Accepted Papers in Workshops and Invited Sessions of
IIHMSP-2008
IIHMSP-2008-WS01-001
Challenges
of Location Tracking Techniques in Wireless Forensics
Emmanuel Velasco, Weifeng Chen, Ping Ji, and Raymond Hsieh
IIHMSP-2008-WS01-002
Copyright
Protection in Wireless Sensor Networks by Watermarking
Rong Xiao, Xingming Sun, and Ying Yang
IIHMSP-2008-WS01-003
File-Update
Based Steganography for Microsoft PowerPoint Files
Yongping Liu, Xingming Sun, Yuling Liu, and Rong Xiao
IIHMSP-2008-WS01-004
Random
Index Modulation based Fragile Watermarking Scheme for Authenticating Colour Images
Chang-Tsun Li and Yue Li
IIHMSP-2008-WS01-005
A Steganography Scheme in P2P Network
Zishuai Li, Xingming Sun, Xiaoliang Wang, and Baowei Wang
IIHMSP-2008-IS01-001
A Scalable Power
Efficient Wireless Audio Streaming Mechanism for Portable Devices
Chung-Ping Young, Bao Rong Chang, Wen-Jie Wu, and Wen-Yu Su
IIHMSP-2008-IS01-002
Building an Online Game-based
Learning System for Elementary School
Yuh-Ming Cheng and Peng-Fei
Chen
IIHMSP-2008-IS01-003
The Study of Balance
Traffic Load with Genetic Algorithm for PON
Chun-Ting Huang
IIHMSP-2008-IS01-004
A Hybrid Fast Approach to
Secure Group-oriented Management of Key Trees on Internet
Mong-Fong Horng, Chien-Ming
You, Yau-Hwang Kuo, and
Yu-Cheng Lin
IIHMSP-2008-IS03-001
A Logistic
Regression Approach to Mammogram Retrieval
Chia-Hung Wei, Chang-Tsun Li, Yue Li, and Chih-Yuan Chang
IIHMSP-2008-IS03-002
Shape
Feature Extraction Using Fourier Descriptors with Brightness in Content-based
Medical Image Retrieval
Gang Zhang, Z.M. Ma, Qiang Tong, Ying He, and Tienan Zhao
IIHMSP-2008-IS04-001
Performance
Framework for P2P Overlay Network
Takuo Nakashima, Akari Ono, and Toshinori Sueyoshi
IIHMSP-2008-IS04-002
Queueing Property for Different Type of Self-similar Traffics
Takuo Nakashima, Yusuke Shomura, and Toshinori Sueyoshi
IIHMSP-2008-IS04-003
An
Animation Engine with the Cubic Spline Interpolation
Ningping Sun, Toru Ayabe, and Kentarou Okumura
IIHMSP-2008-IS04-004
An Approach to Speech Driven Animation
Ningping Sun, Kaori Suigetu, and Toru Ayabe
IIHMSP-2008-IS05-001
A
Proposal of Falsification Detection System in Structural Design
Kenshi Uematsu and Ryoichi Sasaki
IIHMSP-2008-IS05-002
Fingerprinting
Traffic Log
Katsunari Yoshioka and Tsutomu Matsumoto
IIHMSP-2008-IS05-003
Expiration-Dated
Watermarking
Maki Yoshida and Toru Fujiwara
IIHMSP-2008-IS05-004
Lossless
Data Hiding Using Bit-depth Embedding for JPEG2000 Compressed Bit-stream
Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, and Hideki Noda
IIHMSP-2008-IS05-005
Performance
Improvement of JPEG2000 Steganography Using QIM
Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, and Michiharu Niimi
IIHMSP-2008-IS05-006
Picture Watermarks Surviving General Affine Transformation and Random Distortion
Yusuke Atomori, Isao Echizen, and Hiroshi Yoshiura
IIHMSP-2008-IS05-007
Information
Hiding Method utilizing Low Visible Natural Fiber Pattern for Printed Document
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, and Seiichiro Hangai
IIHMSP-2008-IS05-008
Information
Hiding Technique using Simple Dot Pattern of High Density for Printed Document
Kitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, and Seiichiro Hangai
IIHMSP-2008-IS05-009
Development
of Benchmark Tool for Digital Watermarking
Kosuke Kamiya, Takuma Mori, and Keiichi Iwamura
IIHMSP-2008-IS05-010
Design
and Implementation of Synchronized Audio-to-audio Steganography
Scheme
Xuping Huang, Ryota Kawashima, Norihisa Segawa, and Yoshihiko Abe
IIHMSP-2008-IS06-001
Symbian Forensics: An Overview
Antonio Savoldi and Paolo Gubian
IIHMSP-2008-IS06-002
Measure
of Integrity Leakage in Live Forensic Context
Lei Pan, Antonio Savoldi, and Paolo Gubian
IIHMSP-2008-IS06-003
Methodologies
for Detecting Covert Database
Keun Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung Soo Lim, Seok Hee Lee, and Sang Jin Lee
IIHMSP-2008-IS06-004
Design
and Implementation of a Tool for System Restore Point Analysis
Sun-Mi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, and Sangjin Lee
IIHMSP-2008-IS06-005
Design
and Implementation of a Tool for Detecting Accounting Frauds
Yeog Kim, Antonio Savoldi, Paolo Gubian, Hyewon Lee, Sunmi Yun, Jaemin Choi, Sangjin Lee and Jongin Lim
IIHMSP-2008-IS07-001
Skin
Detection by Using Edge Consistency
Jiann-Shu Lee and Kai-Yang Hwang
IIHMSP-2008-IS07-002
Face
Recognition Based on Gabor Features and Two-Dimensional PCA
Yi-Chun Lee and Chin-Hsing Chen
IIHMSP-2008-IS07-003
Hand Detections
Based on Invariant Skin-Color Models Constructed Using Linear and Nonlinear Color
Spaces
Cheung-Wen Chang and Yung-Nien Sun
IIHMSP-2008-IS07-004
Knapsack
Model for Pixel Based Skin Detection
Sajad Shirali-Shahreza, Hamid Beigy, and M. Hassan Shirali-Shahreza
IIHMSP-2008-IS07-005
Face
Localization in Cluttered Background
Jing-Wein Wang
IIHMSP-2008-IS07-006
Interactive
3D Virtual Elevator with Webcam-based Gesture Recognition
Shei-Hsi Chang, Chang-Lin Chuang, Chen-Lan Yen, Kuo-Hsien Lu, Ming-Hsuan Li, Chu-Chuan Huang, Duan-Li Liao, and Jia-Chang Li
IIHMSP-2008-IS08-001
Data Hiding for Audio Signals that are Robust with
respect to Air Transmission and a Speech Codec
Akira Nishimura
IIHMSP-2008-IS08-002
Steganography in Silence Intervals of Speech
Sajad
Shirali-Shahreza and Mohammad Shirali-Shahreza
IIHMSP-2008-IS08-003
A Technique of Lossless Steganography for G.711
Telephony Speech
Naofumi Aoki
IIHMSP-2008-IS08-004
Packet Loss Concealment for MDCT-based Audio Codec
using Correlation-based Side Information
Akinori Ito,
Kiyoshi Konno, Shozo Makino, and Motoyuki Suzuki
IIHMSP-2008-IS08-005
Audio Watermarking Method based on the Cochlear Delay
Characteristics
Masashi Unoki and
Daiki Hamada
IIHMSP-2008-IS08-006
Content-based Authentication Watermarking with
Improved Audio Content Feature Extraction
Michael Gulbis,
Erika Muller, and Martin Steinbach
IIHMSP-2008-IS08-007
A Digital Watermark for Stereo Audio Signals Using
Variable Interchannel Delay in High Frequency Bands
Kazuhiro Kondo
and Kiyoshi Nakagawa
IIHMSP-2008-IS08-008
On the Accuracy of Estimated Synchronization
Positions for Audio Digital Watermarks using the Modified Patchwork Algorithm
on Analog Channels
Koudai Hiratsuka,
Kazuhiro Kondo, and Kiyoshi Nakagawa
IIHMSP-2008-IS09-001
Generalized
Bilinear Interpolation of Motion Vectors for Quad-Tree Mesh
Chih-Cheng Wei and Chin-Hsing Chen
IIHMSP-2008-IS09-002
Robust
Superresolution Reconstruction from Compressed Video
Sequences with Occlusion
Hsi-Kuan Chen, Chin-Hsing Chen, and Shih-Jen Wang
IIHMSP-2008-IS09-003
An
Adaptive Image Frequency Subbanding Method by
Estimation for High-Frequency Pixels
Chao-Yu Chen, Chao-Ho (Thou-Ho) Chen, Tien-Hsiang Huang, and Chin-Hsing Chen
IIHMSP-2008-IS09-004
Video
Stabilization by Feature-Block Motion Estimation
Chao-Ho (Thou-Ho) Chen, Che-Wei Hsu, and Chin-Hsing Chen
IIHMSP-2008-IS09-005
A
Novel Efficient VLSI Architecture of 2-D Discrete Wavelet Transform
Tsung-Han Tsai, Chin-Fa Hsieh, and Che-Wei Chang
IIHMSP-2008-IS09-006
Low
Power Adders Design for Portable Video Terminal
Chien-Hung Lin, Shu-Chung Yi, and Jin-Jia Chen
IIHMSP-2008-IS09-007
People
Counting System for Getting In/Out of a Bus Based on Image Processing
Chao-Ho (Thou-Ho) Chen, Yin-Chan Chang, and Tsong-Yi Chen
IIHMSP-2008-IS09-008
Ship-Flow
Analysis and Counting System Based on Image Processing
Tsong-Yi Chen, Chao-Ho (Thou-Ho) Chen, Wen-Sheng
Chen, Yin-Chan Chang, and Da-Jinn Wang
IIHMSP-2008-IS09-009
H.264
Video Authentication Based on Semi-Fragile Watermarking
Tsong-Yi Chen, Chao-Ho (Thou-Ho) Chen, Yin-Ting Lin, Yin-Chan Chang, and Da-Jinn Wang
IIHMSP-2008-IS10-001
A
H.264 based Joint Source Channel Coding Scheme over Wireless Channels
Xuejuan Gao, Li Zhuo, Suyu Wang, and Lansun Shen
IIHMSP-2008-IS10-002
A Delivery
System for Scalable Video Streaming Using the Scalability Extension of
H.264/AVC over DiffServ Networks
Lishui Chen and Guizhong Liu
IIHMSP-2008-IS10-003
GM/LM
based Error Concealment for MPEG-4 Video Transmission over High Lossy and Noisy Networks
Xueming Qian and Guizhong Liu
IIHMSP-2008-IS10-004
A Refined
Algorithm for the Side Information in DVC
Ying Feng, Chengke Wu, Song Xiao, and Rui Song
IIHMSP-2008-IS10-005
An
Approach to Side Information Estimation Based on Universal Prediction and
Motion Compensated Temporal Interpolation
Yangli
IIHMSP-2008-IS11-001
Face Recognition
Using Separate Layers of the RGB Image
Patrick Bours and Kirsi Helkala
IIHMSP-2008-IS11-002
Biometric
Fusion Using Enhanced SVM Classification
Menrit S. Fahmy, Amir F. Atiya, and Raafat S. Elfouly
IIHMSP-2008-IS11-003
Common
Interface for Connecting of Low Profile Biometric Modules
Raul Sanchez-Reillo, L. Mengibar-Pozo, M. G. Lorenz, and R. Alonso-Moreno
IIHMSP-2008-IS11-004
Visible-Spectrum
Biometric Retina Recognition
Halvor Borgen, Patrick Bours, and Stephen D. Wolthusen
IIHMSP-2008-IS11-005
Pseudo
Identities Based on Fingerprint Characteristics
Nicolas Delvaux, P. Lindeberg, J. Breebaart, E. Kindt, C. Busch, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos
IIHMSP-2008-IS11-006
Fuzzy
Vault for 3D Face Recognition
Thomas Franssen, Xuebing Zhou, and Christoph Busch
IIHMSP-2008-IS11-007
Experiments
with Skin Resistance and Temperature for Liveness
Detection
Martin Drahansky
IIHMSP-2008-IS11-008
Arm
Swing as a Weak Biometric for Unobtrusive User Authentication
Davrondzhon Gafurov and Einar Snekkenes
IIHMSP-2008-IS11-009
Body,
Biometrics and Identity
Emilio Mordini
IIHMSP-2008-IS12-001
Steganalysis Based on Co-occurrence Matrix of Differential Image
Ziwen Sun, Chao Guan, and Zhiping Zhou
IIHMSP-2008-IS12-002
A New
Iris Recognition Method Based on Gabor Wavelet Neural Network
Zhiping Zhou, Quanxing Lv, and Ziwen Sun
IIHMSP-2008-IS12-003
Document
Watermarking Robust to Copying
Bin Luo and Li Li
IIHMSP-2008-IS12-004
A
Robust Double Watermarking 3D Mesh Model Based on Feature
Xiaoqing Feng, Li Li, Zhigen Pan, Shusen Sun, and Daxing Zhang
IIHMSP-2008-IS12-005
Robust
Remote Authentication for Scalable Web-based Services
Jianbin Li, Kwok-Yan Lam, Hong-Wei Sun, and Siu-Leung Chung
IIHMSP-2008-IS12-006
Reversible
Data Embedding Using the Sliding Window
Chin-Feng Lee and Hsing-Ling Chen
IIHMSP-2008-IS12-007
A Blind
Associative Watermark Detection Scheme Using Self-embedding Technique
Chin-Feng Lee and Huai-En Lee
IIHMSP-2008-IS12-008
Software
Integration for Applications with Audio Stream
Jim-Min Lin, Wen-Gung Cheng, and Guo-Ming Fang
IIHMSP-2008-IS12-009
Hiding
Data in VQ-compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree
Chin-Feng Lee, Chin-Chen Chang, and Kuo-Hua Wang
IIHMSP-2008-IS12-010
An
Effective Demosaicking and Zooming Algorithm for CFA
Images
Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, and Chin-Chen Chang
IIHMSP-2008-IS13-001
The Distortion Control Method of
Reversible Contrast Mapping Hiding Scheme
Tzu-Chuen Lu
and Ying-Hsuan Huang
IIHMSP-2008-IS13-002
A Robust Watermarking Algorithm Based
on Salient Image Features
Yuan-Liang Tang and Chih-Peng
Wang
IIHMSP-2008-IS13-003
Efficient Vector Quantization Codebook
Generation Based on Histogram Thresholding Algorithm
Chang-Chin Huang, Du-Shiau Tsai and Gwoboa Horng
IIHMSP-2008-IS13-004
Secret Sharing Systems with
Authentication-based Steganography
Shiuh-Jeng
Wang, I-Shuan Lin, Ye-Lin Hsieh, and Chi-Yao Weng
IIHMSP-2008-IS13-005
An Effective Demosaicking
and Zooming Algorithm for CFA Images
Chin-Feng
Lee, Pei-Yan Pai, Wen-Hung
Huang, and Chin-Chen Chang
IIHMSP-2008-IS13-006
A Digital Watermarking Based on
Interpolating Polynomials
Chao-Wen Chan
and Chin-Chen Chang
IIHMSP-2008-IS13-007
Hiding Data in VQ-compressed Images
Using Pairwise Nearest Codewords
Based on Minimum Spanning Tree
Chin-Feng
Lee, Chin-Chen Chang and Kuo-Hua Wang
IIHMSP-2008-IS13-008
An Image Authentication Scheme for
Halftone Images Based upon Error Diffusion
Jun-Chou Chuang and Chin-Chen Chang
IIHMSP-2008-IS13-009
Twice Grid Colorings in Steganography
Weiming Zhang, Xinpeng
Zhang, Shuozhong Wang
IIHSMP-2008-IS13-010
A New Probabilistic Visual Secret Sharing Scheme for Color Images
Chin-Chen Chang, Chia-Chen
Lin, T. Hoang Ngan Le, and Hoai
Bac Le
IIHMSP-2008-IS14-001
IWT-based
Watermarking by Adaptive Bit-labeling Scheme
Ching-Yu Yang, Wei-Ying Hwang, and Ya-Fen Cheng
IIHMSP-2008-IS14-002
Use
of Quotient-embedding Scheme with Smart Arrangement to Hide Gray-scale Data
Ching-Yu Yang and Chen-Yuan Lai
IIHMSP-2008-IS14-003
A
Data Hiding Method with Capabilities for Information Authentication and Face
Image Recovery in e-Commerce
Da-Chun Wu and Jiun-Sheng Li
IIHMSP-2008-IS14-004
Enhance
the Image Sharing with Steganography and Authentication
Chia-Chun Wu, Shang-Juh Kao, Min-Shiang Hwang, and Wen-Chung Kuo
IIHMSP-2008-IS14-005
Multi-Purpose
Image Watermarking Method Based on Wavelet Transform
Chih-Hung Lin and Sheng-Lung Chien
IIHMSP-2008-IS14-006
Multipurpose
Image Authentication Method based on Vector Quantization
Chih-Hung Lin and Hsiao-Fen Chien
IIHSMP-2008-IS15-001
An
Efficient Data Placement Scheme for Peer-to-Peer Video Streaming Over
Wireless-Mesh Community Networks
Jen-Wen Ding, Wan-Ting Wang, and Chu-Fu Wan
IIHMSP-2008-IS16-001
Assigning
Keys in a Hierarchy
Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, and Tzung-Her Chen
IIHMSP-2008-IS16-002
A Novel Digital Signature Scheme for Application of Document Review in a
Linearly Hierarchical Organization
Iuon-Chang Lin and Chin-Chen Chang
IIHMSP-2008-IS16-003
An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows
from Distributed DoS Attacks
Chu-Hsing Lin, Jung-Chun Liu, and Chien-Ting Kuo
IIHMSP-2008-IS16-004
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve
for Wireless Mobile Networks
Chin-Chen Chang and Shih-Chang Chang
IIHMSP-2008-IS16-005
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application
in Information Protection Systems
Jen-Ho Yang and Chin-Chen Chang
IIHMSP-2008-IS16-006
An Iris Cryptosystem for Information Security
Xiangqian Wu, Ning Qi, Kuanquan Wang, and David Zhang
IIHMSP-2008-IS16-007
An Efficient Proxy Signature for Realizing Generalized Proxy Signature Policy
Iuon-Chang Lin, Chin-Chen Chang, and Jen-Ho Yang
IIHMSP-2008-IS16-008
An Efficient Non-repudiation Mechanism for SIP-based Services
Ming-Way Huang, Wei-Bin Lee, and Hsing-Bai Chen
IIHMSP-2008-IS16-009
Preserving
PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques
Jing Li, Jung-San Lee, and Chin-Chen Chang
IIHMSP-2008-IS17-001
Face
Detection with Automatic White Balance for Digital Still Camera
Yuan-Kai Wang and Jing-Fa Wang
IIHMSP-2008-IS17-002
Human
Action Recognition Using Star Templates and Delaunay Triangulation
Chi-Hung Chuang, Jun-Wei Hsieh, Luo-Wei Tsai, and Kuo-Chin Fan
IIHMSP-2008-IS17-003
Iris
recognition on Matching Pursuit
Yueh-Shiun Lee, Jinn Ho, Wen-Liang Hwang, and Chung-Lin Huang
IIHMSP-2008-IS17-004
Real-Time
Spatiotemporal Video Analysis with Application to People Counting
Duan-Yu Chen and Mark Hong-Yuan Liao
IIHMSP-2008-IS17-005
Digital
Image Forgery Detection Based on the Consistency of Defocus Blur
Xin Wang, Bo Xuan, and Silong Peng
IIHMSP-2008-IS18-001
Robust
Face Recognition Based on Modified
Xian-Hua Han, Yen-Wei Chen, Hideto Fujita, and Akihiko Yamada
IIHMSP-2008-IS18-002
Gaze
Tracking by Binocular Vision Technology and PPBTF Features
Huchuan Lu, Chao Wang, and Yen-wei Chen
IIHMSP-2008-IS18-003
Region-based
Image Segmentation and Auto Annotation for Color Images
Yohei Tsurugai, Yuuta Iwasaki, Xian-hua Han, and Yen-Wei Chen
IIHMSP-2008-IS18-004
Classification
of Brain Matters in MRI by Kernel Independent Component Analysis
Tomoko Tateyama, Zensho Nakao, and Yen-Wei Chen
IIHMSP-2008-IS18-005
Enhancement
and Detection of Lung Nodules with Multiscale Filters
in CT Images
Shingo Takemura, Yen-Wei Chen, Katsuhiro Ito, Masahiro Ito, and Ikuko Nishikawa
IIHMSP-2008-IS18-006
Intractive System of Artificial
Hisashi Kawabayashi and Yen-Wei Chen
IIHMSP-2008-IS18-007
Segmentation
of High-Resolution Satellite Images and Its application to GIS Construction
Yen-Wei Chen and Xian-hua Han
IIHMSP-2008-IS19-001
Multiview Video Service Framework for 3D
Junsup Kwon, Manbae Kim, and Changyeol Choi
IIHMSP-2008-IS19-002
An
Object Removal Using Multiview Sequence Completion
Soon-Young Lee, Jun-Hee Heu, Chang-Su Kim, and Sang-Uk Lee
IIHMSP-2008-IS19-003
Challenges
and Realization of Real-Time Multi-View Video over IP Systems
Jongryool Kim, Koh Choi, Changhyeok Bae, and JongWon Kim
IIHMSP-2008-IS19-004
Efficient
Prediction Structure for 2-D Wide Multi-View Video Sequence
Taeyoung Chung, Kwanwoong Song, and Chang-Su Kim
IIHMSP-2008-IS19-005
A
Motion Vector Prediction Method for Multi-View Video Coding
Sang Heon Lee, Jeong Hyu Yang, Sang Hwa Lee, and
IIHMSP-2008-IS19-006
Segment-Based
Foreground Object Disparity Estimation using Zcam and
Multiple-View Stereo
Taehoon Kim, Kyoung Mu Lee, and Sang
IIHMSP-2008-IS20-001
A
Robust Image Watermarking Scheme Based-on the relationship of SVD
Xiangyang Sun, Ju Liu, and Jiande Sun
IIHMSP-2008-IS20-002
Variational Bayesian Inference for Diffusion Driven Image Restoration
Hong-Wei Zheng and Dietmar Saupe
IIHMSP-2008-IS20-003
Intelligent
Watermark Recovery using Spatial Domain Extension