Abstract is missing.
- On secure communication with known interferenceMustafa El-Halabi, Costas N. Georghiades. 1-5 [doi]
- 3-Bit decoding algorithm for AWGN channelsHiroshi Kamabe, Hiroshi Ono. 1-5 [doi]
- Multi-bit flip type gradient descent bit flipping decoding using no thresholdsRyoji Haga, Shogo Usami. 6-10 [doi]
- An improved LT encoding scheme with extended chain lengthsKuo-Kuang Yen, Chih-Lung Chen, Hsie-Chia Chang. 11-15 [doi]
- Generalization of Lu's linear time encoding algorithm for LDPC codesKazuki Kobayashi, Tomoharu Shibuya. 16-20 [doi]
- Proposal of new decision feedback carrier synchronization method for meteor burst communicationsKeisuke Komatsubara, Kaiji Mukumoto, Tadahiro Wada. 21-25 [doi]
- A study on read-back signal generation modeling for shingled-write magnetic recording from experimental resultsKohsuke Harada, Yasushi Tomizawa, Akihiko Takeo, Yuuichi Yamada, Kazuto Kashiwagi, Kenji Yoshida. 26-30 [doi]
- N-PE transmission system for Narrow-Band PLCShinji Tsuzuki, Yukiaki Yoshizawa, Intan Sari Areni, Yoshio Yamada. 31-35 [doi]
- Unequal error protection with CRC-16 bits in EPC class-1 generation-2 UHF RFID systemsRobert Morelos-Zaragoza. 36-40 [doi]
- Maximum mutual information rate for the Uniformly Symmetric Variable Noise FSMC without channel state informationBenshuai Xu, Zarko B. Krusevac, Predrag B. Rapajic, Yifan Chen. 41-45 [doi]
- On two strong converse theorems for discrete memoryless channelsYasutada Oohama. 46-50 [doi]
- Optimal reliability over a DMC with feedback via deterministic sequential codingMohammad Naghshvar, Tara Javidi. 51-55 [doi]
- Non-binary serially concatenated codes for distributed source codingSatoru Nakagawa, Motohiko Isaka. 56-60 [doi]
- Wireless mesh networks allowing intra-link errors: CEO problem viewpointXin He, Xiaobo Zhou, Khoirul Anwar, Tad Matsumoto. 61-65 [doi]
- Power controlled adaptive sum-capacity in the presence of distributed CSIKrishnamoorthy Iyer, Sibi Raj B. Pillai, Bikash K. Dey. 66-70 [doi]
- Bayesian criteria based on universal measuresJoe Suzuki. 71-75 [doi]
- The multiple sensor positive detection problemRhonda D. Phillips. 76-80 [doi]
- Mean square error reduction by precoding of mixed Gaussian inputJohn T. Flåm, Mikko Vehkaperä, Dave Zachariah, Efthymios Tsakonas. 81-85 [doi]
- Asymptotics of Bayesian estimation for nested models under misspecificationNozomi Miya, Tota Suko, Goki Yasuda, Toshiyasu Matsushima. 86-90 [doi]
- Comparing Euclidean, Kendall tau metrics toward extending LP decodingJustin Kong, Manabu Hagiwara. 91-95 [doi]
- On codes correcting bidirectional limited-magnitude errors for flash memoriesMyeongwoon Jeon, Jungwoo Lee. 96-100 [doi]
- Lattice-based WOM codebooks that allow two writesBrian M. Kurkoski. 101-105 [doi]
- Index-less flash codes with arbitrary small slicesHiroyuki Nagahara, Yuichi Kaji. 106-110 [doi]
- A soft-decision sphere decoding based on the recursive vector generatorTakuya Kusaka, Ryuhei Yokoyama, Toru Fujiwara. 111-115 [doi]
- Some results and challenges on codes and iterative decoding with non-equal symbol probabilitiesBowen Dai, Lei Wei. 116-120 [doi]
- Write-margin evaluation of LDPC coding and iterative decoding system in BPM R/W channel with write-errorsYasuaki Nakamura, Yoshihiro Okamoto, Hisashi Osawa, Hajime Aoi, Hiroaki Muraoka. 121-124 [doi]
- Mixed-scheduling belief propagation for LDPC decoders in the magnetic recording systemsWatid Phakphisut, Pornchai Supnithi. 125-129 [doi]
- Novel 64QAM space-time codes using a large number of receive antennasTatsumi Konishi. 130-134 [doi]
- Cooperative reception scheme using multiple terminals for digital terrestrial television broadcasting One-Segment ServiceRyo Araki, Naoki Kobayashi 0006, Akira Nakamura, Kohei Ohno, Makoto Itami. 135-139 [doi]
- A theoretical study on demodulation of pre-coded OFDM by pre-coded symbol replacementNaoki Sunaga, Kohei Ohno, Makoto Itami. 140-144 [doi]
- Complexity reduction using QRD-M or SD in MIMO Interleaved SC-FDMA receiver with iterative detectionMasaaki Moriyama, Yasunori Iwanami. 145-149 [doi]
- Interference mitigation depending on the number of antennas and CSI available at femtocellsGenji Hayashi, Tomoaki Ohtsuki. 150-154 [doi]
- On the redundancy of variable-rate Slepian-Wolf codingShigeaki Kuzuoka. 155-159 [doi]
- Computing polynomial functions of correlated sources: Inner boundsSheng Huang, Mikael Skoglund. 160-164 [doi]
- Layered LDPC convolutional codes for compression of correlated sources under adversarial attacksFarshad Naghibi, Ragnar Thobaben, Somayeh Salimi, Mikael Skoglund. 165-169 [doi]
- Source coding with side information at the decoder: Models with uncertainty, performance bounds, and practical coding schemesElsa Dupraz, Aline Roumy, Michel Kieffer. 170-174 [doi]
- An optimization algorithm for scalable multiple description scalar quantizersShahid Mahmood Satti, Nikos Deligiannis, Adrian Munteanu, Peter Schelkens, Jan Cornelis. 175-179 [doi]
- Signal detection and modulation classification using a goodness of fit testChiaki Honda, Ikuo Oka, Shingo Ata. 180-183 [doi]
- A study on location tracking system using Kalman filter based on sensor informationRyo Ogawara, Masahiro Fujii, Yu Watanabe. 184-188 [doi]
- Heart rate detection from waist ECG/PCG sensors for a vital signal acquisition system for athletesNao Masuoka, Tetsuo Tsujioka, Shinsuke Hara. 189-193 [doi]
- On real-time arrhythmia detection in ECG monitors using antidictionary codingTakahiro Ota, Hiroyoshi Morita. 194-198 [doi]
- Improvement of 2-EPP using quantum error correcting codes and binary searchShigeyori Nagahashi, Tsuyoshi Sasaki Usuda, Ichi Takumi. 199-202 [doi]
- Superiority of 2-EPPs to 1-EPPs with finite entangled resourcesYoshiaki Yazaki, Shogo Usami, Tsuyoshi Sasaki Usuda. 203-207 [doi]
- On the hardness of decoding quantum stabilizer codes under the depolarizing channelKao-Yueh Kuo, Chung-Chin Lu. 208-211 [doi]
- Property of capacity by WDM for attenuated quantum channelKazuha Ohashi, Tsuyoshi Sasaki Usuda. 212-215 [doi]
- An improvement of insertion/deletion/substitution error correction capabilities of LDPC codes using slide decodingTooru Shigehiro, Hirohisa Yabe, Keiichi Iwamura. 216-220 [doi]
- Insertion/deletion/substitution error correction using adaptive inversion of synchronization markerMasato Inoue, Haruhiko Kaneko. 221-225 [doi]
- A direct product construction for high-rate self-synchronizing codesYuichiro Fujiwara, Vladimir D. Tonchev. 226-229 [doi]
- Combined permutation codes for synchronizationReolyn Heymann, Hendrik C. Ferreira, Theo G. Swart. 230-234 [doi]
- An Adaptive Conditional Zero-Forcing decoder with full-diversity, least complexity and essentially-ML performance for STBCsLakshmi Prasad Natarajan, B. Sundar Rajan. 235-239 [doi]
- Large system analysis of power minimization in multiuser MISO downlink with transmit-side channel correlationYichao Huang, Chee-Wei Tan, Bhaskar D. Rao. 240-244 [doi]
- Large-system analysis of joint user selection and vector precoding with zero-forcing transmit beamforming for MIMO broadcast channelsKeigo Takeuchi, Ralf R. Müller, Tsutomu Kawabata. 245-249 [doi]
- An alternate view of transmit diversity for the collocated MIMO systemVijayvaradharaj T. Muralidharan, B. Sundar Rajan. 250-254 [doi]
- Secret sharing schemes based on minimum bandwidth regenerating codesMasazumi Kurihara, Hidenori Kuwakado. 255-259 [doi]
- On the role of mutual infomation between the shares in a robust (k, n)-threshold schemeHiroki Koga, Kazuya Koyano. 260-264 [doi]
- Consideration for multi-threshold multi-secret sharing schemesAtsushi Waseda, Masakazu Soshi. 265-269 [doi]
- Churn resilience in network coding-based anonymous P2P systemTodorka Alexandrova, Gergely Huzsak, Hiroyoshi Morita. 270-274 [doi]
- A design method for FIR filters with complex coefficients by Successive Projection methodToma Miyata, Kosuke Teramoto, Naoyuki Aikawa. 275-278 [doi]
- An L1-method for designing FIR digital filters with complex coefficientsIkuya Murakami, Yukio Mori, Naoyuki Aikawa. 279-283 [doi]
- On statistical restricted isometry property of a new class of deterministic partial Fourier compressed sensing matricesNam Yul Yu. 284-288 [doi]
- Performance bounds for vector quantized compressive sensingAmirpasha Shirazinia, Saikat Chatterjee, Mikael Skoglund. 289-293 [doi]
- Logarithmic Cubic Vector Quantization: Concept and analysisChristian Rohlfing, Hauke Krüger, Peter Vary. 294-298 [doi]
- Lower bounds on the error probability in classical and quantum state discriminationTakuya Kubo, Hiroshi Nagaoka. 299-302 [doi]
- Explicit receivers for pure-interference bosonic multiple access channelsMark M. Wilde, Saikat Guha. 303-307 [doi]
- Error performance of semi-classical quantum receivers for CPPM signals in KCQ key generationHiro Yamashita, Tsuyoshi Sasaki Usuda, Shogo Usami. 308-311 [doi]
- Security on the quantum-type Even-Mansour cipherHidenori Kuwakado, Masakatu Morii. 312-316 [doi]
- Quantum key distribution using Mean King problem with modified measurement schemesMasakazu Yoshida, Takayuki Miyadera, Hideki Imai. 317-321 [doi]
- Average growth rate of low-density generator-matrix codes ensemblesKazushi Mimura, Tadashi Wadayama, Yoshiyuki Kabashima. 322-326 [doi]
- Probabilistic analysis of the network reliability problem on a random graph ensembleAkiyuki Yano, Tadashi Wadayama. 327-331 [doi]
- A coding theoretic approach for evaluating accumulate distribution on minimum cut capacity of weighted random graphsYuki Fujii, Tadashi Wadayama. 332-336 [doi]
- Asymptotic analysis of spatially coupled MacKay-Neal and Hsu-Anastasopoulos LDPC codesDavid G. M. Mitchell, Kenta Kasai, Michael Lentmaier, Daniel J. Costello Jr.. 337-341 [doi]
- Extrinsic information transfer analysis of finite field spreadingGuanghui Song, Yuta Tsujii, Jun Cheng, Yoichiro Watanabe. 342-346 [doi]
- A novel spreading sequence and its performances for code-diversity in DS/CDMA communication systemsHayato Noguchi, Shin'ichi Tachikawa. 347-351 [doi]
- A novel synchronization scheme for Bi-orthogonal modulation using modified pseudo-ternary M-sequenceMasaya Yamagata, Hiromasa Habuchi. 352-356 [doi]
- Analysis of hierarchical multi-pulse PPM using modified pseudo orthogonal M-sequence setYusuke Kozawa, Hiromasa Habuchi. 357-361 [doi]
- Performance analysis of multi-pulse PPM/CSK on Ultra Wideband Impulse RadioTomoyuki Mochizuki, Kouji Ohuchi. 362-366 [doi]
- Minimal-rate description for multiple-access channelsSue-May Huang, Hsiao-feng Francis Lu, Stefan M. Moser. 367-371 [doi]
- Sending two Gaussians over the Gaussian MAC with bandwidth expansionNan Jiang, Yang Yang, Anders Høst-Madsen, Zixiang Xiong. 372-376 [doi]
- Finite blocklength bounds for multiple access channels with correlated sourcesHideki Yagi. 377-381 [doi]
- Decoding for non-binary signature codeShan Lu, Jun Cheng, Yoichiro Watanabe. 382-386 [doi]
- Weighted sum-rate functional dependence bound for network coding capacityXiaoli Xu, Satyajit Thakor, Yong Liang Guan. 387-391 [doi]
- A distribution scheme of certificate revocation list by inter-vehicle communication using a random network codingTaisuke Yamamoto, Youji Fukuta, Masami Mohri, Masanori Hirotomo, Yoshiaki Shiraishi. 392-395 [doi]
- A graph theoretical approach to network encoding complexityEaston Li Xu, Weiping Shang, Guangyue Han. 396-400 [doi]
- A construction of matroidal error correcting networksKrishnan Prasad, B. Sundar Rajan. 401-405 [doi]
- On the existence of generalized rank weightsFrédérique E. Oggier, Adnen Sboui. 406-410 [doi]
- Faster elliptic curve arithmetic for double-base chain by reordering sequences of field operationsChitchanok Chuengsatiansup. 411-445 [doi]
- Improving GGH cryptosystem for large error vectorMasayuki Yoshino, Noboru Kunihiro. 416-420 [doi]
- Homomorphic encryption based cancelable biometrics secure against replay and its related attackTakato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda, Takumi Mori. 421-425 [doi]
- Upper bound of the shortest vector coefficients and its applicationsKen Naganuma, Masayuki Yoshino, Hisayoshi Sato. 426-430 [doi]
- Improved multipoint codes from Hermitian curvesMasaya Fujisawa, Shojiro Sakata. 431-435 [doi]
- Decoding a class of affine variety codes with fast DFTHajime Matsui. 436-440 [doi]
- The designed minimum distance of medium lengths for binary cyclic codesJunru Zheng, Takayasu Kaida. 441-445 [doi]
- On improved algorithms of the proposed lower bound including well-known bounds for cyclic codesTakayasu Kaida, Junru Zheng. 446-449 [doi]
- On nonbinary quantum nonprimitive non-narrow-sense BCH codesGiuliano G. La Guardia. 450 [doi]
- Performance of multihop decode-and-forward relaying assisted device-to-device communication underlaying cellular networksDonghoon Lee, Sung-Il Kim, Jaeyoung Lee, Jun Heo. 455-459 [doi]
- Carrier to interference ratio in shotgun cellular systems over composite fading channelsAsma Bagheri, Ghosheh Abed Hodtani. 460-464 [doi]
- User pairing algorithms for multi-cell and multi-user communicationsFong-Ru Huang, Mao-Ching Chiu, Wern-Ho Sheen. 465-469 [doi]
- Performance evaluation of the modified binary countdown scheme considering the priority of packetKoichiro Hashiura, Fumie Ono. 470-474 [doi]
- A VLC receiving devise using audio jacks with a folding noiseYuta Ashida, Kuniyoshi Okuda, Wataru Uemura. 475-479 [doi]
- A fast binary arithmetic coding using probability table of expanded symbolsShota Kanahara, Madoka Hasegawa, Shigeo Kato, Yuichi Tanaka. 480-484 [doi]
- On variable-to-fixed length coding of a general source with infinite alphabetMitsuharu Arimura, Ken-ichi Iwata. 485-488 [doi]
- On the maximum redundancy of CSE for I.I.D. sourcesKen-ichi Iwata, Mitsuharu Arimura, Yuki Shima. 489-492 [doi]
- Universal codes on continuous alphabet using sparse matricesShigeki Miyake, Jun Muramatsu. 493-497 [doi]
- On the ratio between the maximal T-complexity and the T-complexity of random stringsT. Aaron Gulliver, Ulrich Speidel. 498-500 [doi]
- Optimal scheduling for two sources over time varying wireless channelsMohamed Kashef, Anthony Ephremides. 501-505 [doi]
- Revisiting minimum-length scheduling in wireless networks: An algorithmic frameworkQing He, Vangelis Angelakis, Anthony Ephremides, Di Yuan. 506-510 [doi]
- On rate scaling laws with CDF-based distributed scheduling in multicell networksYichao Huang, Bhaskar D. Rao. 511-515 [doi]
- Memory placement in network compression: Line and grid topologiesMohsen Sardari, Ahmad Beirami, Faramarz Fekri. 516-520 [doi]
- A middletext distinguisher for full CLEFIA-128Kazumaro Aoki. 521-525 [doi]
- A peculiar higher order differential of CLEFIANaoki Shibayama, Toshinobu Kaneko. 526-530 [doi]
- The optimal key estimation of stream ciphers and its approximation algorithm based on a probabilistic inferenceYuji Iikubo, Shunsuke Horii, Toshiyasu Matsushima. 531-535 [doi]
- ♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's responseXuedi Song, Kazukuni Kobara, Kentaro Imafuku, Hideki Imai. 536-540 [doi]
- Another look on the relation between template attack and higher order DPAYuichi Komano, Hideo Shimizu, Chiho Mihara. 541-545 [doi]
- Unequal error protection QC-LDPC codes via MaskingChi-Jen Wu, Chung-Hsuan Wang, Chi-Chao Chao. 546-550 [doi]
- An efficient method for computing the weight spectrum of LDPC convolutional codes constructed from quasi-cyclic codesMasanori Hirotomo, Masakatu Morii. 551-555 [doi]
- Weight enumerator analysis for (2, P)- and (3, P)-SFA LDPC codesManabu Hagiwara, James B. Nation. 556-560 [doi]
- Consideration on modified gold sequences for optical CDMSatoru Aoyama, Shogo Usami. 561-565 [doi]
- An evaluation of a parallel transmission visible light communication system employing an LDPC codeJunya Amano, Tadahiro Wada, Kaiji Mukumoto. 566-570 [doi]
- A study on code construction of optical orthogonal codes with variable chip ratesTetsuo Tsujioka. 571-575 [doi]
- BER performance of multiplexed CSK using linear/circular polarization in optical wireless communicationsChiharu Mukai, Kouji Ohuchi. 576-580 [doi]
- Two-level signaling for IPACT in passive optical networksShoichiro Matsumoto, Koji Kamakura. 581-585 [doi]
- Localization of faults in software programs using Bernoulli divergencesShounak Roychowdhury, Sarfraz Khurshid. 586-590 [doi]
- Formalization of Gaussian integers, Gaussian rational numbers, and their algebraic structures with MizarYuichi Futa, Daichi Mizushima, Hiroyuki Okazaki. 591-595 [doi]
- On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functionsNicholas Kolokotronis, Konstantinos Limniotis. 596-600 [doi]
- A greedy algorithm for checking normality of cryptographic boolean functionsNicholas Kolokotronis, Konstantinos Limniotis. 601-605 [doi]
- On a Shannon cover of certain reducible shift of finite typeAkiko Manada. 606-610 [doi]
- Linear complexity of quaternary sequences constructed from binary Legendre sequencesYoung-Sik Kim, Ji-Woong Jang, Sang-Hyo Kim, Jong-Seon No. 611-614 [doi]
- On the linear complexity over Fp of quaternary sequences from binary Sidel'nikov sequencesYoung-Sik Kim, Ji-Woong Jang, Sang-Hyo Kim, Jong-Seon No. 615-619 [doi]
- Distribution of the loops on the logistic maps over integers for the control parameterTakeru Miyazaki, Shunsuke Araki, Satoshi Uehara. 620-624 [doi]
- Fourier analysis of sequences over a composition algebra of the real number fieldTakao Maeda, Takafumi Hayashi. 625-628 [doi]
- Digital watermarking method by selecting suitable pixel value from pixel value candidates near to original pixel valueMotoi Iwata. 629-633 [doi]
- An implementation of steganography using construction of Huffman treeYamamoto Hiroshi, Fujioka Hayato. 634-637 [doi]
- An improvement of steganography scheme based on complete complementary codesRyusuke Mayuzumi, Tetsuya Kojima. 638-642 [doi]
- Analysis of binary fingerprinting codes under relaxed marking assumptionMinoru Kuribayashi. 643-647 [doi]
- Error-trellises for tailbiting convolutional codesMasato Tajima, Koji Okino. 648-652 [doi]
- Reconstruction of constellation labeling with convolutional coded dataNicolas Sendrier, Marion Bellard. 653-657 [doi]
- Theoretical analysis of bit error probability for punctured convolutional codesHideki Yoshikawa. 658-661 [doi]
- A construction of high rate punctured convolutional codesHiroshi Sasano, Sen Moriya. 662-666 [doi]
- Coupling effects between transmit and receive antennas in frequency offset amplify-and-forward relayNaoki Kikuchi, Mamiko Inamori, Yukitoshi Sanada. 667-671 [doi]
- SAGE-based estimation algorithms for time-varying channels in Amplify-and-forward cooperative networksNico Aerts, Marc Moeneclaey. 672-676 [doi]
- Trade-off of multiplexing-diversity gain for high throughput multiple-hop MIMO relay systemPham Thanh Hiep, Ryuji Kohno. 677-681 [doi]
- MIMO detect-and-forward relay scheme using symbol LLR thresholdDaniel Ciarlini Pinheiro, Yasunori Iwanami. 682-686 [doi]
- Energy efficiency in large interference networksMinqi Shen, Anders Høst-Madsen, Yabo Li. 687-691 [doi]
- Energy efficiency in fading interference channels under QoS constraintsMustafa Ozmen, Mustafa Cenk Gursoy, Pramod K. Varshney. 692-696 [doi]
- Cognitive interference channels with confidential messages under randomness constraintShun Watanabe, Yasutada Oohama. 697-701 [doi]
- Accuracy of latent variable estimation with the maximum likelihood estimator for partially observed hidden dataKeisuke Yamazaki. 707-711 [doi]
- Fault diagnosis algorithm in multi-computer systems based on Lagrangian relaxation methodShunsuke Horii, Manabu Kobayashi, Toshiyasu Matsushima, Shigeichi Hirasawa. 712-716 [doi]
- An error probability estimation of the document classification using Markov modelManabu Kobayashi, Hiroshi Ninomiya, Toshiyasu Matsushima, Shigeichi Hirasawa. 717-721 [doi]
- Chinese text categorization using the character N-gramMakoto Suzuki, Naohide Yamagishi, Yi-Ching Tsai. 722-726 [doi]
- Scheme overcoming incompatibility of privacy and utilization of personal dataShigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Hiroshi Yamaguchi, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji, Norihisa Doi. 727-730 [doi]
- Security analysis of shifted odd knapsack public key encryption schemeRyuichi Sakai, Yasuyuki Murakami, Masao Kasahara. 731-734 [doi]
- A public-key cryptosystem based on decision version of subset sum problemYasuyuki Murakami, Shinsuke Hamasho, Masao Kasahara. 735-739 [doi]
- A study on precision of pseudorandom number generators using the logistic mapShunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki. 740-744 [doi]
- Polar codes for private classical communicationMark M. Wilde, Joseph M. Renes. 745-749 [doi]
- Performance of mismatched polar codes over BSCsMine Alsan. 750-755 [doi]
- m)Junya Honda, Hirosuke Yamamoto. 754-758 [doi]
- A hybrid structured turbo code of CBRM in conjunction with XOR coded parity compressionYasuhiro Kitamura, Shinsuke Ibi, Seiichi Sampei. 759-763 [doi]
- Error-controlling scheme with encoding and spreading in multi-hop relay networkEriko Saeki, Ryuji Kohno. 764-768 [doi]
- Capacity bounds for the alternative relaying diamond channel with conferencing linksChuan Huang, Shuguang Cui. 769-773 [doi]
- A design of code-aided channel estimation in two-way relay networksPing-Chung Wang, Hua-Lung Tsai, Mao Chao Lin. 774-778 [doi]
- A system combining extrapolated and interpolated side information for single view multi-hypothesis distributed video codingDaniel J. Louw, Haruhiko Kaneko. 779-783 [doi]
- Steganalysis of synthetic low-colour imagesSathiamoorthy Manoharan. 784-788 [doi]
- A new robust pitch determination algorithm for telephone speechLiang Chang, Jingde Xu, Kun Tang, Huijuan Cui. 789-791 [doi]
- Performance characteristics of LSB steganalysis based on statistics of image difference signalTadakazu Sakakura, Akira Hayashi. 792-796 [doi]
- New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracySeigo Ikeda, Maki Yoshida, Toru Fujiwara. 797-801 [doi]
- Proposal of a watermarking scheme using winding number and unneeded synchronismHiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura. 802-805 [doi]
- Private and blind digital fingerprinting schemes based upon complete complementary codesTetsuya Kojima, Naoki Ohtani. 806-810 [doi]