1. |
Xue-Dan Jia, Ya-Fen Chang, Chin-Chen Chang and Liang-Min Wang
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 183-188, March 2015.
|
2. |
Yanping Liao and Aya Abouzaid
Resolution Improvement for MUSIC and ROOT MUSIC Algorithms
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 189-197, March 2015.
|
3. |
Feng-Ying He, Tian-Shun Chen and Shang-Ping Zhong
A Classifier Ensemble Algorithm Based on Improved RSM for High Dimensional Steganalysis
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 198-210, March 2015.
|
4. |
Hongfeng Zhu, Xin Hao, Yifeng Zhang and Man Jiang
A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 211-224, March 2015.
|
5. |
Ying Zhou, Ji-Hong Zhang, Yong-Sheng Liang and Wei Liu
Video Motion Characteristics based Spatial-Temporal Salient Region Extraction Method
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 225-233, March 2015.
|
6. |
Shouda Jiang, Zhong Bo, Chao Sun and Yuqi Liu
A Hybrid Narrowband Active Noise Control System for Uncorrelated Narrowband Disturbance
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 234-245, March 2015.
|
7. |
Li Liu, An-Hong Wang, Chin-Chen Chang, Zhi-Hong Li and Jin-bo Liu
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 246-253, March 2015.
|
8. |
Alexandros Iosifidis, Ermioni Marami, Anastasios Tefas, Ioannis Pitas
The MOBISERV-AIIA Eating and Drinking multi-view database for vision-based assisted living
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 254-273, March 2015.
|
9. |
Hongfeng Zhu, Yifeng Zhang and Yan Zhang
A One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 274-287, March 2015.
|
10. |
Hsiao-Ling Wu and Chin-Chen Chang
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 288-296, March 2015.
|
11. |
Thi-Kien Dao, Tien-Szu Pan, Trong-The Nguyen and Shu-Chuan Chu
A Compact Articial Bee Colony Optimization for Topology Control Scheme in Wireless Sensor Networks
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 297-310, March 2015.
|
12. |
Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong and Zhong-Ping Yang
An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 311-322, March 2015.
|
13. |
Rongrong Ni, Yao Zhao and Xiaobo Zhai
Recaptured Images Forensics Based On Color Moments and DCT Coefficients Features
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 323-333, March 2015.
|
14. |
Zhi-Min Fang, Zhe-Ming Lu, Xin-Feng Li, Mei-Lei Lv and Lu Zhang
Deterministic Small-World Network Extended From Triangles
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 334-339, March 2015.
|
15. |
Jian-zhi Sang, Shen Wang, Xian-hua Song, Xue-hu Yan and Xia-mu Niu
A novel representation for Multi-Channel log-polar quantum images
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 340-350, March 2015.
|
16. |
Salam Abdul-Nabi Thajeel and Ghazali Sulong
A Novel Approach for Detection of Copy Move Forgery using Completed Robust Local Binary Pattern
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 351-364, March 2015.
|
17. |
Wen-Pinn Fang
A Data Hiding Method which the Secret Image Exist After Cropping Style Image Resizing
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 365-370, March 2015.
|
18. |
You-Wei Wang, Chii-Jen Chen, Sheng-Fang Huang and Yi-Shiung Horng
Segmentation of Median Nerve by Greedy Active Contour Detection Framework on Strain Ultrasound Images
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 371-378, March 2015.
|
19. |
Yanpeng Wu, Xiaoqi Peng and Yanpo Song
The Algorithm of Estimating the Bubble Size Distribution Characteristics of the Foam Image
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 379-388, March 2015.
|
20. |
Zuowen Tan
An Improved Anonymous Authentication Scheme for Roaming Services
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 389-397, March 2015.
|
21. |
Win-Bin Huang and Mong-Fong Horng
Speed up Video Coders with Only Examining the Predicted Modes in a Coding Block
Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 398-408, March 2015.
|