IIH-MSP
2015 Conference Program
(parallel
sessions in each block)
|
Wed 23 Sep |
Thu 24 Sep |
Fri 25 Sep |
09:00-10:00 |
Registration |
Keynote 1 |
Keynote 2 |
10:00-10:20 |
Coffee break |
||
10:20-12:00 |
IS14 Technologies for
Next-Generation Network Environments (part1) |
IS10 Recent Advances in
Information Hiding and Enrichment Technologies for Audio and
Speech Signals |
IS19 Big Data Security
Analytics |
12:00-13:00 |
Lunch |
||
13:00-14:40 |
IS14 Technologies for
Next-Generation Network Environments (part 2) |
IS22 Enrichment of
acoustic spatial information for future ultra-realistic
communications over internet |
|
14:40-15:00 |
Coffee break |
||
15:00-17:00 |
IS18 2D/3D Video Coding
and Image/Video Information Processing |
IS01 Cross-discipline
Techniques in Signal Processing and Networking |
|
|
|
|
|
|
Welcome Reception |
Conference Dinner |
Date |
Wed 23 Sep |
Time |
10:20-12:00 |
Room |
GK2-16 |
Session |
IS14 Technologies for Next-Generation Network Environments (part1) |
Chair(s) |
Chien-Ming Chen |
NIDS
Rule Generating System for Detecting HTTP-like Malware
Communication
Chia-Nan
Kao, Yung-Cheng Chang, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu,
Hsien-Wei Hung, and Che-Wei Lin
Security
Analysis of A Time-bound Hierarchical Key Assignment
Scheme
Jeng-Shyang
Pan,Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang
A
Design and Implementation of Multi-source Wi-Fi Display Model on
Android Devices
Yuan-Yuan
Su, Yu-Tzu Chang, and Hung-Min Sun
Inspection
Risk and Delay for Screening Cargo Containers at Security
Checkpoints
Chia-Hung
Wang, Mu-En Wu and Chien-Ming Chen
A
New Reduced-Latency SC Decoder for Polar Codes
Dan
Le, Qiong Li, Lu Shan and Xiamu Niu
Date |
Wed 23 Sep |
Time |
13:00 – 14:40 |
Room |
GK2-16 |
Session |
IS14 Technologies for Next-Generation Network Environments (part 2) |
Chair(s) |
Chien-Ming Chen |
Improving
Weights for Graph-Based Image Fragment Reassembly
Xianyan
Wu, Qi Han, Xiamu Niu
An
Accountable Identity-based Billing Protocol for Cloud
Environment
Nai-Wei
Lo and Cheng Tsung Liu
A
Swarm-based Sanitization Approach for Hiding Confidential
Itemsets
Chun-Wei
Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, and
Jeng-Shyang Pan
A
KL Divergence Function for Randomized Secret Shares
Jeng-Shyang
Pan, Chi-Yao Weng, Mu-En Wu, Chwei-Shyong Tsai, and Chien-Ming
Chen
Detection
of Seam Carving and Contrast Enhancement Operation Chain
Jianwei
Li, Yao Zhao, Rongrong Ni
Date |
Wed 23 Sep |
Time |
13:00 – 14:40 |
Room |
GK2-12 |
Session |
Combined IS07 +
IS16: |
Chair(s) |
Hsueh-Yi Sean Lin |
Fingertip
Detection Using Two-Stage Random Decision Forest
Meng-Hsin
Liu, Tai-Hung Lin, and Chih-Wen Su
A
Multiresolution Approach to Recovering Colors and Details of Clipped
Image Regions
Yi-Hong
Lu, Yu-Hsi Chen, and Hsueh-Yi Sean Lin
Extended
Discriminant Nearest Feature Line Analysis for Feature
Extraction
Yunxia
Liu, Tie Cai, Guowei Huang
Two-Dimensional
Extended Feature Line Space for Feature Extraction
Jiangang
Chen, Xuefeng Bai, Guowei Huang
Date |
Wed 23 Sep |
Time |
15:00-17:00 |
Room |
GK2-12 |
Session |
IS18 2D/3D Video Coding and Image/Video Information Processing |
Chair(s) |
Ke-Bin Jia |
An
automatic geometric features extracting approach for facial
expression recognition based on corner detection
Guandong
Gao, Kebin Jia, and Bin Jiang
Deep
Feature Learning with Discrimination Mechanism for Brain Tumor
Segmentation and Diagnosis
Liya
Zhao, Kebin Jia
A
Distributed Anomaly Detection Method of Operation Energy Consumption
using Smart Meter Data
Ye
Yuan, Kebin Jia
Design
and Implementation of Remote Facial Expression Recognition
Surveillance System Based on PCA and KNN algorithms
Qite
Wang , Kebin Jia and Pengyu Liu
Video
Annotation Based on Video Structure Information and Key frames
Semantic Description
Zhonghua
Sun, Miaojie Sang, Kebin Jia
Date |
Wed 23 Sep |
Time |
15:00-17:00 |
Room |
GK2-16 |
Session |
IS13 Public Key Cryptography and Applications |
Chair(s) |
Jeng-Shyang Pan |
Detecting
Duplicated Frames by Mapping Frames to 3D Skeletons
Liyang
Yu, Qi Han, Xiamu Niu
A
Novel (2, 2) Visual Secret Sharing Without the Pixel Expansion
Xin
Liu, Shen Wang, Weizhe Zhang and Xiamu Niu
A
Formalized Description and Analysis of FTP on Petri Net
Cai
Bin
Modeling
and Analysis of Intelligence Assurance System Based on the Complex
Networks Theory
HAN
Shu-jian, ZHU Li, LI Zheng
Tamper
Detection Method for Clipped Double JPEG Compression Image
Gong
Zhenzhen, Niu Shaozhang, Han Hongli
An
Efficient Lattice-based Proxy Signature Scheme without
Trapdoor
Chunli
Yang, Licheng Wang, Shihui Zheng, and Yixian Yang
Security
analysis on “Strongly secure certificateless key-insulated
signature secure in the standard model”
Feng
Wang, Li Xu, and Jeng-Shyang Pan
Date |
Wed 23 Sep |
Time |
15:00-17:00 |
Room |
GK4-18 |
Session |
Regular session (part 1) |
Chair(s) |
Ivan Lee |
Weighted
Extreme Learning Machine for Digital Watermarking in DWT Domain.
Ram
Pal Singh, Neelam Dabas, Vikash Chaudhary and Nagendra
Feature
reduction of multi-scale LBP for texture classification
Ran
Hu, Wenfa Qi and Zongming Guo
Passive
Detection of Tampered JPEG Image Based on First Digit Statistics
Qing
Wang, Rong Zhang and Ke Qing
Iterative
Weighted DCT-SVD for Compressive Imaging
Zhenglin
Wang and Ivan Lee
Compressing
Encrypted Images Using the Integer Lifting Wavelet
Chuntao
Wang and Jiangqun Ni
Image
scrambling scheme based on bit-level permutation and 2-D Cellular
Automata
Ping
Ping
Deshun
Yang and Xiaoou Chen. Using Deep Belief Network to capture temporal
information for audio event classification
Feng
Guo
Thursday
24 September
Date |
Thu 24 Sep |
Time |
10:20-12:00 |
Room |
GK2-12 |
Session |
IS10 Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals |
Chair(s) |
Masashi Unoki |
Properties
of an emergency broadcasting system based on audio data
hiding
Tetsuya
Kojima, Akihiro Oizumi, and Udaya Parampalli
Tempo
modification of mixed music signal by nonlinear time scaling and
sinusoidal modeling
Tsukasa
Nishino, Takashi Nose, and Akinori Ito
Advertising
system based on cloud computing and audio watermarking
Chengxiang
Yin, Jin Hu, Xuejun Zhang, and Xiang Xie
An
audio watermarking method using tones of diatonic chord
Harumi
Murata and Akio Ogihara
An
automatic watermarking in CELP speech codec based on formant
tuning
Erick
Christian Garcia Alvarez, Shengbei Wang, and Masashi Unoki
Audible
secret keying for time-spread-echo based audio watermarking
Tatsuya
Matsumoto and Kotaro Sonoda
Date |
Thu 24 Sep |
Time |
10:20 – 12:00 |
Room |
GK2-16 |
Session |
IS15 Signal Processing, Optimization and Robust Evaluation (part 1) |
Chair(s) |
Baolong Guo |
Small
Moving Object Tracking in Dynamic Video
Dajian
Li, Wei Jia, Wei Sun, Penghui Li, Chunyu Zhao, Xumeng Chen
Exploring
Research of Algorithm in Signal Coning Error Compensation
Xin
Wang
Research
on Imaging Detection Based on Digital Reflection Device
Xin
Wang
A
FPGA power estimation method based on an improved BP neural
network
Guochang
Zhou, Baolong Guo, Xiang Gao, Jing Ma, Hongjie He, Yunyi Yan
Digital
Image Stabilization for Cameras on Moving Platform
Juanjuan
Zhu, Cheng Li, Jinli Xu
Date |
Thu 24 Sep |
Time |
10:20 – 12:00 |
Room |
GK4-18 |
Session |
Combined IS04 +
IS09 |
Chair(s) |
Kalana Ishara Patuwatha Withanage |
Vehicle
Detection in Nighttime Environment by Locating Road Lane and
Taillights
Tsong-Yi
Chen, Chao-Ho Chen,Guan-Ming Luo, Wu-Chih Hu
A
Virtual Backbone Construction Heuristic for Maximizing the Lifetime
of Dual-Radio Wireless Sensor Networks
Bing-Hong
Liu, Van-Trung Pham, Ngoc-Tu Nguyen
Life
Events Segmentation based on Lifelog Recorded by Wearable
Device
Chieh-Ling
Huang, Yu-Hsiang Huang, Jwu-Jenq Chen
Finding
All Competitive Products Using the Dominant Relationship
Analysis
Yu-Chi
Chung, I-Fang Su, Chiang Lee, Pin-Chieh Huang
Channel
Estimation for Inverse Power Control in Wireless Communication
Networks
Chang-Yi
Yang
Date |
Thu 24 Sep |
Time |
13:00 – 14:40 |
Room |
GK2-12 |
Session |
IS22 Enrichment of acoustic spatial information for future ultra-realistic communications over internet |
Chair(s) |
Shuichi Sakamoto |
Virtual
auditory display on a smartphone for high-resolution acoustic space
by remote rendering
Yukio
Iwaya, Takao Tsuchiya, Makoto Otani and Junfeng Li
A
compact representation of the head-related transfer function inspired
by the wavelet transform on the sphere
Jorge
Trevino, Shichao Hu, Cesar Salvador, Shuichi Sakamoto, Junfeng Li and
Yo-iti Suzuki
Prediction
method for the compression of spherical microphone array signals
using geometrical information
Shuichi
Sakamoto, Arif Wicaksono, Jorge Trevino, Cesar Salvador and Yo-Iti
Suzuki
Equalization
of sound reproduction system based on the human perception
characteristics
Qianqian
Fang, Huaxing Xu, Risheng Xia, Junfeng Li and Yonghong
Yan
Feasibility
of estimating direction of arrival based on monaural modulation
spectrum
Daisuke
Morikawa, Masaru ando and Masashi Unoki
Objective
measurement of spatial audio quality based on MARS
Jing
Wang, Xiang Xie, Shenghui Zhao and Jingming Kuang
Date |
Thu 24 Sep |
Time |
13:00 – 14:40 |
Room |
GK2-16 |
Session |
IS15 Signal Processing, Optimization and Robust Evaluation (part 2) |
Chair(s) |
Baolong Guo |
Network
Anomaly Detection with Compression
Jun
Ma, Jianguo Yao, Yunyi Yan
An
Efficient Weighting Method for Nakagami-m Envelope Distribution
Simulation
Shi
Lei, Li Xiaoping, Liu Yanming, Zhao Lei
A
Method to Fallible Branch Search in FPGA Programs
Haixu
Li, Yunyi Yan, Baolong Guo
Image
retrieval by saliency detection
Fanjie
Meng, Baolong Guo, Miao Song, Xu Zhang
Design
for Maintenance System of Satellites after Atomic Clock
Switching
Miao
Miao, Zhou Wei, Li Zhiqi, Zhang Xueping, Xuan Zongqiang
Date |
Thu 24 Sep |
Time |
13:00 – 14:40 |
Room |
GK4-18 |
Session |
IS08 Multimedia Security and Copyright Protection |
Chair(s) |
Yung-Chen Chou |
Combined
Prediction-based Reversible Data Embedding Methods for High Image
Quality
Tzu-Chuen
Lu, Ying-Hsuan Huang, and Mei-Chen Lin
Reversible
Dual-image Data Embedding on Pixel Differences using
Histogram-Modification-Shifting and Cross Magic Matrix
Chin-Feng
Lee, Si-Ting Chen, and Jau-Ji Shen
An
Improvement to Image Interpolating Data Embedding using Reversible
Pixel Shifting Modification and Direction Modification
Operation
Chin-Feng
Lee and Yu-Ju Tseng
Equalized
CR-Dropping for Image Compression
Chun-Hsiu
Yeh, Jau-Ji Shen, and Jinn-Ke Jan
A
Histogram Shifting-based Reversible Data Hiding Scheme Using
Multi-patternStrategy
Chiung-Chen
Tseng,Yu-Hsuan Chiu, and Yung-ChenChou
Date |
Thu 24 Sep |
Time |
15:00-17:00 |
Room |
GK2-12 |
Session |
IS01 Cross-discipline Techniques in Signal Processing and Networking |
Chair(s) |
Feng-Cheng
Chang |
Design
of triple-band planar antenna for LTE/WLAN applications
Yuh-Yih
Lu, Shih-Chieh Dai, and Hsiang-Cheh Huang
Ownership
Protection for Progressive Transmission of Color Images with
Reversible Data Hiding
Hsiang-Cheh
Huang, Jiun Lin, and Yuh-Yih Lu
An
Auxiliary Teaching Management System by Applying Six Sigma
Method
Liou
Chu
Fidelity
Enhancement of Reversible Data Hiding for Images with
Prediction-Based Concepts
Hsiang-Cheh
Huang, Chuan-Chang Lin, and Yueh-Hong Chen
Design
of an Adapter Service for Web Application Transition
Kun
Xie, Po-Ju Li, Wei-Kai Chiu, Po-Yen Liu, Yao-Wei Chuang, Feng-Cheng
Chang, and Hsiang-Cheh Huang
Visual
Cryptography for Compressed Sensing of Images with Transmission over
Multiple Channels
Hsiang-Cheh
Huang and Feng-Cheng Chang
Progressive
Watermarking for Images with Regions of Interest
Yueh-Hong
Chen and Hsiang-Cheh Huang
Date |
Thu 24 Sep |
Time |
15:00-17:00 |
Room |
GK2-16 |
Session |
IS02 Wearable Computing and Information Security |
Chair(s) |
Wen-Fong Wang |
High-Performance
Digital Watermarking with L2-Norm Centroid for Colour Images
Ching-Yu
Yang and Wen-Fong Wang
Study
on the Relationship between Stair's Slope and Upward/Downward Gaits
in Stairs
Wen-Fong
Wang, Ching-Yu Yang, and Hao-Hsiang Wang
An
Imperceptible Information Hiding in Encoded Bits of Speech
Signal
Rong-San
Lin
The
Develop of Emergency Communication APP using AD Hoc Network with
IPv6
Wen Yen
Lin, Kuang-Po Hsueh, and Pai-Shan Pa
Efficient
Software Method for Decoding of the (71, 36, 11) Quadratic Residue
Code
Yan-Haw
Chen and Ching-Fu Huang
Date |
Thu 24 Sep |
Time |
15:00-17:00 |
Room |
GK4-18 |
Session |
Combined IS03 +
IS17: |
Chair(s) |
Bor-Shyh Lin |
Using
Back-Propagation Neural Network for Automatic Wheezing
Detection
Bor-Shing
Lin, Huey-Dong Wu, Sao-Jie Chen, Gene Eu Jan, Bor-Shyh Lin
Wearable
and wireless human body electrostatic monitoring system
Nan-Chun
Lin
Optical
Technique for Estimating Cerebral Perfusion Pressure
Chang-Ting
Chen, Yi-Chien Liao, Chien-Fu Lai, Bor-Shyh Lin, Che-Chuan Wang,
Jinn-Rung Kuo
Method
of the Detection of Frequency-hopping Signal Based on Channelized
Receiver in the Complicated Electromagnetic Environment
Yi-Jia
Zhang, Shi-Chuan Chen, and Hua-Jun Song
Application
of Dichotomy to Network Partition Based on Sub Network Exchange
Gain
Yi-Jia
Zhang, Zhong-Jian Kang, Zhen Wu, and Zhe-Ming Lu
Date |
Thu 24 Sep |
Time |
15:00-17:00 |
Room |
GK4-30 |
Session |
IS06 Security and Privacy Protection in Computer Forensic Applications |
Chair(s) |
Chia-Chen Lin |
A
new SDCS-based content-adaptive steganography using iterative
noise-level estimation
Bowen
Xue, Xiaolong Li, and Zongming Guo
Data
hiding based on Chinese text automatic proofread
Wenfa
Qi and Zongming Guo
Data
Hidng in Digital image using Four Pixel-value-differencing and
Multiple-base Notational
Xin
Liao and Liping Ding
Improving
Visual Quality of Reversible Data Hiding in Medical Image with
Texture Area Contrast Enhancement
Yang
Yang, Weiming Zhang, and Nenghai Yu
Multiple
Description Coding for Encrypted Images
Yuan
Zhang, Xinpeng Zhang, Chuan Qin, and Jiang Yu
A
Modified IMM-CSRF Algorithm for Passive Tracking Maneuvering
Targets
Jianjun
Li, Lijuan Meng, Zhihui Wang, Xiaofeng Fu, Chin-Chen Chang
Image
quality enhancement based on multiple threshold segmentation and
adaptive Gamma correction
Jianjun
Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen
Chang
Fragile
Watermarking-based Authentication Scheme for Demosaicked
Images
Chia-Chen
Lin, Cheng-Han Lin, Xiao-Long Liu, Shyan-Ming Yuan
Friday 25 September
Date |
Fri 25 Sep |
Time |
10:20-12:00 |
Room |
GK2-12 |
Session |
IS19 Big Data Security Analytics |
Chair(s) |
Yong Peng |
Cyber-Physical
Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis
and Experiment Environment
YongPeng,
Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun
Zhang
Research
of parallel vulnerabilities discovery based on open source database
and text mining
Xianghui
Zhao, Yong Peng, ZanZhai, Jin Yi, YuangangYao
A
New Static Detection Method of Malicious Document Based on Wavelet
package Analysis
Binjie
Gu, Yong Fang, PengJia, Liang Liu,Lei Zhang,Meilin
Wang
Cyber-Physical
Systems Testbed Based on Cloud Computing and Software Defined
Network
HaihuiGao,
Yong Peng, KebinJia, Zhe Wen,Hanjing Li
Cyber
Security Risk Assessment for Industrial Automation
Platform
YilingZheng,
Song Zheng
An
Improved String Matching Algorithm for HTTP Data Reduction
Lei
Zhang,Yong Peng,Jie Liang, Xifeng Liu, Jin Yi, Zhe Wen
Date |
Fri 25 Sep |
Time |
10:20 – 12:00 |
Room |
GK2-15 |
Session |
IS21 Artificial Intelligence and Its Applications |
Chair(s) |
Pei-Wei Tsai |
Optimizing
Ontology Alignments through NSGA-II Using an Aggregation Strategy and
a Mapping Extraction Approach
Li
Jiang and Xingsi Xue
A
Method of Latent Semantic Information Mining for Trajectory
Data
Lyu-Chao
Liao, Xin-Hua Jiang, Fu-Min Zou, Pei-Wei Tsai, and Yan-Ling Deng
A
Self Adaptive Incremental learning Fuzzy Neural Network Based on the
Influence of a Fuzzy Rule
Rong
Hu, Ye Sha, and Hai-Yan Yang
Using
Consumer Confidence Index in the Foreign Exchange Rate
Forecasting
Pei-Wei
Tsai, Chia-Han Liu, Lyu-Chao Liao, and Jui-Fang Chang
A
Novel Sleep Scheduling Algorithm for Wireless Sensor Networks
Jing
Zhang, Li Xu, and Hong Yang
Date |
Fri 25 Sep |
Time |
10:20 – 12:00 |
Room |
GK2-16 |
Session |
Regular session (part 2) |
Chair(s) |
Zhenglin Wang |
An
Information Hiding Method based on EMF Files Carrier
Liu
Yuxin and Qi Wenfa
Steganalyzer
performances in operational contexts
Yousra
Ahmed Fadil, Jean-Francois Couchot, Raphael Couturier and Christophe
Guyeux
Conversion
of Speaker's Face Image Using PCA and Animation Unit for Video
Chatting
Yuki
Saito, Takashi Nose, Takahiro Shinozaki and Akinori Ito
Amphibious
Target Tracking with Single PTZ Camera
Cheng-Chang
Lien and Jian-Xiang Wang
Stitching
of Video Sequences for Weed Mapping
Huajian
Liu and Sang-Heon Lee
Development
of a Visual Reality Headset and Its Applications in 3D Interactive
Bike Race Games
Zhen
Wu, Guohua Feng, Hao Luo and Xiaofeng Wu