The SCEAS System
Navigation Menu

Conferences in DBLP

(iih-msp)
2006 (conf/iih-msp/2006)

  1. Hosei Matsuoka
    Spread Spectrum Audio Steganography Using Sub-band Phase Shifting. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:3-6 [Conf]
  2. Akira Nishimura
    Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:7-10 [Conf]
  3. Ryuta Fujimoto, Mamoru Iwaki, Tohru Kiryu
    A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:11-14 [Conf]
  4. Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto
    Information Hiding on Lossless Data Compression. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:15-18 [Conf]
  5. Akinori Ito, Shozo Makino
    Multiple Description Coding of an Audio Stream by Optimum Recovery Transform. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:19-22 [Conf]
  6. Yôiti Suzuki, Ryouichi Nishimura, Hao Tao
    Audio Watermark Enhanced by LDPC Coding for Air Transmission. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:23-26 [Conf]
  7. Ming Li, Yun Lei, Jian Liu, Yonghong Yan
    A Novel Audio Watermarking in Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:27-32 [Conf]
  8. Saeed Sedghi, Morteza Khademi, Nedeljko Cvejic
    Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:33-36 [Conf]
  9. Gui-jun Nian, Zhiyuan Xie, Shuxun Wang
    Audio Watermarking Based on Reverberation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:37-40 [Conf]
  10. Zhao Xu, Ke Wang, Xiao-hua Qiao
    Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:41-46 [Conf]
  11. Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin
    A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:47-50 [Conf]
  12. Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi
    An Information Hiding Scheme for OFDM Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:51-54 [Conf]
  13. Kai Wang, Wenjiang Pei, Zhenya He, Yiu-ming Cheung
    A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:55-58 [Conf]
  14. Zhao Xu, Ke Wang, Xiao-hua Qiao
    A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:59-62 [Conf]
  15. Xiao-hua Qiao, Shuxun Wang, Quan Wen, Zhao Xu
    A Robust Watermarking Algorithm Adopting Double Embedding. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:63-66 [Conf]
  16. Ying-Tzu Shih, Feng-Cheng Chang, Hsueh-Ming Hang
    A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:67-70 [Conf]
  17. Cong Jin, Feng Tao, Yu Fu
    Image Watermarking Based HVS Characteristic of Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:71-74 [Conf]
  18. Deyun Peng, Jiazhen Wang, Sumin Yang, Suzhen Wang, Aizhen Liu
    CDMA Based Multiple-User Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:75-78 [Conf]
  19. Zheng Fang, Yao Zhao
    Image Watermarking Resisting to Geometrical Attacks Based on Histogram. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:79-82 [Conf]
  20. Ru Zhang, Xiao-gang Yu, Lin-na Zhou, Hong-peng Li
    A New Watermarking Protocol of Copyright Protection. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:83-88 [Conf]
  21. Takanobu Masubuchi, Mitsuyuki Takatsuka, Ryoichi Sasaki
    A Digital Document Flexible Sanitizing Scheme. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:89-92 [Conf]
  22. Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura
    Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:93-96 [Conf]
  23. Akiomi Kunisa, Kousuke Tsujita
    Improved Guided Position Scrambling for Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:97-100 [Conf]
  24. Maki Yoshida, Takaaki Fujita, Toru Fujiwara
    A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:101-104 [Conf]
  25. Zhi-yu Zhang, Wei Huang, Jiu-long Zhang, Hai-yan Yu, Yan-jun Lu
    Digital Image Watermark Algorithm in the Curvelet Domain. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:105-108 [Conf]
  26. Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Bin-Yih Liao
    Joint Halftoning and Visible Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:109-112 [Conf]
  27. Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao
    A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:113-116 [Conf]
  28. Li Weng, Karel Wouters, Bart Preneel
    Extending the Selective MPEG Encryption Algorithm PVEA. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:117-120 [Conf]
  29. Niansheng Liu, Donghui Guo, Gerard Parr
    A New Image Steganography for Internet Communications Based on Chaotic Sequences. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:121-124 [Conf]
  30. Feng Huang, Yong Feng
    An Image Encryption Approach Based on a New Two-Dimensional Map. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:125-130 [Conf]
  31. Longjiang Yu, Sheng-He Sun
    Image Robust Hashing Based on DCT Sign. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:131-134 [Conf]
  32. Sheng-bing Che, Da Huang, Guang Li
    A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:135-138 [Conf]
  33. Junding Sun, Xiaosheng Wu
    Chain Code Distribution-Based Image Retrieval. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:139-142 [Conf]
  34. Kewen Xia, Guan Xu, Naixun Xu
    Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:143-146 [Conf]
  35. Lin Ma, Zhongzhao Zhang, Xuezhi Tan
    A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:147-150 [Conf]
  36. Jianping Qiao, Ju Liu
    A Novel Log-WT Based Super-Resolution Algorithm. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:151-154 [Conf]
  37. Jinye Peng, Wanhai Yang, Yichun Wang
    Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:155-158 [Conf]
  38. Qiang He, Chee-Hung Henry Chu
    Recovering Intrinsic Images from Weighted Edge Maps. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:159-162 [Conf]
  39. Nan Zhang, Xianchuan Yu, Guosheng Ding
    An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:163-166 [Conf]
  40. Bian Yang, Fan Gu, Xiamu Niu
    Block Mean Value Based Image Perceptual Hashing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:167-172 [Conf]
  41. Pei-Chen Tseng, Ching-Tuey Sung, Wen-Shyang Hwang
    Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:173-176 [Conf]
  42. Yung-Li Chang, Hsiang-Kai Liao, Ce-Kuen Shieh, Yu-Ben Miao
    KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:177-180 [Conf]
  43. Ku-Lan Kao, Chih-Heng Ke, Ce-Kuen Shieh
    Video Transmission Performance Evaluation of Ad Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:181-184 [Conf]
  44. Mong-Fong Horng, Hung-Wei Hsu, Wan-Ling Du, Yi-Hsiang Hung, Ming-Harng Lee
    A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:185-188 [Conf]
  45. Hong-Peng Wang, Tie-Jun Zhang, Xiao-Zong Yang
    Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:189-192 [Conf]
  46. Takuo Nakashima
    Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:193-196 [Conf]
  47. Xue-Guang Wang
    Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:197-200 [Conf]
  48. Yongjin Cho, Do-Kyoung Kwon, C. C. Jay Kuo, Renxiang Huang, Claudio Lima, Jim D. Black, James J. Pan
    Video Streaming over 3G Networks with GOP-Based Priority Scheduling. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:201-204 [Conf]
  49. N. Eiamjumrus, Supavadee Aramvith
    Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:205-210 [Conf]
  50. Lei Zhang, Qiuguang Wang, Jiping Qi
    Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:211-214 [Conf]
  51. Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang
    Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:215-218 [Conf]
  52. JinFei Wu, DongXing Qin, HongPing Yu
    Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:219-222 [Conf]
  53. Mehdi Rezaei, Moncef Gabbouj, Imed Bouazizi
    Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:223-227 [Conf]
  54. Te-Jen Su, Jyun-Wei Jhang
    Medical Image Noise Reduction Using Cellular Neural Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:228-231 [Conf]
  55. Dingxue Zhang, Xinzhi Liu, Zhihong Guan
    A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:232-235 [Conf]
  56. Binglong Li, QingXian Wang, Junyong Luo
    Forensic Analysis of Document Fragment Based on SVM. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:236-239 [Conf]
  57. Wei Fang, Jun Sun, Wenbo Xu
    Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:240-243 [Conf]
  58. Qiong Li, Zhaoqing Liu, Xiamu Niu
    Analysis and Problems on Fuzzy Vault Scheme. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:244-250 [Conf]
  59. Junghun Park, Hsiao-Rong Tyan, C. C. Jay Kuo
    GA-Based Internet Traffic Classification Technique for QoS Provisioning. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:251-254 [Conf]
  60. Hsien-Po Shiang, Mihaela van der Schaar
    Multi-user Video Streaming over Multi-hop Wireless Networks: A Cross-Layer Priority Queuing Scheme. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:255-258 [Conf]
  61. Yuh-Chou Tsai, Chia-Ming Tsai, Chia-Wen Lin
    H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:259-262 [Conf]
  62. Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto, Enrico Magli
    Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:263-266 [Conf]
  63. Deepa Kundur, Unoma Ndili Okorafor, William Luh
    HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:267-270 [Conf]
  64. Wenhui Zhao, Daxin Liu, Yu Jiang
    Positioning Algorithm of Wireless Sensor Network Nodes. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:271-273 [Conf]
  65. Hao Wang, Yanying Wang, Jikun Guo, Dianwu Gao
    Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:274-277 [Conf]
  66. Fen-hua Cheng, Jin Zhang, Zheng Ma
    Curve-Based Secure Routing Algorithm for Sensor Network. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:278-281 [Conf]
  67. Guo-min Zhang, Yong Zhang, Ming Chen, Huan Xiong
    Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:282-288 [Conf]
  68. Jingyi Qu, Haoshan Shi
    Symmetrical Color-Spatial Feature for Medical Image Retrieval. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:289-292 [Conf]
  69. Qian Zhang, Zhi-Jing Liu
    Face Detection Based on Complexional Segmentation and Feature Extraction. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:293-296 [Conf]
  70. Yu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun
    Gabor Filter Based Text Extraction from Digital Document Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:297-300 [Conf]
  71. Jun-Bao Li, Shu-Chuan Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan
    Discriminant Feature Fusion Strategy for Supervised Learning. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:301-304 [Conf]
  72. Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan, Jiun-Huei Ho
    A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:305-308 [Conf]
  73. Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He
    A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:309-312 [Conf]
  74. Chi Cui
    An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:313-316 [Conf]
  75. Bo Qian, Yanping Li, Limin Xu, Zhenmin Tang
    A Method of Biomimetic Pattern Recognition for Speaker Recognition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:317-320 [Conf]
  76. Xiaopeng Hong, Hongxun Yao, Yuqi Wan, Rong Chen
    A PCA Based Visual DCT Feature Extraction Method for Lip-Reading. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:321-326 [Conf]
  77. Duan-Yu Chen, Sheng-Wen Shih, Hong-Yuan Mark Liao
    Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:327-330 [Conf]
  78. Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao
    Understanding Human Behavior Using a Language Modeling Approach. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:331-334 [Conf]
  79. Yu-Chun Lai, Hong-Yuan Mark Liao
    Human Motion Recognition Using Clay Representation of Trajectories. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:335-338 [Conf]
  80. Yung-Tai Hsu, Jun-Wei Hsieh
    Boosted String Representation and Its Application to Video Surveillance. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:339-342 [Conf]
  81. Yong Xu, Yingnan Zhao
    Comparison Study on SVD-Based Face Classification. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:343-346 [Conf]
  82. Junding Sun
    Image Retrieval Based on Improved Entropy and Moments. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:347-350 [Conf]
  83. Yuhua Jiao, Bian Yang, He Wang, Xiamu Niu
    SVD Based Robust Image Content Retrieval. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:351-354 [Conf]
  84. Lan Li, Ji-hua Chen
    Emotion Recognition Using Physiological Signals from Multiple Subjects. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:355-358 [Conf]
  85. Ping-He Huang, Jing-Yong Su, Zhe-Ming Lu, Jeng-Shyang Pan
    A Fire-Alarming Method Based on Video Processing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:359-364 [Conf]
  86. Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang, Jianchao Sun
    A New Steganalysis Method for Adaptive Spread Spectrum Steganography. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:365-368 [Conf]
  87. Xin-guang Sui, Hui Luo, Zhong-liang Zhu
    A Steganalysis Method Based on the Distribution of First Letters of Words. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:369-372 [Conf]
  88. Antonio Savoldi, Paolo Gubian
    A Methodology to Improve the Detection Accuracy in Digital Steganalysis. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:373-376 [Conf]
  89. Cui-Qing Liu, Xijian Ping, Tao Zhang, Lin-na Zhou, Yun-He Wang
    A Research on Steganography Method Based on Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:377-380 [Conf]
  90. Jinhong Luo, Haiyi Shi
    Research of Chaos Encryption Algorithm Based on Logistic Mapping. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:381-383 [Conf]
  91. Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang
    Analysis of Current Steganography Tools: Classifications & Features. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:384-387 [Conf]
  92. Mohammad Shirali-Shahreza
    Java Applets Copy Protection by Steganography. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:388-391 [Conf]
  93. Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh
    Novel Steganographic Schemes Based on Row-Major Mapping Relation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:392-395 [Conf]
  94. Ping Wang, Xiangyang Luo, Fenlin Liu
    An Improved Secret Key Estimation Method for Sequential Steganography. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:396-402 [Conf]
  95. Chia-Te Chou, Sheng-Wen Shih, Duan-Yu Chen
    Design of Gabor Filter Banks for Iris Recognition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:403-406 [Conf]
  96. Chun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang
    Abnormal Event Detection in Video Using N-cut Clustering. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:407-410 [Conf]
  97. Chih-Chung Hsu, Hsuan T. Chang, Ting Cheng Chang
    Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:411-414 [Conf]
  98. Kai-Li Chiang, Wen-Hsiang Tsai
    Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:415-418 [Conf]
  99. Cheng-Chang Lien, Yang-Kai Chang, Chih-Chiang Tien
    A Fast Facial Expression Recognition Method at Low-Resolution Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:419-422 [Conf]
  100. Yining Qi, Mingyuan Dai
    The Effect of Frame Freezing and Frame Skipping on Video Quality. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:423-426 [Conf]
  101. Thou-Ho Chen, Yen-Hui Yin, Shi-Feng Huang, Yan-Ting Ye
    The Smoke Detection for Early Fire-Alarming System Base on Video Processing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:427-430 [Conf]
  102. Tsong-Yi Chen, Thou-Ho Chen, Shi-Feng Huang, Yi-Fan Li
    An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:431-434 [Conf]
  103. Shahryar Karimi-Ashtiani, C. C. Jay Kuo
    Automatic Real-Time Moving Target Detection from Infrared Video. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:435-440 [Conf]
  104. Ping-Sung Liao, Cheng-Yi Chen, Chun-Chi Chen, Jeng-Shyang Pan
    Interlacing Domain Partition for Fractal Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:441-444 [Conf]
  105. Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura
    Improved Video Verification Method Using Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:445-448 [Conf]
  106. M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai
    Blind Watermarking in Contourlet Domain with Improved Detection. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:449-452 [Conf]
  107. Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
    A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:453-456 [Conf]
  108. Jie Liu, Xiamu Niu, Wenhai Kong
    Image Watermarking Based on Singular Value Decomposition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:457-460 [Conf]
  109. Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang
    A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:461-464 [Conf]
  110. Dan Wang, Peizhong Lu
    Geometrically Invariant Watermark Using Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:465-468 [Conf]
  111. Michael Gulbis, Erika Muller, Martin Steinebach
    Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:469-472 [Conf]
  112. Pei-wei Tsai, Shu-Chuan Chu, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao
    The Attacking Method for DC Components Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:473-478 [Conf]
  113. Wai-Chi Fang, Jaw-Chyng L. Lue
    VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:479-482 [Conf]
  114. Chua-Chin Wang, Gang-Neng Sung, Jia-Hao Li
    Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:483-486 [Conf]
  115. Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Hsiang-Cheh Huang
    Reversible Data Hiding for 3D Point Cloud Model. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:487-490 [Conf]
  116. Huihui Bai, Yao Zhao
    Multiple Description Image Coding Using Shifted Lattice Vector Quantization. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:491-494 [Conf]
  117. Joseph Kolibal, Daniel Howard
    Implications of a Novel Family of Stochastic Methods for Function Recovery. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:495-498 [Conf]
  118. Chun-Ting Hung, Jin-Jang Leou
    A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:499-502 [Conf]
  119. Hong-Jun Wang, Yong-Jian Huang, Hua Li
    H.264/AVC Video Encoder Implementation Based on TI TMS320DM642. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:503-506 [Conf]
  120. Do-Kyoung Kwon, Mei-Yin Shen, C. C. Jay Kuo
    R-D Optimized Frame-Layer Bit Allocation for H.264. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:507-510 [Conf]
  121. Yu Hu, Qing Li, Siwei Ma, C. C. Jay Kuo
    Fast H.264/AVC Inter-Mode Decision with RDC Optimization. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:511-516 [Conf]
  122. Baishan Zhao, Yi-Sheng Zhu
    Chaotic Signal Design with Selected Parameters. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:517-520 [Conf]
  123. Melvin A. Breuer, Haiyang (Henry) Zhu
    Error-Tolerance and Multi-Media. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:521-524 [Conf]
  124. Namgook Cho, Yu Shiu, C. C. Jay Kuo
    An Improved Technique for Blind Audio Source Separation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:525-528 [Conf]
  125. Thou-Ho Chen, Shi-Feng Huang, Chao-Yu Chen, Zhi-Hong Lin
    Adaptive Working Window for Impulse Noise Reduction. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:529-532 [Conf]
  126. Wan-Chi Lee, C. C. Jay Kuo
    Improved Linear Prediction Technique for Musical Onset Detection. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:533-536 [Conf]
  127. Hui Ding, Bo Qian, Yanping Li, Zhenmin Tang
    A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:537-540 [Conf]
  128. Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li
    Improved SMVQ Scheme with Edge-Directed Prediction. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:541-544 [Conf]
  129. Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
    A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:545-548 [Conf]
  130. Chin-Chen Chang, Yung-Chen Chou
    Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:549-554 [Conf]
  131. Song Qiu, Wai-yun Li, Jin-gao Liu, Wen-jing Hu
    Design of AC-PDP Signal Processor for SoC Application. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:555-558 [Conf]
  132. Lingjun Xu, Qiang Wang, Jiansong Gao, Yong Wang, Ping Zhang
    A Novel Low-IF Topology for High Performance Integrated Receivers. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:559-562 [Conf]
  133. Ru Yang, Gang Feng, Donghai Li
    Power Optimization for Bus on Multimedia SoC. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:563-566 [Conf]
  134. Min-Hong Chen, Feng-Cheng Chang, Hsueh-Ming Hang
    Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:567-570 [Conf]
  135. Yuan-Long Jeang, Tzuu-Shaang Wey, Hung-Yu Wang, Chih-Chung Tai
    A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:571-574 [Conf]
  136. Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen
    Research on Applying Java Card to Database Encryption Systems. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:575-578 [Conf]
  137. Wai-Chi Fang, Sharon Kedar, Susan Owen, Gu-Yeon Wei, David Brooks, Jonathan Lees
    System-on-Chip Architecture Design for Intelligent Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:579-582 [Conf]
  138. Wai-Chi Fang, Tsung-Hsien Lin
    Low-Power Radio Design for Wireless Smart Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:583-586 [Conf]
  139. Zheng Shen, Hu He, Yanjun Zhang, Yihe Sun
    VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:587-592 [Conf]
  140. Zhen Sun, Zhe-Ming Lu, Zhen Li
    Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:593-596 [Conf]
  141. Imtiaz Awan, S. A. M. Gilani, S. A. Shah
    Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:597-600 [Conf]
  142. Liehuang Zhu, Wenzhuo Li, Lejian Liao, Hong Li
    A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:601-604 [Conf]
  143. Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu
    Focus on the Generalized Information Hiding Technology. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:605-608 [Conf]
  144. Linna Zhou, Cui-Qing Liu, Xijian Ping, Tao Zhang, Yun-He Wang
    Information Hiding Method in Digital Audio Signal Based on Perfect Codes. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:609-612 [Conf]
  145. Yaqin Zhao, Nan Zhao, Guanghui Ren, Bo Zhang
    A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:613-616 [Conf]
  146. Chia-Chen Lin, Chin-Chen Chang
    An Image Hiding Scheme Based on Du's Disk Allocation Method. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:617-620 [Conf]
  147. Xin-guang Zou, Sheng-He Sun
    Analysis of Anonymity on the Signatures of Knowledge. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:621-624 [Conf]
  148. Xiao-yong Li, Chang-xiang Shen, Xiao-Dong Zuo
    An Efficient Attestation for Trustworthiness of Computing Platform. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:625-630 [Conf]
  149. Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong
    Effects on Statistical Features for Image by Quantization. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:631-634 [Conf]
  150. Bei-bei Li, Xin Li, Shuxun Wang, Haifeng Li
    A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:635-638 [Conf]
  151. Byung-Ho Cha, C. C. Jay Kuo
    Design of Collusion-Free Codes Based on MAI-Free Principle. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:639-642 [Conf]
  152. Zhenyu Wu, Hongyang Yu, Bin Tang, Hong Hu
    Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:643-646 [Conf]
  153. Behnaz Ghoraani, Sridhar Krishnan
    Chirp-Based Image Watermarking as Error-Control Coding. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:647-650 [Conf]
  154. Chun-Hsien Chou, Kuo-Cheng Liu
    Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:651-654 [Conf]
  155. Qi Zhang, Yunyang Dai, Siwei Ma, C. C. Jay Kuo
    Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:655-658 [Conf]
  156. Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee
    Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:659-662 [Conf]
  157. Jianjun Lei, Jian Wang, Jun Guo, Gang Liu, Haifeng Shen
    Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:663-668 [Conf]
  158. Qiusheng He, Wending Liu, Fuzeng Wang, Jianjun Hao, Hui Li, Yaqi Cheng
    Fast Algorithm of Trigonometric Function of Specific Angle. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:669-672 [Conf]
  159. Omar U. Flórez-Choque
    Voice2SQL: A Hybrid Intelligent System for the Recovery of Information from Databases by Means of Spoken Natural Language. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:673-676 [Conf]
  160. Cong Jin, Yu Fu, Feng Tao
    The Watermarking Model for Relational Database Based on Watermarking Sharing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:677-680 [Conf]
  161. Chin-Chen Chang, Jun-Chou Chuang
    Progressive Image Transmission Using Significant Features and Linear Regression Prediction. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:681-684 [Conf]
  162. Xiao-jun Tong, Ming-gen Cui, Wei Jiang
    The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:685-688 [Conf]
  163. Fang Pu, Daoqin Sun, Qiying Cao, Haibin Cai, Fan Yang
    Pervasive Computing Context Access Control Based on UCON_ABC Model. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:689-692 [Conf]
  164. Qi Han, Zhifang Wang, Xiamu Niu
    A Non-uniform Quantizing Approach to Protect Biometric Templates. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:693-698 [Conf]
  165. Jianlong Yang, Jianmin Wang, Deyi Li
    Detecting the Theft of Natural Language Text Using Birthmark. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:699-702 [Conf]
  166. Yong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, Rui Chen
    A Context-Aware AmI System Based on MAS Model. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:703-706 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002