Accepted
Papers in Invited Sessions and Workshop of IAS-2009
IAS-2009-IS01-01
Majority-Parity-Guided
Watermarking for Block-Truncated Images
Jing-Ming Guo and Yun-Fu Liu
IAS-2009-IS01-02
Data
Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and
Quality-Noise Look Up Table
Jing-Ming Guo and Jia-Jin Tsai
IAS-2009-IS01-03
Improving
the Modified Matrix Encoding on Steganography Method
Yong-Soo Choi and Hyoung-Joong Kim
IAS-2009-IS01-04
Reversible Information Hiding Considering
Hierarchical Access Control
Masaaki Fujiyoshi, Seungwu Han, and
Hitoshi Kiya
IAS-2009-IS02-01
An Effective Lossless Hiding Technique based on
Reversible Contrast Mapping and Histogram Embedding Methods
Tzu-Chuen Lu and Ying-Hsuan Huang
IAS-2009-IS02-02
A High Quality Reversible Data Hiding Method Using
Interpolation Technique
Chyuan-Huei Thomas Yang and Chun-Hao Hsu
IAS-2009-IS02-03
Reversible Steganography
Based on Side Match and Hit Pattern for VQ-Compressed Images
Cheng-Hsing Yang, Cheng-Ta Huang, and Shiuh-Jeng Wang
IAS-2009-IS02-04
A High Embedding Efficiency Steganography
Scheme for Wet Paper Codes
Zhao-Xia Yin, Chin-Chen Chang, and Yan-Ping Zhang
IAS-2009-IS02-05
A Block Feature Correlation Based Image Watermarking
for Tamper Detection Using Linear Equation
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, and Meng-Cheng Tsai
IAS-2009-IS02-06
Prediction-Based Watermarking Schemes for DCT-Based
Image Coding
Jing-Ming Guo and Chia-Hao Chang
IAS-2009-IS02-07
Human Visual System based Watermarking for Color
Images
Kuo-Cheng Liu
IAS-2009-IS03-01
Privacy Protection in On-line Shopping for Electronic
Documents
Yu-Chi Chen, Gwoboa Horng, and Chang-Chin Huang
IAS-2009-IS03-02
A Low-cost RFID Authentication Protocol with Location
Privacy Protection
Yu-Yi Chen, Jun-Chao Lu, Shin-I Che, and Jinn-Ke Jan
IAS-2009-IS03-03
A Real-Time
Selective Video Encryption Using Context-Key Control
Hung-Min Sun and Muh-Chyi Leu
IAS-2009-IS03-04
Ideal Perfect
Hierarchical Threshold Secret Sharing Schemes
Changlu Lin, Lein Harn, and Dingfeng Ye
IAS-2009-IS03-05
Implementation of an Electronic Voting System with
Contactless IC Cards for Small-Scale Voting
Chung-Huang Yang, Shih-Yi Tu, and Pei-Hua Yen
IAS-2009-IS03-06
Access Log Generator
for Analyzing Malicious Website Browsing Behaviors
Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
IAS-2009-IS03-07
Detecting DoS and DDoS Attacks by Using an
Intrusion Detection and Remote Prevention System
Fang-Yie Leu and Zhi-Yang Li
IAS-2009-IS03-08
Detecting DoS&DDoS Attacks Using Chi-Square
Fang-Yie Leu and Chia-Chi Pai
IAS-2009-IS03-09
Hierarchical
Key Agreement Protocols in Group-user Systems
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, and Pin-You Chen
IAS-2009-IS04-01
Common Friends Discovery with Privacy and Authenticity
Shin-Yan Chiou, Shih-Ying Chang, and Hung-Min Sun
IAS-2009-IS04-02
Collaborated Medical Image Secret Sharing Scheme
Kun-Yuan Chen and Der-Ming Liou
IAS-2009-IS04-03
Known Signature Attack of ID-based Multisignature
Schemes
Wu-Chuan Yang and Jhih-Syue Jhou
IAS-2009-IS04-04
A Generalization of de Weger's
Method
Chien-Yuan Chen, Chih-Cheng Hsueh, and Yu-Feng Lin
IAS-2009-IS04-05
New Strategy of Efficient SPA-resistant
Exponentiations
Wu-Chuan Yang
IAS-2009-IS05-01
Color-Texture Based Image Retrieval System by Gaussian Markov Random
Field Model
Yung-Kuan Chan, Jiun-Shiang Wang, Meng-Hsiun Tsai, and Yen-Ping Chu
IAS-2009-IS05-02
Image Watermarking Using Phase-shifting Digital Hologram Embedded in
Wavelet Domain
Mn-Ta Lee, Hsuan-Ting Chang, and Mu-Liang Wang
IAS-2009-IS05-03
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor
Networks
Iuon-Chang Lin and Shu-Yan Huang
IAS-2009-IS05-04
An Adaptable Threshold Decision Method
Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan
IAS-2009-IS05-05
Zero Packet Loss Hand-off Mechanism in SIP-based
Wireless Networks
Ching-Lung Chang, Jia-Yi Syu, and Yuan-Sun Chu
IAS-2009-IS05-06
A New Authenticated Key Agreement Protocol for
Wireless
Shin-Jia Hwang and Ming-Jhang Chai
IAS-2009-IS05-07
Economical Dental Stereoradiography in Digital Era
Hsien-Huang P. Wu, Chien-Chih Lin, and Ping-Kuo Weng
IAS-2009-IS05-08
A Resistant Secret Sharing
Scheme
Chin-Chen Chang,
Yen-Chang Chen, and Chia-Chen Lin
IAS-2009-IS06-01
Active Contour Model via Honey Bee Mating Optimization
Ming-Huwi Horng, Jin-Yi Chen, and Liou Ren-Jean
IAS-2009-IS06-02
Intra-mode Dependent Coding Method for Image
Compression
Yung-Chiang Wei, Jui-Che Teng, and Chien-Wen Chung
IAS-2009-IS06-03
Dynamically Constrained One-Bit Transform for Motion
Vector Estimation
Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, and Wen-Yuan Liao
IAS-2009-IS06-04
A Name Recommendation Photo Album Using Probability
Neural Network
Ding-Hrong Chen and Shiang-En Tang
IAS-2009-IS06-05
Estimation of Soft Tissue Deformation in Laparoscopic
Video Images
Chia-Hsiang Wu, Yung-Nien Sun, and Chien-Chen Chang
IAS-2009-IS06-06
Lung Segmentation for
Chest Radiograph by Using Adaptive Active Shape Models
Jiann-Shu Lee
IAS-2009-IS06-07
Fast Registration of 3D Facial Images
Chia-Hsiang Wu, Cheng-Ming Ni, and Sheng-Che Lin
IAS-2009-IS07-01
Full System
Simulation and Verification Framework
Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee,Yuan-Hua,
IAS-2009-IS07-02
Automatic IP
Interface Synthesis Supporting Multi-Layer Communication Protocols in SoC Designs
Yin-Tsung Hwang and
Hua-Hsin Luo
IAS-2009-IS07-03
Moving Object
Tracking Using Symmetric Mask-Based Scheme
Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, and Zong-Jheng Wu
IAS-2009-IS07-04
Hardware/Software Codesign of Resource Constrained Real-Time Systems
Chia-Cheng Lo, Jung-Guan Luo, and Ming-Der Shieh
IAS-2009-IS07-05
Design and
Integration for Background Subtraction and Foreground Tracking Algorithm
Tsung-Han Tsai, Chung-Yuan Lin,
De-Zhang Peng, and Giua-Hua
Chen
IAS-2009-IS07-06
Parallel 3-Pixel Labeling
Method and its Hardware Architecture Design
Shyue-Wen Yang, Ming-Hwa
Sheu, Jun-Jie Lin,
Chuang-Chun Hu, Tzu-Hsiung
Chen, and Shau-Yin Tseng
IAS-2009-IS08-01
Privacy Protection for Speech Information
Kazumasa Yamamoto and Seiichi Nakagawa
IAS-2009-IS08-02
An Improvement of Speaker Vector-based Speaker
Verification
Naoki Tadokoro, Tetsuo Kosaka, Masaharu Kato, and Masaki Kohda
IAS-2009-IS08-03
Acoustic-based Security System: Towards Robust
Understanding of Emergency Shout
Hiroaki Nanjo, Takanobu Nishiura, and Hiroshi Kawano
IAS-2009-IS08-04
A System for Detecting Unusual Sounds from Sound
Environment Observed by Microphone Arrays
Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani, and Yingbo Hua
IAS-2009-IS08-05
Detection of Abnormal Sound using Multi-stage GMM for
Surveillance Microphone
Akinori Ito, Akihito Aiba, Masashi Ito, and Shozo Makino
IAS-2009-IS09-01
Zero-Collision RFID Tags
Identification based on CDMA
Lih-Chyau Wuu, Wen-Chung Kuo, Yen-Ju Chen, and Chi-Hsiang Hung
IAS-2009-IS09-02
An
Enhanced Remote User Authentication Scheme Providing Mutual Authentication and
Key Agreement with Smart Cards
Chun-Ta Li
IAS-2009-IS09-03
Improvement on RFID Authentication
Protocol for Anti-counterfeiting and Privacy Protection
Yung-Cheng Lee, Wen-Chung Kuo, and Huan-Cheng Lien
IAS-2009-IS09-04
Efficient Proxy Re-Encryption Schemes with
Non-Transferability and Multi-Delegability
Jiin-Chiou Cheng and Chi-Sung Laih
IAS-2009-IS09-05
A Secure Access Control Scheme of RFID System
Application
Yu-Chih Huang
IAS-2009-IS10-01
Facial Expression Recognition Based on Field
Programmable Gate Array
Jzau-Sheng Lin, Shao-Han Liou, Wu-Chih Hsieh, Yu-Yi Liao, HongChao Wang, and QingHua Lan
IAS-2009-IS10-02
Analysis and Evaluation of Contrast Enhancement
methods in Digital Images
Shen-Chuan
Tai, Yi-Ying Chang, Ting-Chou Tsai, and Li-Man Liao
IAS-2009-IS10-03
Contrast Enhancement
method based on Average Luminance with Weighted Histogram Equalization
Shen-Chuan
Tai, Yi-Ying Chang, Kang-Ming Li, and Ting-Chou Tsai
IAS-2009-IS10-04
Application of Averaged
Learning Subspace
Chuin-
IAS-2009-IS12-01
A Novel
Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT
Algorithm
Lin-Lin Tang, Zhe-Ming
Lu, and Fa-Xin Yu
IAS-2009-IS12-02
A CELP-Speech
Information Hiding Algorithm Based on Vector Quantization
Ji-Xin Liu, Zhe-Ming Lu, and Hao Luo
IAS-2009-IS12-03
Video
Identification Using Spatio-temporal Salient Point
Yue-Nan Li and Zhe-Ming Lu
IAS-2009-IS13-01
An Efficient Anonymous Routing Protocol for
Xiaoqing Li, Hui Li, and Jianfeng Ma
IAS-2009-IS13-02
Distributed Event-triggered Trust Management for
Wireless Sensor Networks
Si-bo Liu, Liao-jun Pang,
IAS-2009-IS13-03
A Novel Biometric-based Authentication Scheme with Privacy Protection
Hui-xian Li
IAS-2009-IS13-04
Roaming Authentication and Key Agreement Protocol with
Anonymity for Wireless Mesh Sensor Networks
Qingquan Peng, Xiuqiang Wu, and Liaojun Pang
IAS-2009-IS13-05
Towards Provably Secure On-Demand Source Routing in
MANET
Liqiang
Mao and Jianfeng Ma
IAS-2009-IS13-06
Research on Integration of Safety Analysis in
Model-driven Software Development
Feng Chen,
Weihua Li, Dingyi Fang, and
Xiaojiang Chen
IAS-2009-IS13-07
An Authentication Protocol Applied to RFID Security
Systems
Xiaoqing Gong, Hui Li, Jian He, and Yi Wang
IAS-2009-IS13-08
A New Hybrid Routing Protocol in Heterogeneous
Wireless Networks
Yulong Shen, Qijian Xu, and Hao Yin
IAS-2009-IS13-09
Layer Key Management Scheme on Wireless Sensor
Networks
IAS-2009-IS13-10
A Broadcast Protocol for Key Establishment and
Updating in Wireless Sensor Network
Xiaoyuan
Yang, Maotang Li, Lixian
Wei, and Yiliang Han
IAS-2009-IS13-11
C&M: A New Network Coding Scheme for Wireless Networks
Xiaoyan
Zhu, Hao Yue, Yuguang Fang,
and Yumin Wang
IAS-2009-IS13-12
Range-free Fast and Rough Nodes Localization Algorithm
in Wireless Sensor Network
Mei Wang, Xiaochuan Sun, and Hao Zheng
IAS-2009-IS13-13
Information Security Wireless Sensor Grid
Mingming Li, Baiping Li, Wei Li, and Lei Chen
IAS-2009-IS14-01
A Parity Check Node Synchronization Based Method for
Solving Phase Ambiguity Problem in DVB-S Systems
Jielin Fu and Yongjun Tang
IAS-2009-IS14-02
Security Analysis of the Kerberos Protocol using BAN
Logic
Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, and Weidong Kou
IAS-2009-IS14-03
The Testing and Evaluating System for the Security
Operating System Based on the Mechanism of Keyword-driven
Xing Liu and Mian Cai
IAS-2009-IS14-04
An Identity-Based Authentication Model for
Yike Yu, Xue-feng Zheng, and Mingde Zhang
IAS-2009-IS14-05
Performance Analysis of Analog LMS Multiuser Receiver
in Transmitted-Reference UWB System
Lin Zheng, Wei Ge, and Hongbing Qiu
IAS-2009-IS14-06
A New Abuse-Free Fair Electronic Payment Protocol
Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, and Weidong Kou
IAS-2009-IS14-07
Action-Based Access Control for Web Services
Fenghua Li, Wei Wang, Jianfeng Ma, and Haoxin Su
IAS-2009-IS14-08
A Provably Secure Certificateless
Blind Signature Scheme
Xiaoyuan Yang, Zhongyin Liang, Ping Wei, and Junwei Shen
IAS-2009-IS14-09
Research on Model of Trust Degrees for PKI
Mingde Zhang, Xuefeng Zheng, Shuwang Lv, Wensheng Yang, and Qingguo Zhang
IAS-2009-IS14-10
Information Security Routing Protocol in the WSN
Wei Li, Ming Chen, Mingming Li, and Wei Li
IAS-2009-IS15-01
A Dynamic Graph Watermark Scheme of Tamper Resistance
Xiaojiang
Chen, Dingyi Fang, Jingbo Shen, Wenbo Wang, Feng Chen, Wenjuan Chen, and Lu
He
IAS-2009-IS15-02
Trusted Computing Based
Zhen Yang and
Kefeng Fan
IAS-2009-IS15-03
An Authenticating Algorithm with Multi-compression Compatible in DCT
Domain
Xiaoyuan
Yang,
IAS-2009-IS15-04
Audio Digital Signature Algorithm with Tamper Detection
Xiaoyuan
Yang, Xiang Wu, and Minqing Zhang
IAS-2009-IS15-05
Key Binding Based on Biometric Shielding Functions
Huixian
Li
IAS-2009-IS15-06
A Digital Certificate Application Scheme in Content Protection System
for High Definition Digital Interface
Kefeng
Fan and Subing Zhang
IAS-2009-IS15-07
A Deep Copy Protection Framework for Electronic Devices within Home
Yang Zhan, Haibo Tian, Yaoyu Zhang, and Yumin Wang
IAS-2009-IS15-08
Attack on an Universal Designated Verifier Signature Scheme
Yanping
Li, LiaoJun Pang, and Yumin
Wang
IAS-2009-IS15-09
Image Enhancement Based On Nonsubsampled Contourlet Transform
Yuxin
Ma, Jiancang Xie, and Yuheng Sha
IAS-2009-IS15-10
Performance Analysis of Chinese Webpage Categorizing Algorithm Based on
Support Vector Machines
Gang Xiao and Jiancang Xie
IAS-2009-IS15-11
Research on Improved Algorithm for Chinese Word Segmentation Based on
Markov Chain
Baomao
Pang and Haoshan Shi
IAS-2009-IS15-12
A New Histogram Based Image Watermarking Scheme Resisting Geometric
Attacks
Xin-Wei
Li, Bao-Long Guo, and Lei-Da Li
IAS-2009-IS15-13
A Balanced Multiwavelet Based Adaptive Digital
Watermarking Algorithm
Ming-Xiang Zang, Na Zhang, and Jian-Guo Jiang
IAS-2009-IS15-14
An Improved Iris Recognition Method Based on Gray Surface Matching
Dongmei
Wu and Jiangnan
Wang
IAS-2009-IS15-15
Image Retrieval Based on 2D Histogram of Interest Points
Fanjie Meng, Baolong Guo, and Lei Guo
IAS-2009-IS15-16
An Identification Method of Video Information Coupled Circuits in the
Radiation Environment
Jin Tian and Yang Qiu
IAS-2009-IS15-17
An Improved Fusion Algorithm of the Weighted Features and Its Application in Image Retrieval
Mei Wang and Li Wang
IAS-2009-IS15-18
An Active Defense Model and Framework of Insider Threat Detection and Sense
Hongbin
Zhang,
IAS-2009-IS16-01
A Modified Feature based Image Watermarking Scheme in NSCT Domain
Liu Yang, Baolong Guo, and Jianmin Lv
IAS-2009-IS16-02
Grounding Grid Corrosion Diagnosis based on Large Change Sensitivity
Liqiang
Liu, Xianjue Luo, Tao Niu, and Kai Wang
IAS-2009-IS16-03
An Improved Algorithm of Grounding Grids Corrosion Diagnosis
Tao Niu, Yingjiao Zhang, Liqiang Liu, and Xianjue Luo
IAS-2009-IS16-04
Anomalous Payload Detection System using Analysis of Frequent Sequential Pattern
Jun Ma, GuanZhong Dai, and Jing
Zhou
IAS-2009-IS16-05
An Enhanced Block Mode Selection Method for Surveillance Video Communication
Jie Jiang,
IAS-2009-IS16-06
The Detection of Bi-Frequency Weak Signal Based on Chaos and Correlation
Mei Wang, Huifeng Zhang, and Yong
Yan
IAS-2009-IS16-07
The Application and Study of Graph Cut in Motion Segmentation
Ye Hou, Baolong Guo,
and Jeng-Shyang
Pan
IAS-2009-IS16-08
Application of Rough Set Theory in Coal Gangue Image Process
Xian-Min Ma and Liang Che
IAS-2009-IS16-09
A Dynamic Layering Scheme of Multicast Key Management
Fan Yang, Xiao-ping Li, Qing-kuan Dong, and Yan-ming Liu
IAS-2009-IS16-10
Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement
Zhanli
Li and Yuan Wang
IAS-2009-IS16-11
Research on Video Information Camouflage Processing Algorithm Based on
Amplitude Modulation
Yang Qiu, Jin Tian, and Wei Jing
IAS-2009-IS16-12
A New Multiple-Objects Tracking Method with Particle Filter
Long Chen, Bao-long Guo, and Wei Sun
IAS-2009-IS16-13
Study on the Feedback Fuzzy Controller for a Two-wheeled Unstable
Vehicle
Shengli Qu
IAS-2009-IS16-14
Support Vector Machine Based on Possibility Degree and Fault Diagnosis
Jingyi
Du, Mei Wang, and Wenhao Cai
IAS-2009-IS18-01
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in
Intrusion Alert Correlation
Maheyzah Md Siraj, Mohd
Aizaini Maarof, and Siti Zaiton Mohd
Hashim
IAS-2009-IS18-02
Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection
Anazida Zainal, Den Fairol Samaon, Mohd Aizaini
Maarof, and Siti Mariyam Shamsuddin
IAS-2009-IS18-03
Hierarchical Takagi-Sugeno Models for Online
Security Evaluation Systems
Ajith
Abraham, Crina Grosan, Hongbo Liu, and Yuehui Chen
IAS-2009-IS18-04
Detecting Insider Attached Using Non-negative Matrix Factorization
Jan Platoš, Vaclav Snasel, Pavel Krömer, and Ajith Abraham
IAS-2009-IS19-01
A New Adaptive Image Denoising Method
Combining the Nonsubsampled Contourlet
Transform and Total Variation
Xiaoyue
Wu, Baolong Guo, Shengli Qu, and Zhuo Wang
IAS-2009-IS19-02
Grounding Grid Corrosion Diagnosis with Test Nodes Migration
Liqiang
Liu, Xianjue Luo, Tao Niu, and Kai Wang
IAS-2009-IS19-03
SAR Image Target Recognition Based on Hu
Invariant Moments and SVM
Yan Fu, Mei
Wang, Chunqin Zhang
IAS-2009-IS19-04
Testability Analysis of Grounding Grids Using Network Transformation
Tao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, and Xianjue Luo
IAS-2009-IS19-05
Research on Digital Filtering Algorithm based on the Video Information
Security
Yang Qiu, Jin Tian, Lili Wei, and Guangda Chen
IAS-2009-IS19-06
ISAR Imaging of High Speed Moving Targets Based-on Radon Transform
Tong-an Feng, Jin He, and Ying
Luo
IAS-2009-IS19-07
Octa-Log-Polar Fourier Transform for Image Registration
Xian-xiang Wu, Bao-long Guo, and Juan Wang
IAS-2009-IS19-08
Design of DBA Algorithm in EPON Uplike
Yamin
Wang and Yan Liu
IAS-2009-IS19-09
Cramer-Rao lower bound for non-coherent TOA Estimation
with Impulse Signal
Jie Liu, Xiaoji Li, and Lin Zheng
IAS-2009-IS19-10
Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge
of Boost DC-DC Converters
Shulin
Liu
IAS-2009-IS19-11
Study on the Control of a Two-wheeled Unstable Vehicle based on Sensitivity Analysis
Shengli Qu
IAS-2009-IS19-12
Generalized Analysis Model of Information Security of Computer System
Based on Electromagnetic Topology
Jin Tian, Yang Qiu, and Liuyu Qian