of Microelectronic, China
Jianjun Hao , China University of Mining & Technology, China
Fuzeng Wang , Agriculture University of Hebei, China
Wending Liu , Bejing Forestry University, China
Qiusheng He , China University of Mining & Technology, China
Hui Li , China University of Mining & Technology, China
pp. 669-672

The Watermarking Model for Relational Database Based on Watermarking Sharing (Abstract)

Yu Fu , Central China Normal University, China
Cong Jin , Central China Normal University, China
Feng Tao , Central China Normal University, China
pp. 677-680

The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System (Abstract)

Ming-gen Cui , Harbin Normal University, China
Xiao-jun Tong , Harbin Institute of Technology, China
Wei Jiang , Harbin Institute of Technology, China
pp. 685-688

Pervasive Computing Context Access Control Based on UCON_ABC Model (Abstract)

Fan Yang , Donghua University, China
Haibin Cai , Donghua University, China
Qiying Cao , Donghua University, China
Fang Pu , Donghua University, China
Daoqin Sun , Donghua University, China
pp. 689-692

A Non-uniform Quantizing Approach to Protect Biometric Templates (Abstract)

Xiamu Niu , Harbin Institute of Technology, China
Zhifang Wang , Harbin Institute of Technology, China
Qi Han , Harbin Institute of Technology, China
pp. 693-698

Detecting the Theft of Natural Language Text Using Birthmark (Abstract)

Jianlong Yang , Tsinghua University, China
Deyi Li , Tsinghua University, China
Jianmin Wang , Tsinghua University, China
pp. 699-702

A Context-Aware AmI System Based on MAS Model (Abstract)

Yibin Hou , Beijing University of Technology, China
Rui Chen , Beijing University of Technology, China
Yong Zhang , Beijing University of Technology, China
Zhangqin Huang , Beijing University of Technology, China
Hui Li , Beijing University of Technology, China
pp. 703-706
Author Index

Author Index (PDF)

pp. 707-711
80 ms
(Ver 3.3 (11022016))