Abstract is missing.
- Design of 3-D FIR Cone-Shaped Filters by McClellan Transformation and Least-Squares Contour MappingJong-Jy Shyu, Soo-Chang Pei, Yun-Da Huang. 1-4 [doi]
- Design of 2.45GHz Planar Meander Dipole AntennaYuh-Yih Lu, Shih-Chiang Wei, Chun-Yi Li, Hsiang-Cheh Huang. 5-8 [doi]
- A Study on ENF Discontinuity Detection TechniquesFeng-Cheng Chang, Hsiang-Cheh Huang. 9-12 [doi]
- Reversible Data Hiding with Difference Modification and Rhombus Relationships in Quadtree DecompositionHsiang-Cheh Huang, Yuh-Yih Lu, Yueh-Hong Chen. 13-16 [doi]
- An Integrated Building Fire Evacuation System with RFID and Cloud ComputingLiou Chu, Shih-Jung Wu. 17-20 [doi]
- A Copyright Information Embedding System for Android PlatformYueh-Hong Chen, Hsiang-Cheh Huang. 21-24 [doi]
- A Novel Packet Scheduling Scheme for Downlink LTE SystemShih-Jung Wu, Liou Chu. 25-28 [doi]
- Content-Adaptive Multi-level Data Embedding for Lossless Data HidingHsiang-Cheh Huang, Wei-Hao Lai, Feng-Cheng Chang. 29-32 [doi]
- The Design of an XMPP-based Service Integration SchemeFeng-Cheng Chang, Duen-Kai Chen. 33-36 [doi]
- Histogram-Based Difference Expansion for Reversible Data Hiding with Content StatisticsHsiang-Cheh Huang, Yueh-Hong Chen, Yuh-Yih Lu. 37-40 [doi]
- The Research of Acoustic Emission Signal ClassificationXiaojing Meng, Weidong Liu 0003, Enjie Ding. 41-44 [doi]
- A Blind Digital Steganography Scheme Based on Complete Complementary CodesRyusuke Mayuzumi, Tetsuya Kojima. 45-48 [doi]
- Asynchronous Stochastic Decoder for Spread Spectrum Digital WatermarkingNao Teranishi, Masaki Kawamura. 49-52 [doi]
- Content-Based De-anonymisation of TweetsTomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama, Hiroshi Yoshiura. 53-56 [doi]
- A New Compression-Based Method for Estimating LSB Replacement Rate in Color and Grayscale ImagesViktor Monarev, Andrey Pestunov. 57-60 [doi]
- Wavelet-Based Entropy for Digital Audio WatermarkingShuo-Tsung Chen, Huang-Nan Huang, Chih-Yu Hsu, Kuo-Kun Tseng, Chun-Hua Wu, Jeng-Shyang Pan. 61-64 [doi]
- Prediction-Based Lossless Data Hiding by Adaptive Coefficient-Bias AlgorithmChing-Yu Yang, Chih-Hung Lin, Wu-Chih Hu. 65-68 [doi]
- Data Encrypting in a Binary Image Base on Modified Data Hiding MethodKuang Tsan Lin. 69-72 [doi]
- Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood TogglingBrian K. Lien, Zhi-Lin Lan. 73-76 [doi]
- Hierarchical Three-Dimension Mesh Model SharingShang-Kuan Chen, Chiu-Jian Hsu, Yen-Wu Ti. 77-80 [doi]
- Perceptual Watermarking for 3D Stereoscopic Video Using Depth InformationMin-Jeong Lee, Ji Won Lee, Heung-Kyu Lee. 81-84 [doi]
- Video Watermarking on Overlay LayerJi Won Lee, Tae-Woo Oh, Min-Jeong Lee, Hae-Yeoun Lee, Heung-Kyu Lee. 85-88 [doi]
- Offline QR Code Authorization Based on Visual CryptographyWen-Pinn Fang. 89-92 [doi]
- Improved Invertible Secret Image Sharing with SteganographyYung-Yi Lin, Ran-Zan Wang. 93-96 [doi]
- Single-Packet IP Traceback with Less LoggingWen-Chung Kuo, Yi-Lin Chen, Shuen-Chih Tsai, Jung-Shian Li. 97-100 [doi]
- A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy VaultNing Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu. 101-104 [doi]
- A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive SensingRong Huang, Kouichi Sakurai. 105-108 [doi]
- Design and Research on the Control of Biped Robot System Based on RUPMeiqiang Zhu, Jun Wang 0001, Ming Li, Dong Li. 109-112 [doi]
- Static Gait Analysis and Planning of Biped RobotMeiqiang Zhu, Jun Wang, Ming Li, Yajing Lin. 113-116 [doi]
- The Research on the Module of Bipedal Robot Balance AdjustmentHanjun Li. 117-120 [doi]
- Super-resolution Reconstruction Based on Irregular Sample and Local StatisticsJianping Qiao, Huamei Xin, Xiaojuan Yang. 121-124 [doi]
- A Novel Image Hashing Scheme Based on Wave AtomsFang Liu, Lee-Ming Cheng. 125-128 [doi]
- A Saliency Detection Approach to Combine LSK and Color for Color ImageXin He, Huiyun Jing, Qi Han, Xiamu Niu. 129-132 [doi]
- Multimedia Privacy Protection System for Mobil EnvironmentsChih-Yang Lin, Chao-Chin Chang, Yi-Hui Chen, Panyaporn Prangjarote. 133-136 [doi]
- A New Approach of Image Compression Based on Difference Vector QuantizationJau-Ji Shen, Ya-Hsin Lo. 137-140 [doi]
- An Anti-phishing User Authentication Scheme without Using a Sensitive Key TableWei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Chia-Chi Yang. 141-144 [doi]
- An Efficient Mutual Authentication with Key Agreement Protocol for Mobile DevicesJen-Ho Yang, Chin-Chen Chang, Shih-Yi Lin. 145-148 [doi]
- Fast Decoding Method for On-line Visual Secret Sharing by Parallel Processing ApproachWen-Pinn Fang. 149-152 [doi]
- Distributed SteganographyXin Liao, Qiao-Yan Wen, Sha Shi. 153-156 [doi]
- Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret SharingChin-Chen Chang, Kuo-Nan Chen, Ying-Hsuan Huang. 157-160 [doi]
- Data Hiding Scheme Based on Features of Chinese TextChia-Chen Lin, Li-Cheng Yang, Yi-Hui Chen. 161-164 [doi]
- Universal Steganalysis Based on Local Prediction Error in Wavelet DomainAnahita Shojaei-Hashemi, Mostafa Mehdipour-Ghazi, Shahrokh Ghaemmaghami, Hamid Soltanian-Zadeh. 165-168 [doi]
- A DCT Steganographic Classifier Based on Compressive SensingConstantinos Patsakis, Nikolaos Aroukatos. 169-172 [doi]
- Invisible Communication through Portable Document File (PDF) FormatGundeep Singh Bindra. 173-176 [doi]
- Genetic Algorithm-Backpropagation Network Hybrid Architecture for Grayscale Image Watermarking in DCT DomainCharu Agarwal, Anurag Mishra, Arpita Sharma. 177-180 [doi]
- Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio DataPranab Kumar Dhar, Isao Echizen. 181-184 [doi]
- An Improved Data Hiding Method Using Image InterpolationSen-Ren Jan, Steen J. Hsu, Chuan-Feng Chiu, Shu-Lin Chang. 185-188 [doi]
- A Location Map Free Reversible Data Hiding Scheme for VQ-Compressed Images Based on Search Order CodingPeyman Rahmani, Ehsan Rahmani, Gholamhossein Dastghaibyfard. 189-192 [doi]
- Graph-Based Features for Image RetrievalCai-Hua Li, Zhe-Ming Lu. 193-195 [doi]
- Development and Evaluation of Defaced Sites Automatic Detection System DICETatsuya Tanaka, Toshifumi Kai, Yusuke Tamura, Ryoichi Sasaki. 196-201 [doi]
- An Improved Algorithm for Multiple Closed Contour DetectionTiejun Zhang, Xuefeng Bai, Xianhua Song, Xiamu Niu. 202-205 [doi]
- Power Research of JPEG Circuits in FPGAXinsheng Wang, Mingyan Yu. 206-208 [doi]
- Steganography: A Class of Algorithms having Secure PropertiesJacques M. Bahi, Jean-FranƧois Couchot, Christophe Guyeux. 209-212 [doi]
- IC Postprocessing Stage for Random Number Generators and an Alternative Design MethodologySalih ErgĆ¼n. 213-217 [doi]
- DOA Estimation of Coherent NLFM SignalsChunxia Gao, Tianqi Zhang, Fangqing Tan, Chao Wang. 218-221 [doi]
- Compressing Encrypted Image Using Compressive SensingXinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian. 222-225 [doi]
- A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection CodesQian Mao, Boqing Xu, Yanping Qin. 226-229 [doi]
- HB Family RFID Mutual Authentication ProtocolChia-Min Lin, Shyh-Chang Tsaur, Yeong-Chin Chen, Iuon-Chang Lin. 230-235 [doi]
- A Multi-stage Fast Intra Mode Decision Algorithm in H.264Lu-Lu Wang, Kebin Jia, Zhuo-Yi Lu. 236-239 [doi]
- Visual Attention Model with Cross-Layer Saliency OptimizationJiande Sun, Jie Zhang, Hua Yan, Likun Zhang, Wei Liu. 240-243 [doi]
- General Threshold Signature Based on the Chinese Remainder TheoremCheng Guo, Chin-Chen Chang. 244-247 [doi]
- A General Sharing Model Based on Proxy Re-encryptionGuojun Ma, Qingqi Pei, Yuchen Wang, Xiaohong Jiang. 248-251 [doi]
- A Robust and Efficient Smart Card Oriented Remote User Authentication ProtocolChin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, Ching-Hsiang Chang. 252-255 [doi]
- Reversible Data Hiding by Reduplicated Exploiting Modification Direction MethodChin-Feng Lee, Kai-Chin Chen. 256-259 [doi]
- Secure Template Protection in Touch-less Based Fingeprint Verification SystemBee Yan Hiew, Andrew Teoh Beng Jin. 260-265 [doi]
- Modulation Recognition Algorithms for Communication Signals Based on Particle Swarm Optimization and Support Vector MachinesYu-e Wang, Tian-qi Zhang, Juan Bai, Rui-bao. 266-269 [doi]
- A Video Transmission Framework Based on Packet Criticality ModelJianchao Du, Song Xiao, Chengke Wu, Jianlong Zhang. 270-273 [doi]
- A Threshold-Based Coefficients Cutting Method for Compressive ImagingLei Quan, Song Xiao, Jianchao Du, Janli Zhou. 274-277 [doi]
- Fast Mode Decision Algorithm for H.264/SVC Based on Motion Vector Relation AnalysisXuesong Sun, Song Xiao, Jianchao Du, Min Hu. 278-281 [doi]
- A Rate Distortion-Based Network Coding Design for Video TransmissionYing Kang, Song Xiao, Ji Lu, Chengke Wu. 282-285 [doi]
- An Error Concealment Algorithm Based on Non-uniform Lagrange InterpolationJianlong Zhang, Xinbao Gao, Song Xiao, Jianchao Du. 286-289 [doi]
- An Opportunistic Network Coding Algorithm Based on the Queue State and Network TopologyLi Zhang, Song Xiao, Ning Cai, Jianchao Du. 290-293 [doi]
- The Effect of Speaker and Noise Type on the Accuracy of Estimated Speech Intelligibility Using Objective MeasuresKazuhiro Kondo. 294-297 [doi]
- Manipulating Vocal Signal in Mixed Music Sounds Using Small Amount of Side InformationYuto Sasaki, Seongjun Hahm, Akinori Ito. 298-301 [doi]
- Median Plane Mislocalization of Virtual Sound Presented through HeadphonesRyouichi Nishimura, Hiroaki Kato, Parham Mokhtari, Hironori Takemoto. 302-305 [doi]
- Audio Trick Art Based on Information Misreading TechniqueNaofumi Aoki. 306-309 [doi]
- Robust Character Recognition Using Connected-Component ExtractionWai-Lin Chan, Chi-Man Pun. 310-313 [doi]
- Reversible Watermarking for Digital Audio Based on Cochlear Delay CharacteristicsMasashi Unoki, Ryota Miyauchi. 314-317 [doi]
- Reversible Audio Data Hiding Using Linear Prediction and Error ExpansionAkira Nishimura. 318-321 [doi]
- Information Hiding Based on the Artificial Fiber Pattern with Improved Robustness against Foregound ObjectsKitahiro Kaneda, Yuta Kito, Keiichi Iwamura. 322-329 [doi]
- Information Hiding Based on a Single Dot Pattern Method with Improved Extraction and Robustness against Foreground ObjectsKitahiro Kaneda, Yoshiaki Tachibana, Keiichi Iwamura. 330-335 [doi]
- An Efficient Key Generation Method in Audio Zero-WatermarkingRimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai. 336-339 [doi]
- License Plate Location for Vehicles Passing through a GateChao-Ho Chen, Tsong-Yi Chen, Chi-Ming Huang, Da-Jinn Wang. 340-343 [doi]
- Abrupt Cut Detection Based on Motion InformationChun Wang, Zhonghua Sun, Kebin Jia. 344-347 [doi]
- Crowd Density Estimation Based on Frequency AnalysisWei-Lieh Hsu, Kun-Fong Lin, Chang-Lung Tsai. 348-351 [doi]
- Low-Complexity Encoding Method for H.264/AVC Based on Visual PerceptionPengyu Liu, Kebin Jia. 352-355 [doi]
- Playfield Detection Using Color Ratio and Local EntropyXuefeng Bai, Tiejun Zhang, Xianhua Song, Xiamu Niu. 356-359 [doi]
- A Joint Approach to Frame Synchronization in Presence of Frequency OffsetYongcheng Wang, You Ling, Mi Liang. 360-364 [doi]
- Design of U Disk Remote Monitoring System in Trusted Computing EnvironmentShidou Yan, Yatao Yang, Zichen Li. 365-368 [doi]
- Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic SystemsAhmed A. Abd El-Latif, Li Li 0015, Ning Wang, Xiamu Niu. 369-373 [doi]
- Sockpuppet Detection in Online Discussion ForumsXueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu. 374-377 [doi]
- Privacy Preserving Confidential Forensic Investigation for Shared or Remote ServersShuhui Hou, Tetsutaro Uehara, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow. 378-383 [doi]
- Automatic Online Monitoring and Data-Mining Internet ForumsYuk-Ming Lai, Xueling Zheng, K. P. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu. 384-387 [doi]
- Development of Domestic and International Computer ForensicsRongSheng Xu, K. P. Chow, Ying Yang. 388-394 [doi]
- Research on Path ID and VPI/VCI Relating Guess Solution for TD-SCDMA Network Centralized Monitoring SystemFang Cheng, Lei Tian, Jinfeng Xie. 395-398 [doi]