Accepted Papers in Regular Session |
---|
Paper Number | Paper Title | Corresponding Author Name |
---|
IIHMSP-2006-0199 | A Modified Particle Swarm Algorithm Combined with Fuzzy Neural Network with Application to Financial | Fuyuan Huang |
IIHMSP-2006-0200 | Symmetrical Color-Spatial Feature for Medical Image Retrieval | Qu Jingyi |
IIHMSP-2006-0201 | Face detection based on complexional segmentation and feature extraction | ZHANG QIAN |
IIHMSP-2006-0202 | Image Robust Hashing based on DCT Sign | Longjiang Yu |
IIHMSP-2006-0203 | Enabled SIP-Based Multimedia Services with MPLS Technology in Ad hoc Wireless Networks | Hongpeng Wang |
IIHMSP-2006-0204 | A Self-adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System | Che Sheng-bing |
IIHMSP-2006-0205 | The effect of frame freezing and frame skipping on video quality | yining qi |
IIHMSP-2006-0206 | A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission | Chun-Ting Hung |
IIHMSP-2006-0207 | Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images Recognition | Lei Zhang |
IIHMSP-2006-0208 | Digital Image Watermark Algorithm in the Curvelet Domain | Zhiyu Zhang |
IIHMSP-2006-0211 | Improved SMVQ scheme with edge-directed prediction | Chia-Chen Chang |
IIHMSP-2006-0212 | Study on the Signal-to-Noise Ratio of Multiple A/D Nonuniformly Sampled Signals | MA Kai |
IIHMSP-2006-0220 | H.264/AVC Video Encoder Implementation Based on TI TMS320DM642 | Wang Hong-jun |
IIHMSP-2006-0225 | Chain Code Distribution-Based Image Retrieval | sun junding |
IIHMSP-2006-0230 | Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution | Rongrong Ji |
IIHMSP-2006-0231 | Analysis of Anonymity on the Signatures of Knowledge | ZOU Xinguang |
IIHMSP-2006-0244 | Gabor Filter Based Text Extraction From Digital Document Images | Yu-Long Qiao |
IIHMSP-2006-0246 | A New Steganalysis Method for DCT-based Adaptive Spread Spectrum Steganography | Rongrong Ji |
IIHMSP-2006-0249 | Design of AC-PDP Signal Processor for SoC application | song qiu |
IIHMSP-2006-0253 | Application and computer emulation of cochlear implant CIS method based on the all phase DFT filter | Pang Zhimin |
IIHMSP-2006-0265 | Discriminant Feature Fusion Strategy for Supervised Learning | Jun-Bao Li |
IIHMSP-2006-0270 | Chaotic Signal Design with Selected Parameters | Baishan Zhao |
IIHMSP-2006-0274 | A Novel Low-IF Topology for High Performance Integrated Receivers | Xu Lingjun |
IIHMSP-2006-0277 | Joint Halftoning and Visible Watermarking | Hao Luo |
IIHMSP-2006-0288 | A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images | Jun-Bao Li |
IIHMSP-2006-0298 | Power Optimization for Bus on Multimedia SoC | Gang Feng |
IIHMSP-2006-0304 | Reversible Data Hiding for 3D Point Cloud Model | Hao Luo |
IIHMSP-2006-0313 | Self-similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment | Takuo Nakashima |
IIHMSP-2006-0319 | A Chaotic Masking Communication System With Better Performance | haoming bao |
IIHMSP-2006-0325 | R-D Optimized Frame-Layer Bit Allocation for H.264 | Do-Kyoung Kwon |
IIHMSP-2006-0328 | A Steganalysis Method Based on the Distribution of First Letters of Words | Xin-guang Sui |
IIHMSP-2006-0334 | Multi-dimensional Packet Classification using Tuple Space based on Bit-Parallelism | wang xueguang |
IIHMSP-2006-0337 | Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing Technique | Kewen Xia |
IIHMSP-2006-0340 | Fast Algorithm Computing Trigonometric Function of Specific Angle | he qiusheng |
IIHMSP-2006-0346 | A Subsampling and PSK Based Watermarking Scheme Which Can Resist the Permutation Attacking | Chuang Lin |
IIHMSP-2006-0351 | An Information Hiding Scheme for OFDM Wireless Networks | Chuang Lin |
IIHMSP-2006-0355 | A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme | kai wang |
IIHMSP-2006-0359 | Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain | Zhen Sun |
IIHMSP-2006-0363 | A Methodology to Improve the Detection Accuracy in Digital Steganalysis | Antonio Savoldi |
IIHMSP-2006-0368 | A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System | Lin Ma |
IIHMSP-2006-0374 | Face recognition using PCA features selection by GAs | Jing-Wein Wang |
IIHMSP-2006-0380 | The Hierarchy Index of the Multimedia Educational Resources Database System | Wu Chun-xiang |
IIHMSP-2006-0390 | A Facial Expression Recognition Approach Based on Confusion-crossed Support Vector Machine Tree | Qinzhen Xu |
IIHMSP-2006-0396 | A Novel Watermarking Scheme in Contour let Domain Based on Independent Component Analysis | Zhao Xu |
IIHMSP-2006-0401 | A Novel Log-WT based Super-Resolution Algorithm | Jianping Qiao |
IIHMSP-2006-0429 | A Robust Watermarking Algorithm Adopting Double Embedding | Xiao-hua Qiao |
IIHMSP-2006-0434 | A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB systems | Ying-Tzu Shih |
IIHMSP-2006-0437 | Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform | Min-Hong Chen |
IIHMSP-2006-0442 | Audio Watermarking based on Reverberation | Nian Guijun |
IIHMSP-2006-0446 | Design of collusion free codes based on MAI-free principle | Byung-Ho Cha |
IIHMSP-2006-0452 | Positioning Algorithm of Wireless Sensor Network Nodes | Wenhui Zhao |
IIHMSP-2006-0460 | Error-tolerance and multi-media | Melvin Breuer |
IIHMSP-2006-0485 | Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2 | Zhenyu Wu |
IIHMSP-2006-0491 | An Improved Technique for Blind Audio Source Separation | Namgook Cho |
IIHMSP-2006-0506 | Image watermarking based HVS characteristic of wavelet transform | Cong Jin |
IIHMSP-2006-0523 | CDMA Based Multiple-User Digital Watermarking | Deyun Peng |
IIHMSP-2006-0526 | VLSI IMPLEMENTATION OF CORE COMPLAINT TO SPI4.2 FOR BROADBAND APPLICATIONS | MAYANK JAIN |
IIHMSP-2006-0531 | IMAGE WATERMARKING RESISTING TO GEOMETRICAL ATTACKS BASED ON HISTOGRAM | Fang Zheng |
IIHMSP-2006-0536 | Blind Source Extraction Algorithm Based on Normalized Kurtosis for Additive Noisy Environment | Er-Fu Wang |
IIHMSP-2006-0541 | Extending the Selective MPEG Encryption Algorithm PVEA | Li Weng |
IIHMSP-2006-0544 | A New Watermarking Protocol of Copyright protection | ru zhang |
IIHMSP-2006-0550 | Nonholonomic motion planning of mobile robot with ameliorated genetic algorithm | Wu JinFei |
IIHMSP-2006-0554 | An Improved Design and Implementation of Chinese Name card recognition system on mobile Devices | Chi Cui |
IIHMSP-2006-0559 | THE SMOKE DETECTION FOR EARLY FIRE-ALARMING SYSTEM BASE ON VIDEO PROCESSING. | Thou-Ho (Chao-Ho) Chen |
IIHMSP-2006-0565 | A Research on Steganography Method Based on Error-Correcting Codes | LIU Cui-Qing |
IIHMSP-2006-0569 | Research of Chaos Encryption Algorithm Based on Logistic mapping | Luo jinhong |
IIHMSP-2006-0575 | Multi-scale Gradient Vector Field with Application to Image Segmentation | jinye Peng |
IIHMSP-2006-0596 | Interlacing domain partition for Fractal Watermarking | Ping-Sung Liao |
IIHMSP-2006-0601 | Adaptive Working Window for Impulse Noise Reduction | Thou-Ho (Chao-Ho) Chen |
IIHMSP-2006-0605 | An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion Estimation | Tsong-Yi Chen |
IIHMSP-2006-0608 | Recovering Intrinsic Images from Weighted Edge Maps | Qiang He |
IIHMSP-2006-0613 | Video streaming over 3G networks with GOP-based priority scheduling | Yongjin Cho |
IIHMSP-2006-0622 | Voice2SQL: Hybrid Intelligent System for the recovery of information from databases by means of spok | Omar Florez |
IIHMSP-2006-0628 | Fast Intra Prediction Mode Decision Algorithm for H.264/AVC Video Coding Standard | Jen-Shiung Chiang |
IIHMSP-2006-0631 | A Method of Biomimetic Pattern Recognition for Speaker Recognition | Qian Bo |
IIHMSP-2006-0636 | Evaluation of Signal Processing effect in media gateway based on cross correlation | Hao WANG |
IIHMSP-2006-0640 | Improved Video Verification Method Using Digital Watermarking | Isao Echizen |
IIHMSP-2006-0644 | Improved Linear Prediction Technique for Musical Onset Detection | Wan-Chi Lee Lee |
IIHMSP-2006-0647 | Blind Watermarking in Contourlet Domain with Improved Detection | Jayalakshmi M |
IIHMSP-2006-0652 | A Clustering Scheme for Intrusion Detection Agent Distribution in Mobile Ad Hoc Networks | zu baoming |
IIHMSP-2006-0655 | Digital Audio Watermarking Algorithm Based On Quantizing Coefficients | Zhao Xu |
IIHMSP-2006-0659 | A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection | Qian Bo |
IIHMSP-2006-0665 | Utilization of Maximum Data Hiding Capacity in Object-based Text Document Authentication | Imtiaz Awan |
IIHMSP-2006-0671 | Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H | Mehdi Rezaei |
IIHMSP-2006-0676 | Analysis of Current Steganography Tools: Classifications & Features | Chen Ming |
IIHMSP-2006-0679 | Chirp-based image watermarking as error-control coding | Behnaz Ghoraani |
IIHMSP-2006-0684 | A Novel Image Scrambling Algorithm for Digital Watermarking Based on Chaotic Sequences | Zhu liehuangz |
IIHMSP-2006-0689 | Iris Recognition Based on Local Feature Point Matching | zhu ruihui |
IIHMSP-2006-0693 | Efficient Object Tracking Based on Local Invariant Features | Li yanjun |
IIHMSP-2006-0696 | A PCA based Visual DCT Feature Extraction Method for Lip-Reading | Xiaopeng Hong |
IIHMSP-2006-0700 | Rate control Scheme based on Cauchy R-D Optimization Model for H.264 under Low Delay Constraint | Nongluk Eiamjamras |
IIHMSP-2006-0703 | The Watermarking Model for Relational Database Based on Watermarking Sharing | Cong Jin |
IIHMSP-2006-0708 | Automatic Real-time Moving Target Detection from Infrared Video | Shahryar Karimi-Ashtiani |
IIHMSP-2006-0713 | Comparison study on SVD-based face classification | Yong Xu |
IIHMSP-2006-0718 | Medical Image Noise Reduction Using Cellular Neural Networks | Te-Jen Su |
IIHMSP-2006-0721 | Progressive Image Transmission Using Significant Features and Linear Regression Prediction | Chia-Chen Chang |
IIHMSP-2006-0724 | The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System | Tong xiaojun |
IIHMSP-2006-0730 | Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors | Chun-Chieh Tseng |
IIHMSP-2006-0735 | A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords | Chia-Chen Chang |
IIHMSP-2006-0741 | A Heuristic Method for Extracting Enhanced Watermarks from Digital Images | Chia-Chen Chang |
IIHMSP-2006-0748 | Grid-Based Routing Algorithm for Sensor Network | Jin Zhang |
IIHMSP-2006-0751 | Curve-Based Secure Routing Algorithm for Sensor Network | Jin Zhang |
IIHMSP-2006-0756 | A Novel Routing Algorithm for Wireless Sensor Networks | Jing Jiang |
IIHMSP-2006-0772 | A Single-Stream Pipelined Instruction Decompression System for Embedded Microprocessors | Yuan-Long Jeang |
IIHMSP-2006-0778 | An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging data | Nan Zhang |
IIHMSP-2006-0783 | Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search | Chia-Chen Chang |
IIHMSP-2006-0787 | Pervasive Computing Context Access Control Based on UCONABC Model | Pu Fang |
IIHMSP-2006-0792 | A New Image Steganography for Internet Communications Based on Chaotic Sequences | Niansheng Liu |
IIHMSP-2006-0797 | Image Retrieval Based on Improved Entropy and Moments | sun junding |
IIHMSP-2006-0801 | A Non-uniform Quantizing Approah to Protect Biometric Templates | Xiamu Niu |
IIHMSP-2006-0806 | SVD BASED ROBUST IMAGE CONTENT RETRIEVAL | Xiamu Niu |
IIHMSP-2006-0812 | SVD Based Blind Image Watermarking Algorithm | Xiamu Niu |
IIHMSP-2006-0818 | Focus on the Generalized Information Hiding Technology | Xiamu Niu |
IIHMSP-2006-0822 | A PRACTICAL MULTIPURPOSE WATERMARKING SCHEME FOR VISUAL CONTENT COPYRIGHT PROTECTION AND AUTHENTICAT | Xiamu Niu |
IIHMSP-2006-0828 | Domain-based Dynamic Resource Management Mechanism Supporting | ZHANG Guo-min |
IIHMSP-2006-0833 | An Optimal Block Mapping Method Based on Genetic Algorithm for LSB Substitution | Rongrong Ji |
IIHMSP-2006-0836 | BLOCK MEAN VALUE BASED IMAGE PERCEPTUAL HASHING | Bian Yang |
IIHMSP-2006-0848 | Java Applets Copy Protection by Steganography | Mohammad Shirali-Shahreza |
IIHMSP-2006-0858 | Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition | Jian Wang |
IIHMSP-2006-0868 | Wavelet-Based Hierarchical Clustering Approach for Image Database | Hongli XU |
IIHMSP-2006-0874 | Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal Spaces | Kuo-Cheng Liu |
IIHMSP-2006-0878 | Detecting the Theft of Natural Language Text Using Birthmark | Jianlong Yang |
IIHMSP-2006-0887 | Security Research on VoIP with Watermarking | hu dong |
IIHMSP-2006-0890 | Discriminating Wavelet-based Watermarking with Modified MAP | Amirali Shirazi Beheshti |
IIHMSP-2006-0902 | A Novel Steganography with Row-Major Mapping Relation | Chung-Chuan Wang |
IIHMSP-2006-0908 | An Image Encryption Approach Based on a New Two-dimensional Map | Feng Huang |
IIHMSP-2006-0916 | Fast H.264/AVC Inter-Mode Decision with RDC Optimization | Yu Hu |
IIHMSP-2006-0922 | A DYNAMIC CLUSTERING ALGORITHM BASED ON PSO AND ITS APPLICATION IN FUZZY IDENTIFICATION | Zhang Dingxue |
IIHMSP-2006-0928 | An improved secret key estimation method for sequential steganography | wang ping |
IIHMSP-2006-0934 | Automatic Semantic Annotation of videos Based on Bayesian Network | Fangshi Wang |
IIHMSP-2006-0937 | Emotion Recognition Using Physiological Signals from Multiple Subjects | Li Lan |
IIHMSP-2006-0941 | Fast Gaussian Computation Algorithm for Restricted and HMM-based Speech Recognition | lingyun xie |
IIHMSP-2006-0945 | Effects on Statistical Features for Image by Quantization | Yanqing Guo |
IIHMSP-2006-0953 | Information Hiding Method in digital audio signal Based on Perfect Codes | Xiamu Niu |
IIHMSP-2006-0957 | Decoder-Friendly Subpel MV Selection for H.264/AVC Video Encoding | Qi Zhang |
IIHMSP-2006-0962 | A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences | yaqin zhao |
IIHMSP-2006-0966 | Forensic Analysis of Document fragment based on SVM | Binglong Li |
IIHMSP-2006-0970 | A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform | li beibei |
IIHMSP-2006-0974 | A context-aware AmI systems based on MAS model | Zhang Yong |
IIHMSP-2006-0981 | System behavior based Attestation for Trustworthiness of Computing Platform | Xiaoyong Li |
IIHMSP-2006-0985 | Geometrically Invariant Watermark Using Fast Correlation Attacks | dan wang |
IIHMSP-2006-1004 | Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks | Michael Gulbis |
IIHMSP-2006-1007 | An Image Hiding Scheme Based on Du’s Disk Allocation Method | Chia-Chen Lin |
IIHMSP-2006-1012 | Research on Applying Java Card to Database Encryption Systems | Xiamu Niu |
IIHMSP-2006-1018 | Attacking Methods for dc components watermarking based on DCT | Pei-Wei Tsai |
IIHMSP-2006-1036 | VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition | Wai-Chi Fang |
IIHMSP-2006-1039 | System-on-Chip Architecture Design for Intelligent Sensor Networks | Wai-Chi Fang |
IIHMSP-2006-1044 | Low-Power Radio Design for Smart Sensor Networks | Wai-Chi Fang |
IIHMSP-2006-1056 | Design of Two-dimensional Recursive Filters by Using Quantum-behaved Particle Swarm Optimization | Fang Wei |
IIHMSP-2006-1059 | VS-ISA: A Video Specific Instruction Set Architecture for ASIP design | Zheng Shen |
IIHMSP-2006-1063 | Analysis and Problems on Fuzzy Vault Scheme | Xiamu Niu |
IIHMSP-2006-1066 | Improved Detection of Grayscale LSB Matching Steganogrpahy | Qingzhong Liu |