Accepted Papers in Invited Sessions of IIH-MSP-2011

 

IIH-MSP-2011-IS01-01

License Plate Recognition for Vehicle Passing through a Gate

Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, and Chi-Ming Huang

 

IIH-MSP-2011-IS02-01

A Blind Digital Steganography Scheme Based on Complete Complementary Codes

Ryusuke Mayuzumi and Tetsuya Kojima

 

IIH-MSP-2011-IS02-02

Asynchronous stochastic decoder for spread spectrum digital watermarking

Nao Teranishi and Masaki Kawamura

 

IIH-MSP-2011-IS02-03

Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio

Pranab Kumar Dhar and Isao Echizen

 

IIH-MSP-2011-IS02-04

Content-based De-anonymisation of Tweets

Tomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama, and Hiroshi Yoshiura

 

IIH-MSP-2011-IS03-01

The Effect of Speaker and Noise Type on the Accuracy of Estimated Speech Intelligibility Using Objective Measures

Kazuhiro Kondo

 

IIH-MSP-2011-IS03-02

Manipulating Vocal Signal in Mixed Music Sounds Using Small Amount of Side Information

Yuto Sasaki, Seong-Jun Hahm, and Akinori Ito

 

IIH-MSP-2011-IS03-03

Median Plane Mislocalization of Virtual Sound Presented Through Headphones

Ryouichi Nishimura, Hiroaki Kato, Parham Mokhtari, and Hironori Takemoto

 

IIH-MSP-2011-IS03-04

Reversible Watermarking for Digital-audio Based on Cochlear Delay Characteristics

Masashi Unoki and Ryota Miyauchi

 

IIH-MSP-2011-IS03-05

Reversible Audio Data Hiding Using Linear Prediction and Error Expansion

Akira Nishimura

 

IIH-MSP-2011-IS03-06

Audio Trick Art Based on Information Misreading Technique

Naofumi Aoki

 

IIH-MSP-2011-IS04-01

The Research of Acoustic Emission Signal Classification

Xiaojing Meng, Weidong Liu, and Enjie Ding

 

IIH-MSP-2011-IS04-02

Design and Research on the Control of Biped Robot System Based on RUP

Meiqiang Zhu, Jun Wang, Ming Li, and Dong Li

 

IIH-MSP-2011-IS04-03

Static Gait Analysis and Planning of Biped Robot

Meiqiang Zhu, Jun Wang, Ming Li, and Yajing Lin

 

IIH-MSP-2011-IS04-04

The Research on the Module of Bipedal Robot Balance Adjustment

HanJun Li

 

IIH-MSP-2011-IS06-01

Multimedia Privacy Protection System for Mobil Environments

Chih-Yang Lin, Yi-Hui Chen, and Chao-Chin Chang

 

IIH-MSP-2011-IS06-02

A New Approach of Image Compression Based on Difference Vector Quantization

Jau-Ji Shen and Ya-Hsin Lo

 

IIH-MSP-2011-IS06-03

An Anti-Phishing User Authentication Scheme without Using a Sensitive Key Table

Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, and Chia-Chi Yang

 

IIH-MSP-2011-IS06-04

An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices

Jen-Ho Yang, Chin-Chen Chang, and Shih-Yi Lin

 

IIH-MSP-2011-IS06-05

Fast Decoding method for On-Line Visual Secret Sharing by Parallel Processing Approach

Wen-Pinn Fang

 

IIH-MSP-2011-IS06-06

Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing

Chin-Chen Chang, Kuo-Nan Chen, and Ying-Hsuan Huang

 

IIH-MSP-2011-IS06-07

Data Hiding Scheme based on Features of Chinese Text

Yi-Hui Chen, Li-Cheng Yang, and Chia-Chen Lin

 

IIH-MSP-2011-IS07-01

Graph-Based Features for Image Retrieval

Cai-Hua Li and Zhe-Ming Lu

 

IIH-MSP-2011-IS08-01

Design of 3-D FIR Cone-Shaped Filters by McClellan Transformation and Least-Squares Contour Mapping

Jong-Jy Shyu, Soo-Chang Pei, and Yun-Da Huang

 

IIH-MSP-2011-IS08-02

Design of 2.45GHz Planar Meander Dipole Antenna

Yuh-Yih Lu, Shih-Chiang Wei, Chun-Yi Li, and Hsiang-Cheh Huang

 

IIH-MSP-2011-IS08-03

A Study on ENF Discontinuity Detection Techniques

Feng-Cheng Chang and Hsiang-Cheh Huang

 

IIH-MSP-2011-IS08-04

Reversible Data Hiding with Difference Modification and Rhombus Relationships in Quadtree Decomposition

Hsiang-Cheh Huang, Yuh-Yih Lu, and Yueh-Hong Chen

 

IIH-MSP-2011-IS08-05

An Integrated Building Fire Evacuation System with RFID and Cloud Computing

Liou Chu and Shih-Jung Wu

 

IIH-MSP-2011-IS08-06

A Copyright Information Embedding System for Android Platform

Yueh-Hong Chen and Hsiang-Cheh Huang

 

IIH-MSP-2011-IS08-07

A Novel Packet Scheduling Scheme for Downlink LTE System

Shih-Jung Wu and Liou Chu

 

IIH-MSP-2011-IS08-08

Content-Adaptive Multibit Data Embedding for Lossless Data Hiding

Hsiang-Cheh Huang, Wei-Hao Lai, and Feng-Cheng Chang

 

IIH-MSP-2011-IS08-09

The Design of an XMPP-based Service Integration Scheme

Feng-Cheng Chang and Duen-Kai Chen

 

IIH-MSP-2011-IS08-10

A Cicerone System based on Android Platform

Yueh-Hong Chen and Hsiang-Cheh Huang

 

IIH-MSP-2011-IS08-11

Histogram-Based Difference Expansion for Reversible Data Hiding with Content Statistics

Hsiang-Cheh Huang, Yueh-Hong Chen, and Yuh-Yih Lu

 

IIH-MSP-2011-IS09-01

Prediction-based Lossless Data Hiding by Adaptive Coefficient-bias Algorithm

Ching-Yu Yang, Chih-Hung Lin, and Wu-Chih Hu

 

IIH-MSP-2011-IS09-02

Data Encrypting In a Binary Image Base on Modified Data Hiding Method

Kuang Tsan Lin

 

IIH-MSP-2011-IS09-03

Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood Toggling

Brian K. Lien and Zhi-Lin Lan

 

IIH-MSP-2011-IS09-04

An Improved Data Hiding Method Using Image Interpolation

Sen-Ren Jan, Steen J. Hsu, Chuan-Feng Chiu, and Shu-Lin Chang

 

IIH-MSP-2011-IS09-05

Hierarchical Three-Dimension Mesh Model Sharing

Shang-Kuan Chen and Chiu-Jian Hsu

 

IIH-MSP-2011-IS09-06

Offline QR Code Authorization Based on Visual Cryptography

Wen-Pinn Fang

 

IIH-MSP-2011-IS09-07

Improved Invertible Secret Image Sharing with Steganography

Yung-Yi Lin and Ran-Zan Wang

 

IIH-MSP-2011-IS09-08

Single-Packet IP Traceback with Less Logging

Wen-Chung Kuo, Shuen-Chih Tsai, Yi-Lin Chen, and Jung-Shian Li

 

IIH-MSP-2011-IS11-01

Compressing Encrypted Image Using Compressive Sensing

Xinpeng Zhang, Yanli Ren, Guorui Feng, and Zhenxing Qian

 

IIH-MSP-2011-IS11-02

General Threshold Signature based on the Chinese Remainder Theorem

Cheng Guo and Chin-Chen Chang

 

IIH-MSP-2011-IS11-03

A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes

Qian Mao, Boqing Xu, and Yanping Qin

 

IIH-MSP-2011-IS11-04

A General Sharing Model Based on Proxy Re-encryption

Guojun Ma, Qingqi Pei, and Jianfeng Ma

 

IIH-MSP-2011-IS11-05

A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol

Chin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, and Ching-Hsiang Chang

 

IIH-MSP-2011-IS11-06

Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method

Chin-Feng Lee and Kai-Chin Chen

 

IIH-MSP-2011-IS11-07

HB Family RFID Mutual Authentication Protocol

Chia-Min Lin, Shyh-Chang Tsaur, Yeong-Chin Chen, and Iuon-Chang Lin

 

IIH-MSP-2011-IS12-01

A Video Transmission Framework Based on Packet Criticality Model

Jianchao Du, Jianlong Zhang, Song Xiao, and Chengke Wu

 

IIH-MSP-2011-IS12-02

A Threshold-based Coefficients Cutting Method for Compressive Imaging

Lei Quan, Song Xiao, Jianchao Du, and Jianli Zhou

 

IIH-MSP-2011-IS12-03

Fast Mode Decision Algorithm for H.264/SVC Based on Motion Vector Relation Analysis

Xuesong Sun, Song Xiao, Jianchao Du, and Min Hu

 

IIH-MSP-2011-IS12-04

A Rate Distortion-based Network Coding Design for Video Transmission

Ying Kang, Song Xiao, Ji Lu, and Chengke Wu

 

IIH-MSP-2011-IS12-05

An Error Concealment Algorithm Based on Non-uniform Lagrange Interpolation

Jianlong Zhang, Xinbo Gao, Song Xiao, and Jianchao Du

 

IIH-MSP-2011-IS12-06

An Opportunistic Network Coding Algorithm Based on the Queue State and Network Topology

Li Zhang, Song Xiao, Ning Cai, and Jianchao Du

 

IIH-MSP-2011-IS13-01

Design of U Disk Remote Monitoring System in Trusted Computing Environment

Shidou Yan, Yatao Yang, Zichen Li, and Huanhuan Lu

 

IIH-MSP-2011-IS13-02

Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems

Ahmed A. Abd El-Latif, Li Li, Ning Wang, and Xiamu Niu

 

IIH-MSP-2011-IS13-03

Sockpuppet Detection in Online Discussion Forums

Xueling Zheng, Yiu Ming Lai, K.P. Chow, Lucas C.K. Hui, and S.M. Yiu

 

IIH-MSP-2011-IS13-04

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers

Shuhui Hou, Tetsutaro Uehara, S.M. Yiu, Lucas C.K. Hui, and K.P. Chow

 

IIH-MSP-2011-IS13-05

Automatic Online Monitoring and Data-Mining Internet Forums

Y.M. Lai, Xueling Zheng, K.P. Chow, Lucas C.K. Hui, and S.M. Yiu

 

IIH-MSP-2011-IS13-06

Development of Domestic and International Computer Forensic

Rongsheng Xu, K.P. Chow, and Ying Yang