default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 6
Volume 6, Number 1, January 2015
- Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map. 1-28 - Wei-Han Chang, Ming-Cheng Cheng, Chung-Ming Kuo, Guan-Da Huang:
Feature-Oriented Artistic Styles Transfer Based on Effective Texture Synthesis. 29-46 - Chin-Chen Chang, Chia-Chen Lin, Chih-Yang Lin:
Compressing Vector Quantization Index Table Using Side Match State Codebook. 47-58 - Chih-Chao Chung, Li-Chung Chao, Shi-Jer Lou, Nguyen Quang Vinh:
Benchmarking-based Analytic Network Process Model for Strategic Management. 59-73 - Xu Ding, Zhe-Ming Lu, Tingyuan Nie, Jie Sun:
A Robust Blind Image Watermarking Scheme Based on Classified Vector Quantization. 74-80 - Hongfeng Zhu, Man Jiang, Xin Hao, Yan Zhang:
Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture. 81-98 - Chi-Kien Tran, Tsair-Fwu Lee, Pei-Ju Chao:
Improving face recognition performance using similarity feature-based selection and classification algorithm. 99-112 - Yu-Hsiu Huang, Kai-Hsun Fan, Wen-Shyong Hsieh:
Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU. 113-122 - Mohamed Khalil Krichi, Adnan Cherif:
Improvements of Arabic database and Noise Reduction of Speech Signal using Wavelet for Arabic speech synthesis system using HMM: HTS_ARAB_TALK. 123-130 - Feifei Liu, Lijian Zhou, Zhe-Ming Lu, Tingyuan Nie:
Palmprint Feature Extraction Based on Curvelet Transform. 131-139 - Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management. 140-153 - Ying Cui, Jiaqi Wang, Shubin Liu, Liguo Wang:
Hyperspectral image feature reduction based on Tabu Search Algorithm. 154-162 - Peipei Zhao, Shushang Li, Linlin Zhou, Leida Li, Xingge Guo:
Detecting Affine-Distorted Duplicated Regions in Images by Color Histograms. 163-174 - Hejin Yuan:
A Semi-supervised Human Action Recognition Algorithm Based on Skeleton Feature. 175-182
Volume 6, Number 2, March 2015
- Xuedan Jia, Ya-Fen Chang, Chin-Chen Chang, Liang-Min Wang:
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks. 183-188 - Yanping Liao, Aya Abouzaid:
Resolution Improvement for MUSIC and ROOT MUSIC Algorithms. 189-197 - Fengying He, Tianshun Chen, Shangping Zhong:
A Classifier Ensemble Algorithm Based on Improved RSM for High Dimensional Steganalysis. 198-210 - Hongfeng Zhu, Xin Hao, Yifeng Zhang, Man Jiang:
A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem. 211-224 - Ying Zhou, Ji-Hong Zhang, Yongsheng Liang, Wei Liu:
Video Motion Characteristics based Spatial-Temporal Salient Region Extraction Method. 225-233 - Shouda Jiang, Zhong Bo, Chao Sun, Yuqi Liu:
A Hybrid Narrowband Active Noise Control System for Uncorrelated Narrowband Disturbance. 234-245 - Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Jinbo Liu:
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability. 246-253 - Alexandros Iosifidis, Ermioni Marami, Anastasios Tefas, Ioannis Pitas:
The MOBISERV-AIIA Eating and Drinking multi-view database for vision-based assisted living. 254-273 - Hongfeng Zhu, Yifeng Zhang, Yan Zhang:
A One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture. 274-287 - Hsiao-Ling Wu, Chin-Chen Chang:
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems. 288-296 - Thi-Kien Dao, Tien-Szu Pan, Trong-The Nguyen, Shu-Chuan Chu:
A Compact Articial Bee Colony Optimization for Topology Control Scheme in Wireless Sensor Networks. 297-310 - Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition. 311-322 - Rongrong Ni, Yao Zhao, Xiaobo Zhai:
Recaptured Images Forensics Based On Color Moments and DCT Coefficients Features. 323-333 - Zhimin Fang, Zhe-Ming Lu, Xin-Feng Li, Meilei Lv, Lu Zhang:
Deterministic Small-World Network Extended From Triangles. 334-339 - Jianzhi Sang, Shen Wang, Xianhua Song, Xuehu Yan, Xiamu Niu:
A novel representation for Multi-Channel log-polar quantum images. 340-350 - Salam Abdul-Nabi Thajeel, Ghazali Sulong:
A Novel Approach for Detection of Copy Move Forgery using Completed Robust Local Binary Pattern. 351-364 - Wen-Pinn Fang:
A Data Hiding Method which the Secret Image Exist After Cropping Style Image Resizing. 365-370 - You-Wei Wang, Chii-Jen Chen, Sheng-Fang Huang, Yi-Shiung Horng:
Segmentation of Median Nerve by Greedy Active Contour Detection Framework on Strain Ultrasound Images. 371-378 - Yanpeng Wu, Xiaoqi Peng, Yanpo Song:
The Algorithm of Estimating the Bubble Size Distribution Characteristics of the Foam Image. 379-388 - Zuowen Tan:
An Improved Anonymous Authentication Scheme for Roaming Services. 389-397 - Win-Bin Huang, Mong-Fong Horng:
Speed up Video Coders with Only Examining the Predicted Modes in a Coding Block. 398-408
Volume 6, Number 3, May 2015
- Chunlei Fan, Songyan Liu, Qun Ding:
Design of Embedded Ethernet Interface Based on Chaotic Stream Cipher. 409-415 - Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Secure and Efficient Scheme for Digital Gift Certificates. 416-429 - Hsiang-Cheh Huang, Feng-Cheng Chang, Yueh-Hong Chen, Shu-Chuan Chu:
Survey of Bio-inspired Computing for Information Hiding. 430-443 - Hongfeng Zhu, Yu Xia, Hui Li:
An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet. 444-457 - Jianfeng Lu, Meng Wang, Junping Dai, Qianru Huang, Li Li, Chin-Chen Chang:
Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images. 458-472 - Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
SkyLen: a Skype-based length covert channel. 473-481 - Hao Cai, Leida Li, Jiansheng Qian, Jeng-Shyang Pan:
Image Blur Assessment with Feature Points. 482-490 - Jie Sun, Zhe-Ming Lu, Lijian Zhou:
The Elimination Eyelash Iris Recognition Based on Local Median Frequency Gabor Filters. 491-499 - Hongfeng Zhu, Xin Hao, Huiyan Liu:
An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card. 500-510 - Wen-Fong Wang, Ching-Yu Yang, Sheng-Jia Shih:
Study on a Computational Model of Food Intake for a Body Weight Management System. 511-522 - Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method. 523-533 - Yulong Qiao, Ying Zhao:
Rotation Invariant Texture Classification Using Principal Direction Estimation and Random Projection. 534-543 - Lihua Zhang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Improving Reliability of Covert Timing Channel to Packet Loss. 544-553 - Yi-Bing Wang, Tian-Yun Zhou, Bang-Jun Hu:
A Step-wise Refinement Algorithm for Face Recognition Based on Blocking Wavelet Transforms. 554-567 - Li Liu, Anhong Wang, Chin-Chen Chang, Qiang Jin, Binbin Xia:
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction. 568-576 - Ching-Yu Yang, Wen-Fong Wang, Yih-Fuh Wang, Ran-Zan Wang:
A Simple Watermarking Scheme with High Perceptual Quality for Still Color Images Based on RWM and Centroid. 577-590 - Xiaodan Xie, Bohu Li, Xudong Chai:
Kernel-Based Nonparametric Fisher Classifier for Hyperspectral Remote Sensing Imagery. 591-599 - Kun Zhan, Jicai Teng, Qiaoqiao Li, Jinhui Shi:
A Novel Explicit Multi-focus Image Fusion Method. 600-612 - Wenmin Song, Xiuyan Sun, Cheng Liu, Linlin Tang:
A New Watermarking Frame Based on the Genetic Algorithms and Wavelet Packet Decomposition. 613-621 - Yanchao Xing, Enqing Sun, Yang Lu, Zhe-Ming Lu:
Multi-scale Shot Segmentation Based on Weighted Subregion Color Histogram. 622-628
Volume 6, Number 4, July 2015
- Zhi-Hui Wang, Ying-Hsuan Huang, Chin-Chen Chang, Hai-Rui Yang:
Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy. 629-638 - Thi Thi Zin, Pyke Tin, Hiromitsu Hama, Takashi Toriu:
A Matrix-Geometric Method for Web Page Ranking Systems. 639-647 - Lili Meng, Huaxiang Zhang:
MDC-Based Robust Stereo Video Coding Using ICP. 648-654 - Tianhua Liu:
A Simple and Robust Biometrics-based One-Time Identity-Password Authenticated Key Agreement Scheme. 655-665 - Chun-Yu Zhang, Wenxiang Zhang, Shaowei Weng:
Comparison of two kinds of image scrambling methods based on LSB steganalysis. 666-673 - Zhihui Wang, Qiong Wu, Zhongxuan Luo, Chin-Chen Chang:
A novel information hiding scheme based on line segments. 674-685 - Wan-Li Lyu, Chin-Chen Chang, Yeh-Chieh Chou, Chia-Chen Lin:
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. 686-696 - Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen:
MAPMP: A Mutual Authentication Protocol for Mobile Payment. 697-707 - Fuxiang Lu, Jun Huang, Kun Zhan:
Boosting Classifiers for Scene Category Recognition. 708-717 - Wen-Chung Kuo, Ming-Chih Kao, Chin-Chen Chang:
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme. 718-727 - Jin Tang, Bo Jiang, Bin Luo, Chin-Chen Chang:
An Outlier Detection Method for Feature Point Matching Problem. 728-739 - Guoyong Wang, Bing-Lei Guan:
Fuzzy Adaptive Variational Bayesian Unscented Kalman Filter. 740-749 - Hao Wang, Guangjie Liu, Yuewei Dai, Jin Shi:
A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size. 750-759 - Ying-Hsuan Huang, Chin-Chen Chang, Meng-Chieh Lin, Gwoboa Horng:
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification. - Yi Mao, Baolong Guo, Yunyi Yan, Wei Sun:
Multiple structure based saliency detection and its application in image retrieval. 771-782 - Yanping Liao, Hua Han, Qiang Guo:
Design of Robust Near-field Multi-beam forming Based on improved LCMV algorithm. 783-791 - Yuh-Yih Lu, Jun-Yi Kuo, Hsiang-Cheh Huang:
Design and Application of Triple-Band Planar Dipole Antennas. 792-805 - Yihan Xiao, Liwei Chen, Mingyao Zhang, Mingkui Li:
Gas Turbine Blades Fault Diagnosis Method with EMD Energy Entropy and Related Vector Machine. 806-814 - Ching-Yu Yang, Wen-Fong Wang:
High-Capacity Steganographic Method for Color Images using Progressive Pixel-Alignment. 815-823 - Xiaodan Xie, Bohu Li, Xudong Chai:
Adaptive Sparse Kernel Principal Component Analysis for Computation and Store Space Constrained-based Feature Extraction. 824-832
Volume 6, Number 5, September 2015
- Ming Zhao, Jeng-Shyang Pan, Shuo-Tsung Chen:
Optimal SNR of Audio Watermarking by Wavelet and Compact PSO Methods. 833-846 - Hsiang-Cheh Huang, Feng-Cheng Chang:
Error Resilience for Compressed Sensing with Multiple-Channel Transmission. 847-856 - Taisong Xiong, Yuanyuan Huang:
Robust Gaussian Mixture Modelling Based on Spatially Constraints for Image Segmentation. 857-868 - Feng-Cheng Chang, Duen-Kai Chen, Hsiang-Cheh Huang:
Future Classroom with the Internet of Things - A Service-Oriented Framework. 869-881 - Bin Yan, Ya-Fei Wang, Lingyun Song, Hong-Mei Yang:
Power Spectrum Compliant QIM Watermarking for Autoregressive Host Signals. 882-888 - Shuliang Sun, Yongning Guo:
A Novel Image Steganography Based on Contourlet Transform and Hill Cipher. 889-897 - Jen-Chang Liu, Tsung-Min Lin:
Location and Image-Based Plant Recognition and Recording System. 898-910 - Po-Yuan Hsu, Yi-Lung Yeh:
Study on Flood Para-Tank Model Parameters with Particle Swarm Optimization. 911-923 - Yeong-Chin Chen, Huiyu Shen, Chao-Hsing Hsu:
Fundamental Frequency Analysis on a Harmonic Power Signal Using Fourier Series and Zero Crossing Algorithms. 924-937 - Yu-Ze Jheng, Chien-Yuan Chen, Chien-Feng Huang:
Reversible Data Hiding Based on Histogram Modification over Ternary Computers. 938-955 - Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. 956-967 - Chang-An Wei, Yunlong Sheng, Shou-Da Jiang, Jianfeng Wang:
Combinatorial Test Suites Generation Method Based on Fuzzy Genetic Algorithm. 968-976 - Xun-Fei Liu, Xiang-xian Zhu:
Parallel Feature Extraction through Preserving Global and Discriminative Property for Kernel-Based Image Classification. 977-986 - Fei Guo, Hui Wang:
Multi-wavelet Feature Extraction Method for Variable Illumination Face Recognition. 987-996 - Hongfeng Zhu, Yu Xia, Yan Zhang:
A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model. 997-1008 - Xiao Chen, Zhe-Ming Lu, Hong-Wa Yang, Gaofeng Pan:
A New Approach to Constructing a Minimum Edge Cut Set Based on Maximum Flow. 1009-1014 - Guangjia Song, Zhenzhou Ji:
A Novel Address Resolution Process Based on the Seek Secret Man Protocol. 1015-1028 - Jeng-Shyang Pan, Sen Ma, Shi-Huang Chen, Chun-Sheng Yang:
Vision-based Vehicle Forward Collision Warning System Using Optical Flow Algorithm. 1029-1042 - Janusz Pawel Kowalski, Jakub Peksinski, Grzegorz Mikolajczak:
Use of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests. 1043-1052 - Ruituo Wang, Yao Zhao, Chunyu Lin, Huihui Bai, Meiqin Liu:
Image Set Compression Based on Undirected Weighted Graph. 1053-1061
Volume 6, Number 6, November 2015
- Zhe-Ming Lu, Ya-Pei Feng:
Critical Nodes and Links Evaluation with Multi-Criteria Based on Entropy-Weighted Method. 1062-1076 - Hongfeng Zhu, Huiyan Liu, Yifeng Zhang, Yan Zhang:
Three-party Authentication Key Agreement Protocol Based on Chaotic Maps in the Standard Model with Privacy Preserving. 1077-1087 - Mao-Hsiung Hung, Jeng-Shyang Pan:
A Real-time Action Detection System for Surveillance Videos Using Template Matching. 1088-1099 - Jorge Treviño, Yôiti Suzuki, Takuma Okamoto, Yukio Iwaya, Junfeng Li:
A Spatial Extrapolation Method to Derive High-Order Ambisonics Data from Stereo Sources. 1100-1116 - Ziyi You, Shiguo Chen, Yi Wang:
An effcient traffic data aggregation scheme for WSN based intelligent transportation systems. 1117-1129 - Ju-Chin Chen, Tzung-Hua Wu:
Framework for Automatic Face Makeup Rendering for Fixing Flaws in Images. 1130-1144 - Rung-Shiang Cheng, Chia Peng Lin, Kawuu W. Lin, Weijun Hong:
NFC Based Equipment Management Inventory System. 1145-1155 - Dora M. Ballesteros L., Diego Renza, Ramiron Rincon:
Gray-scale Images within Color Images using Similarity Histogram-Based Selection and Replacement Algorithm. 1156-1166 - Wen-Chung Kuo, Po-Yu Lai, Chun-Cheng Wang, Lih-Chyau Wuu:
A Formula Diamond Encoding Data Hiding Scheme. 1167-1176 - Jie Cui, Hong Zhong, Runhua Shi, Liangmin Wang:
A New AES S-Box Equation System Based on BES. 1177-1184 - Bo Hu, Yu Zhou, Leida Li, Jianying Zhang, Jeng-Shyang Pan:
Polar Linear Canonical Transform in Quaternion Domain. 1185-1193 - Pei-Wei Tsai, Jing Zhang, Shunmiao Zhang, Vaci Istanda, Lyu-Chao Liao, Jeng-Shyang Pan:
Improving Swarm Intelligence Accuracy with Cosine Functions for Evolved Bat Algorithm. 1194-1202 - Wen Tian, Jiangtao Zhai, Mingqian Wang:
SkyLen: a Simple covert timing channel based on Huffman encoding. 1203-1214 - Hsin-Wen Wei, Tin-Yu Wu, Wei-Tsong Lee, Che-Wei Hsu:
Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing. 1215-1230 - Qiu-Yu Zhang, Shuang Yu, Peng-Fei Xing, Yi-Bo Huang, Zhan-Wei Ren:
An Improved Phase Coding-Based Watermarking Algorithm for Speech Perceptual Hashing Authentication. 1231-1241 - Yuan Ni, Zongquan Deng, Junbao Li, Xiang Wu, Long Li:
An improving analytical model with high accuracy for a micro manipulator. 1242-1249 - Guanghua Gu, Jiaojiao Zhu, Zexia Liu, Yao Zhao:
Visual Saliency Detection Based Object Recognition. 1250-1263 - Shengbei Wang, Ryota Miyauchi, Masashi Unoki, Nam Soo Kim:
Tampering Detection Scheme for Speech Signals using Formant Enhancement based Watermarking. 1264-1283 - Wen-Hua Ren, Zhe-Ming Lu:
Error Reduction for Temperature Detection Unit of Sigma-Delta High Resolution Temperature Sensor. 1284-1294 - Hongfeng Zhu, Yan Zhang:
Enhanced Graphical Captcha Framework and Applications to Strong Security Authenticated Scheme without Password Table. 1295-1309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.