IIH-MSP-2009-015 |
A
Fast and Robust Algorithm of Detection and Segmentation for Moving Object |
He, Jie |
||
IIH-MSP-2009-020 |
Privacy
Preserving clustering |
Dhiraj, S.S.Shivaji |
||
IIH-MSP-2009-023 |
An
Adaptive Fairness Control Model in Wireless Sensor Networks |
kuang, Zhufang |
||
IIH-MSP-2009-028 |
Multi
Path Based on Cache Notification Algorithm in Wireless Sensor Networks |
kuang, Zhufang |
||
IIH-MSP-2009-032 |
A
Novel approach for Computation-Efficient Rekeying for Multicast Key
Distribution |
John,
Jeffneil |
||
IIH-MSP-2009-042 |
Automatic
Traffic Monitoring Method Based on Cellular Model |
Hsu, WeiLeih |
||
IIH-MSP-2009-045 |
Chinese
Name Speech Classification Using Fisher Score Based on Continuous Density
Hidden Markov Models.pdf |
Gao, Yi |
||
IIH-MSP-2009-050 |
Multisecret Image Sharing |
Wang,
Ran-Zan |
||
IIH-MSP-2009-061 |
A
Robust Content in DCT Domain for Image Authentication |
Wang,
Yuan |
||
IIH-MSP-2009-066 |
Optimizing
Constrained Mixed-Integer Nonlinear Programming Problems Using Nature
Selection |
He, Rong-Song |
||
IIH-MSP-2009-072 |
Region-based
segmentation versus Edge detection |
GREMA
KAGANAMI, Hassana |
||
IIH-MSP-2009-075 |
Further
Remarks on Identity-based RSA Multisignature |
Chang,
Ya-Fen |
||
IIH-MSP-2009-078 |
A
Robust Watermark Algorithm for JPEG2000 Images |
HaiYing, Gao
|
||
IIH-MSP-2009-081 |
Joint
Secret Image Sharing and Progressive Transmission Based on Integer Discrete
Cosine Transform |
Luo, Hao |
||
IIH-MSP-2009-087 |
A ±1-based steganography by minimizing the
distortion of first order statistics |
LI, Xiaolong |
||
IIH-MSP-2009-093 |
Information
Embedding in MPEG-4 Scalable Lossless Audio |
Li,
Te |
||
IIH-MSP-2009-099 |
Robust
Data Hiding by Hilbert Curve Decomposition |
lien,
brian |
||
IIH-MSP-2009-104 |
Fast
Channel Change IPTV System for Enhanced User Experience |
Young-Ho,
Song |
||
IIH-MSP-2009-108 |
A
Novel Multi-Touch Human-Computer-Interface Based on Binocular Stereo Vision |
Wang,
Wenlong |
||
IIH-MSP-2009-111 |
Fast
Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue Code |
Lee,
Hung Peng |
||
IIH-MSP-2009-119 |
Study
of Thangka Image Retrieval and Multimedia
Presentation Management System |
Weilan, Wang |
||
IIH-MSP-2009-124 |
Quality
Evaluation of Digital Image Watermarking |
SU, qingtang |
||
IIH-MSP-2009-130 |
Syntactic
and Semantic Role Labeling for Chinese FrameNet
Based on Cascaded Conditional Random Fields |
hao, xiao |
||
IIH-MSP-2009-134 |
On
Acceptable Modification Limits of Electroacoustic
Speech Signals for Data Hiding |
Ponomar, Marina |
||
IIH-MSP-2009-140 |
Representing
Meanings of Images Based on Associative Values with Lexicons |
Dai,
Ying |
||
IIH-MSP-2009-143 |
Emotion
Feature Vector of Finger Braille |
Matsuda,
Yasuhiro |
||
IIH-MSP-2009-154 |
Algorithm
for Detecting Steganographic Information Based on
Characteristic of Embedded Message |
lang, rong |
||
IIH-MSP-2009-160 |
An
Image Steganography Using Pixel-Value Differencing |
Geng, zhi |
||
IIH-MSP-2009-174 |
Perfect
Forward Secure Two-Party Key Agreement Protocol with Key Escrow |
Hou, Mengbo |
||
IIH-MSP-2009-180 |
A
semi-fragile digital watermarking algorithm for 2D vector graphics tamper
localization |
Gao, ming |
||
IIH-MSP-2009-185 |
Content
Based Image Hashing Robust to Geometric Transformations |
Xiong, Caiqiong |
||
IIH-MSP-2009-189 |
An
Enlargement Method Using Undecimated Wavelet
Transform and Shape Function |
Yen, Wen-Chien |
||
IIH-MSP-2009-192 |
Advanced
Color Images Enhancement Using Wavelet and K-Means Clustering |
GREMA
KAGANAMI, Hassana |
||
IIH-MSP-2009-196 |
A
study of rounding error on CDMA-based fingerprinting scheme |
Kuribayashi, Minoru |
||
IIH-MSP-2009-207 |
Distance
Sensing Disparity Map for Binocular Stereo Video Systems |
Takaya,
Kunio |
||
IIH-MSP-2009-211 |
Optimization
of AVS-M Video Decoder for Real-time Implementation on Embedded RISC
Processors |
Jian, Guo-An |
||
IIH-MSP-2009-227 |
Random
number generating from white noise of webcam |
Chen,
I-Te |
||
IIH-MSP-2009-233 |
Random
Number Generator designed by the divergence of scaling functions |
Chen,
I-Te |
||
IIH-MSP-2009-236 |
Employing
optimal matrix for efficient matrix embedding |
LI, Xiaolong |
||
IIH-MSP-2009-241 |
A New
Contrast Enhancement Technique Implemented on FPGA for Real Time Image
Processing |
Ching-Hsi, Lu |
||
IIH-MSP-2009-247 |
Double-Density
Dual-Tree Wavelet Transform Based Texture Classification |
Qiao, Yu-Long |
||
IIH-MSP-2009-252 |
Fair
Non-Repudiation Security Protocols with off-line TTP |
wang, xi |
||
IIH-MSP-2009-257 |
Content-Based
Mode Selection for Fast Rate-Distortion Optimization in H.264/AVC |
Wang,
Szu |
||
IIH-MSP-2009-262 |
Backbone
network design and performance analysis |
Chew,
Hou |
||
IIH-MSP-2009-266 |
Identity
Authentication in RFID Based Logistics-Customs Clearance Service Platform |
DENG,
Huifang |
||
IIH-MSP-2009-273 |
Quantization
Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVC |
Wang,
Szu |
||
IIH-MSP-2009-284 |
ONE
H.264/AVC REAL-TIME WATERMARKING METHOD BASED ON CAVLC |
ke, liao |
||
IIH-MSP-2009-288 |
REAL-TIME
AVS VIDEO WATERMARKING ALGORITHM USING C2D-VLC |
ke, liao |
||
IIH-MSP-2009-292 |
A
Provably Secure Two-Party Attribute-based Key Agreement Protocol |
Wang,
Hao |
||
IIH-MSP-2009-295 |
Wavelet-based
sequence Codec Implementation on TMS320DM642 |
Ghorbanian, Ali |
||
IIH-MSP-2009-301 |
Identity
Based Authenticated Key Agreement for Tree-Based Group |
sun, xiang |
||
IIH-MSP-2009-307 |
Non-expansion
Hiding Secret Image in Visual Secret Sharing with Shift Style |
Fang,
Wen-Pinn |
||
IIH-MSP-2009-311 |
The Altinn Case Study: Proposal for a Large-Scale Public-Key
Biometric Infrastructure |
Mjaaland, Bendik
|
||
IIH-MSP-2009-317 |
A
secure steganography: noisy region embedding |
LI, Xiaolong |
||
IIH-MSP-2009-320 |
A
Video Retrieval Algorithm Based on Spatio-temporal
Feature Curves and Key Frames |
Chen,
Xiuxin |
||
IIH-MSP-2009-323 |
Salt-and-Pepper
Noise Elimination by PI-Remover and Modified AMF Noise Detectors |
Liao,
Li-Chun |
||
IIH-MSP-2009-327 |
An
adaptive particle swarm optimization with time-varying acceleration
coefficients |
Zhang,
Dingxue |
||
IIH-MSP-2009-333 |
Bilinear
coons patch and its application in security pattern design |
LI, Xiaolong |
||
IIH-MSP-2009-339 |
Creating
RSA trapdoors using Lagrange four Square theorem |
Patsakis, Constantinos
|
||
IIH-MSP-2009-344 |
An
Observer-based Method for Secure Communication |
Lee, Tsair-Fwu |
||
IIH-MSP-2009-348 |
Precision
Segmentation Rendering for 3-D Coronary Angiography Medical Image |
Lee, Tsair-Fwu |
||
IIH-MSP-2009-360 |
Extracting
invariable features using geometry projection based histogram model for 3D
object description |
Li,
Jun-Bao |
||
IIH-MSP-2009-363 |
VLSI
Design and Analysis of Multipliers for Low Power |
pachara, ve
|
||
IIH-MSP-2009-373 |
Feature
Selection for Character Recognition Using Genetic Algorithm |
Kimura,
Yoshimasa |
||
IIH-MSP-2009-379 |
HVS-based
Imperceptibility Evaluation for Steganography |
MA, Xiu Ying |
||
IIH-MSP-2009-389 |
Performance
Study of Asymmetric Traffic Load for OBS Ring Networks |
Lee, Tsair-Fwu |
||
IIH-MSP-2009-395 |
Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography |
ye, mao |
||
IIH-MSP-2009-401 |
A
Novel Secure RFID System to Ensure Privacy |
Karabat, Cagatay
|
||
IIH-MSP-2009-405 |
A
Cancelable Biometric Hashing For Secure Biometric Verification System |
Karabat, Cagatay
|
||
IIH-MSP-2009-411 |
A
Multilingual Patent Text-Mining Approach for Computing Relatedness Evaluation
of Patent Documents |
Li,
Yi |
||
IIH-MSP-2009-415 |
A
Visual Compensation Aiding System for the Visually Impaired |
Lai, ChinLun |
||
IIH-MSP-2009-421 |
Color
Image Watermarking Scheme Based on Support Vector Regression |
Lv, Xiuli |
||
IIH-MSP-2009-429 |
Rubust Data Hiding on Texture Images |
Otori, Hirofumi |
||
IIH-MSP-2009-433 |
Blind
Clustering of Music Recordings Based on Audio Fingerprinting |
Tsai,
Wei-Ho |
||
IIH-MSP-2009-446 |
Age
Estimation using AAM and Local Facial Features |
Huang,
Chung-Lin |
||
IIH-MSP-2009-455 |
An
algorithm for packing bitstream of scalable video
coding |
Kao,
Jung |
||
IIH-MSP-2009-461 |
Mobile
Sensor for Target Tracking via Modified Particle Filter |
Chen,
Wen |
||
IIH-MSP-2009-464 |
Target
Tracking in Clusters of Sensor Networks via Handoff Scheme with Extended Kalman filter |
WU,
CHIEN |
||
IIH-MSP-2009-468 |
An
Adaptive Gradient-Projection Image Restoration using Local Statistics and
Estimated Noise Characteristics |
hwang, joo |
||
IIH-MSP-2009-475 |
An
Improving Technique of Color Histogram in Segmentation-based Image Retrieval |
Zhang,
Zhenhua |
||
IIH-MSP-2009-480 |
A
Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance
Videos |
Wu, Ching-Yu |
||
IIH-MSP-2009-484 |
Mean
Best Basis Algorithm for Wavelet Speech Parameterization |
Galka, Jakub |
||
IIH-MSP-2009-489 |
Personal
Photo Organizer based on Automated Annotation Framework |
Tsay, Kai-En |
||
IIH-MSP-2009-492 |
Guess
and Determine Attack on Modified SNOW2.0 |
ding,
lin |
||
IIH-MSP-2009-496 |
Real-Time
Hand Detection and Tracking against Complex Background |
Mao,
Gang-Zeng |
||
IIH-MSP-2009-499 |
STEGANALYSIS
ALGORITHM BASED ON DENOISING OF SOURCE IMAGE USING |
Bakhshandeh, soodeh
|
||
IIH-MSP-2009-505 |
Gray
Image Noise Cancellation Using Adaptive Particle Swarm Optimization |
Su,
Te-Jen |
||
IIH-MSP-2009-508 |
A
Falsification Prevention Method for Face Authentication Using Light |
Horiuchi, Yousuke
|
||
IIH-MSP-2009-514 |
Indexing
and Querying in Multimedia Databases |
Lin,
Hung-Yi |
||
IIH-MSP-2009-517 |
Digital
Watermarking Method for Printed Materials Embedding in |
Goto, Yuta |
||
IIH-MSP-2009-521 |
Robust
Perceptual Image Hashing based Temporal Synchronization for Watermarked H.264
Frames |
Gong,
Xun |
||
IIH-MSP-2009-526 |
Volume
Image Segmentaton by Dual Multi-Scale Morphological
Reconstructions |
Chen,
Jiann-Jone |
||
IIH-MSP-2009-532 |
Secret
Sharing Protocol for Linguistic Threshold Schemes |
Marek, Ogiela |
||
IIH-MSP-2009-541 |
Adaptive
Reed–Solomon Code Protection
of Data Partitioned H.264 Video |
Li, heng |
||
IIH-MSP-2009-546 |
Electrical
impedance tomography for washing out underground pollution |
Tamura,
Shinichi |
||
IIH-MSP-2009-552 |
Orthogonal
functional expansion method of optical flow for large displacement |
Tamura,
Shinichi |
||
IIH-MSP-2009-556 |
Association
and abstraction on neural circuit loop and coding |
Tamura,
Shinichi |
||
IIH-MSP-2009-559 |
Non-expansible
Flip-flop Visual Cryptography with perfect security |
Chen,
Shang-Kuan |
||
IIH-MSP-2009-564 |
A
fast and novel inter-frame mode decision prediction algorithm for H.264/AVC
based-on the characteristic of macro-block |
liu, pengyu |
||
IIH-MSP-2009-569 |
Time-Scale
Invariant Zero-Watermarking Scheme for Audio |
Fan,
Ming |
||
IIH-MSP-2009-573 |
A
Robust Contourlet Based Image Hash Algorithm |
Wu,
Di |
||
IIH-MSP-2009-578 |
Improved
EMD Steganography with Great Embedding Rate and
High Embedding Efficiency |
Qu, Zhiguo |
||
IIH-MSP-2009-581 |
An
Improved Intra-frame Prediction Algorithm Based on the Histogram Feature of
Macro-block for H.264/AVC |
liu, pengyu |
||
IIH-MSP-2009-588 |
A
Schema for Multi-Signature Handling Based on Workflow Model |
Qiu, Zhilong |
||
IIH-MSP-2009-592 |
Detection
of LSB Replacement and LSB Matching Steganography
using Gray Level Run Length Matrix |
Seyedhosseini Tarzjani,
Seyed Mojtaba |
||
IIH-MSP-2009-596 |
Image
Watermarking in Face Recognition Systems Based on Contourlet
Transform |
Moin, Shahram |
||
IIH-MSP-2009-600 |
Exploring
AUC Boosting Approach in Multimodal Biometrics Score Level Fusion |
Moin, Shahram |
||
IIH-MSP-2009-604 |
Performance
and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream
Processor Architectures |
xu, guang |
||
IIH-MSP-2009-610 |
Mental
Rotation by neural Network |
Tamura,
Shinichi |
||
IIH-MSP-2009-614 |
Adaptive
Rate Control Scheme in Frame-layer for Real-time H.264 |
Kim, Myoung-Jin |
||
IIH-MSP-2009-619 |
A
Pair-wise Key Establishment Scheme for Wireless Sensor Networks |
Yang,
Cheng-Ta |
||
IIH-MSP-2009-623 |
An
Efficient Architecture for Deblocking Filter in
H.264 |
He,
Jing |
||
IIH-MSP-2009-633 |
Dual-Microphone
Speech Extraction from Signals with Audio Background |
Ziolko, Bartosz |
||
IIH-MSP-2009-636 |
Reversible
Secret Image Sharing Based on Shamir’s Scheme |
Hwang,
Min-Shiang |
||
IIH-MSP-2009-644 |
H.264/AVC-BASED
DEPTH MAP SEQUENCE CODING USING IMPROVED LOOP-FILTER |
Zhang,
|
||
IIH-MSP-2009-659 |
Image
retrieval in multimedia databases: a survey |
bogale, yihun |
||
IIH-MSP-2009-699 |
A
Robust Watermarking Algorithm based on Differential Energy and QIM for
Uncompressed Video |
LIU, Zhaoqing |
||
IIH-MSP-2009-703 |
A
fast audio retrieval method based on negativity judgment |
zheng, guibin |
||
IIH-MSP-2009-723 |
An
Automated On-line Traffic Classification Scheme |
Jian, Zhang |
||
IIH-MSP-2009-727 |
ACHIEVING
SECURE FUZZY COMMITMENT SCHEME FOR OPTICAL PUFs |
Ignatenko, Tanya |
||
IIH-MSP-2009-752 |
An
Investigation of Genetic Algorithm on Steganalysis
Techniques |
Yu, Xiaoyi |
||
IIH-MSP-2009-756 |
HISTOGRAM
SHIFTING LOSSLESS DATA HIDING BASED ON SPACE FILLING CURVES |
Wang,
Aiming |
||
IIH-MSP-2009-776 |
Half-Zone
Quantization Based Algorithm for Information Hiding |
Ameri, Ali |
||
IIH-MSP-2009-790 |
A
13.75 ns holographic reconfiguration of an optically differential
reconfigurable gate array |
Watanabe,
Minoru |
||
IIH-MSP-2009-819 |
Fisherface vs. Eigenface
in the Dual-tree Complex Wavelet Domain |
Ma,
Kai-Kuang |
||
IIH-MSP-2009-828 |
SHAPE-BASED
DEPTH MAP CODING |
Zhang,
|
||
IIH-MSP-2009-839 |
Wavelet
Moment and Improved Adaboost application to
Vehicle-logo Location |
Pan,
Xiang |
||
IIH-MSP-2009-843 |
The
Effects of Ambient Sounds on the Quality of 3D Virtual Sound Space |
YAIRI,
Satoshi |
||
IIH-MSP-2009-859 |
Information
hiding into interaural phase differences for stereo
audio signals |
Nishimura,
Ryouichi |