Journal: J. Inf. Sci. Eng.

Volume 22, Issue 3

483 -- 496Yen-Chung Chiu, Wen-Hsiang Tsai. Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain
497 -- 509Varsha Chikane, Chiou-Shann Fuh. Automatic White Balance for Digital Still Cameras
511 -- 534Li-wei He, Tsorng-Lin Chia, Chen-Kuei Yang. A Geometric Invariant Approach to Human Face Verification
535 -- 543Shi-Cheng Liu, Shinfeng D. Lin. BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain
545 -- 557Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan, Bor-Shenn Jeng. Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detection in Image Sequences
559 -- 571Jong-Phil Yang, Kyung Hyune Rhee. A New Design for a Practical Secure Cookies System
573 -- 594Been-Chian Chien, Jung-Yi Lin, Wei-Pang Yang. A Classification Tree Based on Discriminant Functions
595 -- 609Hewijin Christine Jiau, Kuo-Feng Ssu. Building and Using Object-Oriented Frameworks for CAD Rapid Prototyping
611 -- 624Yongsu Park, Yookun Cho. Efficient One-time Signature Schemes for Stream Authentication
625 -- 640Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu, Jim-Min Lin. TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems
641 -- 657Hong-Long Chou, Zen Chen. Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme
659 -- 674Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang. Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6
675 -- 689Ganapathi Padmavathi, Samukutty Annadurai. Storage Efficient Key Management Technique for Secure Multicasting
691 -- 699Wei-Chi Ku, Hui-Lung Lee. Authentication Protocols Using Hoover-Kausik s Software Token
701 -- 712Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee. Semi-fragile Image Authentication Using Real Symmetric Matrix