IIH-MSP 2015 Conference Program
(parallel sessions in each block)


Wed 23 Sep

Thu 24 Sep

Fri 25 Sep

09:00-10:00

Registration
Room: outside GK2-12

Keynote 1
Ling Guan
Natural Human-Computer Interaction for the Creation of Lift-like Experience in the Immersive Environment
Room: HH4-08

Keynote 2
Ce Zhu
Visual Distortion Detection and Reduction in 3D Video
Room: HH4-08

10:00-10:20

Coffee break

10:20-12:00

IS14 Technologies for Next-Generation Network Environments (part1)
Room: GK2-16

IS10 Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals
Room: GK2-12
----------------------------------------
IS15 Signal Processing, Optimization and Robust Evaluation (part 1)
Room: GK2-16
----------------------------------------
Combined IS04 + IS09
IS04 Intelligent Video Processing
IS09 Multimedia Innovative Technology
Room: GK4-18

IS19 Big Data Security Analytics
Room: GK2-12
----------------------------------------
IS21 Artificial Intelligence and Its Applications
Room: GK2-15
----------------------------------------
Regular session (part 2)
Room: GK2-16

12:00-13:00

Lunch

13:00-14:40

IS14 Technologies for Next-Generation Network Environments (part 2)
Room: GK2-16
----------------------------------------
Combined IS07 + IS16:
IS07 Multimedia Signal Processing and Network Technology
IS16 Image Processing and Classification
Room: GK2-12

IS22 Enrichment of acoustic spatial information for future ultra-realistic communications over internet
Room: GK2-12
----------------------------------------
IS15 Signal Processing, Optimization and Robust Evaluation (part 2)
Room: GK2-16
----------------------------------------
IS08 Multimedia Security and Copyright Protection
Room: GK4-18


14:40-15:00

Coffee break

15:00-17:00

IS18 2D/3D Video Coding and Image/Video Information Processing
Room: GK2-12
---------------------------------------
IS13 Public Key Cryptography and Applications
Room: GK2-16
----------------------------------------
Regular session (part 1)
Room: GK4-18

IS01 Cross-discipline Techniques in Signal Processing and Networking
Room: GK2-12
----------------------------------------
IS02 Wearable Computing and Information Security
Room: GK2-16
----------------------------------------
Combined IS03 + IS17:
IS03 Ergonomic Information and Control Systems
IS17 Information Processing and Complex Network
Room: GK4-18
----------------------------------------
IS06 Security and Privacy Protection in Computer Forensic Applications
Room: GK4-30





Welcome Reception
Time: 6:00pm
Location: SAHMRI

Conference Dinner
Time: 6:30pm

Location: Rockford Hotel
164 Hindley St, Adelaide SA 5000, Australia




Wednesday 23 September

Date

Wed 23 Sep

Time

10:20-12:00

Room

GK2-16

Session

IS14 Technologies for Next-Generation Network Environments (part1)

Chair(s)

Chien-Ming Chen
Mu-En Wu

NIDS Rule Generating System for Detecting HTTP-like Malware Communication
Chia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung, and Che-Wei Lin

Security Analysis of A Time-bound Hierarchical Key Assignment Scheme
Jeng-Shyang Pan,Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang

A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices
Yuan-Yuan Su, Yu-Tzu Chang, and Hung-Min Sun

Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints
Chia-Hung Wang, Mu-En Wu and Chien-Ming Chen

A New Reduced-Latency SC Decoder for Polar Codes
Dan Le, Qiong Li, Lu Shan and Xiamu Niu


Date

Wed 23 Sep

Time

13:00 – 14:40

Room

GK2-16

Session

IS14 Technologies for Next-Generation Network Environments (part 2)

Chair(s)

Chien-Ming Chen
Mu-En Wu

Improving Weights for Graph-Based Image Fragment Reassembly
Xianyan Wu, Qi Han, Xiamu Niu

An Accountable Identity-based Billing Protocol for Cloud Environment
Nai-Wei Lo and Cheng Tsung Liu

A Swarm-based Sanitization Approach for Hiding Confidential Itemsets
Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, and Jeng-Shyang Pan

A KL Divergence Function for Randomized Secret Shares
Jeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chwei-Shyong Tsai, and Chien-Ming Chen

Detection of Seam Carving and Contrast Enhancement Operation Chain
Jianwei Li, Yao Zhao, Rongrong Ni


Date

Wed 23 Sep

Time

13:00 – 14:40

Room

GK2-12

Session

Combined IS07 + IS16:
IS07 Multimedia Signal Processing and Network Technology
IS16 Image Processing and Classification

Chair(s)

Hsueh-Yi Sean Lin
Li-Wei Kang
Lijun Yan
Shu-Chuan Chu
Xuefeng Bai

Fingertip Detection Using Two-Stage Random Decision Forest
Meng-Hsin Liu, Tai-Hung Lin, and Chih-Wen Su

A Multiresolution Approach to Recovering Colors and Details of Clipped Image Regions
Yi-Hong Lu, Yu-Hsi Chen, and Hsueh-Yi Sean Lin

Extended Discriminant Nearest Feature Line Analysis for Feature Extraction
Yunxia Liu, Tie Cai, Guowei Huang

Two-Dimensional Extended Feature Line Space for Feature Extraction
Jiangang Chen, Xuefeng Bai, Guowei Huang


Date

Wed 23 Sep

Time

15:00-17:00

Room

GK2-12

Session

IS18 2D/3D Video Coding and Image/Video Information Processing

Chair(s)

Ke-Bin Jia
Zhonghua Sun

An automatic geometric features extracting approach for facial expression recognition based on corner detection
Guandong Gao, Kebin Jia, and Bin Jiang


Deep Feature Learning with Discrimination Mechanism for Brain Tumor Segmentation and Diagnosis

Liya Zhao, Kebin Jia

A Distributed Anomaly Detection Method of Operation Energy Consumption using Smart Meter Data
Ye Yuan, Kebin Jia

Design and Implementation of Remote Facial Expression Recognition Surveillance System Based on PCA and KNN algorithms
Qite Wang , Kebin Jia and Pengyu Liu

Video Annotation Based on Video Structure Information and Key frames Semantic Description
Zhonghua Sun, Miaojie Sang, Kebin Jia


Date

Wed 23 Sep

Time

15:00-17:00

Room

GK2-16

Session

IS13 Public Key Cryptography and Applications

Chair(s)

Jeng-Shyang Pan
Feng Wang

Detecting Duplicated Frames by Mapping Frames to 3D Skeletons
Liyang Yu, Qi Han, Xiamu Niu

A Novel (2, 2) Visual Secret Sharing Without the Pixel Expansion
Xin Liu, Shen Wang, Weizhe Zhang and Xiamu Niu

A Formalized Description and Analysis of FTP on Petri Net
Cai Bin

Modeling and Analysis of Intelligence Assurance System Based on the Complex Networks Theory
HAN Shu-jian, ZHU Li, LI Zheng

Tamper Detection Method for Clipped Double JPEG Compression Image
Gong Zhenzhen, Niu Shaozhang, Han Hongli

An Efficient Lattice-based Proxy Signature Scheme without Trapdoor
Chunli Yang, Licheng Wang, Shihui Zheng, and Yixian Yang

Security analysis on “Strongly secure certificateless key-insulated signature secure in the standard model”
Feng Wang, Li Xu, and Jeng-Shyang Pan


Date

Wed 23 Sep

Time

15:00-17:00

Room

GK4-18

Session

Regular session (part 1)

Chair(s)

Ivan Lee

Weighted Extreme Learning Machine for Digital Watermarking in DWT Domain.
Ram Pal Singh, Neelam Dabas, Vikash Chaudhary and Nagendra

Feature reduction of multi-scale LBP for texture classification
Ran Hu, Wenfa Qi and Zongming Guo

Passive Detection of Tampered JPEG Image Based on First Digit Statistics
Qing Wang, Rong Zhang and Ke Qing

Iterative Weighted DCT-SVD for Compressive Imaging
Zhenglin Wang and Ivan Lee

Compressing Encrypted Images Using the Integer Lifting Wavelet
Chuntao Wang and Jiangqun Ni

Image scrambling scheme based on bit-level permutation and 2-D Cellular Automata
Ping Ping

Deshun Yang and Xiaoou Chen. Using Deep Belief Network to capture temporal information for audio event classification
Feng Guo


Thursday 24 September


Date

Thu 24 Sep

Time

10:20-12:00

Room

GK2-12

Session

IS10 Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals

Chair(s)

Masashi Unoki
Kotaro Sonoda

Properties of an emergency broadcasting system based on audio data hiding
Tetsuya Kojima, Akihiro Oizumi, and Udaya Parampalli

Tempo modification of mixed music signal by nonlinear time scaling and sinusoidal modeling
Tsukasa Nishino, Takashi Nose, and Akinori Ito

Advertising system based on cloud computing and audio watermarking
Chengxiang Yin, Jin Hu, Xuejun Zhang, and Xiang Xie

An audio watermarking method using tones of diatonic chord
Harumi Murata and Akio Ogihara

An automatic watermarking in CELP speech codec based on formant tuning
Erick Christian Garcia Alvarez, Shengbei Wang, and Masashi Unoki

Audible secret keying for time-spread-echo based audio watermarking
Tatsuya Matsumoto and Kotaro Sonoda


Date

Thu 24 Sep

Time

10:20 – 12:00

Room

GK2-16

Session

IS15 Signal Processing, Optimization and Robust Evaluation (part 1)

Chair(s)

Baolong Guo
Yunyi Yan

Small Moving Object Tracking in Dynamic Video
Dajian Li, Wei Jia, Wei Sun, Penghui Li, Chunyu Zhao, Xumeng Chen

Exploring Research of Algorithm in Signal Coning Error Compensation
Xin Wang

Research on Imaging Detection Based on Digital Reflection Device
Xin Wang

A FPGA power estimation method based on an improved BP neural network
Guochang Zhou, Baolong Guo, Xiang Gao, Jing Ma, Hongjie He, Yunyi Yan

Digital Image Stabilization for Cameras on Moving Platform
Juanjuan Zhu, Cheng Li, Jinli Xu


Date

Thu 24 Sep

Time

10:20 – 12:00

Room

GK4-18

Session

Combined IS04 + IS09
IS04 Intelligent Video Processing
IS09 Multimedia Innovative Technology

Chair(s)

Kalana Ishara Patuwatha Withanage

Vehicle Detection in Nighttime Environment by Locating Road Lane and Taillights
Tsong-Yi Chen, Chao-Ho Chen,Guan-Ming Luo, Wu-Chih Hu

A Virtual Backbone Construction Heuristic for Maximizing the Lifetime of Dual-Radio Wireless Sensor Networks
Bing-Hong Liu, Van-Trung Pham, Ngoc-Tu Nguyen

Life Events Segmentation based on Lifelog Recorded by Wearable Device
Chieh-Ling Huang, Yu-Hsiang Huang, Jwu-Jenq Chen

Finding All Competitive Products Using the Dominant Relationship Analysis
Yu-Chi Chung, I-Fang Su, Chiang Lee, Pin-Chieh Huang

Channel Estimation for Inverse Power Control in Wireless Communication Networks
Chang-Yi Yang


Date

Thu 24 Sep

Time

13:00 – 14:40

Room

GK2-12

Session

IS22 Enrichment of acoustic spatial information for future ultra-realistic communications over internet

Chair(s)

Shuichi Sakamoto
Junfeng Li

Virtual auditory display on a smartphone for high-resolution acoustic space by remote rendering
Yukio Iwaya, Takao Tsuchiya, Makoto Otani and Junfeng Li

A compact representation of the head-related transfer function inspired by the wavelet transform on the sphere
Jorge Trevino, Shichao Hu, Cesar Salvador, Shuichi Sakamoto, Junfeng Li and Yo-iti Suzuki

Prediction method for the compression of spherical microphone array signals using geometrical information
Shuichi Sakamoto, Arif Wicaksono, Jorge Trevino, Cesar Salvador and Yo-Iti Suzuki

Equalization of sound reproduction system based on the human perception characteristics
Qianqian Fang, Huaxing Xu, Risheng Xia, Junfeng Li and Yonghong Yan

Feasibility of estimating direction of arrival based on monaural modulation spectrum
Daisuke Morikawa, Masaru ando and Masashi Unoki

Objective measurement of spatial audio quality based on MARS
Jing Wang, Xiang Xie, Shenghui Zhao and Jingming Kuang


Date

Thu 24 Sep

Time

13:00 – 14:40

Room

GK2-16

Session

IS15 Signal Processing, Optimization and Robust Evaluation (part 2)

Chair(s)

Baolong Guo
Yunyi Yan

Network Anomaly Detection with Compression
Jun Ma, Jianguo Yao, Yunyi Yan

An Efficient Weighting Method for Nakagami-m Envelope Distribution Simulation
Shi Lei, Li Xiaoping, Liu Yanming, Zhao Lei

A Method to Fallible Branch Search in FPGA Programs
Haixu Li, Yunyi Yan, Baolong Guo

Image retrieval by saliency detection
Fanjie Meng, Baolong Guo, Miao Song, Xu Zhang

Design for Maintenance System of Satellites after Atomic Clock Switching
Miao Miao, Zhou Wei, Li Zhiqi, Zhang Xueping, Xuan Zongqiang


Date

Thu 24 Sep

Time

13:00 – 14:40

Room

GK4-18

Session

IS08 Multimedia Security and Copyright Protection

Chair(s)

Yung-Chen Chou
Chin-Feng Lee
Tzu-Chuen Lu

Combined Prediction-based Reversible Data Embedding Methods for High Image Quality
Tzu-Chuen Lu, Ying-Hsuan Huang, and Mei-Chen Lin

Reversible Dual-image Data Embedding on Pixel Differences using Histogram-Modification-Shifting and Cross Magic Matrix
Chin-Feng Lee, Si-Ting Chen, and Jau-Ji Shen

An Improvement to Image Interpolating Data Embedding using Reversible Pixel Shifting Modification and Direction Modification Operation
Chin-Feng Lee and Yu-Ju Tseng

Equalized CR-Dropping for Image Compression
Chun-Hsiu Yeh, Jau-Ji Shen, and Jinn-Ke Jan

A Histogram Shifting-based Reversible Data Hiding Scheme Using Multi-patternStrategy
Chiung-Chen Tseng,Yu-Hsuan Chiu, and Yung-ChenChou


Date

Thu 24 Sep

Time

15:00-17:00

Room

GK2-12

Session

IS01 Cross-discipline Techniques in Signal Processing and Networking

Chair(s)

Feng-Cheng Chang
Yueh-Hong Chen
Hsiang-Cheh Huang

Design of triple-band planar antenna for LTE/WLAN applications
Yuh-Yih Lu, Shih-Chieh Dai, and Hsiang-Cheh Huang

Ownership Protection for Progressive Transmission of Color Images with Reversible Data Hiding
Hsiang-Cheh Huang, Jiun Lin, and Yuh-Yih Lu

An Auxiliary Teaching Management System by Applying Six Sigma Method
Liou Chu

Fidelity Enhancement of Reversible Data Hiding for Images with Prediction-Based Concepts
Hsiang-Cheh Huang, Chuan-Chang Lin, and Yueh-Hong Chen

Design of an Adapter Service for Web Application Transition
Kun Xie, Po-Ju Li, Wei-Kai Chiu, Po-Yen Liu, Yao-Wei Chuang, Feng-Cheng Chang, and Hsiang-Cheh Huang

Visual Cryptography for Compressed Sensing of Images with Transmission over Multiple Channels
Hsiang-Cheh Huang and Feng-Cheng Chang

Progressive Watermarking for Images with Regions of Interest
Yueh-Hong Chen and Hsiang-Cheh Huang


Date

Thu 24 Sep

Time

15:00-17:00

Room

GK2-16

Session

IS02 Wearable Computing and Information Security

Chair(s)

Wen-Fong Wang
Ching-Yu Yang

High-Performance Digital Watermarking with L2-Norm Centroid for Colour Images
Ching-Yu Yang and Wen-Fong Wang

Study on the Relationship between Stair's Slope and Upward/Downward Gaits in Stairs
Wen-Fong Wang, Ching-Yu Yang, and Hao-Hsiang Wang

An Imperceptible Information Hiding in Encoded Bits of Speech Signal
Rong-San Lin

The Develop of Emergency Communication APP using AD Hoc Network with IPv6
Wen Yen Lin, Kuang-Po Hsueh, and Pai-Shan Pa

Efficient Software Method for Decoding of the (71, 36, 11) Quadratic Residue Code
Yan-Haw Chen and Ching-Fu Huang


Date

Thu 24 Sep

Time

15:00-17:00

Room

GK4-18

Session

Combined IS03 + IS17:
IS03 Ergonomic Information and Control Systems
IS17 Information Processing and Complex Network

Chair(s)

Bor-Shyh Lin
Zhe-Ming Lu

Using Back-Propagation Neural Network for Automatic Wheezing Detection
Bor-Shing Lin, Huey-Dong Wu, Sao-Jie Chen, Gene Eu Jan, Bor-Shyh Lin

Wearable and wireless human body electrostatic monitoring system
Nan-Chun Lin

Optical Technique for Estimating Cerebral Perfusion Pressure
Chang-Ting Chen, Yi-Chien Liao, Chien-Fu Lai, Bor-Shyh Lin, Che-Chuan Wang, Jinn-Rung Kuo

Method of the Detection of Frequency-hopping Signal Based on Channelized Receiver in the Complicated Electromagnetic Environment
Yi-Jia Zhang, Shi-Chuan Chen, and Hua-Jun Song

Application of Dichotomy to Network Partition Based on Sub Network Exchange Gain
Yi-Jia Zhang, Zhong-Jian Kang, Zhen Wu, and Zhe-Ming Lu


Date

Thu 24 Sep

Time

15:00-17:00

Room

GK4-30

Session

IS06 Security and Privacy Protection in Computer Forensic Applications

Chair(s)

Chia-Chen Lin
Chuan Qin

A new SDCS-based content-adaptive steganography using iterative noise-level estimation
Bowen Xue, Xiaolong Li, and Zongming Guo

Data hiding based on Chinese text automatic proofread
Wenfa Qi and Zongming Guo

Data Hidng in Digital image using Four Pixel-value-differencing and Multiple-base Notational
Xin Liao and Liping Ding

Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement
Yang Yang, Weiming Zhang, and Nenghai Yu

Multiple Description Coding for Encrypted Images
Yuan Zhang, Xinpeng Zhang, Chuan Qin, and Jiang Yu

A Modified IMM-CSRF Algorithm for Passive Tracking Maneuvering Targets
Jianjun Li, Lijuan Meng, Zhihui Wang, Xiaofeng Fu, Chin-Chen Chang

Image quality enhancement based on multiple threshold segmentation and adaptive Gamma correction
Jianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang

Fragile Watermarking-based Authentication Scheme for Demosaicked Images
Chia-Chen Lin, Cheng-Han Lin, Xiao-Long Liu, Shyan-Ming Yuan


Friday 25 September


Date

Fri 25 Sep

Time

10:20-12:00

Room

GK2-12

Session

IS19 Big Data Security Analytics

Chair(s)

Yong Peng
Hai-Hui Gao

Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment
YongPeng, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun Zhang

Research of parallel vulnerabilities discovery based on open source database and text mining
Xianghui Zhao, Yong Peng, ZanZhai, Jin Yi, YuangangYao

A New Static Detection Method of Malicious Document Based on Wavelet package Analysis
Binjie Gu, Yong Fang, PengJia, Liang Liu,Lei Zhang,Meilin Wang

Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network
HaihuiGao, Yong Peng, KebinJia, Zhe Wen,Hanjing Li

Cyber Security Risk Assessment for Industrial Automation Platform
YilingZheng, Song Zheng

An Improved String Matching Algorithm for HTTP Data Reduction
Lei Zhang,Yong Peng,Jie Liang, Xifeng Liu, Jin Yi, Zhe Wen


Date

Fri 25 Sep

Time

10:20 – 12:00

Room

GK2-15

Session

IS21 Artificial Intelligence and Its Applications

Chair(s)

Pei-Wei Tsai

Optimizing Ontology Alignments through NSGA-II Using an Aggregation Strategy and a Mapping Extraction Approach
Li Jiang and Xingsi Xue

A Method of Latent Semantic Information Mining for Trajectory Data
Lyu-Chao Liao, Xin-Hua Jiang, Fu-Min Zou, Pei-Wei Tsai, and Yan-Ling Deng

A Self Adaptive Incremental learning Fuzzy Neural Network Based on the Influence of a Fuzzy Rule
Rong Hu, Ye Sha, and Hai-Yan Yang

Using Consumer Confidence Index in the Foreign Exchange Rate Forecasting
Pei-Wei Tsai, Chia-Han Liu, Lyu-Chao Liao, and Jui-Fang Chang

A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks
Jing Zhang, Li Xu, and Hong Yang


Date

Fri 25 Sep

Time

10:20 – 12:00

Room

GK2-16

Session

Regular session (part 2)

Chair(s)

Zhenglin Wang

An Information Hiding Method based on EMF Files Carrier
Liu Yuxin and Qi Wenfa

Steganalyzer performances in operational contexts
Yousra Ahmed Fadil, Jean-Francois Couchot, Raphael Couturier and Christophe Guyeux

Conversion of Speaker's Face Image Using PCA and Animation Unit for Video Chatting
Yuki Saito, Takashi Nose, Takahiro Shinozaki and Akinori Ito

Amphibious Target Tracking with Single PTZ Camera
Cheng-Chang Lien and Jian-Xiang Wang

Stitching of Video Sequences for Weed Mapping
Huajian Liu and Sang-Heon Lee

Development of a Visual Reality Headset and Its Applications in 3D Interactive Bike Race Games
Zhen Wu, Guohua Feng, Hao Luo and Xiaofeng Wu