Journal: J. Inf. Hiding Multim. Signal Process.

Volume 12, Issue 4

162 -- 174Zhuofan Xu, Huihui Bai, Jimin Xiao, Feiran Jie, Yao Zhao 0001. Occluded and tiny face detection network for dense crowd
175 -- 185Jianliang Xu, Huaxun Lou, Zhe Wang, Zhe-Ming Lu. X-strip Y-band Location Clustering Algorithm for Network Topology Inference
186 -- 198Farah R. Shareef Taka. Secure Communication by combined Diffe-Hellman key exchange Based AES Encryption and Arabic Text Steganography
199 -- 206Phu-Hung Dinh, Trung Nguyen Tu. A novel method based on parameter optimization for medical image fusion
207 -- 216Ming-Sung Chiu, Chien-Chih Lin, Chia-Sheng Cheng, Ming-Tsung Yeh, Yi-Nung Chung, Chao-Hsing Hsu. Applying Image Processing Algorithm to Dynamic Face Detection
217 -- 225Lubab Ahmed Tawfeeq, Samera Shams Hussein, Mahir jasem Mohammed, Shaimaa Sattar Abood. Predication of Most Significant Features in Medical Image by Utilized CNN and Heatmap
226 -- 238Charles Chen, Sheng-Lung Peng. Multi Barcode Scanning and Decoding Technology Based on AR Smart Glasses

Volume 12, Issue 3

116 -- 126Phuc Nguyen. Clustering Web Videos to Improve User Experience on Website
127 -- 139Farah R. Shareef Taka. Text Steganography based on Noorani and Darkness
140 -- 151Trung Nguyen Tu. An improving using MapReduce model in predicting learning ability of pupils based on Bayes classification algorithm
152 -- 161Mohamed A. Elshafey, Ahmed S. Amein, Khaled S. Badran. Universal Image Steganography Detection using Multimodal Deep Learning Framework

Volume 12, Issue 2

42 -- 55An Hong Son, Quynh Dao Thi Thuy, Quynh Nguyen Huu. Stuck Query Point Processing Of Multi-point Query For Image Retrieval With Relevance Feedback
56 -- 64Chi-Ming Chen, Chien-Chih Lin, Yu-Sheng Liu, Jin-Xiang Liao, Ming-Tsung Yeh, Yi-Nung Chung, Chao-Hsing Hsu. Applying Image Processing Technology to Automatically Detect and Adjust Paper Benchmark for Printing Machine
65 -- 82Huwaida T. Elshoush, Ibtihal A. Ali, Mahmoud M. Mahmoud, Abdelrahman Altigani. A Novel Approach to Information Hiding Technique using ASCII Mapping Based Image Steganography
83 -- 92Hany A. A. Mansour. Implementation of Chaotic Sequences on UWB Wireless Communication in Presence of NBI
93 -- 101Qing Wu, Bo-yan Zang, Yu Zhang, Zongxian Qi. Wavelet Kernel Twin Support Vector Machine
102 -- 115Mohamed Amine Belhamra, El Mamoun Souidi. An Information Hiding Scheme for Live P2P Streaming Based on the R2 Protocol

Volume 12, Issue 1

1 -- 11Jian Wu, Ming Xu, Fei-Fei Liu, Miao Huang, Longhua Ma, Zhe-Ming Lu. Solar Wireless Sensor Network Routing Algorithm Based on Multi-Objective Particle Swarm Optimization
12 -- 21Ibrahima Djenabou Barry, Mitsuhiro Yokota. Numerical Analysis of Dispersion Characteristics of a Photonic Crystal Fiber
22 -- 30Hong Nguyen Thi Khanh. Classification of Concepts Using Decision Trees for Inconsistent Knowledge Systems Based on Bisimulation
31 -- 41Hany A. A. Mansour. Comparative Study: Evaluation and Application of Different Chaotic Maps in CDMA System