Accepted Papers in General Sessions of IIHMSP-2014

IIHMSP-2014-0006
A novel reversible data hiding scheme based on reference pixels and adaptive block selection
Xinlu Gui, Siren Cai, Xiaolong Li and Bin Yang
Corresponding Author: Xiaolong Li, lixiaolong@pku.edu.cn

IIHMSP-2014-0010
Steganalysis of LSB matching based on local binary patterns
Xinlu Gui, Xiaolong Li and Bin Yang
Corresponding Author: Xiaolong Li, lixiaolong@pku.edu.cn

IIHMSP-2014-0014
Optimizing Pixel Predictors Based on Self-similarities for Reversible Data Hding
Xiaocheng Hu, Weiming Zhang and Nenghai Yu
Corresponding Author: Xiaocheng Hu, hxc@mail.ustc.edu.cn

IIHMSP-2014-0018
An automatic Chinese font library generation method by modifying vector contour curves
Wenfa Qi, Yuxin Liu and Wei Guo
Corresponding Author: Yuxin Liu, liuyuxin@pku.edu.cn

IIHMSP-2014-0024
Integration of Multiple Shape Features for Human Detection in Videos
Liang-Hua Chen, Pei-Chieh Lee, Li-Yun Wang and Hong-Yuan Liao
Corresponding Author: Liang-Hua Chen, lchen@csie.fju.edu.tw

IIHMSP-2014-0029
Scientific literature retrieval model based on weighted term frequency
Xi-Quan Yang, Dian Yang, Ming Yuan and Xing-Hua Lv
Corresponding Author: Xi-Quan Yang, yangxq375@nenu.edu.cn

IIHMSP-2014-0056
An energy minimization approach for Automatic Video Shot and Scene Boundary Detection
Sinnu Susan Thomas, Sumana Gupta and Venkatesh K. S.
Corresponding Author: Sinnu Susan Thomas, sinnu@iitk.ac.in

IIHMSP-2014-0062
Formalization and Systematization of Differential Cryptanalysis Notions
Andrey Pestunov
Corresponding Author: Andrey Pestunov, pestunov@gmail.com

IIHMSP-2014-0065
Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding
Wannida Sae-Tang, Masaaki Fujiyoshi and Hitoshi Kiya
Corresponding Author: Wannida Sae-Tang, saetang-wannida@ed.tmu.ac.jp

IIHMSP-2014-0071
Night Video Surveillance Based on the Second-Order Statistics Features
Cheng-Chang Lien, Wen-Kai Yu, Chang-Hsing Lee and Chin-Chuan Han
Corresponding Author: Cheng-Chang Lien, cclien@chu.edu.tw

IIHMSP-2014-0074
Robust Handwriting Extraction and Lecture Video Summarization
F. H. Yeh, G. C. Lee, I. J. Chen and C. H. Liao
Corresponding Author: F. H. Yeh, yehvolvo@gmail.com

IIHMSP-2014-0079
The Adaptive Recommendation Segment Mechanism to Reduce Traffic Congestion in Smart City
Gwo-Jiun Horng
Corresponding Author: Gwo-Jiun Horng, grojium@gmail.com

IIHMSP-2014-0083
Elimination of matching digital images to identify objective measures of quality
Jakub Peksinski, Grzegorz Mikolajczak and Janusz Pawel Kowalski
Corresponding Author: Jakub Peksinski, jpeksinski@zut.edu.pl

IIHMSP-2014-0088
On Extreme Learning Machine for Watermarking of an Images in Discrete Wavelet Transform Domain
Ram Pal Singh, Neelam Dabas and Vikash Chaudhary
Corresponding Author: Ram Pal Singh, rprana@gmail.com

IIHMSP-2014-0094
Analyzing Item Features for Cold-Start Problems in Recommendation Systems
Soryoung Kim, Sang-Min Choi, Yo-Sub Han, Ka Lok Man and Kaiyu Wan
Corresponding Author: Ka Lok Man, ka.man@xjtlu.edu.cn

IIHMSP-2014-0102
Recognizing Actions with Multi-view 2D Observations Recovered from Depth Maps
Guoliang LU, Yiqi ZHOU and Xueyong LI
Corresponding Author: Guoliang LU, luguoliang@sdu.edu.cn

IIHMSP-2014-0136
Full-frame Video Stabilization via SIFT Feature Matching
Yu-Hsi Chen, Hsueh-Yi Sean Lin and Chih-Wen Su
Corresponding Author: Hsueh-Yi Sean Lin, seanlin@mail.lhu.edu.tw

IIHMSP-2014-0152
A Dynamic Street View System Using Video Event Data Recorder
Ching-Hao Lai, Jun-Dong Chang, Ji-Wei Lu and Fay Huang
Corresponding Author: Ching-Hao Lai, chinghaolai@gmail.com

IIHMSP-2014-0157
A Hybrid Multi-Functions Digital Public Address System with Earthquake Early Warning
Chung-Heng Chuang, Tsung-Hsing Lin, Liang-Bi Chen, Tung-Lin Lee, Chaio-Hsuan Chuang, Katherine Shi-Min Li, Chih-Lin Hung and Chao-Wen Wu
Corresponding Author: Liang-Bi Chen, liangbi.chen@gmail.com

IIHMSP-2014-0168
A known-key scenario for steganalysis and a highly accurate detector within it
Viktor Monarev and Andrey Pestunov
Corresponding Author: Andrey Pestunov, pestunov@gmail.com

IIHMSP-2014-0174
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction
Chin-Chen Chang and Hsiao-Ling Wu
Corresponding Author: Chin-Chen Chang, alan3c@gmail.com

IIHMSP-2014-0178
An AODV-based Backup Routing Mechanism for Time-Critical in Wireless Mesh Networks
Ming-Hwa Cheng, Rui-Juan Deng, Wen-Shyang Hwang and Yan-Jing Wu
Corresponding Author: Wen-Shyang Hwang, wshwang@mail.ee.kuas.edu.tw

IIHMSP-2014-0186
The K-Means clustering methods applied in the message scheduling methods of FlexRay communication network based on the Embedded FlexRay Node
Yung-Hoh Sheu, Zuo-Wen Wang and Yao-Jhong Liou
Corresponding Author: Yung-Hoh Sheu, yhsheu@nfu.edu.tw

IIHMSP-2014-0192
Robust Message Hiding for QR Code
Thach V. Bui, Nguyen K. Vu, Thong T.P. Nguyen, Isao Echizen and Thuc D. Nguyen
Corresponding Author: Thach V. Bui, vanthach.bui@gmail.com

IIHMSP-2014-0211
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard
Chin-Chen Chang, Wei-Yi Chen and Ting-Fang Cheng
Corresponding Author: Chin-Chen Chang, alan3c@gmail.com

IIHMSP-2014-0241
Applying Histogram Modi?cation to Embed Secret Message in AMBTC
Chin-Chen Chang, Hsiao-Ling Wu and Ting-Feng Chung
Corresponding Author: Chin-Chen Chang, alan3c@gmail.com

IIHMSP-2014-0247
Polynomial-based secret sharing scheme based on the absolute moment block truncation coding technique
Chin-Chen Chang and Chin-Yu Sun
Corresponding Author: Chin-Chen Chang, alan3c@gmail.com