default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 4
Volume 4, Number 1, January 2013
- Cheng Guo, Chin-Chen Chang:
A Construction for Secret Sharing Scheme with General Access Structure. 1-8 - Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Christine Pascu:
New Images Watermarking Scheme Based on Singular Value Decomposition. 9-18 - Shih-Lun Lin, Chien-Feng Huang, Meng-Huan Liou, Chien-Yuan Chen:
Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme. 19-33 - Tianhua Liu, Si-chao Yi, Xiao-wei Wang:
A Fault Management Protocol for Low-Energy and Efficient Wireless Sensor Networks. 34-45 - Leida Li, Shushang Li, Hancheng Zhu, Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan:
An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns. 46-56 - Chien-Ming Chen, Yue-Hsun Lin, Yao-Hsin Chen, Hung-Min Sun:
SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN. 57-72
Volume 4, Number 2, April 2013
- Yuyao Wang, Zhengming Li, Long Wang, Min Wang:
A Scale Invariant Feature Transform Based Method. 73-89 - Shaowei Weng, Shu-Chuan Chu, Nian Cai, Rongxin Zhan:
Invariability of Mean Value Based Reversible Watermarking. 90-98 - Cheng Guo, Chin-Chen Chang, Chin-Yu Sun:
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications. 99-109 - Hongfeng Zhu, Tianhua Liu, Dan Zhu, Haiyang Li:
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme. 110-118 - Xuehu Yan, Shen Wang, Li Li, Ahmed A. Abd El-Latif, Zhiqiang Wei, Xiamu Niu:
A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques. 119-127
Volume 4, Number 3, July 2013
- Wen-Chung Kuo:
Image Hiding by Square Fully Exploiting Modification Directions. 128-137 - Bin Jiang, Kebin Jia:
Semi-supervised Facial Expression Recognition Algorithm on the Condition of Multi-pose. 138-146 - Yu-Chi Chen, Raylin Tso, Gwoboa Horng:
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme. 147-154 - Kun Zhan, Jicai Teng, Yide Ma:
Spiking Cortical Model for Rotation and Scale Invariant Texture Retrieval. 155-165 - Xu Zhuang, Zhi-Hui Wang, Chin-Chen Chang, Yan Zhu:
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement. 166-177 - Qingxiang Feng, Chun-Ta Huang, Lijun Yan:
Representation-based Nearest Feature Plane for Pattern Recognition. 178-191 - Bao Rong Chang, Hsiu Fen Tsai, Chi-Ming Chen:
Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System. 192-200
Volume 4, Number 4, October 2013
- Chun-Wei Lin, Tzung-Pei Hong, Chia-Ching Chang, Shyue-Liang Wang:
A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion. 201-214 - Shiau-Rung Tsui, Cheng-Ta Huang, Wei-Jen Wang:
A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization. 215-224 - Qian Kong, Peng Li, Yanpeng Ma:
On the Feasibility and Security of Image Secret Sharing Scheme to Identify Cheaters. 225-232 - Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin:
An Indicator Elimination Method for Side-match Vector Quantization. 233-249 - Alimohammad Latif:
An Adaptive Digital Image Watermarking Scheme using Fuzzy Logic and Tabu Search. 250-271 - Zhifang Wang, Chao Liu, Taibin Shi, Qun Ding:
Face-Palm Identication System on Feature Level Fusion based on CCA. 272-279 - Jiaqing Qiao, Hongtao Yin:
Optimizing kernel function with applications to kernel principal analysis and locality preserving projection for feature extraction. 280-290
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.