The Community for Technology Leaders
2006 International Conference on Intelligent Information Hiding and Multimedia (2006)
Pasadena, CA, USA
Dec. 18, 2006 to Dec. 20, 2006
ISBN: 0-7695-2745-0
TABLE OF CONTENTS

A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation (PDF)

Ryuta Fujimoto , Niigata University, Japan
Mamoru Iwaki , Niigata University, Japan
Tohru Kiryu , Niigata University, Japan
pp. 11-14

Information Hiding on Lossless Data Compression (PDF)

Katsunari Yoshioka , National Institute of Information and Communications Technology, Japan
Kotaro Sonoda , National Institute of Information and Communications Technology, Japan
Osamu Takizawa , National Institute of Information and Communications Technology, Japan
Tsutomu Matsumoto , Yokohama National University, Japan
pp. 15-18

Multiple Description Coding of an Audio Stream by Optimum Recovery Transform (PDF)

Akinori Ito , Tohoku University, Japan
Shozo Makino , Tohoku University, Japan
pp. 19-22

Audio Watermark Enhanced by LDPC Coding for Air Transmission (PDF)

Yoiti Suzuki , Tohoku University, Japan
Ryouichi Nishimura , Tohoku University, Japan
Hao Tao , Tohoku University, Japan
pp. 23-26

A Novel Audio Watermarking in Wavelet Domain (PDF)

Ming Li , Chinese Academy of Sciences, China
Yun Lei , Chinese Academy of Sciences, China
Jian Liu , Chinese Academy of Sciences, China
Yonghong Yan , Chinese Academy of Sciences, China
pp. 27-32

Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments (PDF)

Saeed Sedghi , Ferdowsi University of Mashhad, Iran
Morteza Khademi , Ferdowsi University of Mashhad, Iran
Nedeljko Cvejic , University of Bristol, United Kingdom
pp. 33-36

Audio Watermarking Based on Reverberation (PDF)

Gui-jun Nian , Jilin University, China
Zhiyuan Xie , Chinese Academy of Sciences, China
Shu-xun Wang , Jilin University, China
pp. 37-40

Digital Audio Watermarking Algorithm Based on Quantizing Coefficients (PDF)

Zhao Xu , Jilin University, China
Ke Wang , Jilin University, China
Xiao-hua Qiao , Jilin University, China
pp. 41-46

A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking (PDF)

Chia An Huang , National Kaohsiung University of Applied Sciences, Taiwan
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Te-hui Kuo , Cheng Shiu University, Taiwan
Jaw-shyang Wu , National Kaohsiung University of Applied Sciences, Taiwan
Chuang Lin , Harbin Institute of Technology, China
pp. 47-50

An Information Hiding Scheme for OFDM Wireless Networks (PDF)

Chuang Lin , Harbin Institute of Technology, China
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Chin-shiuh Shieh , National Kaohsiung University of Applied Sciences, Taiwan
Peng Shi , University of Glamorgan, Wales UK
pp. 51-54

A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme (PDF)

Kai Wang , Southeast University, China
Wenjiang Pei , Southeast University, China
Zhenya He , Southeast University, China
Yiu-ming Cheung , Hong Kong Baptist University, Hong Kong
pp. 55-58

A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis (PDF)

Zhao Xu , Jilin University, China
Ke Wang , Jilin University, China
Xiao-hua Qiao , Jilin University, China
pp. 59-62

A Robust Watermarking Algorithm Adopting Double Embedding (PDF)

Xiao-hua Qiao , Jilin University, China
Shu-xun Wang , Jilin University, China
Quan Wen , Jilin University, China
Zhao Xu , Jilin University, China
pp. 63-66

A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems (PDF)

Ying-tzu Shih , National Chiao Tung University, Taiwan
Feng-cheng Chang , National Chiao Tung University, Taiwan
Hsueh-ming Hang , National Chiao Tung University, Taiwan
pp. 67-70

Image Watermarking Based HVS Characteristic of Wavelet Transform (PDF)

Cong Jin , Central China Normal University, China
Feng Tao , Central China Normal University, China
Yu Fu , Central China Normal University, China
pp. 71-74

CDMA Based Multiple-User Digital Watermarking (PDF)

Deyun Peng , Mechanical Engineering College, China
Jiazhen Wang , Mechanical Engineering College, China
Sumin Yang , Mechanical Engineering College, China
Suzhen Wang , Mechanical Engineering College, China
Aizhen Liu , Mechanical Engineering College, China
pp. 75-78

Image Watermarking Resisting to Geometrical Attacks Based on Histogram (PDF)

Zheng Fang , Beijing Jiaotong University, China
Yao Zhao , Beijing Jiaotong University, China
pp. 79-82

A New Watermarking Protocol of Copyright Protection (PDF)

Ru Zhang , Beijing University of Posts and Telecommunication, China
Xiao-gang Yu , Beijing University of Posts and Telecommunication, China
Lin-na Zhou , Beijing Application Institute of Electronic Technology, China
Hong-peng Li , China Electronics Engineering Design Institute, China
pp. 83-88

A Digital Document Flexible Sanitizing Scheme (PDF)

Takanobu Masubuchi , Tokyo Denki University, Japan
Mitsuyuki Takatsuka , Tokyo Denki University, Japan
Ryoichi Sasaki , Tokyo Denki University, Japan
pp. 89-92

Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending (PDF)

Masanori Dainaka , The University of Electro-Communications, Japan
Shinta Nakayama , The University of Electro-Communications, Japan
Isao Echizen , Hitachi, Ltd., Japan
Hiroshi Yoshiura , The University of Electro-Communications, Japan
pp. 93-96

Improved Guided Position Scrambling for Digital Watermarking (PDF)

Akiomi Kunisa , SANYO Technology Center, USA
Kousuke Tsujita , SANYO Electric Co., Ltd., Japan
pp. 97-100

A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain (PDF)

Maki Yoshida , Osaka University, Japan
Takaaki Fujita , Osaka University, Japan
Toru Fujiwara , Osaka University, Japan
pp. 101-104

Digital Image Watermark Algorithm in the Curvelet Domain (PDF)

Zhi-yu Zhang , Xi'an University of Technology, China
Wei Huang , Xi'an University of Technology, China
Jiu-long Zhang , Xi'an University of Technology, China
Hai-yan Yu , Xi'an University of Technology, China
Yan-jun Lu , Xi'an University of Technology, China
pp. 105-108

Joint Halftoning and Visible Watermarking (PDF)

Hao Luo , Harbin Institute of Technology Shenzhen Graduate School, China; National Kaohsiung University of Applied Sciences, Taiwan
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Zhe-ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Bin-yih Liao , National Kaohsiung University of Applied Sciences, Taiwan
pp. 109-112

A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking (PDF)

Chuang Lin , Harbin Institute of Technology, China
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Chin-shiuh Shieh , National Kaohsiung University of Applied Sciences, Taiwan
Ping-sung Liao , Cheng Shiu University, Taiwan
pp. 113-116

Extending the Selective MPEG Encryption Algorithm PVEA (PDF)

Li Weng , Katholieke Universiteit Leuven, Belgium
Karel Wouters , Katholieke Universiteit Leuven, Belgium
Bart Preneel , Katholieke Universiteit Leuven, Belgium
pp. 117-120

A New Image Steganography for Internet Communications Based on Chaotic Sequences (PDF)

Niansheng Liu , Jimei University, China
Donghui Guo , Xiamen University, China
Gerard Parr , University of Ulster, UK
pp. 121-124

An Image Encryption Approach Based on a New Two-Dimensional Map (PDF)

Feng Huang , Harbin Institute of Technology, China
Yong Feng , Harbin Institute of Technology, China
pp. 125-130

Image Robust Hashing Based on DCT Sign (PDF)

Longjiang Yu , Harbin Institute of Technology, China
Shenghe Sun , Harbin Institute of Technology, China
pp. 131-134

A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System (PDF)

Sheng-bing Che , Central South University of Forestry & Technology, China
Da Huang , Central South University of Forestry & Technology, China
Guang Li , Central South University of Forestry & Technology, China
pp. 135-138

Chain Code Distribution-Based Image Retrieval (PDF)

Junding Sun , Henan Polytechnic University, China
Xiaosheng Wu , Henan Polytechnic University, China
pp. 139-142

Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique (PDF)

Kewen Xia , Hebei University of Technology, China
Guan Xu , Hebei University of Technology, China
Naixun Xu , Chest Hospital of Tianjin City, China
pp. 143-146

A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System (PDF)

Lin Ma , Harbin Institute of Technology, China
Zhongzhao Zhang , Harbin Institute of Technology, China
Xuezhi Tan , Harbin Institute of Technology, China
pp. 147-150

A Novel Log-WT Based Super-Resolution Algorithm (PDF)

Jianping Qiao , Shandong University, China
Ju Liu , Shandong University, China
pp. 151-154

Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement (PDF)

Jinye Peng , Xidian University, China; Northwest University, China
Wanhai Yang , Xidian University, China
Yichun Wang , Northwest University, China
pp. 155-158

Recovering Intrinsic Images from Weighted Edge Maps (PDF)

Qiang He , The University of Louisiana at Lafayette, USA
Chee-hung Henry Chu , The University of Louisiana at Lafayette, USA
pp. 159-162

An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data (PDF)

Nan Zhang , Beijing Normal University, China
Xianchuan Yu , Beijing Normal University, China
Guosheng Ding , Beijing Normal University, China
pp. 163-166

Block Mean Value Based Image Perceptual Hashing (PDF)

Bian Yang , Harbin Institute of Technology, China
Fan Gu , University of New Hampshire, USA
Xiamu Niu , Harbin Institute of Technology, China; Shenzhen Graduate School, Harbin Institute of Technology, China
pp. 167-172

Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway (PDF)

Pei-chen Tseng , National Kaohsiung University of Applied Sciences, Taiwan
Ching-tuey Sung , Tainan University of Technology, Taiwan
Wen-shyang Hwang , National Kaohsiung University of Applied Sciences, Taiwan
pp. 173-176

KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis (PDF)

Yung-li Chang , National Cheng Kung University, Taiwan
Hsiang-kai Liao , National Cheng Kung University, Taiwan
Ce-kuen Shieh , National Cheng Kung University, Taiwan
Yu-ben Miao , Industrial Technology Research Institute, Taiwan
pp. 177-180

Video Transmission Performance Evaluation of Ad Hoc Routing Protocols (PDF)

Ku-lan Kao , National Cheng Kung University, Taiwan
Chih-heng Ke , National Cheng Kung University, Taiwan
Ce-kuen Shieh , National Cheng Kung University, Taiwan
pp. 181-184

A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks (PDF)

Mong-fong Horng , She-Te University, Taiwan
Hung-wei Hsu , She-Te University, Taiwan
Wan-ling Du , She-Te University, Taiwan
Yi-hsiang Hung , She-Te University, Taiwan
Ming-harng Lee , She-Te University, Taiwan
pp. 185-188

Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks (PDF)

Hong-peng Wang , Harbin Institute of Technology, China
Tie-jun Zhang , Harbin Institute of Technology, China
Xiao-zong Yang , Harbin Institute of Technology, China
pp. 189-192

Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism (PDF)

Xue-guang Wang , East China University of Politics and Law, China
pp. 197-200

Video Streaming over 3G Networks with GOP-Based Priority Scheduling (PDF)

Yongjin Cho , University of Southern California, Los Angeles, USA
Do-kyoung Kwon , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
Renxiang Huang , Sprint Advanced Technology Laboratory, USA
Claudio Lima , Sprint Advanced Technology Laboratory, USA
Jim D. Black , Sprint Advanced Technology Laboratory, USA
James J. Pan , Sprint Advanced Technology Laboratory, USA
pp. 201-204

Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint (PDF)

N. Eiamjumrus , Chulalongkorn University, Thailand
S. Aramvith , Chulalongkorn University, Thailand
pp. 205-210

Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition (PDF)

Lei Zhang , Harbin University of Science & Technology, China
Qiuguang Wang , Harbin University of Science & Technology, China
Jiping Qi , Harbin Medical University, China
pp. 211-214

Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution (PDF)

Rongrong Ji , Harbin Institute of Technology, China
Hongxun Yao , Harbin Institute of Technology, China
Shaohui Liu , Harbin Institute of Technology, China
Liang Wang , Harbin Institute of Technology, China
pp. 215-218

Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm (PDF)

Jinfei Wu , University of Electronics Sciences and Technology of China, China
Dongxing Qin , University of Electronics Sciences and Technology of China, China
Hongping Yu , University of Electronics Sciences and Technology of China, China
pp. 219-222

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H (PDF)

Mehdi Rezaei , Tampere University of Technology, Finland
Moncef Gabbouj , Tampere University of Technology, Finland
Imed Bouazizi , Nokia Research Center, Finland
pp. 223-227

Medical Image Noise Reduction Using Cellular Neural Networks (PDF)

Te-jen Su , National Kaohsiung University of Applied Sciences, Taiwan
Jyun-wei Jhang , National Kaohsiung University of Applied Sciences, Taiwan
pp. 228-231

A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification (PDF)

Dingxue Zhang , Huazhong University of Science & Technology, China
Xinzhi Liu , Huazhong University of Science & Technology, China
Zhihong Guan , Huazhong University of Science & Technology, China
pp. 232-235

Forensic Analysis of Document Fragment Based on SVM (PDF)

Binglong Li , Information Engineering University, China
Qingxian Wang , Information Engineering University, China
Junyong Luo , Information Engineering University, China
pp. 236-239

Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization (PDF)

Wei Fang , Southern Yangtze University, China
Jun Sun , Southern Yangtze University, China
Wenbo Xu , Southern Yangtze University, China
pp. 240-243

Analysis and Problems on Fuzzy Vault Scheme (PDF)

Qiong Li , Harbin Institute of Technology, Shenzhen Graduate School, China; Harbin Institute of Technology, China
Zhaoqing Liu , Harbin Institute of Technology, China
Xiamu Niu , Harbin Institute of Technology, Shenzhen Graduate School, China; Harbin Institute of Technology, China
pp. 244-250

GA-Based Internet Traffic Classification Technique for QoS Provisioning (PDF)

Junghun Park , University of Southern California, Los Angeles, USA
Hsiao-rong Tyan , Chung Yung Christian University, Taiwan
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 251-254

H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh (PDF)

Yuh-chou Tsai , National Chung Cheng University, Taiwan
Chia-ming Tsai , National Chung Cheng University, Taiwan
Chia-wen Lin , National Chung Cheng University, Taiwan
pp. 259-262

Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications (PDF)

Pasquale Cataldi , Politecnico di Torino, Italy
Miquel Pedros Shatarski , Politecnico di Torino, Italy
Marco Grangetto , Politecnico di Torino, Italy
Enrico Magli , Politecnico di Torino, Italy
pp. 263-266

HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing (Abstract)

Deepa Kundur , Department of Electrical & Computer Engineering
Unoma Ndili Okorafor , Department of Electrical & Computer Engineering
William Luh , Department of Electrical & Computer Engineering
pp. 267-270

Positioning Algorithm of Wireless Sensor Network Nodes (PDF)

Wenhui Zhao , Harbin Engineering University, China
Daxin Liu , Harbin Engineering University, China
Yu Jiang , Harbin Engineering University, China
pp. 271-273

Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation (PDF)

Hao Wang , Heilongjiang Institute of Science and Technology, China
Yanying Wang , Heilongjiang Institute of Science and Technology, China
Jikun Guo , Heilongjiang Institute of Science and Technology, China
Dianwu Gao , Heilongjiang Institute of Science and Technology, China
pp. 274-277

Curve-Based Secure Routing Algorithm for Sensor Network (PDF)

Fen-hua Cheng , Hunan Science Vocational College, China
Jin Zhang , Hunan University, China; Zhejiang University, China
Zheng Ma , Hunan University, China
pp. 278-281

Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application (PDF)

Guo-min Zhang , PLA University of Science and Technology, China
Yong Zhang , Harbin Institute of Technology Shenzhen Graduate School, China
Ming Chen , PLA University of Science and Technology, China
Huan Xiong , PLA University of Science and Technology, China
pp. 282-288

Symmetrical Color-Spatial Feature for Medical Image Retrieval (PDF)

Jing-yi Qu , Northwestern Polytechnical University, China
Hao-shan Shi , Northwestern Polytechnical University, China
pp. 289-292

Face Detection Based on Complexional Segmentation and Feature Extraction (PDF)

Qian Zhang , XiDian University, China
Zhi-jing Liu , XiDian University, China
pp. 293-296

Gabor Filter Based Text Extraction from Digital Document Images (PDF)

Yu-long Qiao , Harbin Institute of Technology, China; Harbin Engineering University, China
Meng Li , Harbin Institute of Technology, China
Zhe-ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Sheng-he Sun , Harbin Institute of Technology, China
pp. 297-300

Discriminant Feature Fusion Strategy for Supervised Learning (PDF)

Jun-bao Li , Harbin Institute of Technology, China
Shu-chuan Chu , Cheng Shiu University, Taiwan
Jung-chou Harry Chang , Viswis, Inc., Taiwan
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
pp. 301-304

A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images (PDF)

Jun-bao Li , Harbin Institute of Technology, China
Shu-chuan Chu , Cheng Shiu University, Taiwan
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Jiun-huei Ho , Cheng Shiu University, Taiwan
pp. 305-308

A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree (PDF)

Qinzhen Xu , Southeast University, China
Pinzheng Zhang , Southeast University, China
Wenjiang Pei , Southeast University, China
Luxi Yang , Southeast University, China
Zhenya He , Southeast University, China
pp. 309-312

A Method of Biomimetic Pattern Recognition for Speaker Recognition (PDF)

Bo Qian , Nanjing University of S&T, China
Yanping Li , Nanjing University of S&T, China
Limin Xu , Nanjing University of S&T, China
Zhenmin Tang , Nanjing University of S&T, China
pp. 317-320

A PCA Based Visual DCT Feature Extraction Method for Lip-Reading (PDF)

Xiaopeng Hong , Harbin Institute of Technology, China
Hongxun Yao , Harbin Institute of Technology, China
Yuqi Wan , Harbin Institute of Technology, China
Rong Chen , Harbin Institute of Technology, China
pp. 321-326

Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework (PDF)

Duan-yu Chen , Academia Sinica, Taiwan
Sheng-wen Shih , National Chi Nan University, Taiwan
Hong-yuan Mark Liao , Academia Sinica, Taiwan
pp. 327-330

Understanding Human Behavior Using a Language Modeling Approach (PDF)

Yu-ming Liang , National Chiao Tung University, Taiwan
Sheng-wen Shih , National Chi Nan University, Taiwan
Arthur Chun-chieh Shih , Academia Sinica, Taiwan
Hong-yuan Mark Liao , National Chiao Tung University, Taiwan; Academia Sinica, Taiwan
pp. 331-334

Human Motion Recognition Using Clay Representation of Trajectories (PDF)

Yu-chun Lai , National Chiao-Tung University, Taiwan
Hong-yuan Mark Liao , National Chiao-Tung University, Taiwan; Academia Sinica, Taiwan
pp. 335-338

Boosted String Representation and Its Application to Video Surveillance (PDF)

Yung-tai Hsu , Yuan Ze University, Taiwan
Jun-wei Hsieh , Yuan Ze University, Taiwan
pp. 339-342

Comparison Study on SVD-Based Face Classification (PDF)

Yong Xu , Shenzhen graduate school, Harbin Institute of Technology, China
Yingnan Zhao , Jishou University, China
pp. 343-346

Image Retrieval Based on Improved Entropy and Moments (PDF)

Junding Sun , Henan Polytechnic University, China
pp. 347-350

SVD Based Robust Image Content Retrieval (PDF)

Yuhua Jiao , Harbin Institute of Technology, China
Bian Yang , Harbin Institute of Technology, China
He Wang , Harbin Institute of Technology, China
Xiamu Niu , Harbin Institute of Technology, China; Shenzhen Graduate School, Harbin Institute of Technology, China
pp. 351-354

Emotion Recognition Using Physiological Signals from Multiple Subjects (PDF)

Lan Li , Jiangsu University, China
Ji-hua Chen , JiangSu University, China
pp. 355-358

A Fire-Alarming Method Based on Video Processing (PDF)

Ping-he Huang , TingYing Industry Corporation Ltd., Taiwan
Jing-yong Su , Harbin Institute of Technology Shenzhen Graduate School, China
Zhe-ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Jeng-shyang Pan , Kaohsiung University of Applied Sciences, Taiwan
pp. 359-364

A New Steganalysis Method for Adaptive Spread Spectrum Steganography (PDF)

Rongrong Ji , Harbin Institute of Technology, China
Hongxun Yao , Harbin Institute of Technology, China
Shaohui Liu , Harbin Institute of Technology, China
Liang Wang , Harbin Institute of Technology, China
Jianchao Sun , Harbin Institute of Technology, China
pp. 365-368

A Steganalysis Method Based on the Distribution of First Letters of Words (PDF)

Xin-guang Sui , National Key Lab. of Blind Signals Processing, China
Hui Luo , National Key Lab. of Blind Signals Processing, China
Zhong-liang Zhu , National Key Lab. of Blind Signals Processing, China
pp. 369-372

A Methodology to Improve the Detection Accuracy in Digital Steganalysis (PDF)

Antonio Savoldi , University of Brescia, Italy
Paolo Gubian , University of Brescia, Italy
pp. 373-376

A Research on Steganography Method Based on Error-Correcting Codes (PDF)

Cui-qing Liu , Zhengzhou Information Science and Technology Institute, China
Xi-jian Ping , Zhengzhou Information Science and Technology Institute, China
Tao Zhang , Zhengzhou Information Science and Technology Institute, China
Lin-na Zhou , Beijing Application Institute of Electronic Technology, China
Yun-he Wang , Chinese People's Public Security University, China
pp. 377-380

Research of Chaos Encryption Algorithm Based on Logistic Mapping (PDF)

Jinhong Luo , South China Univ. of Tech., China
Haiyi Shi , South China Univ. of Tech., China
pp. 381-383

Analysis of Current Steganography Tools: Classifications & Features (PDF)

Ming Chen , Beijing University of Posts & Telecomm, China
Ru Zhang , Beijing University of Posts & Telecomm, China
Xinxin Niu , Beijing University of Posts & Telecomm, China
Yixian Yang , Beijing University of Posts & Telecomm, China
pp. 384-387

Java Applets Copy Protection by Steganography (PDF)

Mohammad Shirali-Shahreza , Sharif University of Technology, Iran
pp. 388-391

Novel Steganographic Schemes Based on Row-Major Mapping Relation (PDF)

Chung-chuan Wang , National Chung Hsing University, Taiwan
Chin-chen Chang , Feng Chia University, Taiwan
Jinn-ke Jan , National Chung Hsing University, Taiwan
Jieh-shan Yeh , Providence University, Taiwan
pp. 392-395

An Improved Secret Key Estimation Method for Sequential Steganography (PDF)

Ping Wang , Information Science and Technology Institute, China
Xiangyang Luo , Information Science and Technology Institute, China
Fenlin Liu , Information Science and Technology Institute, China
pp. 396-402

Design of Gabor Filter Banks for Iris Recognition (PDF)

Chia-te Chou , Department of Computer Science and Information Engineering, Taiwan
Sheng-wen Shih , Department of Computer Science and Information Engineering, Taiwan
Duan-yu Chen , Academia Sinica, Taiwan
pp. 403-406

Abnormal Event Detection in Video Using N-cut Clustering (PDF)

Chun-ku Lee , National Tsing Hua University, Taiwan
Meng-fen Ho , National Tsing Hua University, Taiwan
Wu-sheng Wen , National Tsing Hua University, Taiwan
Chung-lin Huang , National Tsing Hua University, Taiwan
pp. 407-410

Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video (PDF)

Chih-chung Hsu , National Yunlin University of Science & Technology, Taiwan
Hsuan T. Chang , National Yunlin University of Science & Technology, Taiwan
Ting-cheng Chang , Lin Tung University, Taiwan
pp. 411-414

Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information (PDF)

Kai-li Chiang , National Chiao Tung University, Taiwan
Wen-hsiang Tsai , National Chiao Tung University, Taiwan; Asia University, Taiwan
pp. 415-418

A Fast Facial Expression Recognition Method at Low-Resolution Images (PDF)

Cheng-chang Lien , Chung Hua University, Taiwan
Yang-kai Chang , Chung Hua University, Taiwan
Chih-chiang Tien , Chung Hua University, Taiwan
pp. 419-422

The Effect of Frame Freezing and Frame Skipping on Video Quality (PDF)

Yining Qi , Tong Ji University, China
Mingyuan Dai , Tong Ji University, China
pp. 423-426

The smoke detection for early fire-alarming system base on video processing (PDF)

Thou-Ho Chen , National Kaohsiung University of Applied Sciences, Taiwan
Yen-Hui Yin , National Kaohsiung University of Applied Sciences, Taiwan
Shi-Feng Huang , National Kaohsiung University of Applied Sciences, Taiwan
Yan-Ting Ye , National Kaohsiung University of Applied Sciences, Taiwan
pp. 427-430

An adjustable multipath flatted-hexagon search algorithm for block motion estimation (PDF)

Tsong-yi Chen , National Kaohsiung University of Applied Sciences, Taiwan
Thou-ho Chen , National Kaohsiung University of Applied Sciences, Taiwan
Shi-feng Huang , National Kaohsiung University of Applied Sciences, Taiwan
Yi-fan Li , National Kaohsiung University of Applied Sciences, Taiwan
pp. 431-434

Automatic Real-Time Moving Target Detection from Infrared Video (PDF)

Shahryar Karimi-Ashtiani , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 435-440

Interlacing Domain Partition for Fractal Watermarking (PDF)

Ping-sung Liao , Cheng-Shiu University
Cheng-yi Chen , Cheng-Shiu University
Chun-chi Chen , National Kaohsiung University of Applied Sciences
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences
pp. 441-444

Improved Video Verification Method Using Digital Watermarking (PDF)

Isao Echizen , Hitachi, Ltd., Japan
Takaaki Yamada , Hitachi, Ltd., Japan
Satoru Tezuka , Hitachi, Ltd., Japan
Stephan Singh , Swiss Institute of Technology-Eurecom, France
Hiroshi Yoshiura , The University of Electro-Communications, Japan
pp. 445-448

Blind Watermarking in Contourlet Domain with Improved Detection (PDF)

M. Jayalakshmi , Indian Institute of Technology, India
S.N. Merchant , Indian Institute of Technology, India
U.B. Desai , Indian Institute of Technology, India
pp. 449-452

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images (PDF)

Chin-chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Yung-chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Jau-ji Shen , National Chung Hsing University, Taiwan
pp. 453-456

Image Watermarking Based on Singular Value Decomposition (PDF)

Jie Liu , Shenyang Normal University, China
Xiamu Niu , Shenyang Normal University, China; Harbin Institute of Technology, China
Wenhai Kong , Harbin Institute of Technology, China
pp. 457-460

A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication (PDF)

Zhifang Wang , Harbin Institute of Technology, China
Bian Yang , Harbin Institute of Technology, China
Xiamu Niu , Harbin Institute of Technology, China; Shenzhen Graduate School, Harbin Institute of Technology, China
Yijia Zhang , Harbin Institute of Technology, China
pp. 461-464

Geometrically Invariant Watermark Using Fast Correlation Attacks (PDF)

Dan Wang , Fudan University, China
Peizhong Lu , Fudan University, China
pp. 465-468

Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks (PDF)

Michael Gulbis , University of Rostock, Germany
Erika Muller , University of Rostock, Germany
Martin Steinebach , Fraunhofer IPSI, Germany
pp. 469-472

The Attacking Method for DC Components Watermarking (PDF)

Pei-wei Tsai , National Kaohsiung University of Applied Sciences, Taiwan
Shu-chuan Chu , Tajen University
Ching-sung Lu , Tajen University
Jui-fang Chang , National Kaohsiung University of Applied Sciences
Hsing-yuan Liao , College of Electrical Engineering and Computer Science
pp. 473-478

VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition (PDF)

Wai-chi Fang , California Institute of Technology, USA
Jaw-chyng L. Lue , University of Southern California, Los Angeles, USA
pp. 479-482

Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263 (PDF)

Chua-chin Wang , Senior Member, IEEE; National Sun Yat-Sen University, Taiwan
Gang-neng Sung , National Sun Yat-Sen University, Taiwan
Jia-hao Li , National Sun Yat-Sen University, Taiwan
pp. 483-486

Reversible Data Hiding for 3D Point Cloud Model (PDF)

Hao Luo , Harbin Institute of Technology Shenzhen Graduate School, China; National Kaohsiung University of Applied Sciences, Taiwan
Jeng-shyang Pan , National Kaohsiung University of Applied Sciences, Taiwan
Zhe-ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Hsiang-cheh Huang , National University of Kaohsiung, Taiwan
pp. 487-490

Multiple Description Image Coding Using Shifted Lattice Vector Quantization (PDF)

Huihui Bai , Beijing Jiaotong University, China
Yao Zhao , Beijing Jiaotong University, China
pp. 491-494

Implications of a Novel Family of Stochastic Methods for Function Recovery (PDF)

Joseph Kolibal , University of Southern Mississippi, USA
Daniel Howard , Senior Member IEEE, UK
pp. 495-498

A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission (PDF)

Chun-ting Hung , National Chung Cheng University, Taiwan
Jin-jang Leou , National Chung Cheng University, China
pp. 499-502

H.264/AVC Video Encoder Implementation Based on TI TMS320DM642 (PDF)

Hong-jun Wang , Shandong University, China
Yong-jian Huang , Qufu Normal University, China
Hua Li , Tianjin University, China
pp. 503-506

R-D Optimized Frame-Layer Bit Allocation for H.264 (PDF)

Do-kyoung Kwon , University of Southern California, Los Angeles, USA
Mei-yin Shen , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 507-510

Fast H.264/AVC Inter-Mode Decision with RDC Optimization (PDF)

Yu Hu , University of Southern California, Los Angeles, USA
Qing Li , University of Southern California, Los Angeles, USA
Siwei Ma , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 511-516

Chaotic Signal Design with Selected Parameters (PDF)

Baishan Zhao , Dalian Maritime University, China
Yi-sheng Zhu , Dalian Maritime University, China
pp. 517-520

Error-tolerance and multi-media (PDF)

Melvin A. Breuer , University of Southern California, Los Angeles, CA, USA
Haiyang Zhu , University of Southern California, Los Angeles, CA, USA
pp. 521-524

An Improved Technique for Blind Audio Source Separation (PDF)

Namgook Cho , University of Southern California, Los Angeles, USA
Yu Shiu , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 525-528

Adaptive working window for impulse noise reduction (PDF)

Thou-ho Chen , National Kaohsiung University of Applied Sciences, Taiwan
Shi-feng Huang , National Kaohsiung University of Applied Sciences, Taiwan
Chao-yu Chen , National Cheng Kung University, Taiwan
Zhi-hong Lin , National Cheng Kung University, Taiwan
pp. 529-532

Improved Linear Prediction Technique for Musical Onset Detection (PDF)

Wan-chi Lee , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 533-536

A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection (PDF)

Hui Ding , Nanjing University of S&T, China; JiaXing University, China
Bo Qian , Nanjing University of S&T, China
Yanping Li , Nanjing University of S&T, China
Zhenmin Tang , Nanjing University of S&T, China
pp. 537-540

Improved SMVQ Scheme with Edge-Directed Prediction (PDF)

Chin-chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Yi-hui Chen , National Chung Cheng University, Taiwan
Kuan-ming Li , National Chung Cheng University, Taiwan
pp. 541-544

A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords (PDF)

Chin-chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Yung-chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Jau-ji Shen , National Chung Hsing University, Taiwan
pp. 545-548

Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search (PDF)

Chin-chen Chang , Feng Chia University, Taiwan; National Chung Cheng University, Taiwan
Yung-chen Chou , National Chung Cheng University, Taiwan
pp. 549-554

Design of AC-PDP Signal Processor for SoC Application (PDF)

Song Qiu , East China Normal University, China
Wai-yun Li , East China Normal University, China
Jin-gao Liu , East China Normal University, China
Wen-jing Hu , Hunan Institute of Science and Technology, China
pp. 555-558

A Novel Low-IF Topology for High Performance Integrated Receivers (PDF)

Lingjun Xu , Beijing University of Posts and Telecommunications, China
Qiang Wang , Beijing University of Posts and Telecommunications, China
Jiansong Gao , Beijing University of Posts and Telecommunications, China
Yong Wang , Beijing University of Posts and Telecommunications, China
Ping Zhang , Beijing University of Posts and Telecommunications, China
pp. 559-562

Power Optimization for Bus on Multimedia SoC (PDF)

Ru Yang , Heilongjiang Institute of Technology, China
Gang Feng , Harbin Engineering University, China
Donghai Li , Harbin Engineering University, China
pp. 563-566

Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform (PDF)

Min-hong Chen , National Chiao Tung University, Taiwan
Feng-cheng Chang , National Chiao Tung University, Taiwan
Hsueh-ming Hang , National Chiao Tung University, Taiwan
pp. 567-570

A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors (PDF)

Yuan-long Jeang , Kun Shan University
Tzuu-shaang Wey , Kun Shan University
Hung-yu Wang , National Kaohsiung University of Applied Sciences
Chih-chung Tai , National Kaohsiung University of Applied Sciences
pp. 571-574

Research on Applying Java Card to Database Encryption Systems (PDF)

Han Yu , PLA Information Engineering University, China
Xiamu Niu , Harbin Institute of Technology, Shenzhen Graduate School, China
Duohe Ma , Harbin Institute of Technology, Shenzhen Graduate School, China
Changxiang Shen , PLA Information Engineering University, China
pp. 575-578

System-on-Chip Architecture Design for Intelligent Sensor Networks (PDF)

Wai-chi Fang , California Institute of Technology, USA
Sharon Kedar , California Institute of Technology, USA
Susan Owen , California Institute of Technology, USA
Gu-yeon Wei , Harvard University, USA
David Brooks , Harvard University, USA
Jonathan Lees , University of North Carolina, USA
pp. 579-582

Low-Power Radio Design for Wireless Smart Sensor Networks (PDF)

Wai-chi Fang , California Institute of Technology, USA
Tsung-hsien Lin , National Taiwan University, Taiwan
pp. 583-586

VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design (PDF)

Zheng Shen , Tsinghua University, China
Hu He , Tsinghua University, China
Yanjun Zhang , Tsinghua University, China
Yihe Sun , Tsinghua University, China
pp. 587-592

Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain (PDF)

Zhen Sun , Harbin Institute of Technology, China
Zhe-ming Lu , Harbin Institute of Technology Shenzhen Graduate School, China
Zhen Li , Harbin Institute of Technology, China
pp. 593-596

Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication (PDF)

Imtiaz Awan , GIK Institute of Engineering Sciences & Technology Topi, Pakistan
S.A.M. Gilani , GIK Institute of Engineering Sciences & Technology Topi, Pakistan
S.a. Shah , GIK Institute of Engineering Sciences & Technology Topi, Pakistan
pp. 597-600

A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping (PDF)

Liehuang Zhu , Beijing Institute of Technology, China
Wenzhuo Li , Beijing Institute of Technology, China
Lejian Liao , Beijing Institute of Technology, China
Hong Li , Beijing Institute of Technology, China
pp. 601-604

Focus on the Generalized Information Hiding Technology (PDF)

Dai-mao Lin , Beijing Institute of Electronic Technology Application, China
Lin-na Zhou , Beijing Institute of Electronic Technology Application, China
Yun-biao Guo , Beijing Institute of Electronic Technology Application, China
Lan Hu , Beijing Institute of Electronic Technology Application, China
Xia-mu Niu , Information Countermeasure Technique Research Institute, China
pp. 605-608

Information Hiding Method in Digital Audio Signal Based on Perfect Codes (PDF)

Lin-na Zhou , Beijing University of Posts and Telecommunication, China
Cui-qing Liu , ZhengZhou Information Science Technology Institute, China
Xi-jian Ping , ZhengZhou Information Science Technology Institute, China
Tao Zhang , ZhengZhou Information Science Technology Institute, China
Yun-he Wang , Chinese People's Public Security University, China
pp. 609-612

A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences (PDF)

Yaqin Zhao , Harbin Institute of Technology, China
Nan Zhao , Harbin Institute of Technology, China
Guanghui Ren , Harbin Institute of Technology, China
Bo Zhang , Harbin Institute of Technology, China
pp. 613-616

An Image Hiding Scheme Based on Du's Disk Allocation Method (PDF)

Chia-chen Lin , Providence University, Taiwan
Chin-chen Chang , Feng Chia University, Taiwan
pp. 617-620

Analysis of Anonymity on the Signatures of Knowledge (PDF)

Xinguang Zou , Harbin Institute of Technology, China
Shenghe Sun , Harbin Institute of Technology, China
pp. 621-624

An Efficient Attestation for Trustworthiness of Computing Platform (PDF)

Xiao-yong Li , Beijing Jiaotong University, China
Chang-xiang Shen , Naval Institute of Computing Technology, China
Xiao-dong Zuo , Graduate School of CAS, China
pp. 625-630

Effects on Statistical Features for Image by Quantization (PDF)

Yanqing Guo , Dalian University of Technology, China
Weiwei Quan , Dalian University of Technology, China
Yanwu Zhu , Dalian University of Technology, China
Xingang You , Dalian University of Technology, China
Xiangwei Kong , Dalian University of Technology, China
pp. 631-634

A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform (PDF)

Bei-bei Li , Jilin University, China
Xin Li , Jilin University, China
Shu-xun Wang , Jilin University, China
Hai-feng Li , Jilin University, China
pp. 635-638

Design of Collusion-Free Codes Based on MAI-Free Principle (PDF)

Byung-ho Cha , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 639-642

Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2 (PDF)

Zhenyu Wu , University of Electronic Science and Technology of China, China
Hongyang Yu , University of Electronic Science and Technology of China, China
Bin Tang , University of Electronic Science and Technology of China, China
Hong Hu , University of Electronic Science and Technology of China, China
pp. 643-646

Chirp-Based Image Watermarking as Error-Control Coding (PDF)

Behnaz Ghoraani , Ryerson University, Canada
Sridhar Krishnan , Ryerson University, Canada
pp. 647-650

Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces (PDF)

Chun-hsien Chou , Tatung University, Taiwan
Kuo-cheng Liu , Tatung University, Taiwan; Taiwan Hospitality and Tourism College, Taiwan
pp. 651-654

Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding (PDF)

Qi Zhang , University of Southern California, Los Angeles, USA
Yunyang Dai , University of Southern California, Los Angeles, USA
Siwei Ma , University of Southern California, Los Angeles, USA
C.-c. Jay Kuo , University of Southern California, Los Angeles, USA
pp. 655-658

Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors (PDF)

Chun-chieh Tseng , National Kaohsiung University of Applied Sciences, Taiwan
Mao-fu Lai , Tung Nan Institute of Technology, Taiwan
Por-song Lee , I-Shou University, Taiwan
pp. 659-662

Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition (PDF)

Jianjun Lei , Beijing University of Posts and Telecommunications, China
Jian Wang , Beijing University of Posts and Telecommunications, China
Jun Guo , Beijing University of Posts and Telecommunications, China
Gang Liu , Beijing University of Posts and Telecommunications, China
Haifeng Shen , Beijing University of Posts and Telecommunications, China
pp. 663-668

Fast Algorithm of Trigonometric Function of Specific Angle (PDF)

Qiusheng He , China University of Mining & Technology, China
Wending Liu , Bejing Forestry University, China
Fuzeng Wang , Agriculture University of Hebei, China
Jianjun Hao , China University of Mining & Technology, China
Hui Li , China University of Mining & Technology, China
Yaqi Cheng , China Academy of Science Institute of Microelectronic, China
pp. 669-672

The Watermarking Model for Relational Database Based on Watermarking Sharing (PDF)

Cong Jin , Central China Normal University, China
Yu Fu , Central China Normal University, China
Feng Tao , Central China Normal University, China
pp. 677-680

The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System (PDF)

Xiao-jun Tong , Harbin Institute of Technology, China
Ming-gen Cui , Harbin Normal University, China
Wei Jiang , Harbin Institute of Technology, China
pp. 685-688

Pervasive Computing Context Access Control Based on UCON_ABC Model (PDF)

Fang Pu , Donghua University, China
Daoqin Sun , Donghua University, China
Qiying Cao , Donghua University, China
Haibin Cai , Donghua University, China
Fan Yang , Donghua University, China
pp. 689-692

A Non-uniform Quantizing Approach to Protect Biometric Templates (PDF)

Qi Han , Harbin Institute of Technology, China
Zhifang Wang , Harbin Institute of Technology, China
Xiamu Niu , Harbin Institute of Technology, China
pp. 693-698

Detecting the Theft of Natural Language Text Using Birthmark (PDF)

Jianlong Yang , Tsinghua University, China
Jianmin Wang , Tsinghua University, China
Deyi Li , Tsinghua University, China
pp. 699-702

A Context-Aware AmI System Based on MAS Model (PDF)

Yong Zhang , Beijing University of Technology, China
Yibin Hou , Beijing University of Technology, China
Zhangqin Huang , Beijing University of Technology, China
Hui Li , Beijing University of Technology, China
Rui Chen , Beijing University of Technology, China
pp. 703-706
92 ms
(Ver 3.3 (11022016))