324 | -- | 341 | Nhut Minh Ngo, Masashi Unoki, Ryota Miyauchi, Yôiti Suzuki. Data Hiding Scheme for Amplitude Modulation Radio Broadcasting Systems |
342 | -- | 352 | Chin-Chen Chang 0001, Yi-Hui Chen, Lin-Yi Chuang. Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques |
353 | -- | 366 | Peng Li, Qian Kong, Yanpeng Ma. Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation |
367 | -- | 378 | Hao-Kuan Tso, Tsung-Ming Lo, Wei-Kuei Chen. Friendly Medical Image Sharing Scheme |
379 | -- | 390 | Xin-Wei Li, Kang Sun, Lei-Da Li. Accelerated Tracing Scheme for Gaussian Fingerprinting |
391 | -- | 398 | Ying Cui, Hui-Qin Liu, Tong Wang. Target Coverage Research Based on Improved Binary Differential Algorithm |
399 | -- | 407 | Lijian Zhou, Yukai Xu, Zhe-Ming Lu, Tingyuan Nie. Face Recognition Based on Multi-Wavelet and Sparse Representation |
408 | -- | 419 | Sagar Gujjunoori, B. B. Amberker. Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients |
420 | -- | 430 | Wen-Chung Kuo, Sheng-Yi Chang. Hybrid GEMD Data Hiding |
431 | -- | 438 | Xun-Fei Liu, Xiang-xian Zhu. Kernel-optimized Based Fisher Classification of Hyperspectral Imagery |
439 | -- | 450 | Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu. A Novel Frequency Billing Service in Digital Television System |
451 | -- | 460 | John Marin, Frank Y. Shih. Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification |
461 | -- | 474 | Chun-Hung Richard Lin, Kuan-Hua Tseng, Yu-Hsiu Huang, Cheng-Yi Lin. Implementation of IP-over-DVB Network as a Wireless Internet Backbone |
475 | -- | 484 | Mei Zhao, Anhong Wang, Lei Liu, Bing Zeng, Huihui Bai. Depth Coding Based on Compressed Sensing with Optimized Measurement and Quantization |
485 | -- | 496 | Chang Duan, Qi Hong Huang, Xue-gang Wang, Shuai Wang. Remote Image Fusion Based on PCA and Dual Tree Compactly Supported Shearlet Transform |
497 | -- | 507 | Wei-Chun Lin, Tsair-Fwu Lee, Shu-Yuan Lin, Li-Fu Wu, Hung-Yu Wang, Liyun Chang, Jia-Ming Wu, Jing-Chuan Jiang, Chiu-Ching Tuan, Mong-Fong Horng, Chin-Shiuh Shieh, Pei-Ju Chao. Non-invasive Knee Osteoarthritis Diagnosis via Vibroarthrographic Signal Analysis |
508 | -- | 517 | Xiaoxia Wang, Liangyu Ma. A Compact K Nearest Neighbor Classification cation for Power Plant Fault Diagnosis |
518 | -- | 526 | Hai Cheng, Qun Ding, Chunguang Huang, Shuxia Zhai, Lianzhong Fang. Improvements of SM4 Algorithm and Application in Ethernet Encryption System Based on FPGA |
527 | -- | 533 | ShaoWei Weng, Jeng-Shyang Pan 0001. Reversible Watermarking Based on Eight Improved Prediction Modes |
534 | -- | 545 | Chuan Qin, Chin-Chen Chang 0001, Szu-Ting Wang. A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files |
546 | -- | 554 | Zhenfeng Zhu, LinLin Du, Lei Zhang, Yao Zhao 0001. Shared Subspace Learning for Latent Representation of Multi-View Data |
555 | -- | 566 | Jia-Jia Zhang, Xuan Wang 0002, Lin Yao, Jingpeng Li, Shen-Xeu Dong. Using Risk Dominance Strategy in Poker |
567 | -- | 573 | Jie Sun, Zhe-Ming Lu, Lijian Zhou. Iris Recognition Using Curvelet Transform Based on Principal Component Analysis and Linear Discriminant Analysis |