Conferences in DBLP
(iih-msp) 2006 (conf/iih-msp/2006)
Hosei Matsuoka Spread Spectrum Audio Steganography Using Sub-band Phase Shifting. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:3-6 [Conf ] Akira Nishimura Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:7-10 [Conf ] Ryuta Fujimoto , Mamoru Iwaki , Tohru Kiryu A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:11-14 [Conf ] Katsunari Yoshioka , Kotaro Sonoda , Osamu Takizawa , Tsutomu Matsumoto Information Hiding on Lossless Data Compression. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:15-18 [Conf ] Akinori Ito , Shozo Makino Multiple Description Coding of an Audio Stream by Optimum Recovery Transform. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:19-22 [Conf ] Yôiti Suzuki , Ryouichi Nishimura , Hao Tao Audio Watermark Enhanced by LDPC Coding for Air Transmission. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:23-26 [Conf ] Ming Li , Yun Lei , Jian Liu , Yonghong Yan A Novel Audio Watermarking in Wavelet Domain. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:27-32 [Conf ] Saeed Sedghi , Morteza Khademi , Nedeljko Cvejic Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:33-36 [Conf ] Gui-jun Nian , Zhiyuan Xie , Shuxun Wang Audio Watermarking Based on Reverberation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:37-40 [Conf ] Zhao Xu , Ke Wang , Xiao-hua Qiao Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:41-46 [Conf ] Chia An Huang , Jeng-Shyang Pan , Te-hui Kuo , Jaw-Shyang Wu , Chuang Lin A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:47-50 [Conf ] Chuang Lin , Jeng-Shyang Pan , Chin-Shiuh Shieh , Peng Shi An Information Hiding Scheme for OFDM Wireless Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:51-54 [Conf ] Kai Wang , Wenjiang Pei , Zhenya He , Yiu-ming Cheung A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:55-58 [Conf ] Zhao Xu , Ke Wang , Xiao-hua Qiao A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:59-62 [Conf ] Xiao-hua Qiao , Shuxun Wang , Quan Wen , Zhao Xu A Robust Watermarking Algorithm Adopting Double Embedding. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:63-66 [Conf ] Ying-Tzu Shih , Feng-Cheng Chang , Hsueh-Ming Hang A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:67-70 [Conf ] Cong Jin , Feng Tao , Yu Fu Image Watermarking Based HVS Characteristic of Wavelet Transform. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:71-74 [Conf ] Deyun Peng , Jiazhen Wang , Sumin Yang , Suzhen Wang , Aizhen Liu CDMA Based Multiple-User Digital Watermarking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:75-78 [Conf ] Zheng Fang , Yao Zhao Image Watermarking Resisting to Geometrical Attacks Based on Histogram. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:79-82 [Conf ] Ru Zhang , Xiao-gang Yu , Lin-na Zhou , Hong-peng Li A New Watermarking Protocol of Copyright Protection. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:83-88 [Conf ] Takanobu Masubuchi , Mitsuyuki Takatsuka , Ryoichi Sasaki A Digital Document Flexible Sanitizing Scheme. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:89-92 [Conf ] Masanori Dainaka , Shinta Nakayama , Isao Echizen , Hiroshi Yoshiura Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:93-96 [Conf ] Akiomi Kunisa , Kousuke Tsujita Improved Guided Position Scrambling for Digital Watermarking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:97-100 [Conf ] Maki Yoshida , Takaaki Fujita , Toru Fujiwara A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:101-104 [Conf ] Zhi-yu Zhang , Wei Huang , Jiu-long Zhang , Hai-yan Yu , Yan-jun Lu Digital Image Watermark Algorithm in the Curvelet Domain. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:105-108 [Conf ] Hao Luo , Jeng-Shyang Pan , Zhe-Ming Lu , Bin-Yih Liao Joint Halftoning and Visible Watermarking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:109-112 [Conf ] Chuang Lin , Jeng-Shyang Pan , Chin-Shiuh Shieh , Ping-Sung Liao A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:113-116 [Conf ] Li Weng , Karel Wouters , Bart Preneel Extending the Selective MPEG Encryption Algorithm PVEA. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:117-120 [Conf ] Niansheng Liu , Donghui Guo , Gerard Parr A New Image Steganography for Internet Communications Based on Chaotic Sequences. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:121-124 [Conf ] Feng Huang , Yong Feng An Image Encryption Approach Based on a New Two-Dimensional Map. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:125-130 [Conf ] Longjiang Yu , Sheng-He Sun Image Robust Hashing Based on DCT Sign. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:131-134 [Conf ] Sheng-bing Che , Da Huang , Guang Li A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:135-138 [Conf ] Junding Sun , Xiaosheng Wu Chain Code Distribution-Based Image Retrieval. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:139-142 [Conf ] Kewen Xia , Guan Xu , Naixun Xu Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:143-146 [Conf ] Lin Ma , Zhongzhao Zhang , Xuezhi Tan A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:147-150 [Conf ] Jianping Qiao , Ju Liu A Novel Log-WT Based Super-Resolution Algorithm. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:151-154 [Conf ] Jinye Peng , Wanhai Yang , Yichun Wang Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:155-158 [Conf ] Qiang He , Chee-Hung Henry Chu Recovering Intrinsic Images from Weighted Edge Maps. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:159-162 [Conf ] Nan Zhang , Xianchuan Yu , Guosheng Ding An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:163-166 [Conf ] Bian Yang , Fan Gu , Xiamu Niu Block Mean Value Based Image Perceptual Hashing. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:167-172 [Conf ] Pei-Chen Tseng , Ching-Tuey Sung , Wen-Shyang Hwang Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential Gateway. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:173-176 [Conf ] Yung-Li Chang , Hsiang-Kai Liao , Ce-Kuen Shieh , Yu-Ben Miao KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:177-180 [Conf ] Ku-Lan Kao , Chih-Heng Ke , Ce-Kuen Shieh Video Transmission Performance Evaluation of Ad Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:181-184 [Conf ] Mong-Fong Horng , Hung-Wei Hsu , Wan-Ling Du , Yi-Hsiang Hung , Ming-Harng Lee A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:185-188 [Conf ] Hong-Peng Wang , Tie-Jun Zhang , Xiao-Zong Yang Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:189-192 [Conf ] Takuo Nakashima Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:193-196 [Conf ] Xue-Guang Wang Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-Parallelism. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:197-200 [Conf ] Yongjin Cho , Do-Kyoung Kwon , C. C. Jay Kuo , Renxiang Huang , Claudio Lima , Jim D. Black , James J. Pan Video Streaming over 3G Networks with GOP-Based Priority Scheduling. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:201-204 [Conf ] N. Eiamjumrus , Supavadee Aramvith Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay Constraint. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:205-210 [Conf ] Lei Zhang , Qiuguang Wang , Jiping Qi Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:211-214 [Conf ] Rongrong Ji , Hongxun Yao , Shaohui Liu , Liang Wang Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:215-218 [Conf ] JinFei Wu , DongXing Qin , HongPing Yu Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:219-222 [Conf ] Mehdi Rezaei , Moncef Gabbouj , Imed Bouazizi Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:223-227 [Conf ] Te-Jen Su , Jyun-Wei Jhang Medical Image Noise Reduction Using Cellular Neural Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:228-231 [Conf ] Dingxue Zhang , Xinzhi Liu , Zhihong Guan A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy Identification. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:232-235 [Conf ] Binglong Li , QingXian Wang , Junyong Luo Forensic Analysis of Document Fragment Based on SVM. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:236-239 [Conf ] Wei Fang , Jun Sun , Wenbo Xu Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:240-243 [Conf ] Qiong Li , Zhaoqing Liu , Xiamu Niu Analysis and Problems on Fuzzy Vault Scheme. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:244-250 [Conf ] Junghun Park , Hsiao-Rong Tyan , C. C. Jay Kuo GA-Based Internet Traffic Classification Technique for QoS Provisioning. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:251-254 [Conf ] Hsien-Po Shiang , Mihaela van der Schaar Multi-user Video Streaming over Multi-hop Wireless Networks: A Cross-Layer Priority Queuing Scheme. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:255-258 [Conf ] Yuh-Chou Tsai , Chia-Ming Tsai , Chia-Wen Lin H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refresh. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:259-262 [Conf ] Pasquale Cataldi , Miquel Pedros Shatarski , Marco Grangetto , Enrico Magli Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:263-266 [Conf ] Deepa Kundur , Unoma Ndili Okorafor , William Luh HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:267-270 [Conf ] Wenhui Zhao , Daxin Liu , Yu Jiang Positioning Algorithm of Wireless Sensor Network Nodes. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:271-273 [Conf ] Hao Wang , Yanying Wang , Jikun Guo , Dianwu Gao Evaluation of Signal Processing Effect in Media Gateway Based on Cross Correlation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:274-277 [Conf ] Fen-hua Cheng , Jin Zhang , Zheng Ma Curve-Based Secure Routing Algorithm for Sensor Network. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:278-281 [Conf ] Guo-min Zhang , Yong Zhang , Ming Chen , Huan Xiong Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:282-288 [Conf ] Jingyi Qu , Haoshan Shi Symmetrical Color-Spatial Feature for Medical Image Retrieval. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:289-292 [Conf ] Qian Zhang , Zhi-Jing Liu Face Detection Based on Complexional Segmentation and Feature Extraction. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:293-296 [Conf ] Yu-Long Qiao , Meng Li , Zhe-Ming Lu , Sheng-He Sun Gabor Filter Based Text Extraction from Digital Document Images. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:297-300 [Conf ] Jun-Bao Li , Shu-Chuan Chu , Jung-Chou Harry Chang , Jeng-Shyang Pan Discriminant Feature Fusion Strategy for Supervised Learning. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:301-304 [Conf ] Jun-Bao Li , Shu-Chuan Chu , Jeng-Shyang Pan , Jiun-Huei Ho A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:305-308 [Conf ] Qinzhen Xu , Pinzheng Zhang , Wenjiang Pei , Luxi Yang , Zhenya He A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:309-312 [Conf ] Chi Cui An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:313-316 [Conf ] Bo Qian , Yanping Li , Limin Xu , Zhenmin Tang A Method of Biomimetic Pattern Recognition for Speaker Recognition. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:317-320 [Conf ] Xiaopeng Hong , Hongxun Yao , Yuqi Wan , Rong Chen A PCA Based Visual DCT Feature Extraction Method for Lip-Reading. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:321-326 [Conf ] Duan-Yu Chen , Sheng-Wen Shih , Hong-Yuan Mark Liao Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic Framework. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:327-330 [Conf ] Yu-Ming Liang , Sheng-Wen Shih , Arthur Chun-Chieh Shih , Hong-Yuan Mark Liao Understanding Human Behavior Using a Language Modeling Approach. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:331-334 [Conf ] Yu-Chun Lai , Hong-Yuan Mark Liao Human Motion Recognition Using Clay Representation of Trajectories. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:335-338 [Conf ] Yung-Tai Hsu , Jun-Wei Hsieh Boosted String Representation and Its Application to Video Surveillance. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:339-342 [Conf ] Yong Xu , Yingnan Zhao Comparison Study on SVD-Based Face Classification. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:343-346 [Conf ] Junding Sun Image Retrieval Based on Improved Entropy and Moments. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:347-350 [Conf ] Yuhua Jiao , Bian Yang , He Wang , Xiamu Niu SVD Based Robust Image Content Retrieval. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:351-354 [Conf ] Lan Li , Ji-hua Chen Emotion Recognition Using Physiological Signals from Multiple Subjects. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:355-358 [Conf ] Ping-He Huang , Jing-Yong Su , Zhe-Ming Lu , Jeng-Shyang Pan A Fire-Alarming Method Based on Video Processing. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:359-364 [Conf ] Rongrong Ji , Hongxun Yao , Shaohui Liu , Liang Wang , Jianchao Sun A New Steganalysis Method for Adaptive Spread Spectrum Steganography. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:365-368 [Conf ] Xin-guang Sui , Hui Luo , Zhong-liang Zhu A Steganalysis Method Based on the Distribution of First Letters of Words. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:369-372 [Conf ] Antonio Savoldi , Paolo Gubian A Methodology to Improve the Detection Accuracy in Digital Steganalysis. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:373-376 [Conf ] Cui-Qing Liu , Xijian Ping , Tao Zhang , Lin-na Zhou , Yun-He Wang A Research on Steganography Method Based on Error-Correcting Codes. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:377-380 [Conf ] Jinhong Luo , Haiyi Shi Research of Chaos Encryption Algorithm Based on Logistic Mapping. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:381-383 [Conf ] Ming Chen , Ru Zhang , Xinxin Niu , Yixian Yang Analysis of Current Steganography Tools: Classifications & Features. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:384-387 [Conf ] Mohammad Shirali-Shahreza Java Applets Copy Protection by Steganography. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:388-391 [Conf ] Chung-Chuan Wang , Chin-Chen Chang , Jinn-ke Jan , Jieh-Shan Yeh Novel Steganographic Schemes Based on Row-Major Mapping Relation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:392-395 [Conf ] Ping Wang , Xiangyang Luo , Fenlin Liu An Improved Secret Key Estimation Method for Sequential Steganography. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:396-402 [Conf ] Chia-Te Chou , Sheng-Wen Shih , Duan-Yu Chen Design of Gabor Filter Banks for Iris Recognition. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:403-406 [Conf ] Chun-Ku Lee , Meng-Fen Ho , Wu-Sheng Wen , Chung-Lin Huang Abnormal Event Detection in Video Using N-cut Clustering. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:407-410 [Conf ] Chih-Chung Hsu , Hsuan T. Chang , Ting Cheng Chang Efficient Moving Object Extraction in Compressed Low-Bit-Rate Video. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:411-414 [Conf ] Kai-Li Chiang , Wen-Hsiang Tsai Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location Information. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:415-418 [Conf ] Cheng-Chang Lien , Yang-Kai Chang , Chih-Chiang Tien A Fast Facial Expression Recognition Method at Low-Resolution Images. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:419-422 [Conf ] Yining Qi , Mingyuan Dai The Effect of Frame Freezing and Frame Skipping on Video Quality. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:423-426 [Conf ] Thou-Ho Chen , Yen-Hui Yin , Shi-Feng Huang , Yan-Ting Ye The Smoke Detection for Early Fire-Alarming System Base on Video Processing. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:427-430 [Conf ] Tsong-Yi Chen , Thou-Ho Chen , Shi-Feng Huang , Yi-Fan Li An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:431-434 [Conf ] Shahryar Karimi-Ashtiani , C. C. Jay Kuo Automatic Real-Time Moving Target Detection from Infrared Video. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:435-440 [Conf ] Ping-Sung Liao , Cheng-Yi Chen , Chun-Chi Chen , Jeng-Shyang Pan Interlacing Domain Partition for Fractal Watermarking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:441-444 [Conf ] Isao Echizen , Takaaki Yamada , Satoru Tezuka , Stephan Singh , Hiroshi Yoshiura Improved Video Verification Method Using Digital Watermarking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:445-448 [Conf ] M. Jayalakshmi , Shabbir N. Merchant , Uday B. Desai Blind Watermarking in Contourlet Domain with Improved Detection. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:449-452 [Conf ] Chin-Chen Chang , Yung-Chen Chang , Jau-Ji Shen A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:453-456 [Conf ] Jie Liu , Xiamu Niu , Wenhai Kong Image Watermarking Based on Singular Value Decomposition. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:457-460 [Conf ] Zhifang Wang , Bian Yang , Xiamu Niu , Yijia Zhang A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:461-464 [Conf ] Dan Wang , Peizhong Lu Geometrically Invariant Watermark Using Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:465-468 [Conf ] Michael Gulbis , Erika Muller , Martin Steinebach Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:469-472 [Conf ] Pei-wei Tsai , Shu-Chuan Chu , Ching-Sung Lu , Jui-Fang Chang , Hsing-Yuan Liao The Attacking Method for DC Components Watermarking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:473-478 [Conf ] Wai-Chi Fang , Jaw-Chyng L. Lue VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:479-482 [Conf ] Chua-Chin Wang , Gang-Neng Sung , Jia-Hao Li Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:483-486 [Conf ] Hao Luo , Jeng-Shyang Pan , Zhe-Ming Lu , Hsiang-Cheh Huang Reversible Data Hiding for 3D Point Cloud Model. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:487-490 [Conf ] Huihui Bai , Yao Zhao Multiple Description Image Coding Using Shifted Lattice Vector Quantization. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:491-494 [Conf ] Joseph Kolibal , Daniel Howard Implications of a Novel Family of Stochastic Methods for Function Recovery. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:495-498 [Conf ] Chun-Ting Hung , Jin-Jang Leou A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:499-502 [Conf ] Hong-Jun Wang , Yong-Jian Huang , Hua Li H.264/AVC Video Encoder Implementation Based on TI TMS320DM642. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:503-506 [Conf ] Do-Kyoung Kwon , Mei-Yin Shen , C. C. Jay Kuo R-D Optimized Frame-Layer Bit Allocation for H.264. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:507-510 [Conf ] Yu Hu , Qing Li , Siwei Ma , C. C. Jay Kuo Fast H.264/AVC Inter-Mode Decision with RDC Optimization. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:511-516 [Conf ] Baishan Zhao , Yi-Sheng Zhu Chaotic Signal Design with Selected Parameters. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:517-520 [Conf ] Melvin A. Breuer , Haiyang (Henry) Zhu Error-Tolerance and Multi-Media. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:521-524 [Conf ] Namgook Cho , Yu Shiu , C. C. Jay Kuo An Improved Technique for Blind Audio Source Separation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:525-528 [Conf ] Thou-Ho Chen , Shi-Feng Huang , Chao-Yu Chen , Zhi-Hong Lin Adaptive Working Window for Impulse Noise Reduction. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:529-532 [Conf ] Wan-Chi Lee , C. C. Jay Kuo Improved Linear Prediction Technique for Musical Onset Detection. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:533-536 [Conf ] Hui Ding , Bo Qian , Yanping Li , Zhenmin Tang A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:537-540 [Conf ] Chin-Chen Chang , Yi-Hui Chen , Kuan-Ming Li Improved SMVQ Scheme with Edge-Directed Prediction. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:541-544 [Conf ] Chin-Chen Chang , Yung-Chen Chang , Jau-Ji Shen A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:545-548 [Conf ] Chin-Chen Chang , Yung-Chen Chou Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:549-554 [Conf ] Song Qiu , Wai-yun Li , Jin-gao Liu , Wen-jing Hu Design of AC-PDP Signal Processor for SoC Application. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:555-558 [Conf ] Lingjun Xu , Qiang Wang , Jiansong Gao , Yong Wang , Ping Zhang A Novel Low-IF Topology for High Performance Integrated Receivers. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:559-562 [Conf ] Ru Yang , Gang Feng , Donghai Li Power Optimization for Bus on Multimedia SoC. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:563-566 [Conf ] Min-Hong Chen , Feng-Cheng Chang , Hsueh-Ming Hang Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:567-570 [Conf ] Yuan-Long Jeang , Tzuu-Shaang Wey , Hung-Yu Wang , Chih-Chung Tai A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:571-574 [Conf ] Han Yu , Xiamu Niu , Duohe Ma , Changxiang Shen Research on Applying Java Card to Database Encryption Systems. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:575-578 [Conf ] Wai-Chi Fang , Sharon Kedar , Susan Owen , Gu-Yeon Wei , David Brooks , Jonathan Lees System-on-Chip Architecture Design for Intelligent Sensor Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:579-582 [Conf ] Wai-Chi Fang , Tsung-Hsien Lin Low-Power Radio Design for Wireless Smart Sensor Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:583-586 [Conf ] Zheng Shen , Hu He , Yanjun Zhang , Yihe Sun VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:587-592 [Conf ] Zhen Sun , Zhe-Ming Lu , Zhen Li Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:593-596 [Conf ] Imtiaz Awan , S. A. M. Gilani , S. A. Shah Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:597-600 [Conf ] Liehuang Zhu , Wenzhuo Li , Lejian Liao , Hong Li A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:601-604 [Conf ] Daimao Lin , Linna Zhou , Yunbiao Guo , Lan Hu , Xiamu Niu Focus on the Generalized Information Hiding Technology. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:605-608 [Conf ] Linna Zhou , Cui-Qing Liu , Xijian Ping , Tao Zhang , Yun-He Wang Information Hiding Method in Digital Audio Signal Based on Perfect Codes. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:609-612 [Conf ] Yaqin Zhao , Nan Zhao , Guanghui Ren , Bo Zhang A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:613-616 [Conf ] Chia-Chen Lin , Chin-Chen Chang An Image Hiding Scheme Based on Du's Disk Allocation Method. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:617-620 [Conf ] Xin-guang Zou , Sheng-He Sun Analysis of Anonymity on the Signatures of Knowledge. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:621-624 [Conf ] Xiao-yong Li , Chang-xiang Shen , Xiao-Dong Zuo An Efficient Attestation for Trustworthiness of Computing Platform. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:625-630 [Conf ] Yanqing Guo , Weiwei Quan , Yanwu Zhu , Xingang You , Xiangwei Kong Effects on Statistical Features for Image by Quantization. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:631-634 [Conf ] Bei-bei Li , Xin Li , Shuxun Wang , Haifeng Li A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:635-638 [Conf ] Byung-Ho Cha , C. C. Jay Kuo Design of Collusion-Free Codes Based on MAI-Free Principle. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:639-642 [Conf ] Zhenyu Wu , Hongyang Yu , Bin Tang , Hong Hu Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:643-646 [Conf ] Behnaz Ghoraani , Sridhar Krishnan Chirp-Based Image Watermarking as Error-Control Coding. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:647-650 [Conf ] Chun-Hsien Chou , Kuo-Cheng Liu Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:651-654 [Conf ] Qi Zhang , Yunyang Dai , Siwei Ma , C. C. Jay Kuo Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:655-658 [Conf ] Chun-Chieh Tseng , Mao-Fu Lai , Por-Song Lee Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:659-662 [Conf ] Jianjun Lei , Jian Wang , Jun Guo , Gang Liu , Haifeng Shen Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:663-668 [Conf ] Qiusheng He , Wending Liu , Fuzeng Wang , Jianjun Hao , Hui Li , Yaqi Cheng Fast Algorithm of Trigonometric Function of Specific Angle. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:669-672 [Conf ] Omar U. Flórez-Choque Voice2SQL: A Hybrid Intelligent System for the Recovery of Information from Databases by Means of Spoken Natural Language. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:673-676 [Conf ] Cong Jin , Yu Fu , Feng Tao The Watermarking Model for Relational Database Based on Watermarking Sharing. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:677-680 [Conf ] Chin-Chen Chang , Jun-Chou Chuang Progressive Image Transmission Using Significant Features and Linear Regression Prediction. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:681-684 [Conf ] Xiao-jun Tong , Ming-gen Cui , Wei Jiang The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:685-688 [Conf ] Fang Pu , Daoqin Sun , Qiying Cao , Haibin Cai , Fan Yang Pervasive Computing Context Access Control Based on UCON_ABC Model. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:689-692 [Conf ] Qi Han , Zhifang Wang , Xiamu Niu A Non-uniform Quantizing Approach to Protect Biometric Templates. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:693-698 [Conf ] Jianlong Yang , Jianmin Wang , Deyi Li Detecting the Theft of Natural Language Text Using Birthmark. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:699-702 [Conf ] Yong Zhang , Yibin Hou , Zhangqin Huang , Hui Li , Rui Chen A Context-Aware AmI System Based on MAS Model. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:703-706 [Conf ]