Accepted Papers in Invited Sessions of
IIH-MSP-2010
IIH-MSP-2010-0027
Analysis and Research for Airplane Cockpit Sound’ICA Denoise Based on Blind Source Separation Principle
Dao-Lai Cheng, Chui-Jie Yi, Zhi-Qiang Zhang, and Hong-Yu Yao
IIH-MSP-2010-0031
An Improved Genetic FCM Clustering Algorithm
Wei Chen, Ji-Zheng Wu, Ting-Jin Lu, and Yan-Qing Zhao
IIH-MSP-2010-0034
The Research of Semi-fragile Watermarking Algorithm Based on Dynamic Segmentation
Sheng-Bing Che and Xu Shu
IIH-MSP-2010-0041
New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 Networks
Zbigniew Piotrowski, Krzysztof Sawicki, Mariusz Bednarczyk, and Piotr Gajewski
IIH-MSP-2010-0049
Robust Watermarking of H.264-encoded Video: Extension to SVC
Peter Meerwald and Andreas Uhl
IIH-MSP-2010-0055
Research on Integrated Technology of RC Active Filter Optimization
Shui-Bao1 Yu, Sheng Zhang,Xi Chen, and Ji-Shi Su
IIH-MSP-2010-0059
A Robust Digital Image Watermarking Algorithm Based on CHIRPLET Transform
Ming-Hui Deng and Xiu-Li Zhou
IIH-MSP-2010-0062
An Information–Theoretic Model for Dispersed Ordered Dithered Halftone Image Watermarking by Hilbert Curve Decomposition
Brian K. Lien
IIH-MSP-2010-0065
Mobile Services and Implementation of Digital Watermarks in Audio Files
Manabu Hirakawa and Junichi Iijima
IIH-MSP-2010-0078
Algorithms of Data Hiding in Prosodic Parameters of Speech
Marina Ponomar
IIH-MSP-2010-0084
A Digital Fingerprint Scheme Based On MPEG-2
Yi-Gang Zhou, Ling-Hui Li, and Jia Liu
IIH-MSP-2010-0090
Acceleration Axis Selection in Biometric Technique Based on Gesture Recognition
J. Guerra Casanova, C. Sanchez Avila, A. de Santos Sierra, G. Bailador del Pozo, and V. Jara Vera
IIH-MSP-2010-0095
Multi-class Relationship Extraction from Biomedical Literature using Maximum Entropy
Lin Yao, Cheng-Jie Sun, Xiao-Long Wang, and Xuan Wang
IIH-MSP-2010-0098
Two Stress Detection Schemes Based on Physiological Signals for Real-time Applications
Alberto de Santos Sierra and Carmen Sanchez Avila
IIH-MSP-2010-0101
A Modified Differential Evolution Algorithm and its Application in Thermal Process Model Identification
Chang-Liang Liu and Ming Yu
IIH-MSP-2010-0106
Pixel Intensity Based High Capacity Data Embedding Method
Mehdi Hussain and Mureed Hussain
IIH-MSP-2010-0111
A Watermarking Based Tamper Detection Solution for RFID Tags
Ali Nur Mohammad Noman, Kevin Curran, and Tom Lunney
IIH-MSP-2010-0114
A Simple and Efficient Anti-Collision Algorithm for RFID System
Chuen-Ching Wang, Te-Yuan Wang, Tien-Hao Lien, and Rong-Ming Su
IIH-MSP-2010-0117
A Novel Image Watermarking Technique using Fuzzy-BP Network
Charu Agarwal and Anurag Mishra
IIH-MSP-2010-0122
Varying Radix Numeral System based Adaptive Image Steganography
S. Geetha1, V. Kabilan, and N. Kamaraj
IIH-MSP-2010-0128
Identifying Steganographic Payload Location in Binary Image
Kang Leng Chiew and Josef Pieprzyk
IIH-MSP-2010-0136
LMI-based Criterion for the Global Asymptotic Stability of Two Dimensions State-space Digital Filters with Saturation Arithmetic
Yang Yan and Xi-Biao Cai
IIH-MSP-2010-0142
A Robust Digital Video Watermark Algorithm Based on DCT Domain
Guang-qi Liu, Xiao-Shi Zheng, Yan-Ling Zhao, and Na Li
IIH-MSP-2010-0151
Differential Histogram Modification-based Reversible Watermarking with Predicted Error Compensation
Dong-Gyu Yeo, Hae-Yeoun Lee, and Byeong Man Kim
IIH-MSP-2010-0154
A Novel Inter-frame Mode Decision Prediction Algorithm for H.264/AVC
Pengyu Liu and Kebin Jia
IIH-MSP-2010-0157
Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients
Tomoaki Matsunami, Toshihiko Yamasaki, and Kiyoharu Aizawa
IIH-MSP-2010-0160
A Fast Intra-frame Prediction Algorithm Based on the Feature of Macro-block for H.264/AVC
Pengyu Liu and Kebin Jia
IIH-MSP-2010-0170
Function Design of Multimedia Monitoring System Based on Wireless Network
Min Li and Xiao-Fan Zhao
IIH-MSP-2010-0177
Prediction of Lorenz Chaotic Time Series via Genetic Algorithm
Hanif Tahersima, Fatemeh Tahersima, and Akram Mesgari Sohani
IIH-MSP-2010-0180
A Novel Motion Estimation Search Scheme for H.264/AVC
Pengyu Liu and Kebin Jia
IIH-MSP-2010-0185
Teaching of Emotional Expression Using Finger Braille
Yasuhiro Matsuda and Tsuneshi Isomura
IIH-MSP-2010-0189
A Visually-Enhanced Approach to Watermarking 3D Models
Shinichi Nakazawa, Sho Kasahara, and Shigeo Takahashi
IIH-MSP-2010-0192
Robustness Evaluation of Digital Watermarking Based on Discrete Wavelet Transform
Kiyoharu Okagaki, Kenichi Takahashi, and Hiroaki Ueda
IIH-MSP-2010-0197
Kernel Canonical Correlation with Similarity Refinement for Automatic Image Tagging
Yanhui Xiao, Yao Zhao, and Zhenfeng Zhu
IIH-MSP-2010-0201
Secure Hybrid Spread Spectrum System for Steganography in Auditive Media
Marcus Nutzinger, Christian Fabiany, and Marion Marschalek
IIH-MSP-2010-0215
Compression of 3D Triangle Meshes Based on Predictive Vector Quantization
Zhongbao Chen, Fuliang Bao, Zhigang Fang, and Zhen Li
IIH-MSP-2010-0220
Key-Frame Extraction using Kernel-Based Locality Preserving Learning
Zhongbao Chen, Fuliang Bao, Zhigang Fang, and Zhen Li
IIH-MSP-2010-0226
Attacking Spatial Domain Stego Systems with Run Length Matrices’and Edge Statistical Features
S. Suganya and B. G. Priyadharshini
IIH-MSP-2010-0230
A New Blind Robust Image Watermarking Scheme Based on SVD-DCT Transform
Zhen Li, Zhe-Ming Lu, and Faxin Yu
IIH-MSP-2010-0236
Industrial Workflows Recognition by Computer Vision and AI Technologies
Emmanouel Sardis and Theodora Varvarigou
IIH-MSP-2010-0240
A Novel Steganographic Protocol from Error-correcting Codes
M. B. Ould Medeni and El Mamoun Souidi
IIH-MSP-2010-0244
Multiple Description Wavelet Based Image Coding with Classification
Chunyu Lin and Yao Zhao
IIH-MSP-2010-0249
Special Factor Backtracking Algorithm to Get the Optimal Solution
Li Wang and Dong Li
IIH-MSP-2010-0252
Research and Application on Android Wireless Location and Surrounding Search
Xudong Li
IIH-MSP-2010-0260
An Efficient Intrusion Detection and Prevention System against SIP Malformed Message Attacks
Hongbin Li, Hu Lin, Huichao Hou1, and Xuehua Yang
IIH-MSP-2010-0269
Impulsive Synchronization for Coupled Reaction-Diffision System and its Application in Information Hiding
Yang wanli, Zheng Suwen, and Huang Li
IIH-MSP-2010-0275
Single Band Statistics and Steganalysis Performance
Pham Hai Dang Le and Matthias Otto Franz
IIH-MSP-2010-0284
Detecting Sustained Attention during Cognitive Work using Heart Rate Variability
Cho-Yan Chen, Chi-Jen Wang, E-Liang Chen, Chi-Keng Wu, Yen-Kuang Yang, Jeen-Shing Wang, and Pau-Choo Chung
IIH-MSP-2010-0291
Study on Pavement Performance Evaluation Based on the Hybrid Genetic Algorithm Neural Network
Wei-dong Qian
IIH-MSP-2010-0296
Visual Tracking with Adaptive Layered-optimizing Particles in Multifeature Particle Filtering Framework
Weijun Zou, Mingfeng Yin, and Yuming Bo
IIH-MSP-2010-0312
Overlapping interval differences-based fast intra mode decision for H.264/AVC
Yan-Qiang Lei, Yuan-Gen Wang, and Fan Liang
IIH-MSP-2010-0315
A Mutual Information and Information Entropy Pair Based Feature Selection Method in Text Classification
Zhili Pei, Yuxin Zhou, and Lihua Wang
IIH-MSP-2010-0320
Digital Image Forgery Detection by Local Statistical Models
Jiri Grim, Petr Somol, and Pavel Pudil
IIH-MSP-2010-0325
Digital Image Watermarking in DCT Domain Using Finite Newton Support Vector
Regression
Rajesh Mehta, Anurag Mishra, Rampal Singh, and Navin Rajpal
IIH-MSP-2010-0328
Fast Watermarking Based on QR Decomposition in Wavelet Domain
Yashar Naderahmadian and Saied Hosseini-Khayat
IIH-MSP-2010-0333
A Fine Grained RBAC model Supporting Flexible Administrative Separation of Duty
Yongzhong He and Zhan Han
IIH-MSP-2010-0338
Intelligent Watermarking with Multi-Objective Population Based Incremental Learning
Bassem S. Rabil, Robert Sabourin, and Eric Granger
IIH-MSP-2010-0343
Based on Private Matching and Min-Attribute Generalization for Privacy Preserving in Cloud Computing
Jian Wang and Jiajin Le
IIH-MSP-2010-0347
Simulation Method for Three-Dimensional Atmospheric Turbulence based on Correction Function
Yang Wu and Shou-da Jiang
IIH-MSP-2010-0351
A Wireless Ad Hoc Overlay Networks Indexing Mechanism Based on Petri Nets Theory
Li Zhang and Yang Zhang
IIH-MSP-2010-0357
NLOS Mitigation Method for TDOA Measurement
Hao Jiang, Jie Xu, and Zhen Li
IIH-MSP-2010-0365
Gabor-based Kernel Independent Component Analysis for Face Recognition
Yanchuan Huang, Mingchu Li, and Chuang Lin
IIH-MSP-2010-0370
A Recovery Algorithm for the Details of the Low Resolution Video Sequence
Jin Jing and Yuan Jie
IIH-MSP-2010-0375
A New SETUP for Factoring Based Algorithms
Constantinos Patsakis and Nikolaos Alexandris
IIH-MSP-2010-0381
Novel (n, n) Secret Image Sharing Scheme Based on Addition
Lin Dong and Min Ku
IIH-MSP-2010-0384
Bayesian Decision Based Method for Assets Recognition of Risk Assessment
Shenyu Liu and Xi He
IIH-MSP-2010-0388
An Attack on a Digital Watermarking Scheme Based on DCT and SVD
Yashar Naderahmadian and Saied Hosseini-Khayat
IIH-MSP-2010-0400
Self-Synchronizable Time-Domain Audio Watermarking based on LDPC-Coded Watermarks
Raul Martinez-Noriega, Mariko Nakano, and Kazuhiko Yamaguchi
IIH-MSP-2010-0403
A Fast Modular Multiplication Method
Ali Senturk and Mustafa Gok
IIH-MSP-2010-0408
Chaotic Iterations Versus Spread-spectrum: Chaos and Stego Security
Christophe Guyeux, Nicolas Friot, and Jacques M. Bahi
IIH-MSP-2010-0419
Controlled Distortion for High Capacity Data-in-speech Spectrum Steganography
Fatiha Djebbar, Habib Hamam, Driss Guerchi, and Karim Abed-Meraim
IIH-MSP-2010-0427
Bio-Inspired Hybrid Face Recognition System For Small Sample Size and Large Dataset
Muhammad Imran Razzak, Muhammad Khurram, and Khaled Alghathbar
IIH-MSP-2010-0432
Simulation of Ticket Hall Activities in Transit Station Based on Cellular Automata Model
Ming-jun Liao, Kai-ying Wang, and Xian-qiang Meng
IIH-MSP-2010-0436
Intelligent Watermarking of Document Images as a Dynamic Optimization Problem
Eduardo Vellasques, Robert Sabourin, and Eric Granger
IIH-MSP-2010-0442
Frame Interpolation Method Based on Adaptive Threshold and Adjacent Pixles
Hyeongchul Oh, Joohyun Lee, Changki Min, and Jechang Jeong
IIH-MSP-2010-0445
A Fast 8*8 2D IDCT Architecture, Avoiding Zero Transformed Coefficients
Thomas Tziortzios and Stavros Dokouzyannis
IIH-MSP-2010-0451
Driving Conditions Recognition Using Heart Rate Variability Indexes
Jeen-Shin Wang, Pau-Choo Chung, Wei-Hsin Wang, and Che-Wei Lin
IIH-MSP-2010-0455
Low-Complexity DC-Compensated Weighted 2BT-based Motion Estimation
Changryoul Choi and Jechang Jeong
IIH-MSP-2010-0461
A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition
Jian Wang, Ron Healy, and Joe Timoney
IIH-MSP-2010-0465
Autoregressive Video Modeling through 2D Wavelet Statistics
Mona Omidyeganeh, S. Ghaemmaghami, and S. Shirmohammadi
IIH-MSP-2010-0486
A Dynamic Ant Colony Optimization Algorithm for the Ad Hoc Network Routing
Gai-ping Sun, Hai-wen Guo, Dezhi Wang, and Jiang-hua Wang
IIH-MSP-2010-0495
Research on Load Balancing for Multidimensional Network Services Based on Particle Swarm Optimization Algorithm
Yongyi Zhao and Shengxian Xia
IIH-MSP-2010-0500
Competitiveness Evaluation in Commercial Banks Based on Principal Component Analysis and Neural Network
Wei Sun and Lili Jiang
IIH-MSP-2010-0504
Facial Features Approximation for Expression Detection in Human-Robot Interface
Mohammad Ibrahim Khan and Md. Al-Amin Bhuiyan
IIH-MSP-2010-0507
Single-Machine Scheduling With Periodic Maintenance to Minimize Makespan Revisit
Xianyu Yu and Sican Xiong
IIH-MSP-2010-0511
The Research on Chinese Coreference Resolution Based on Support Vector Machines
Yihao Zhang and Peng Jin