Journal: J. Inf. Hiding Multim. Signal Process.

Volume 3, Issue 4

306 -- 319Shing-Tai Pan, Tzung-Pei Hong. Robust Speech Recognition by DHMM with A Codebook Trained by Genetic Algorithm
320 -- 326ShaoWei Weng, Jeng-Shyang Pan 0001, Xia Gao. Reversible Watermark Combining Pre-processing Operation and Histogram Shifting
327 -- 339Stelios Krinidis, Michail Krinidis, Vassilios Chatzis. Frequency-Based Deformable Models as a Distance Metric
340 -- 351Chi-Shiang Chan, Chin-Chen Chang 0001, Hung P. Vo. A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor
352 -- 369Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan 0001, Lakhmi C. Jain. Multiple Viewpoints Based Overview for Face Recognition
370 -- 380Yuh-Ming Cheng, Peng-fei Chen. Autonomous Pedagogical Agents to E-Learning in Elementary School

Volume 3, Issue 3

212 -- 226Philip C. Ritchey, Vernon Rego. A Context Sensitive Tiling System for Information Hiding
227 -- 239Hsuan-Ming Feng, Ji-Hwei Horng, Shiang-Min Jou. Bacterial Foraging Particle Swarm Optimization Algorithm Based Fuzzy-VQ Compression Systems
240 -- 251Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng. A Revocable ID-based Signcryption Scheme
252 -- 281Chung-Ping Young, Bao Rong Chang, Zhiliang Qiu. Scheduling Optimization for Vector Graphics Acceleration on Multiprocessor Systems
282 -- 296Deng-Yuan Huang, Chao-Ho Chen, Wu-Chih Hu, Shu-Chung Yi, Yu-Feng Lin. Feature-Based Vehicle Flow Analysis and Measurement for a Real-Time Traffic Surveillance System
297 -- 305Qingxiang Feng, Jeng-Shyang Pan 0001, Lijun Yan. Restricted Nearest Feature Line with Ellipse for Face Recognition

Volume 3, Issue 2

122 -- 134Tsung-Han Tsai 0001, Chung-Yuan Lin. Visual Hand Gesture Segmentation Using Three-Phase Model Tracking Technique for Real-Time Gesture Interpretation System
135 -- 141Khaled Loukhaoukha. On The Security of Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm
142 -- 150Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu. Reversible Data Hiding for High-Quality Images Based on Integer Wavelet Transform
151 -- 163Stelios Krinidis, Michail Krinidis, Vassilios Chatzis. An Unsupervised Image Clustering Method Based on EEMD Image Histogram
164 -- 175Xinshan Zhu, Yanming Chen. Performance Analysis of Dither Modulation against Composite Attacks
176 -- 190Bao Rong Chang, Chien-Feng Huang, Hsiu Fen Tsai, Zih-Yao Lin. Rapid Access Control on Ubuntu Cloud Computing with Facial Recognition and Fingerprint Identification
191 -- 204Constantinos Patsakis. Number Theoretic SETUPs for RSA Like Factoring Based Algorithms
205 -- 211Valery I. Korzhik, Guillermo Morales-Luna, Ksenia Nebaeva. The Capacity of a Stegosystem for the Noisy Attack Channel

Volume 3, Issue 1

1 -- 11Mohamed Haj Taieb, Jean-Yves Chouinard, Demin Wang, Khaled Loukhaoukha, Grégory Huchet. Progressive Coding and Side Information Updating for Distributed Video Coding
12 -- 23Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, Tsang-Jie Chen. A Cost-Effective People-Counter for a Crowd of Moving People Based on Two-Stage Segmentation
24 -- 33Michael Grosvald, C. Orhan Orgun. Human- Versus Computer-Generated Text-Based Steganography: Real-World Tests of Two Algorithms
34 -- 46Zhuo-Yi Lu, Ke-bin Jia, Wan-Chi Siu. A Fast Video Transcoding Algorithm Based on Hybrid Characteristic of Multi-Scale Videos
47 -- 65Marcus Nutzinger. Real-time Attacks on Audio Steganography
66 -- 70Hua Chen 0003, Bei-Bei Liu, Hao Luo 0001, Zhe-Ming Lu. Fast Image Artistic Style Learning Using Twin-Codebook Vector Quantization
71 -- 99Yunbo Rao, Leiting Chen. A Survey of Video Enhancement Techniques
100 -- 121Stelios Krinidis, Vassilios Chatzis. A Physics-Based Dual Deformable Model