Journal: J. Inf. Hiding Multim. Signal Process.

Volume 5, Issue 4

574 -- 585Xianhua Song, Shen Wang 0004, Xiamu Niu. Multi-Channel Quantum Image Representation Based on Phase Transform and Elementary Transformations
586 -- 602Sunita V. Dhavale, Rajendra S. Deodhar, Debashish Pradhan, L. M. Patnaik. High Payload Adaptive Audio Watermarking based on Cepstral Feature Modification
603 -- 613Yanjun Liu 0002, Chin-Chen Chang 0001. A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem
614 -- 624Bao Rong Chang, Hsiu Fen Tsai, Yun-Che Tsai. High-Performed Virtualization Services for In-Cloud Enterprise Resource Planning System
625 -- 641Dongning Zhao, Weixin Xie, Zhe-Ming Lu. High Efficiency Reversible Data Hiding for Two-stage Vector Quantization Compressed Images
642 -- 648Chien-Ming Chen 0001, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang, Hung-Min Sun. Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID
649 -- 665Hongfeng Zhu. Structured and Efficient Password-Based Group Key Agreement Protocol
666 -- 671Kai Chain, Wen-Chung Kuo, Jyun-Pei Siang, Jiin-Chiou Cheng. A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity
672 -- 689Hongfeng Zhu, Xin Hao, Yang Sun. Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant
690 -- 700Hao-Xian Wang, Zhe-Ming Lu, Yong Zhang. A sparse representation based super-resolution image reconstruction scheme utilizing dual dictionaries
701 -- 708Wei Zhang, Leida Li, Hancheng Zhu, Deqiang Cheng, Shu-Chuan Chu, John F. Roddick. No-reference Quality Metric of Blocking Artifacts Based on Orthogonal Moments
709 -- 718Yanjun Liu 0002, Chin-Chen Chang 0001. A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem
719 -- 730Kun Zhao, Jie Sun, Zhe-Ming Lu, Jian Wang, Lijian Zhou. Non-rigid Video Object Segmentation Based on Semantic Multi-level Framework
731 -- 739Hongtao Yin, Jiaqing Qiao, Ping Fu, XinYuan Xia. Face Feature Selection with Binary Particle Swarm Optimization and Support Vector Machine
740 -- 756Samaa M. Shohieb, Hamdy K. Elminir, Alaa Mohamed Riad. A Multi-Modal Oculography-Based Mouse Controlling System: Via Facial Expressions & Eye Movement
757 -- 768Junping Dai, Yazhong Liu, Jianfeng Lu, Jiayi Xu, Chin-Chen Chang 0001, Li Li 0014. Watermarking Marbled Image Based on Linear Enhancement Hologram
769 -- 777Weiwei Liu 0002, Guangjie Liu, Yuewei Dai. Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity
778 -- 788Ping Wang, Jia-Chi Liu. Threat Analysis of Cyber Attacks with Attack Tree+
789 -- 805Chin-Chen Chang 0001, Pei-Yan Pai, Meng-Hsiun Tsai, Chia-Ming Liu. A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution
806 -- 813Juanjuan Zhu, Bao-Long Guo, Chuang Ge. Real-Time Digital Image Stabilization Algorithm using Sage-Husa Filter

Volume 5, Issue 3

324 -- 341Nhut Minh Ngo, Masashi Unoki, Ryota Miyauchi, Yôiti Suzuki. Data Hiding Scheme for Amplitude Modulation Radio Broadcasting Systems
342 -- 352Chin-Chen Chang 0001, Yi-Hui Chen, Lin-Yi Chuang. Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
353 -- 366Peng Li, Qian Kong, Yanpeng Ma. Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation
367 -- 378Hao-Kuan Tso, Tsung-Ming Lo, Wei-Kuei Chen. Friendly Medical Image Sharing Scheme
379 -- 390Xin-Wei Li, Kang Sun, Lei-Da Li. Accelerated Tracing Scheme for Gaussian Fingerprinting
391 -- 398Ying Cui, Hui-Qin Liu, Tong Wang. Target Coverage Research Based on Improved Binary Differential Algorithm
399 -- 407Lijian Zhou, Yukai Xu, Zhe-Ming Lu, Tingyuan Nie. Face Recognition Based on Multi-Wavelet and Sparse Representation
408 -- 419Sagar Gujjunoori, B. B. Amberker. Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients
420 -- 430Wen-Chung Kuo, Sheng-Yi Chang. Hybrid GEMD Data Hiding
431 -- 438Xun-Fei Liu, Xiang-xian Zhu. Kernel-optimized Based Fisher Classification of Hyperspectral Imagery
439 -- 450Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu. A Novel Frequency Billing Service in Digital Television System
451 -- 460John Marin, Frank Y. Shih. Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification
461 -- 474Chun-Hung Richard Lin, Kuan-Hua Tseng, Yu-Hsiu Huang, Cheng-Yi Lin. Implementation of IP-over-DVB Network as a Wireless Internet Backbone
475 -- 484Mei Zhao, Anhong Wang, Lei Liu, Bing Zeng, Huihui Bai. Depth Coding Based on Compressed Sensing with Optimized Measurement and Quantization
485 -- 496Chang Duan, Qi Hong Huang, Xue-gang Wang, Shuai Wang. Remote Image Fusion Based on PCA and Dual Tree Compactly Supported Shearlet Transform
497 -- 507Wei-Chun Lin, Tsair-Fwu Lee, Shu-Yuan Lin, Li-Fu Wu, Hung-Yu Wang, Liyun Chang, Jia-Ming Wu, Jing-Chuan Jiang, Chiu-Ching Tuan, Mong-Fong Horng, Chin-Shiuh Shieh, Pei-Ju Chao. Non-invasive Knee Osteoarthritis Diagnosis via Vibroarthrographic Signal Analysis
508 -- 517Xiaoxia Wang, Liangyu Ma. A Compact K Nearest Neighbor Classification cation for Power Plant Fault Diagnosis
518 -- 526Hai Cheng, Qun Ding, Chunguang Huang, Shuxia Zhai, Lianzhong Fang. Improvements of SM4 Algorithm and Application in Ethernet Encryption System Based on FPGA
527 -- 533ShaoWei Weng, Jeng-Shyang Pan 0001. Reversible Watermarking Based on Eight Improved Prediction Modes
534 -- 545Chuan Qin, Chin-Chen Chang 0001, Szu-Ting Wang. A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files
546 -- 554Zhenfeng Zhu, LinLin Du, Lei Zhang, Yao Zhao 0001. Shared Subspace Learning for Latent Representation of Multi-View Data
555 -- 566Jia-Jia Zhang, Xuan Wang 0002, Lin Yao, Jingpeng Li, Shen-Xeu Dong. Using Risk Dominance Strategy in Poker
567 -- 573Jie Sun, Zhe-Ming Lu, Lijian Zhou. Iris Recognition Using Curvelet Transform Based on Principal Component Analysis and Linear Discriminant Analysis

Volume 5, Issue 2

117 -- 123Takashi Mihara. A New Framework of Steganography Using the Content of Cover Data
124 -- 143Chia-Chen Lin, Chin-Chen Chang 0001, Yi-Hui Chen. A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images
144 -- 151Zhi-Wei Zhang, Ming-Hui Wang, Zhe-Ming Lu, Yong Zhang. A Skin Color Model Based on Modified GLHS Space for Face Detection
152 -- 164Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang 0001, Yanjun Liu 0002. (k, n)-Image Reversible Data Hiding
165 -- 178Tian-Hua Liu, Qian Wang, Hong-Feng Zhu. A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving
179 -- 186Guo-Liang Zhang, Chun-Ling Yang. Anomaly Detection for Hypaerspectral Imagery Using Analytical Fusion and RX
187 -- 198Cheng Luo, Yong Zhang, Weixin Xie. Traffic Regulation based Congestion Control algorithm in Sensor Networks
263 -- 274Chia-Mei Chen, Ming-Zong Huang, Ya-Hui Ou. Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain
275 -- 285Hsiang-Cheh Huang, Feng-Cheng Chang. Robust Image Watermarking Based on Compressed Sensing Techniques
286 -- 295Takeshi Nagano, Akinori Ito. Packet Loss Concealment of Voice-over IP Packet using Redundant Parameter Transmission Under Severe Loss Conditions
296 -- 301Mengmeng Yang, Jie Liu. A Maximum Lifetime Coverage Algorithm Based on Linear Programming
302 -- 309Baoxiang Du, Qun Ding, Xiaoli Geng. Analysis and Elimination of Digital Chaotic Key Sequence¡¦s Autocorrelation
310 -- 323Deng-Yuan Huang, Chun-Jih Lin, Shr-Huan Dai. Face Recognition Using the Diagonal Relative Gradient Method in a Low Illumination Environment

Volume 5, Issue 1

1 -- 12Chin-Chen Chang 0001, Ting-Fang Cheng. A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature
13 -- 19Qi Han 0002, Liyang Yu, Wenchao Zheng, Na Cheng, Xiamu Niu. A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching
20 -- 32Constantinos Patsakis, Nikolaos Aroukatos. LSB and DCT steganographic detection using compressive sensing
33 -- 40Mao-Hsiung Hung, Jeng-Shyang Pan 0001, Chaur-Heh Hsieh. A Fast Algorithm of Temporal Median Filter for Background Subtraction
41 -- 46Yan Xu 0007, Miaomiao Tian 0001, Liusheng Huang, Wei Yang 0011. Improvement of a Lattice-based Signature Scheme
47 -- 60Zhi-Hui Wang, Marcos Segalla Pizzolatti, Chin-Chen Chang 0001. Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation
61 -- 71Feng-Cheng Chang, Hsiang-Cheh Huang. A Framework for Prototyping Telecare Applications
72 -- 79Delong Zhang, Jiaqing Qiao, Jun-Bao Li, Liyan Qiao, Shu-Chuan Chu, John F. Roddick. Optimizing Matrix Mapping with Data Dependent Kernel for Image Classification
80 -- 89Lian-Lei Lin, Ling-Yu Li, Yue Ma. Design of Data Archive in Virtual Test Architecture
90 -- 97Taghaddos Danial, Alimohammad Latif. Visual cryptography for grayscale images using bit-level
98 -- 106Xue Zhang, Anhong Wang, Bing Zeng, Lei Liu. Adaptive Distributed Compressed Video Sensing
107 -- 116Chin-Chen Chang 0001, Ya-Chieh Huang, Hao-Chuan Tsai. Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks