Accepted Papers in Invited Sessions and Workshop of IAS-2009

 

IAS-2009-IS01-01

Majority-Parity-Guided Watermarking for Block-Truncated Images

Jing-Ming Guo and Yun-Fu Liu

 

IAS-2009-IS01-02

Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table

Jing-Ming Guo and Jia-Jin Tsai

 

IAS-2009-IS01-03

Improving the Modified Matrix Encoding on Steganography Method

Yong-Soo Choi and Hyoung-Joong Kim

 

IAS-2009-IS01-04

Reversible Information Hiding Considering Hierarchical Access Control

Masaaki Fujiyoshi, Seungwu Han, and Hitoshi Kiya

 

IAS-2009-IS02-01

An Effective Lossless Hiding Technique based on Reversible Contrast Mapping and Histogram Embedding Methods

Tzu-Chuen Lu and Ying-Hsuan Huang

 

IAS-2009-IS02-02

A High Quality Reversible Data Hiding Method Using Interpolation Technique

Chyuan-Huei Thomas Yang and Chun-Hao Hsu

 

IAS-2009-IS02-03

Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images

Cheng-Hsing Yang, Cheng-Ta Huang, and Shiuh-Jeng Wang

 

IAS-2009-IS02-04

A High Embedding Efficiency Steganography Scheme for Wet Paper Codes

Zhao-Xia Yin, Chin-Chen Chang, and Yan-Ping Zhang

 

IAS-2009-IS02-05

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation

Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, and Meng-Cheng Tsai

 

IAS-2009-IS02-06

Prediction-Based Watermarking Schemes for DCT-Based Image Coding

Jing-Ming Guo and Chia-Hao Chang

 

IAS-2009-IS02-07

Human Visual System based Watermarking for Color Images

Kuo-Cheng Liu

 

IAS-2009-IS03-01

Privacy Protection in On-line Shopping for Electronic Documents

Yu-Chi Chen, Gwoboa Horng, and Chang-Chin Huang

 

IAS-2009-IS03-02

A Low-cost RFID Authentication Protocol with Location Privacy Protection

Yu-Yi Chen, Jun-Chao Lu, Shin-I Che, and Jinn-Ke Jan

 

IAS-2009-IS03-03

A Real-Time Selective Video Encryption Using Context-Key Control

Hung-Min Sun and Muh-Chyi Leu

 

IAS-2009-IS03-04

Ideal Perfect Hierarchical Threshold Secret Sharing Schemes

Changlu Lin, Lein Harn, and Dingfeng Ye

 

IAS-2009-IS03-05

Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting

Chung-Huang Yang, Shih-Yi Tu, and Pei-Hua Yen

 

IAS-2009-IS03-06

Access Log Generator for Analyzing Malicious Website Browsing Behaviors

Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen

 

IAS-2009-IS03-07

Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System

Fang-Yie Leu and Zhi-Yang Li

 

IAS-2009-IS03-08

Detecting DoS&DDoS Attacks Using Chi-Square

Fang-Yie Leu and Chia-Chi Pai

 

IAS-2009-IS03-09

Hierarchical Key Agreement Protocols in Group-user Systems

Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, and Pin-You Chen

 

IAS-2009-IS04-01

Common Friends Discovery with Privacy and Authenticity

Shin-Yan Chiou, Shih-Ying Chang, and Hung-Min Sun

 

IAS-2009-IS04-02

Collaborated Medical Image Secret Sharing Scheme

Kun-Yuan Chen and Der-Ming Liou

 

IAS-2009-IS04-03

Known Signature Attack of ID-based Multisignature Schemes

Wu-Chuan Yang and Jhih-Syue Jhou

 

IAS-2009-IS04-04

A Generalization of de Weger's Method

Chien-Yuan Chen, Chih-Cheng Hsueh, and Yu-Feng Lin

 

IAS-2009-IS04-05

New Strategy of Efficient SPA-resistant Exponentiations

Wu-Chuan Yang

 

IAS-2009-IS05-01

Color-Texture Based Image Retrieval System by Gaussian Markov Random Field Model

Yung-Kuan Chan, Jiun-Shiang Wang, Meng-Hsiun Tsai, and Yen-Ping Chu

 

IAS-2009-IS05-02

Image Watermarking Using Phase-shifting Digital Hologram Embedded in Wavelet Domain

Mn-Ta Lee, Hsuan-Ting Chang, and Mu-Liang Wang

 

IAS-2009-IS05-03

A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks

Iuon-Chang Lin and Shu-Yan Huang

 

IAS-2009-IS05-04

An Adaptable Threshold Decision Method

Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, and Yung-Kuan Chan

 

IAS-2009-IS05-05

Zero Packet Loss Hand-off Mechanism in SIP-based Wireless Networks

Ching-Lung Chang, Jia-Yi Syu, and Yuan-Sun Chu

 

IAS-2009-IS05-06

A New Authenticated Key Agreement Protocol for Wireless Mobile Networks

Shin-Jia Hwang and Ming-Jhang Chai

 

IAS-2009-IS05-07

Economical Dental Stereoradiography in Digital Era

Hsien-Huang P. Wu, Chien-Chih Lin, and Ping-Kuo Weng

 

IAS-2009-IS05-08

A Resistant Secret Sharing Scheme

Chin-Chen Chang, Yen-Chang Chen, and Chia-Chen Lin

 

IAS-2009-IS06-01

Active Contour Model via Honey Bee Mating Optimization

Ming-Huwi Horng, Jin-Yi Chen, and Liou Ren-Jean

 

IAS-2009-IS06-02

Intra-mode Dependent Coding Method for Image Compression

Yung-Chiang Wei, Jui-Che Teng, and Chien-Wen Chung

 

IAS-2009-IS06-03

Dynamically Constrained One-Bit Transform for Motion Vector Estimation

Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, and Wen-Yuan Liao

 

IAS-2009-IS06-04

A Name Recommendation Photo Album Using Probability Neural Network

Ding-Hrong Chen and Shiang-En Tang

 

IAS-2009-IS06-05

Estimation of Soft Tissue Deformation in Laparoscopic Video Images

Chia-Hsiang Wu, Yung-Nien Sun, and Chien-Chen Chang

 

IAS-2009-IS06-06

Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models

Jiann-Shu Lee

 

IAS-2009-IS06-07

Fast Registration of 3D Facial Images

Chia-Hsiang Wu, Cheng-Ming Ni, and Sheng-Che Lin

 

IAS-2009-IS07-01

Full System Simulation and Verification Framework

Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee,Yuan-Hua, Chu, Jen-Chieh Yeh, and Ying-Chuan Hsiao

 

IAS-2009-IS07-02

Automatic IP Interface Synthesis Supporting Multi-Layer Communication Protocols in SoC Designs

Yin-Tsung Hwang and Hua-Hsin Luo

 

IAS-2009-IS07-03

Moving Object Tracking Using Symmetric Mask-Based Scheme

Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, and Zong-Jheng Wu

 

IAS-2009-IS07-04

Hardware/Software Codesign of Resource Constrained Real-Time Systems

Chia-Cheng Lo, Jung-Guan Luo, and Ming-Der Shieh

 

IAS-2009-IS07-05

Design and Integration for Background Subtraction and Foreground Tracking Algorithm

Tsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, and Giua-Hua Chen

 

IAS-2009-IS07-06

Parallel 3-Pixel Labeling Method and its Hardware Architecture Design

Shyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, and Shau-Yin Tseng

 

IAS-2009-IS08-01

Privacy Protection for Speech Information

Kazumasa Yamamoto and Seiichi Nakagawa

 

IAS-2009-IS08-02

An Improvement of Speaker Vector-based Speaker Verification

Naoki Tadokoro, Tetsuo Kosaka, Masaharu Kato, and Masaki Kohda

 

IAS-2009-IS08-03

Acoustic-based Security System: Towards Robust Understanding of Emergency Shout

Hiroaki Nanjo, Takanobu Nishiura, and Hiroshi Kawano

 

IAS-2009-IS08-04

A System for Detecting Unusual Sounds from Sound Environment Observed by Microphone Arrays

Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani, and Yingbo Hua

 

IAS-2009-IS08-05

Detection of Abnormal Sound using Multi-stage GMM for Surveillance Microphone

Akinori Ito, Akihito Aiba, Masashi Ito, and Shozo Makino

 

IAS-2009-IS09-01

Zero-Collision RFID Tags Identification based on CDMA

Lih-Chyau Wuu, Wen-Chung Kuo, Yen-Ju Chen, and Chi-Hsiang Hung

 

IAS-2009-IS09-02

An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards

Chun-Ta Li

 

IAS-2009-IS09-03

Improvement on RFID Authentication Protocol for Anti-counterfeiting and Privacy Protection

Yung-Cheng Lee, Wen-Chung Kuo, and Huan-Cheng Lien

 

IAS-2009-IS09-04

Efficient Proxy Re-Encryption Schemes with Non-Transferability and Multi-Delegability

Jiin-Chiou Cheng and Chi-Sung Laih

 

IAS-2009-IS09-05

A Secure Access Control Scheme of RFID System Application

Yu-Chih Huang

 

IAS-2009-IS10-01

Facial Expression Recognition Based on Field Programmable Gate Array

Jzau-Sheng Lin, Shao-Han Liou, Wu-Chih Hsieh, Yu-Yi Liao, HongChao Wang, and QingHua Lan

 

IAS-2009-IS10-02

Analysis and Evaluation of Contrast Enhancement methods in Digital Images

Shen-Chuan Tai, Yi-Ying Chang, Ting-Chou Tsai, and Li-Man Liao

 

IAS-2009-IS10-03

Contrast Enhancement method based on Average Luminance with Weighted Histogram Equalization

Shen-Chuan Tai, Yi-Ying Chang, Kang-Ming Li, and Ting-Chou Tsai

 

IAS-2009-IS10-04

Application of Averaged Learning Subspace Method in MRI Classification

Chuin-Mu Wang, Jau-An Chen, and Jui-Hsing Chu

 

IAS-2009-IS12-01

A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm

Lin-Lin Tang, Zhe-Ming Lu, and Fa-Xin Yu

 

IAS-2009-IS12-02

A CELP-Speech Information Hiding Algorithm Based on Vector Quantization

Ji-Xin Liu, Zhe-Ming Lu, and Hao Luo

 

IAS-2009-IS12-03

Video Identification Using Spatio-temporal Salient Point

Yue-Nan Li and Zhe-Ming Lu

 

IAS-2009-IS13-01

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks

Xiaoqing Li, Hui Li, and Jianfeng Ma

 

IAS-2009-IS13-02

Distributed Event-triggered Trust Management for Wireless Sensor Networks

Si-bo Liu, Liao-jun Pang, Qing-qi Pei, Hua Ma, and Qing-quan Peng

 

IAS-2009-IS13-03

A Novel Biometric-based Authentication Scheme with Privacy Protection

Hui-xian Li

 

IAS-2009-IS13-04

Roaming Authentication and Key Agreement Protocol with Anonymity for Wireless Mesh Sensor Networks

Qingquan Peng, Xiuqiang Wu, and Liaojun Pang

 

IAS-2009-IS13-05

Towards Provably Secure On-Demand Source Routing in MANET

Liqiang Mao and Jianfeng Ma

 

IAS-2009-IS13-06

Research on Integration of Safety Analysis in Model-driven Software Development

Feng Chen, Weihua Li, Dingyi Fang, and Xiaojiang Chen

 

IAS-2009-IS13-07

An Authentication Protocol Applied to RFID Security Systems

Xiaoqing Gong, Hui Li, Jian He, and Yi Wang

 

IAS-2009-IS13-08

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks

Yulong Shen, Qijian Xu, and Hao Yin

 

IAS-2009-IS13-09

Layer Key Management Scheme on Wireless Sensor Networks

Qingqi Pei, Lei Wang, Hao Yin, and Hua Ma

 

IAS-2009-IS13-10

A Broadcast Protocol for Key Establishment and Updating in Wireless Sensor Network

Xiaoyuan Yang, Maotang Li, Lixian Wei, and Yiliang Han

 

IAS-2009-IS13-11

C&M: A New Network Coding Scheme for Wireless Networks

Xiaoyan Zhu, Hao Yue, Yuguang Fang, and Yumin Wang

 

IAS-2009-IS13-12

Range-free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Network

Mei Wang, Xiaochuan Sun, and Hao Zheng

 

IAS-2009-IS13-13

Information Security Wireless Sensor Grid

Mingming Li, Baiping Li, Wei Li, and Lei Chen

 

IAS-2009-IS14-01

A Parity Check Node Synchronization Based Method for Solving Phase Ambiguity Problem in DVB-S Systems

Jielin Fu and Yongjun Tang

 

IAS-2009-IS14-02

Security Analysis of the Kerberos Protocol using BAN Logic

Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, and Weidong Kou

 

IAS-2009-IS14-03

The Testing and Evaluating System for the Security Operating System Based on the Mechanism of Keyword-driven

Xing Liu and Mian Cai

 

IAS-2009-IS14-04

An Identity-Based Authentication Model for Mobile Agent

Yike Yu, Xue-feng Zheng, and Mingde Zhang

 

IAS-2009-IS14-05

Performance Analysis of Analog LMS Multiuser Receiver in Transmitted-Reference UWB System

Lin Zheng, Wei Ge, and Hongbing Qiu

 

IAS-2009-IS14-06

A New Abuse-Free Fair Electronic Payment Protocol

Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, and Weidong Kou

 

IAS-2009-IS14-07

Action-Based Access Control for Web Services

Fenghua Li, Wei Wang, Jianfeng Ma, and Haoxin Su

 

IAS-2009-IS14-08

A Provably Secure Certificateless Blind Signature Scheme

Xiaoyuan Yang, Zhongyin Liang, Ping Wei, and Junwei Shen

 

IAS-2009-IS14-09

Research on Model of Trust Degrees for PKI

Mingde Zhang, Xuefeng Zheng, Shuwang Lv, Wensheng Yang, and Qingguo Zhang

 

IAS-2009-IS14-10

Information Security Routing Protocol in the WSN

Wei Li, Ming Chen, Mingming Li, and Wei Li

 

IAS-2009-IS15-01

A Dynamic Graph Watermark Scheme of Tamper Resistance

Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Wenbo Wang, Feng Chen, Wenjuan Chen, and Lu He

 

IAS-2009-IS15-02

Trusted Computing Based Mobile DRM Authentication Scheme

Zhen Yang and Kefeng Fan

 

IAS-2009-IS15-03

An Authenticating Algorithm with Multi-compression Compatible in DCT Domain

Xiaoyuan Yang, Yao Guo, Ke Niu, and Xiang Wu

 

IAS-2009-IS15-04

Audio Digital Signature Algorithm with Tamper Detection

Xiaoyuan Yang, Xiang Wu, and Minqing Zhang

 

IAS-2009-IS15-05

Key Binding Based on Biometric Shielding Functions

Huixian Li

 

IAS-2009-IS15-06

A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface

Kefeng Fan and Subing Zhang

 

IAS-2009-IS15-07

A Deep Copy Protection Framework for Electronic Devices within Home

Yang Zhan, Haibo Tian, Yaoyu Zhang, and Yumin Wang

 

IAS-2009-IS15-08

Attack on an Universal Designated Verifier Signature Scheme

Yanping Li, LiaoJun Pang, and Yumin Wang

 

IAS-2009-IS15-09

Image Enhancement Based On Nonsubsampled Contourlet Transform

Yuxin Ma, Jiancang Xie, and Yuheng Sha

 

IAS-2009-IS15-10

Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines

Gang Xiao and Jiancang Xie

 

IAS-2009-IS15-11

Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain

Baomao Pang and Haoshan Shi

 

IAS-2009-IS15-12

A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks

Xin-Wei Li, Bao-Long Guo, and Lei-Da Li

 

IAS-2009-IS15-13

A Balanced Multiwavelet Based Adaptive Digital Watermarking Algorithm

Ming-Xiang Zang, Na Zhang, and Jian-Guo Jiang

 

IAS-2009-IS15-14

An Improved Iris Recognition Method Based on Gray Surface Matching

Dongmei Wu and Jiangnan Wang

 

IAS-2009-IS15-15

Image Retrieval Based on 2D Histogram of Interest Points

Fanjie Meng, Baolong Guo, and Lei Guo

 

IAS-2009-IS15-16

An Identification Method of Video Information Coupled Circuits in the Radiation Environment

Jin Tian and Yang Qiu

 

IAS-2009-IS15-17

An Improved Fusion Algorithm of the Weighted Features and Its Application in Image Retrieval

Mei Wang and Li Wang

 

IAS-2009-IS15-18

An Active Defense Model and Framework of Insider Threat Detection and Sense

Hongbin Zhang, Qingqi Pei, and Jianfeng Ma

 

IAS-2009-IS16-01

A Modified Feature based Image Watermarking Scheme in NSCT Domain

Liu Yang, Baolong Guo, and Jianmin Lv

 

IAS-2009-IS16-02

Grounding Grid Corrosion Diagnosis based on Large Change Sensitivity

Liqiang Liu, Xianjue Luo, Tao Niu, and Kai Wang

 

IAS-2009-IS16-03

An Improved Algorithm of Grounding Grids Corrosion Diagnosis

Tao Niu, Yingjiao Zhang, Liqiang Liu, and Xianjue Luo

 

IAS-2009-IS16-04

Anomalous Payload Detection System using Analysis of Frequent Sequential Pattern

Jun Ma, GuanZhong Dai, and Jing Zhou

 

IAS-2009-IS16-05

An Enhanced Block Mode Selection Method for Surveillance Video Communication

Jie Jiang, Wei Mo, and Jianmin Lv

 

IAS-2009-IS16-06

The Detection of Bi-Frequency Weak Signal Based on Chaos and Correlation

Mei Wang, Huifeng Zhang, and Yong Yan

 

IAS-2009-IS16-07

The Application and Study of Graph Cut in Motion Segmentation

Ye Hou, Baolong Guo, and Jeng-Shyang Pan

 

IAS-2009-IS16-08

Application of Rough Set Theory in Coal Gangue Image Process

Xian-Min Ma and Liang Che

 

IAS-2009-IS16-09

A Dynamic Layering Scheme of Multicast Key Management

Fan Yang, Xiao-ping Li, Qing-kuan Dong, and Yan-ming Liu

 

IAS-2009-IS16-10

Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement

Zhanli Li and Yuan Wang

 

IAS-2009-IS16-11

Research on Video Information Camouflage Processing Algorithm Based on Amplitude Modulation

Yang Qiu, Jin Tian, and Wei Jing

 

IAS-2009-IS16-12

A New Multiple-Objects Tracking Method with Particle Filter

Long Chen, Bao-long Guo, and Wei Sun

 

IAS-2009-IS16-13

Study on the Feedback Fuzzy Controller for a Two-wheeled Unstable Vehicle

Shengli Qu

 

IAS-2009-IS16-14

Support Vector Machine Based on Possibility Degree and Fault Diagnosis

Jingyi Du, Mei Wang, and Wenhao Cai

 

IAS-2009-IS18-01

Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation

Maheyzah Md Siraj, Mohd Aizaini Maarof, and Siti Zaiton Mohd Hashim

 

IAS-2009-IS18-02

Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection

Anazida Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, and Siti Mariyam Shamsuddin

 

IAS-2009-IS18-03

Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems

Ajith Abraham, Crina Grosan, Hongbo Liu, and Yuehui Chen

 

IAS-2009-IS18-04

Detecting Insider Attached Using Non-negative Matrix Factorization

Jan Platoš, Vaclav Snasel, Pavel Krömer, and Ajith Abraham

 

IAS-2009-IS19-01

A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation

Xiaoyue Wu, Baolong Guo, Shengli Qu, and Zhuo Wang

 

IAS-2009-IS19-02

Grounding Grid Corrosion Diagnosis with Test Nodes Migration

Liqiang Liu, Xianjue Luo, Tao Niu, and Kai Wang

 

IAS-2009-IS19-03

SAR Image Target Recognition Based on Hu Invariant Moments and SVM

Yan Fu, Mei Wang, Chunqin Zhang

 

IAS-2009-IS19-04

Testability Analysis of Grounding Grids Using Network Transformation

Tao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, and Xianjue Luo

 

IAS-2009-IS19-05

Research on Digital Filtering Algorithm based on the Video Information Security

Yang Qiu, Jin Tian, Lili Wei, and Guangda Chen

 

IAS-2009-IS19-06

ISAR Imaging of High Speed Moving Targets Based-on Radon Transform

Tong-an Feng, Jin He, and Ying Luo

 

IAS-2009-IS19-07

Octa-Log-Polar Fourier Transform for Image Registration

Xian-xiang Wu, Bao-long Guo, and Juan Wang

 

IAS-2009-IS19-08

Design of DBA Algorithm in EPON Uplike

Yamin Wang and Yan Liu

 

IAS-2009-IS19-09

Cramer-Rao lower bound for non-coherent TOA Estimation with Impulse Signal

Jie Liu, Xiaoji Li, and Lin Zheng

 

IAS-2009-IS19-10

Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge of Boost DC-DC Converters

Shulin Liu

 

IAS-2009-IS19-11

Study on the Control of a Two-wheeled Unstable Vehicle based on Sensitivity Analysis

Shengli Qu

 

IAS-2009-IS19-12

Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology

Jin Tian, Yang Qiu, and Liuyu Qian