Accepted Papers in Invited Sessions of
IIH-MSP-2011
IIH-MSP-2011-IS01-01
License Plate Recognition for Vehicle Passing through a Gate
Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, and Chi-Ming Huang
IIH-MSP-2011-IS02-01
A Blind Digital Steganography Scheme Based on Complete Complementary Codes
Ryusuke Mayuzumi and Tetsuya Kojima
IIH-MSP-2011-IS02-02
Asynchronous stochastic decoder for spread spectrum digital watermarking
Nao Teranishi and Masaki Kawamura
IIH-MSP-2011-IS02-03
Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio
Pranab Kumar Dhar and Isao Echizen
IIH-MSP-2011-IS02-04
Content-based De-anonymisation of Tweets
Tomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama, and Hiroshi Yoshiura
IIH-MSP-2011-IS03-01
The Effect of Speaker and Noise Type on the Accuracy of Estimated Speech Intelligibility Using Objective Measures
Kazuhiro Kondo
IIH-MSP-2011-IS03-02
Manipulating Vocal Signal in Mixed Music Sounds Using Small Amount of Side Information
Yuto Sasaki, Seong-Jun Hahm, and Akinori Ito
IIH-MSP-2011-IS03-03
Median Plane Mislocalization of Virtual Sound Presented Through Headphones
Ryouichi Nishimura, Hiroaki Kato, Parham Mokhtari, and Hironori Takemoto
IIH-MSP-2011-IS03-04
Reversible Watermarking for Digital-audio Based on Cochlear Delay Characteristics
Masashi Unoki and Ryota Miyauchi
IIH-MSP-2011-IS03-05
Reversible Audio Data Hiding Using Linear Prediction and Error Expansion
Akira Nishimura
IIH-MSP-2011-IS03-06
Audio Trick Art Based on Information Misreading Technique
Naofumi Aoki
IIH-MSP-2011-IS04-01
The Research of Acoustic Emission Signal Classification
Xiaojing Meng, Weidong Liu, and Enjie Ding
IIH-MSP-2011-IS04-02
Design and Research on the Control of Biped Robot System Based on RUP
Meiqiang Zhu, Jun Wang, Ming Li, and Dong Li
IIH-MSP-2011-IS04-03
Static Gait Analysis and Planning of Biped Robot
Meiqiang Zhu, Jun Wang, Ming Li, and Yajing Lin
IIH-MSP-2011-IS04-04
The Research on the Module of Bipedal Robot Balance Adjustment
HanJun Li
IIH-MSP-2011-IS06-01
Multimedia Privacy Protection System for Mobil Environments
Chih-Yang Lin, Yi-Hui Chen, and Chao-Chin Chang
IIH-MSP-2011-IS06-02
A New Approach of Image Compression Based on Difference Vector Quantization
Jau-Ji Shen and Ya-Hsin Lo
IIH-MSP-2011-IS06-03
An Anti-Phishing User Authentication Scheme without Using a Sensitive Key Table
Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, and Chia-Chi Yang
IIH-MSP-2011-IS06-04
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices
Jen-Ho Yang, Chin-Chen Chang, and Shih-Yi Lin
IIH-MSP-2011-IS06-05
Fast Decoding method for On-Line Visual Secret Sharing by Parallel Processing Approach
Wen-Pinn Fang
IIH-MSP-2011-IS06-06
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing
Chin-Chen Chang, Kuo-Nan Chen, and Ying-Hsuan Huang
IIH-MSP-2011-IS06-07
Data Hiding Scheme based on Features of Chinese Text
Yi-Hui Chen, Li-Cheng Yang, and Chia-Chen Lin
IIH-MSP-2011-IS07-01
Graph-Based Features for Image Retrieval
Cai-Hua Li and Zhe-Ming Lu
IIH-MSP-2011-IS08-01
Design of 3-D FIR Cone-Shaped Filters by McClellan Transformation and Least-Squares Contour Mapping
Jong-Jy Shyu, Soo-Chang Pei, and Yun-Da Huang
IIH-MSP-2011-IS08-02
Design of 2.45GHz Planar Meander Dipole Antenna
Yuh-Yih Lu, Shih-Chiang Wei, Chun-Yi Li, and Hsiang-Cheh Huang
IIH-MSP-2011-IS08-03
A Study on ENF Discontinuity Detection Techniques
Feng-Cheng Chang and Hsiang-Cheh Huang
IIH-MSP-2011-IS08-04
Reversible Data Hiding with Difference Modification and Rhombus Relationships in Quadtree Decomposition
Hsiang-Cheh Huang, Yuh-Yih Lu, and Yueh-Hong Chen
IIH-MSP-2011-IS08-05
An Integrated Building Fire Evacuation System with RFID and Cloud Computing
Liou Chu and Shih-Jung Wu
IIH-MSP-2011-IS08-06
A Copyright Information Embedding System for Android Platform
Yueh-Hong Chen and Hsiang-Cheh Huang
IIH-MSP-2011-IS08-07
A Novel Packet Scheduling Scheme for Downlink LTE System
Shih-Jung Wu and Liou Chu
IIH-MSP-2011-IS08-08
Content-Adaptive Multibit Data Embedding for Lossless Data Hiding
Hsiang-Cheh Huang, Wei-Hao Lai, and Feng-Cheng Chang
IIH-MSP-2011-IS08-09
The Design of an XMPP-based Service Integration Scheme
Feng-Cheng Chang and Duen-Kai Chen
IIH-MSP-2011-IS08-10
A Cicerone System based on Android Platform
Yueh-Hong Chen and Hsiang-Cheh Huang
IIH-MSP-2011-IS08-11
Histogram-Based Difference Expansion for Reversible Data Hiding with Content Statistics
Hsiang-Cheh Huang, Yueh-Hong Chen, and Yuh-Yih Lu
IIH-MSP-2011-IS09-01
Prediction-based Lossless Data Hiding by Adaptive Coefficient-bias Algorithm
Ching-Yu Yang, Chih-Hung Lin, and Wu-Chih Hu
IIH-MSP-2011-IS09-02
Data Encrypting In a Binary Image Base on Modified Data Hiding Method
Kuang Tsan Lin
IIH-MSP-2011-IS09-03
Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood Toggling
Brian K. Lien and Zhi-Lin Lan
IIH-MSP-2011-IS09-04
An Improved Data Hiding Method Using Image Interpolation
Sen-Ren Jan, Steen J. Hsu, Chuan-Feng Chiu, and Shu-Lin Chang
IIH-MSP-2011-IS09-05
Hierarchical Three-Dimension Mesh Model Sharing
Shang-Kuan Chen and Chiu-Jian Hsu
IIH-MSP-2011-IS09-06
Offline QR Code Authorization Based on Visual Cryptography
Wen-Pinn Fang
IIH-MSP-2011-IS09-07
Improved Invertible Secret Image Sharing with Steganography
Yung-Yi Lin and Ran-Zan Wang
IIH-MSP-2011-IS09-08
Single-Packet IP Traceback with Less Logging
Wen-Chung Kuo, Shuen-Chih Tsai, Yi-Lin Chen, and Jung-Shian Li
IIH-MSP-2011-IS11-01
Compressing Encrypted Image Using Compressive Sensing
Xinpeng Zhang, Yanli Ren, Guorui Feng, and Zhenxing Qian
IIH-MSP-2011-IS11-02
General Threshold Signature based on the Chinese Remainder Theorem
Cheng Guo and Chin-Chen Chang
IIH-MSP-2011-IS11-03
A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes
Qian Mao, Boqing Xu, and Yanping Qin
IIH-MSP-2011-IS11-04
A General Sharing Model Based on Proxy Re-encryption
Guojun Ma, Qingqi Pei, and Jianfeng Ma
IIH-MSP-2011-IS11-05
A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
Chin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, and Ching-Hsiang Chang
IIH-MSP-2011-IS11-06
Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method
Chin-Feng Lee and Kai-Chin Chen
IIH-MSP-2011-IS11-07
HB Family RFID Mutual Authentication Protocol
Chia-Min Lin, Shyh-Chang Tsaur, Yeong-Chin Chen, and Iuon-Chang Lin
IIH-MSP-2011-IS12-01
A Video Transmission Framework Based on Packet Criticality Model
Jianchao Du, Jianlong Zhang, Song Xiao, and Chengke Wu
IIH-MSP-2011-IS12-02
A Threshold-based Coefficients Cutting Method for Compressive Imaging
Lei Quan, Song Xiao, Jianchao Du, and Jianli Zhou
IIH-MSP-2011-IS12-03
Fast Mode Decision Algorithm for H.264/SVC Based on Motion Vector Relation Analysis
Xuesong Sun, Song Xiao, Jianchao Du, and Min Hu
IIH-MSP-2011-IS12-04
A Rate Distortion-based Network Coding Design for Video Transmission
Ying Kang, Song Xiao, Ji Lu, and Chengke Wu
IIH-MSP-2011-IS12-05
An Error Concealment Algorithm Based on Non-uniform Lagrange Interpolation
Jianlong Zhang, Xinbo Gao, Song Xiao, and Jianchao Du
IIH-MSP-2011-IS12-06
An Opportunistic Network Coding Algorithm Based on the Queue State and Network Topology
Li Zhang, Song Xiao, Ning Cai, and Jianchao Du
IIH-MSP-2011-IS13-01
Design of U Disk Remote Monitoring System in Trusted Computing Environment
Shidou Yan, Yatao Yang, Zichen Li, and Huanhuan Lu
IIH-MSP-2011-IS13-02
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems
Ahmed A. Abd El-Latif, Li Li, Ning Wang, and Xiamu Niu
IIH-MSP-2011-IS13-03
Sockpuppet Detection in Online Discussion Forums
Xueling Zheng, Yiu Ming Lai, K.P. Chow, Lucas C.K. Hui, and S.M. Yiu
IIH-MSP-2011-IS13-04
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers
Shuhui Hou, Tetsutaro Uehara, S.M. Yiu, Lucas C.K. Hui, and K.P. Chow
IIH-MSP-2011-IS13-05
Automatic Online Monitoring and Data-Mining Internet Forums
Y.M. Lai, Xueling Zheng, K.P. Chow, Lucas C.K. Hui, and S.M. Yiu
IIH-MSP-2011-IS13-06
Development of Domestic and International Computer Forensic
Rongsheng Xu, K.P. Chow, and Ying Yang