Journal: J. Inf. Hiding Multim. Signal Process.

Volume 7, Issue 6

1147 -- 1167P. Senatore, Alessandro Piva, Fabio Garzia, Roberto Cusani. A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform
1168 -- 1184Qian Mao, K. Bharanitharan, Chin-Chen Chang 0001. Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images
1185 -- 1193Zhao Kai, Tang Xian. Virtual Host Dynamic Cooperative Transfer Mechanism Based on Service Driven and Content Aware for Cloud Computing
1194 -- 1205Dao-cheng Qu, Jeng-Shyang Pan 0001, ShaoWei Weng, Shaoqiu Xu. A Novel Reversible Data Hiding Method for Color Images Based on Dynamic Payload Partition and Cross-Channel Correlation
1206 -- 1214Jia Zhao 0001, Xuefeng Fu, Li Lv, Runxiu Wu, Hui Wang 0002, Xiang Yu, Tanghuai Fan. Opposition-Based Artificial Bee Colony Using Different Learning Models
1215 -- 1221Shoulin Yin, Jie Liu. A K-means Approach for Map-Reduce Model and Social Network Privacy Protection
1222 -- 1230Jiangtao Zhai, Fang Yang, Yuewei Dai, Mingqian Wang. A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence
1231 -- 1242Lin You, Jiawan Wang, Bin Yan. A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping
1243 -- 1253Zhe-Ming Lu, Ya-Pei Feng. Information Entropy and Cross Information Entropy Based Attacking Methods for Complex Networks
1254 -- 1264Truong-Giang Ngo, Trong-The Nguyen, Ngo Quoc Tao, Duc Dung Nguyen, Shu-Chuan Chu. Similarity Shape Based on Skeleton Graph Matching
1265 -- 1273Qingzhu Wang, Wanjun Kang, Yan-Jiao Wang. Support Tensor Machine Image Classification Algorithm Based on Tensor Principal Component Analysis
1274 -- 1281Shoulin Yin, Hang Li, Jie Liu. A New Provable Secure Certificateless Aggregate Signcryption Scheme
1282 -- 1292Xiao-Long Liu 0001, Chia-Chen Lin, Chin-Chen Chang 0001, Shyan-Ming Yuan. A Survey of Fragile Watermarking-based Image Authentication Techniques
1293 -- 1305Nai-Chung Yang, Chang-Ming Kuo, Chung Ming Kuo, Liang-Kang Huang. Image Retrieval Using Macro- and Micro-Based Visual Vocabulary
1306 -- 1316Lu Tang, Leida Li, Jiansheng Qian, Jianying Zhang, Jeng-Shyang Pan 0001. NSCT-Based Multimodal Medical Image Fusion With Sparse Representation and Pulse Coupled Neural Network
1317 -- 1329Lian-Lei Lin, Daming Pei, Xiaobin Zhao, Yan-xi Jia. Modeling of Laser Transmission in The Atmosphere For Virtual Test
1330 -- 1336Jianneng Chen, Qunshan Chen, Fumin Zou. Certificate-Based Aggregate Signature Scheme without Bilinear Pairings
1337 -- 1344Jeng-Shyang Pan 0001, Lijun Yan, Xingming Liu, Keke Wu. Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification
1345 -- 1353Xiuyuan Chen, Xiyuan Peng, Yu Peng, Jun-Bao Li. The Classification of Synthetic Aperture Radar Image Target Based on Deep Learning
1354 -- 1364Jing Zhang 0040, Min Chen, Pei-wei Tsai, Longmei Tang, Xiaorong Ji. A Coverage Loopholes Recovery Algorithm in Wireless Sensor Networks
1365 -- 1372Yu Chen, Chien-Ming Chen 0001, Jeng-Shyang Pan 0001, Tsu-Yang Wu, Shuai Liu. Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps
1373 -- 1383Zongliang Gan, Changhong Chen, Ziguan Cui, Feng Liu 0028. Novel Frame Rate Up-Conversion Method Through Weight Matching Criterion and Motion Vector Refinement
1384 -- 1394Chin-Chen Chang 0001, Wan-Ting Tseng, Hao-Chuan Tsai. A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks

Volume 7, Issue 5

0 -- 0Lijian Zhou, Hui Wang, Zhe-Ming Lu, Tingyuan Nie, Kun Zhao. Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method
906 -- 915Pengyu Liu, Yueying Wu, Yuan Gao, Kebin Jia. Hierarchical Coding Algorithm for Medical Video Based on H.265/HEVC
916 -- 929Rong-San Lin. A Synchronization Scheme for Hiding Information in Encoded Bitstream of Inactive Speech Signal
930 -- 937Chun-Ming Wu, Tao Yang. A New Refinement Method for Mirror Error in WSN Localization
938 -- 948Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, Qun Ding. Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks
949 -- 959Qingzhou Ye, Maolin Zhang, Ming-Yong Lin. Design of a High Sensitivity and Non-contact Planar Capacitance Sensor
960 -- 969Wei-Liang Tai, Ya-Fen Chang, Yung-Chi Chen. A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks
970 -- 982Zhihong Li, Qiang Jin, Chin-Chen Chang 0001, Anhong Wang, Li Liu 0029. A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization
983 -- 992Qingzhu Wang, Wanjun Kang. Truncation Strategy of Tensor Compressive Sensing for Noisy Video Sequences
993 -- 1005Bao Rong Chang, Hsiu Fen Tsai, Cin-Long Guo. High Performance Remote Cloud Datacenter Backup in Big Data Environment
1006 -- 1019Yang Sun. An Improved Password Authentication Scheme for Telecare Medical Information Systems Based on Chaotic Maps with Privacy Protection
1020 -- 1030Shan-Qing Zhang, Wen-Lei Wang, Jianfeng Lu, Qili Zhou, Li Li. Image Segmentation Using A New Scalar Texture Descriptor based on Extended Structure Tensor
1031 -- 1040Qiu-yu Zhang, Shuang Yu, Ning Chen, Wen-Jin Hu, Si-Bin Qiao. An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream
1041 -- 1051Lihua Zhang, Guangjie Liu, Weiwei Liu 0002, Jiangtao Zhai, Yuewei Dai. Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes
1052 -- 1059Jeng-Shyang Pan 0001, Lijun Yan, Shu-Chuan Chu, John F. Roddick. Contourlet and Nearest Feature Line Based Feature Extraction Approach for One Prototype Sample Problem
1060 -- 1068Yanfei Jia, Shanshan Liu, Xiaodong Yang 0003. A New Undetermined Blind Source Separation Method based on Orthogonal Projection
1069 -- 1080Rui Xu. A Novel Method for Road Centerline Extraction from High Spatial Resolution Satellite Images
1081 -- 1091Yonghong Tan, Xuhui Wang, Xiangdong Yin. Optimal Beamforming Design for Secure Transmission with Channel Covariance Uncertainty
1100 -- 1109Shuqiang Guo, Liqun Wang, Honghui Fan. An Image Segmentation Method for Eliminating Illumination Influence
1110 -- 1125Jilin Zhang, Yongzeng Lai, Pei-wei Tsai. Analysis of Volatilities and Correlations for Chinese Stock Markets
1126 -- 1135Qiu-yu Zhang, Shuang Yu, Wen-Jin Hu, Si-Bin Qiao, Tao Zhang. An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System
1136 -- 1146Jianfeng Lu, Xiaoyan Xu, Li Li 0014, Chin-Chen Chang 0001, Qiang Wang. A Robust Image Copy Detection Method Based On Feature Extraction Algorithm

Volume 7, Issue 4

674 -- 684Chong-Ming Zhao, Zhenfeng Zhu, Yao Zhao 0001. Text Detection Based On Discriminative Dictionary Learning
697 -- 713Yohan Suryanto, Suryadi, Kalamullah Ramli. A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding
714 -- 728Liquan Chen, Zijuan Fan, Miao Lu, Aiqun Hu. Information Hiding Capacities in Different Multiple Antennas Systems
729 -- 740Dingxin Song, Degen Huang, Lishuang Li, Hong-Lei He. Biomedical Named Entity Recognition Based on Feature Selection and Word Representations
741 -- 753Yanjun Liu 0002, Chin-Chen Chang 0001, Chin-Yu Sun. A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing
754 -- 770Li Li 0014, Dejie Zheng, Jianfeng Lu, Xiaoyang Mao, Chin-Chen Chang 0001. An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images
771 -- 780Miaomiao Liu, Jingfeng Guo, Xu Luo. Link Prediction Based on the Similarity of Transmission Nodes of Multiple Paths in Weighted Social Networks
781 -- 790Shuyi Lin, Xiaosheng Huang. Full Simulation of AC Contactor in the Dynamic Process Based on Finite Element Method
791 -- 801Jeng-Shyang Pan 0001, Chen Wang, Tien-Wen Sung 0001. Road Network Modeling with Layered Abstraction for Path Discovery in Vehicle Navigation Systems
802 -- 809Chun-Ming Wu, Qiang-Huan Song, Long-Long Jiao. Collaborative Image Compression Algorithm In Wireless Multimedia Sensor Networks
810 -- 817Xiaodan Xie, Bohu Li 0001, Xudong Chai. Quasiconformal-Matrix-Based Multikernels Learning for Sensory Data Classification
818 -- 825Rongjin Zheng, Xiaosheng Huang, Huiqiong Deng. Design of Substation and Distribution Station Monitoring System Based on DELPHI and Intelligent Modules
826 -- 835Juan Wang, Qun Ding. Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication
836 -- 845Binbin Xia, Anhong Wang, Chin-Chen Chang 0001, Li Liu 0029. An Image Steganography Scheme Using 3D-Sudoku
846 -- 857Xiaorong Cheng, Tianqi Li, Sizu Hou, Huilan Zhao, Hongyu Wang. Research on Credibility Measurement Method of Data In Big Data
858 -- 866Ye Yuan 0006, Kebin Jia. A Semi-supervised Approach for Water Quality Detection based on IoT Network
867 -- 880Jeng-Shyang Pan 0001, Hongfeng Zhu. An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices
881 -- 888Ying Zhou, Yongsheng Liang, Wei Liu, Cheng He, Yue Zhu. Saliency Region and Motion Characteristics Combined Video Quality Assessment
889 -- 897Diego A. Rojas, Olga L. Ramos, Jorge E. Saby. Recognition of Spanish Vowels through Imagined Speech by using Spectral Analysis and SVM
898 -- 905Chun-Ming Wu, Qiang-Huan Song. Fault Diagnosis of Wind Turbine Vibration Based on Wavelet Transform And Neural Network

Volume 7, Issue 3

460 -- 474Wan-Li Lyu, Chin-Chen Chang 0001, Feng Wang 0020. Image Authentication and Self-Recovery Scheme Based on The Rehashing Model
475 -- 488Hongfeng Zhu, Dan Zhu, Yifeng Zhang, Yan Zhang. A Novel On-Demand Password Scheme Based on BAN Logic
489 -- 498Hejin Yuan, Chunhong Duo, Wei-hua Niu. A Human Behavior Recognition Method Based on Latent Semantic Analysis
499 -- 509Lian-Lei Lin, Yang Wu, Gang Wang. A Simulation Method of Atmospheric Turbulence Based on Von Karman Model
510 -- 520Jiaqi Zhen, Zhifang Wang, Bing Zhao, Linlin Tang. A Novel Super-Resolution Direction Finding Method for Wideband Signals Based on Multiple Small Aperture Subarrays
521 -- 529Lin Liu, Fumin Zou. Research on the Data Collection Methods for Pavement Maintenance Based on the Internet of Vehicles
530 -- 542Zhengwei Zhang, Lifa Wu, Haiguang Lai, Huabo Li, Chenghui Zheng. Double Reversible Watermarking Algorithm for Image Tamper Detection
543 -- 557Chen Cui, Shen Wang 0004, Xiamu Niu. A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape
558 -- 568Xin-Ling Guo, Zhe-Ming Lu. Urban Road Network and Taxi Network Modeling Based on Complex Network Theory
569 -- 575Xiao Chen, Zhe-Ming Lu. Protection on Complex Networks with Geometric and Scale-Free Properties
576 -- 586Qi Zhang, Yuchao Guo, Wangshu Li, Qun Ding. Image Encryption Method Based on Discrete Lorenz Chaotic Sequences
587 -- 598Mingqian Wang, Xianfeng Liu, Wei-jie Gu. A DWT-Based Covert Timing Channel of High Concealment
599 -- 609Feng-Cheng Chang, Hsiang-Cheh Huang. Reversible Data Hiding with Difference Prediction and Content Characteristics
610 -- 619Lifei Zhan, Yuesheng Zhu, Zhiwei Mo. An Image Splicing Detection Method Based on PCA Minimum Eigenvalues
620 -- 628Qingzhu Wang, Wanjun Kang. Lossy Compression for Compressive Sensing of Three-Dimensional Images
629 -- 636Nong Si, Ke-bin Jia. One Communication Key Udate with Whitelist Attribute in SCADA System
637 -- 644Nan Jia, Songyan Liu, Qun Ding, Shangru Wu, Xuming Pan. A New Method of Encryption Algorithm Based on Chaos and ECC
645 -- 652Jia Zhao 0001, Li Lv, Hui Wang 0002, Dekun Tan, Jun Ye, Hui Sun, Yin-Tai Hu. Artifcial Bee Colony Based on Special Central and Adapt Number of Dimensions Learning
653 -- 658Wei-Liang Tai, Ya-Fen Chang, Ti-Sheng Kwang. An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems
659 -- 673Meiling Li, Anhong Wang, Gang-Fei Wang. An Analysis Model for OFDMA-Based Inter-cell Interference

Volume 7, Issue 2

222 -- 232Hongfeng Zhu, Tianhua Liu, Yu Xia. A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server
233 -- 242Dora M. Ballesteros L., Diego Renza, Steven Camacho. An Unconditionally Secure Speech Scrambling Scheme Based on An Imitation Process to A Gaussian Noise Signal
243 -- 253Xiangdong Yin, Linping Tang, Na Wang. Extremely Randomized Clustering Forest Based Scene Recognition Algorithm in Mobile Devices
254 -- 265Yong Jin, Ruigang Li. Opportunistic Cooperative QoS Guarantee Protocol Based on GOP-length and Video Frame-diversity for Wireless Multimedia Sensor Networks
266 -- 276Yu-Jia Ma, Yue-Sheng Zhu, Xiyao Liu. A Novel Reversible Watermarking Scheme for Relational Databases Protection Based on Histogram Shifting
277 -- 285Tingting Xie, Jishi Zheng, Shu-Chuan Chu. A Joint Attitude Control Method for Small Unmanned Aerial Vehicles Based on Prediction Incremental Backstepping
286 -- 295Yibing Wang. The Encryption Scheme for DICOM Based on the Homomorphic Higher Degree Residue System in Cloud Storage
296 -- 303Xiaodan Xie, Bo-Hu Li 0001, Xudong Chai. A Unified Framework of Multiple Kernels Learning for Hyperspectral Remote Sensing Big Data
304 -- 316Wangshu Li, Ziheng Yang, Qun Ding. Synchronous Digital Signal Communication System Based on Chaotic Masking
317 -- 324Li Jiang, Xingsi Xue, Pei-wei Tsai, Jeng-Shyang Pan 0001. A Novel Ontology Matching Technology Based on NSGA-II
325 -- 342Rong Gao, Yi-Xiong Yang. Consumers' Decision: Fashion Omni-channel Retailing
343 -- 351Yan Xu 0007, Hong Zhong 0001, Jie Cui 0004. An Improved Identity-Based Multi-Proxy Multi-Signature Scheme
352 -- 361Dilmurat Tursun, Li Kai, Gulxax Halelbek, Askar Hamdulla. A Joint Approach of Harris Corners Detection and Baseline Searching for Localization of Uyghur Text Lines in Image Sequences
362 -- 375Hong Zhong 0001, Haiquan Liu, Chin-Chen Chang 0001, Chia-Chen Lin. A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images
376 -- 385Yang Sun, Hongfeng Zhu, Xueshuai Feng. An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps
386 -- 398Chuan Qin, Haoran Ren, Chin-Chen Chang 0001, QingKui Chen. Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis
399 -- 408Yi Fan, Yue-Sheng Zhu, Zhen Liu. An Improved SIFT-Based Copy-Move Forgery Detection Method Using T-Linkage and Multi-Scale Analysis
409 -- 418Bing Zhao, Zhifang Wang, Qun Ding, Linlin Tang. Optimizing Multiband Orthogonal Transmission of Low-Energy and Efficient Cognitive Ultra Wideband System
419 -- 424Shun-Peng Hsu, Yi-Nung Chung, Young-Chi Hsu, Chao-Hsing Hsu. Applying Power Management and Wireless Sensing System to Plant Factory
425 -- 437Zuoxian Nie, Mao-Hsiung Hung, Jing Huang. A Novel Algorithm of Rebar Counting on Conveyor Belt Based on Machine Vision
438 -- 447Rui Xu. A Multistage Method for Road Extraction from Optical Remotely Sensed Imagery
448 -- 459Jingli Yang, Fudan Li, Zhen Sun, Shouda Jiang. A Small Target Detection Method based on Human Visual System and Confidence Measurement

Volume 7, Issue 1

1 -- 10Raniyah Wazirali, Zenon Chaczko. Hyper Edge Detection with Clustering for Data Hiding
11 -- 20Hsiang-Cheh Huang, Feng-Cheng Chang. Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics
21 -- 30Pei-wei Tsai, Shunmiao Zhang, Jing Zhang 0040, Yuan Liu, Yao He, Jeng-Shyang Pan 0001. Undulating Swarm Intelligence Agents in Wave Increasing Evolved Bat Algorithm
31 -- 40Kenji Ozawa, Mayuko Mitsuki. Effects of the Relation between Reproduced Sound Pressure Levels and Viewing Angles on the Sense of Presence in Audio-visual Content
41 -- 49Weixin Kang, Raja Asif Wagan, Jingde Li, Chengcheng Zhang. Threshold Based Chain-Leader Election Scheme for Mobile Sink improved energy-efficient PEGASIS-based Routing Protocol
50 -- 58Baishan Zhao, Chengyu Qi. Chaotic Signal Generator Design Based on Discrete System
59 -- 71Hongfeng Zhu, Dan Zhu, Yan Zhang. A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model
72 -- 79Zhifang Wang, Meng Chen, Xiao Meng, Linlin Tang. Bimodal Multi-feature Fusion based on Quaternion Fisher Discriminant Analysis
80 -- 89Bao Rong Chang, Hsiu Fen Tsai, Hung-Ta Hsu. Secondary Index to Big Data NoSQL Database ¡V Incorporating Solr to HBase Approach
90 -- 100Yapeng Li, Zhi Chai, Xiaodan Xie, Weishan Zhang, Zhenghao Li. A Seat Position Labeling Algorithm Based on Improved Edge Operator and Gray Projection
101 -- 114Deng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Wu-Chih Hu, Yu-Lin Lin. A Vehicle Flow Counting System in Rainy Environment Based on Vehicle Feature Analysis
115 -- 126Jinshui Wang, Xingsi Xue, Shu-Chuan Chu. Towards Supporting Feature Location Using Syntactic Analysis
127 -- 134Gaoling Li, Yingli Wang, Hongbin Ma. Audio Packet Encryption of Flow Control Base on stop-and-wait Protocol
135 -- 144Chien-Chang Chen, Yao-Hong Tsai. An Expandable Essential Secret Image Sharing Structure
145 -- 152Yan-Jiao Wang, Xiao-Jie Li. Targets Coverage Algorithm based on Three-dimensional Directional Sensing Model
153 -- 162Sijing Cai, Pei-wei Tsai. Echolocation Guided Evolved Bat Algorithm
163 -- 174Bing Zhao, Qun Ding, Lina Ding. Performance Research of Multiband Parallel Transmission Cognitive Ultra Wideband System
175 -- 183Peng Geng, Song Tian, Kai Lu. Multifocus Image Fusion by the Sum of Local Variance Energy
184 -- 197Chih-Chao Chung, Li-Chung Chao, Shi-Jer Lou. Constructing the predictive model for strategy execution problems -the application of the two-stage Analytic Network Process
198 -- 215Wan-Li Lyu, Chin-Chen Chang 0001. An Image Compression Method Based on Block Truncation Coding and Linear Regression
216 -- 221Da-Jie Guo, Zhe-Ming Lu, Hao Luo 0001. Multi-Channel Adaptive Mixture Background Model for Real-time Tracking