Accepted Papers in Workshops and Invited Sessions of IIHMSP-2008

 

 

IIHMSP-2008-WS01-001

Challenges of Location Tracking Techniques in Wireless Forensics

Emmanuel Velasco, Weifeng Chen, Ping Ji, and Raymond Hsieh

 

IIHMSP-2008-WS01-002

Copyright Protection in Wireless Sensor Networks by Watermarking

Rong Xiao, Xingming Sun, and Ying Yang

 

IIHMSP-2008-WS01-003

File-Update Based Steganography for Microsoft PowerPoint Files

Yongping Liu, Xingming Sun, Yuling Liu, and Rong Xiao

 

IIHMSP-2008-WS01-004

Random Index Modulation based Fragile Watermarking Scheme for Authenticating Colour Images

Chang-Tsun Li and Yue Li

 

IIHMSP-2008-WS01-005

A Steganography Scheme in P2P Network

Zishuai Li, Xingming Sun, Xiaoliang Wang, and Baowei Wang

 

IIHMSP-2008-IS01-001

A Scalable Power Efficient Wireless Audio Streaming Mechanism for Portable Devices

Chung-Ping Young, Bao Rong Chang, Wen-Jie Wu, and Wen-Yu Su

 

IIHMSP-2008-IS01-002

Building an Online Game-based Learning System for Elementary School

Yuh-Ming Cheng and Peng-Fei Chen

 

IIHMSP-2008-IS01-003

The Study of Balance Traffic Load with Genetic Algorithm for PON

Chun-Ting Huang

 

IIHMSP-2008-IS01-004

A Hybrid Fast Approach to Secure Group-oriented Management of Key Trees on Internet

Mong-Fong Horng, Chien-Ming You, Yau-Hwang Kuo, and Yu-Cheng Lin

 

IIHMSP-2008-IS03-001

A Logistic Regression Approach to Mammogram Retrieval

Chia-Hung Wei, Chang-Tsun Li, Yue Li, and Chih-Yuan Chang

 

IIHMSP-2008-IS03-002

Shape Feature Extraction Using Fourier Descriptors with Brightness in Content-based Medical Image Retrieval

Gang Zhang, Z.M. Ma, Qiang Tong, Ying He, and Tienan Zhao

 

IIHMSP-2008-IS04-001

Performance Framework for P2P Overlay Network

Takuo Nakashima, Akari Ono, and Toshinori Sueyoshi

 

IIHMSP-2008-IS04-002

Queueing Property for Different Type of Self-similar Traffics

Takuo Nakashima, Yusuke Shomura, and Toshinori Sueyoshi

 

IIHMSP-2008-IS04-003

An Animation Engine with the Cubic Spline Interpolation

Ningping Sun, Toru Ayabe, and Kentarou Okumura

 

IIHMSP-2008-IS04-004

An Approach to Speech Driven Animation

Ningping Sun, Kaori Suigetu, and Toru Ayabe

 

IIHMSP-2008-IS05-001

A Proposal of Falsification Detection System in Structural Design

Kenshi Uematsu and Ryoichi Sasaki

 

IIHMSP-2008-IS05-002

Fingerprinting Traffic Log

Katsunari Yoshioka and Tsutomu Matsumoto

 

IIHMSP-2008-IS05-003

Expiration-Dated Watermarking

Maki Yoshida and Toru Fujiwara

 

IIHMSP-2008-IS05-004

Lossless Data Hiding Using Bit-depth Embedding for JPEG2000 Compressed Bit-stream

Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, and Hideki Noda

 

IIHMSP-2008-IS05-005

Performance Improvement of JPEG2000 Steganography Using QIM

Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, and Michiharu Niimi

 

IIHMSP-2008-IS05-006

Picture Watermarks Surviving General Affine Transformation and Random Distortion

Yusuke Atomori, Isao Echizen, and Hiroshi Yoshiura

 

IIHMSP-2008-IS05-007

Information Hiding Method utilizing Low Visible Natural Fiber Pattern for Printed Document

Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, and Seiichiro Hangai

 

IIHMSP-2008-IS05-008

Information Hiding Technique using Simple Dot Pattern of High Density for Printed Document

Kitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, and Seiichiro Hangai

 

IIHMSP-2008-IS05-009

Development of Benchmark Tool for Digital Watermarking

Kosuke Kamiya, Takuma Mori, and Keiichi Iwamura

 

IIHMSP-2008-IS05-010

Design and Implementation of Synchronized Audio-to-audio Steganography Scheme

Xuping Huang, Ryota Kawashima, Norihisa Segawa, and Yoshihiko Abe

 

IIHMSP-2008-IS06-001

Symbian Forensics: An Overview

Antonio Savoldi and Paolo Gubian

 

IIHMSP-2008-IS06-002

Measure of Integrity Leakage in Live Forensic Context

Lei Pan, Antonio Savoldi, and Paolo Gubian

 

IIHMSP-2008-IS06-003

Methodologies for Detecting Covert Database

Keun Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung Soo Lim, Seok Hee Lee, and Sang Jin Lee

 

IIHMSP-2008-IS06-004

Design and Implementation of a Tool for System Restore Point Analysis

Sun-Mi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, and Sangjin Lee

 

IIHMSP-2008-IS06-005

Design and Implementation of a Tool for Detecting Accounting Frauds

Yeog Kim, Antonio Savoldi, Paolo Gubian, Hyewon Lee, Sunmi Yun, Jaemin Choi, Sangjin Lee and Jongin Lim

 

IIHMSP-2008-IS07-001

Skin Detection by Using Edge Consistency

Jiann-Shu Lee and Kai-Yang Hwang

 

IIHMSP-2008-IS07-002

Face Recognition Based on Gabor Features and Two-Dimensional PCA

Yi-Chun Lee and Chin-Hsing Chen

 

IIHMSP-2008-IS07-003

Hand Detections Based on Invariant Skin-Color Models Constructed Using Linear and Nonlinear Color Spaces

Cheung-Wen Chang and Yung-Nien Sun

 

IIHMSP-2008-IS07-004

Knapsack Model for Pixel Based Skin Detection

Sajad Shirali-Shahreza, Hamid Beigy, and M. Hassan Shirali-Shahreza

 

IIHMSP-2008-IS07-005

Face Localization in Cluttered Background

Jing-Wein Wang

 

IIHMSP-2008-IS07-006

Interactive 3D Virtual Elevator with Webcam-based Gesture Recognition

Shei-Hsi Chang, Chang-Lin Chuang, Chen-Lan Yen, Kuo-Hsien Lu, Ming-Hsuan Li, Chu-Chuan Huang, Duan-Li Liao, and Jia-Chang Li

 

IIHMSP-2008-IS08-001

Data Hiding for Audio Signals that are Robust with respect to Air Transmission and a Speech Codec

Akira Nishimura

 

IIHMSP-2008-IS08-002

Steganography in Silence Intervals of Speech

Sajad Shirali-Shahreza and Mohammad Shirali-Shahreza

 

IIHMSP-2008-IS08-003

A Technique of Lossless Steganography for G.711 Telephony Speech

Naofumi Aoki

 

IIHMSP-2008-IS08-004

Packet Loss Concealment for MDCT-based Audio Codec using Correlation-based Side Information

Akinori Ito, Kiyoshi Konno, Shozo Makino, and Motoyuki Suzuki

 

IIHMSP-2008-IS08-005

Audio Watermarking Method based on the Cochlear Delay Characteristics

Masashi Unoki and Daiki Hamada

 

IIHMSP-2008-IS08-006

Content-based Authentication Watermarking with Improved Audio Content Feature Extraction

Michael Gulbis, Erika Muller, and Martin Steinbach

 

IIHMSP-2008-IS08-007

A Digital Watermark for Stereo Audio Signals Using Variable Interchannel Delay in High Frequency Bands

Kazuhiro Kondo and Kiyoshi Nakagawa

 

IIHMSP-2008-IS08-008

On the Accuracy of Estimated Synchronization Positions for Audio Digital Watermarks using the Modified Patchwork Algorithm on Analog Channels

Koudai Hiratsuka, Kazuhiro Kondo, and Kiyoshi Nakagawa

 

IIHMSP-2008-IS09-001

Generalized Bilinear Interpolation of Motion Vectors for Quad-Tree Mesh

Chih-Cheng Wei and Chin-Hsing Chen

 

IIHMSP-2008-IS09-002

Robust Superresolution Reconstruction from Compressed Video Sequences with Occlusion

Hsi-Kuan Chen, Chin-Hsing Chen, and Shih-Jen Wang

 

IIHMSP-2008-IS09-003

An Adaptive Image Frequency Subbanding Method by Estimation for High-Frequency Pixels

Chao-Yu Chen, Chao-Ho (Thou-Ho) Chen, Tien-Hsiang Huang, and Chin-Hsing Chen

 

IIHMSP-2008-IS09-004

Video Stabilization by Feature-Block Motion Estimation

Chao-Ho (Thou-Ho) Chen, Che-Wei Hsu, and Chin-Hsing Chen

 

IIHMSP-2008-IS09-005

A Novel Efficient VLSI Architecture of 2-D Discrete Wavelet Transform

Tsung-Han Tsai, Chin-Fa Hsieh, and Che-Wei Chang

 

IIHMSP-2008-IS09-006

Low Power Adders Design for Portable Video Terminal

Chien-Hung Lin, Shu-Chung Yi, and Jin-Jia Chen

 

IIHMSP-2008-IS09-007

People Counting System for Getting In/Out of a Bus Based on Image Processing

Chao-Ho (Thou-Ho) Chen, Yin-Chan Chang, and Tsong-Yi Chen

 

IIHMSP-2008-IS09-008

Ship-Flow Analysis and Counting System Based on Image Processing

Tsong-Yi Chen, Chao-Ho (Thou-Ho) Chen, Wen-Sheng Chen, Yin-Chan Chang, and Da-Jinn Wang

 

IIHMSP-2008-IS09-009

H.264 Video Authentication Based on Semi-Fragile Watermarking

Tsong-Yi Chen, Chao-Ho (Thou-Ho) Chen, Yin-Ting Lin, Yin-Chan Chang, and Da-Jinn Wang

 

IIHMSP-2008-IS10-001

A H.264 based Joint Source Channel Coding Scheme over Wireless Channels

Xuejuan Gao, Li Zhuo, Suyu Wang, and Lansun Shen

 

IIHMSP-2008-IS10-002

A Delivery System for Scalable Video Streaming Using the Scalability Extension of H.264/AVC over DiffServ Networks

Lishui Chen and Guizhong Liu

 

IIHMSP-2008-IS10-003

GM/LM based Error Concealment for MPEG-4 Video Transmission over High Lossy and Noisy Networks

Xueming Qian and Guizhong Liu

 

IIHMSP-2008-IS10-004

A Refined Algorithm for the Side Information in DVC

Ying Feng, Chengke Wu, Song Xiao, and Rui Song

 

IIHMSP-2008-IS10-005

An Approach to Side Information Estimation Based on Universal Prediction and Motion Compensated Temporal Interpolation

Yangli Wang, Jechang Jeong, Chengke Wu, Song Xiao, and Min Zhou

 

IIHMSP-2008-IS11-001

Face Recognition Using Separate Layers of the RGB Image

Patrick Bours and Kirsi Helkala

 

IIHMSP-2008-IS11-002

Biometric Fusion Using Enhanced SVM Classification

Menrit S. Fahmy, Amir F. Atiya, and Raafat S. Elfouly

 

IIHMSP-2008-IS11-003

Common Interface for Connecting of Low Profile Biometric Modules

Raul Sanchez-Reillo, L. Mengibar-Pozo, M. G. Lorenz, and R. Alonso-Moreno

 

IIHMSP-2008-IS11-004

Visible-Spectrum Biometric Retina Recognition

Halvor Borgen, Patrick Bours, and Stephen D. Wolthusen

 

IIHMSP-2008-IS11-005

Pseudo Identities Based on Fingerprint Characteristics

Nicolas Delvaux, P. Lindeberg, J. Breebaart, E. Kindt, C. Busch, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos

 

IIHMSP-2008-IS11-006

Fuzzy Vault for 3D Face Recognition

Thomas Franssen, Xuebing Zhou, and Christoph Busch

 

IIHMSP-2008-IS11-007

Experiments with Skin Resistance and Temperature for Liveness Detection

Martin Drahansky

 

IIHMSP-2008-IS11-008

Arm Swing as a Weak Biometric for Unobtrusive User Authentication

Davrondzhon Gafurov and Einar Snekkenes

 

IIHMSP-2008-IS11-009

Body, Biometrics and Identity

Emilio Mordini

 

IIHMSP-2008-IS12-001

Steganalysis Based on Co-occurrence Matrix of Differential Image

Ziwen Sun, Chao Guan, and Zhiping Zhou

 

IIHMSP-2008-IS12-002

A New Iris Recognition Method Based on Gabor Wavelet Neural Network

Zhiping Zhou, Quanxing Lv, and Ziwen Sun

 

IIHMSP-2008-IS12-003

Document Watermarking Robust to Copying

Bin Luo and Li Li

 

IIHMSP-2008-IS12-004

A Robust Double Watermarking 3D Mesh Model Based on Feature

Xiaoqing Feng, Li Li, Zhigen Pan, Shusen Sun, and Daxing Zhang

 

IIHMSP-2008-IS12-005

Robust Remote Authentication for Scalable Web-based Services

Jianbin Li, Kwok-Yan Lam, Hong-Wei Sun, and Siu-Leung Chung

 

IIHMSP-2008-IS12-006

Reversible Data Embedding Using the Sliding Window

Chin-Feng Lee and Hsing-Ling Chen

 

IIHMSP-2008-IS12-007

A Blind Associative Watermark Detection Scheme Using Self-embedding Technique

Chin-Feng Lee and Huai-En Lee

 

IIHMSP-2008-IS12-008

Software Integration for Applications with Audio Stream

Jim-Min Lin, Wen-Gung Cheng, and Guo-Ming Fang

 

IIHMSP-2008-IS12-009

Hiding Data in VQ-compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree

Chin-Feng Lee, Chin-Chen Chang, and Kuo-Hua Wang

 

IIHMSP-2008-IS12-010

An Effective Demosaicking and Zooming Algorithm for CFA Images

Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, and Chin-Chen Chang

 

IIHMSP-2008-IS13-001

The Distortion Control Method of Reversible Contrast Mapping Hiding Scheme

Tzu-Chuen Lu and Ying-Hsuan Huang

 

IIHMSP-2008-IS13-002

A Robust Watermarking Algorithm Based on Salient Image Features

Yuan-Liang Tang and Chih-Peng Wang

 

IIHMSP-2008-IS13-003

Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding Algorithm

Chang-Chin Huang, Du-Shiau Tsai and Gwoboa Horng

 

IIHMSP-2008-IS13-004

Secret Sharing Systems with Authentication-based Steganography

Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, and Chi-Yao Weng

 

IIHMSP-2008-IS13-005

An Effective Demosaicking and Zooming Algorithm for CFA Images

Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, and Chin-Chen Chang

 

IIHMSP-2008-IS13-006

A Digital Watermarking Based on Interpolating Polynomials

Chao-Wen Chan and Chin-Chen Chang

 

IIHMSP-2008-IS13-007

Hiding Data in VQ-compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree

Chin-Feng Lee, Chin-Chen Chang and Kuo-Hua Wang

 

IIHMSP-2008-IS13-008

An Image Authentication Scheme for Halftone Images Based upon Error Diffusion

Jun-Chou Chuang and Chin-Chen Chang

 

IIHMSP-2008-IS13-009

Twice Grid Colorings in Steganography

Weiming Zhang, Xinpeng Zhang, Shuozhong Wang

 

IIHSMP-2008-IS13-010

A New Probabilistic Visual Secret Sharing Scheme for Color Images

Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, and Hoai Bac Le

 

IIHMSP-2008-IS14-001

IWT-based Watermarking by Adaptive Bit-labeling Scheme

Ching-Yu Yang, Wei-Ying Hwang, and Ya-Fen Cheng

 

IIHMSP-2008-IS14-002

Use of Quotient-embedding Scheme with Smart Arrangement to Hide Gray-scale Data

Ching-Yu Yang and Chen-Yuan Lai

 

IIHMSP-2008-IS14-003

A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in e-Commerce

Da-Chun Wu and Jiun-Sheng Li

 

IIHMSP-2008-IS14-004

Enhance the Image Sharing with Steganography and Authentication

Chia-Chun Wu, Shang-Juh Kao, Min-Shiang Hwang, and Wen-Chung Kuo

 

IIHMSP-2008-IS14-005

Multi-Purpose Image Watermarking Method Based on Wavelet Transform

Chih-Hung Lin and Sheng-Lung Chien

 

IIHMSP-2008-IS14-006

Multipurpose Image Authentication Method based on Vector Quantization

Chih-Hung Lin and Hsiao-Fen Chien

 

IIHSMP-2008-IS15-001

An Efficient Data Placement Scheme for Peer-to-Peer Video Streaming Over Wireless-Mesh Community Networks

Jen-Wen Ding, Wan-Ting Wang, and Chu-Fu Wan

 

IIHMSP-2008-IS16-001

Assigning Keys in a Hierarchy

Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, and Tzung-Her Chen

 

IIHMSP-2008-IS16-002

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization

Iuon-Chang Lin and Chin-Chen Chang

 

IIHMSP-2008-IS16-003

An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks

Chu-Hsing Lin, Jung-Chun Liu, and Chien-Ting Kuo

 

IIHMSP-2008-IS16-004

An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks

Chin-Chen Chang and Shih-Chang Chang

 

IIHMSP-2008-IS16-005

Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems

Jen-Ho Yang and Chin-Chen Chang

 

IIHMSP-2008-IS16-006

An Iris Cryptosystem for Information Security

Xiangqian Wu, Ning Qi, Kuanquan Wang, and David Zhang

 

IIHMSP-2008-IS16-007

An Efficient Proxy Signature for Realizing Generalized Proxy Signature Policy

Iuon-Chang Lin, Chin-Chen Chang, and Jen-Ho Yang

 

IIHMSP-2008-IS16-008

An Efficient Non-repudiation Mechanism for SIP-based Services

Ming-Way Huang, Wei-Bin Lee, and Hsing-Bai Chen

 

IIHMSP-2008-IS16-009

Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques

Jing Li, Jung-San Lee, and Chin-Chen Chang

 

IIHMSP-2008-IS17-001

Face Detection with Automatic White Balance for Digital Still Camera

Yuan-Kai Wang and Jing-Fa Wang

 

IIHMSP-2008-IS17-002

Human Action Recognition Using Star Templates and Delaunay Triangulation

Chi-Hung Chuang, Jun-Wei Hsieh, Luo-Wei Tsai, and Kuo-Chin Fan

 

IIHMSP-2008-IS17-003

Iris recognition on Matching Pursuit

Yueh-Shiun Lee, Jinn Ho, Wen-Liang Hwang, and Chung-Lin Huang

 

IIHMSP-2008-IS17-004

Real-Time Spatiotemporal Video Analysis with Application to People Counting

Duan-Yu Chen and Mark Hong-Yuan Liao

 

IIHMSP-2008-IS17-005

Digital Image Forgery Detection Based on the Consistency of Defocus Blur

Xin Wang, Bo Xuan, and Silong Peng

 

IIHMSP-2008-IS18-001

Robust Face Recognition Based on Modified ICA without Training Samples of Test Subjects

Xian-Hua Han, Yen-Wei Chen, Hideto Fujita, and Akihiko Yamada

 

IIHMSP-2008-IS18-002

Gaze Tracking by Binocular Vision Technology and PPBTF Features

Huchuan Lu, Chao Wang, and Yen-wei Chen

 

IIHMSP-2008-IS18-003

Region-based Image Segmentation and Auto Annotation for Color Images

Yohei Tsurugai, Yuuta Iwasaki, Xian-hua Han, and Yen-Wei Chen

 

IIHMSP-2008-IS18-004

Classification of Brain Matters in MRI by Kernel Independent Component Analysis

Tomoko Tateyama, Zensho Nakao, and Yen-Wei Chen

 

IIHMSP-2008-IS18-005

Enhancement and Detection of Lung Nodules with Multiscale Filters in CT Images

Shingo Takemura, Yen-Wei Chen, Katsuhiro Ito, Masahiro Ito, and Ikuko Nishikawa

 

IIHMSP-2008-IS18-006

Intractive System of Artificial Fish School Based on an Extended BOID Model

Hisashi Kawabayashi and Yen-Wei Chen

 

IIHMSP-2008-IS18-007

Segmentation of High-Resolution Satellite Images and Its application to GIS Construction

Yen-Wei Chen and Xian-hua Han

 

IIHMSP-2008-IS19-001

Multiview Video Service Framework for 3D Mobile Devices

Junsup Kwon, Manbae Kim, and Changyeol Choi

 

IIHMSP-2008-IS19-002

An Object Removal Using Multiview Sequence Completion

Soon-Young Lee, Jun-Hee Heu, Chang-Su Kim, and Sang-Uk Lee

 

IIHMSP-2008-IS19-003

Challenges and Realization of Real-Time Multi-View Video over IP Systems

Jongryool Kim, Koh Choi, Changhyeok Bae, and JongWon Kim

 

IIHMSP-2008-IS19-004

Efficient Prediction Structure for 2-D Wide Multi-View Video Sequence

Taeyoung Chung, Kwanwoong Song, and Chang-Su Kim

 

IIHMSP-2008-IS19-005

A Motion Vector Prediction Method for Multi-View Video Coding

Sang Heon Lee, Jeong Hyu Yang, Sang Hwa Lee, and Nam Ik Cho

 

IIHMSP-2008-IS19-006

Segment-Based Foreground Object Disparity Estimation using Zcam and Multiple-View Stereo

Taehoon Kim, Kyoung Mu Lee, and Sang Uk Lee

 

IIHMSP-2008-IS20-001

A Robust Image Watermarking Scheme Based-on the relationship of SVD

Xiangyang Sun, Ju Liu, and Jiande Sun

 

IIHMSP-2008-IS20-002

Variational Bayesian Inference for Diffusion Driven Image Restoration

Hong-Wei Zheng and Dietmar Saupe

 

IIHMSP-2008-IS20-003

Intelligent Watermark Recovery using Spatial Domain Extension

Shiraz Ahmad and Zhe-Ming Lu