Abstract is missing.
- Spread Spectrum Audio Steganography Using Sub-band Phase ShiftingHosei Matsuoka. 3-6 [doi]
- Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background NoiseAkira Nishimura. 7-10 [doi]
- A Method of High Bit-Rate Data Hiding in Music Using Spline InterpolationRyuta Fujimoto, Mamoru Iwaki, Tohru Kiryu. 11-14 [doi]
- Information Hiding on Lossless Data CompressionKatsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto. 15-18 [doi]
- Multiple Description Coding of an Audio Stream by Optimum Recovery TransformAkinori Ito, Shozo Makino. 19-22 [doi]
- Audio Watermark Enhanced by LDPC Coding for Air TransmissionYôiti Suzuki, Ryouichi Nishimura, Hao Tao. 23-26 [doi]
- A Novel Audio Watermarking in Wavelet DomainMing Li, Yun Lei, Jian Liu, YongHong Yan. 27-32 [doi]
- Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy EnvironmentsSaeed Sedghi, Morteza Khademi, Nedeljko Cvejic. 33-36 [doi]
- Audio Watermarking Based on ReverberationGui-jun Nian, Zhiyuan Xie, Shuxun Wang. 37-40 [doi]
- Digital Audio Watermarking Algorithm Based on Quantizing CoefficientsZhao Xu, Ke Wang, Xiao-hua Qiao. 41-46 [doi]
- A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation AttackingChia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin. 47-50 [doi]
- An Information Hiding Scheme for OFDM Wireless NetworksChuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi. 51-54 [doi]
- A Novel Asymptotic Deterministic Randomness Based Watermarking SchemeKai Wang, Wenjiang Pei, Zhenya He, Yiu-ming Cheung. 55-58 [doi]
- A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component AnalysisZhao Xu, Ke Wang, Xiao-hua Qiao. 59-62 [doi]
- A Robust Watermarking Algorithm Adopting Double EmbeddingXiao-hua Qiao, Shuxun Wang, Quan Wen, Zhao Xu. 63-66 [doi]
- A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB SystemsYing-Tzu Shih, Feng-Cheng Chang, Hsueh-Ming Hang. 67-70 [doi]
- Image Watermarking Based HVS Characteristic of Wavelet TransformCong Jin, Feng Tao, Yu Fu. 71-74 [doi]
- CDMA Based Multiple-User Digital WatermarkingDeyun Peng, Jiazhen Wang, Sumin Yang, Suzhen Wang, Aizhen Liu. 75-78 [doi]
- Image Watermarking Resisting to Geometrical Attacks Based on HistogramZheng Fang, Yao Zhao. 79-82 [doi]
- A New Watermarking Protocol of Copyright ProtectionRu Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li. 83-88 [doi]
- A Digital Document Flexible Sanitizing SchemeTakanobu Masubuchi, Mitsuyuki Takatsuka, Ryoichi Sasaki. 89-92 [doi]
- Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random BendingMasanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura. 93-96 [doi]
- Improved Guided Position Scrambling for Digital WatermarkingAkiomi Kunisa, Kousuke Tsujita. 97-100 [doi]
- A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial DomainMaki Yoshida, Takaaki Fujita, Toru Fujiwara. 101-104 [doi]
- Digital Image Watermark Algorithm in the Curvelet DomainZhi-yu Zhang, Wei Huang, Jiu-long Zhang, Hai-yan Yu, Yan-jun Lu. 105-108 [doi]
- Joint Halftoning and Visible WatermarkingHao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Bin-Yih Liao. 109-112 [doi]
- A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation AttackingChuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao. 113-116 [doi]
- Extending the Selective MPEG Encryption Algorithm PVEALi Weng, Karel Wouters, Bart Preneel. 117-120 [doi]
- A New Image Steganography for Internet Communications Based on Chaotic SequencesNiansheng Liu, Donghui Guo, Gerard Parr. 121-124 [doi]
- An Image Encryption Approach Based on a New Two-Dimensional MapFeng Huang, Yong Feng. 125-130 [doi]
- Image Robust Hashing Based on DCT SignLongjiang Yu, Sheng-He Sun. 131-134 [doi]
- A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic SystemSheng-bing Che, Da Huang, Guang Li. 135-138 [doi]
- Chain Code Distribution-Based Image RetrievalJunding Sun, Xiaosheng Wu. 139-142 [doi]
- Lung Cancer Diagnosis System Based on Support Vector Machines and Image Processing TechniqueKewen Xia, Guan Xu, Naixun Xu. 143-146 [doi]
- A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse SystemLin Ma, Zhongzhao Zhang, Xuezhi Tan. 147-150 [doi]
- A Novel Log-WT Based Super-Resolution AlgorithmJianping Qiao, Ju Liu. 151-154 [doi]
- Multiscale Gradient Vector Field with Application to Image Denoising and EnhancementJinye Peng, Wanhai Yang, Yichun Wang. 155-158 [doi]
- Recovering Intrinsic Images from Weighted Edge MapsQiang He, Chee-Hung Henry Chu. 159-162 [doi]
- An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging DataNan Zhang, Xianchuan Yu, Guosheng Ding. 163-166 [doi]
- Block Mean Value Based Image Perceptual HashingBian Yang, Fan Gu, Xiamu Niu. 167-172 [doi]
- Adaptive Compression Scheme for Video Delivery over the QoS-Aware Residential GatewayPei-Chen Tseng, Ching-Tuey Sung, Wen-Shyang Hwang. 173-176 [doi]
- KaiKai: A NAT Traversal Approach by Using Protocol Behavior AnalysisYung-Li Chang, Hsiang-Kai Liao, Ce-Kuen Shieh, Yu-Ben Miao. 177-180 [doi]
- Video Transmission Performance Evaluation of Ad Hoc Routing ProtocolsKu-Lan Kao, Chih-Heng Ke, Ce-Kuen Shieh. 181-184 [doi]
- A Fast-Startup TCP Mechanism for VoIP Services in Long-Distance NetworksMong-Fong Horng, Hung-Wei Hsu, Wan-Ling Du, Yi-Hsiang Hung, Ming-Harng Lee. 185-188 [doi]
- Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless NetworksHong-Peng Wang, Tie-Jun Zhang, Xiao-Zong Yang. 189-192 [doi]
- Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth RestrainmentTakuo Nakashima. 193-196 [doi]
- Multi-Dimensional Packet Classification Using Tuple Space Based on Bit-ParallelismXue-Guang Wang. 197-200 [doi]
- Video Streaming over 3G Networks with GOP-Based Priority SchedulingYongjin Cho, Do-Kyoung Kwon, C. C. Jay Kuo, Renxiang Huang, Claudio Lima, Jim D. Black, James J. Pan. 201-204 [doi]
- Rate Control Scheme Based on Cauchy R-D Optimization Model for H.264/AVC under Low Delay ConstraintN. Eiamjumrus, Supavadee Aramvith. 205-210 [doi]
- Research Based on Fuzzy Algorithm of Cancer Cells in Pleural Fluid Microscopic Images RecognitionLei Zhang, Qiuguang Wang, Jiping Qi. 211-214 [doi]
- Genetic Algorithm Based Optimal Block Mapping Method for LSB SubstitutionRongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang. 215-218 [doi]
- Nonholonomic Motion Planning of Mobile Robot with Ameliorated Genetic AlgorithmJinFei Wu, DongXing Qin, HongPing Yu. 219-222 [doi]
- Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-HMehdi Rezaei, Moncef Gabbouj, Imed Bouazizi. 223-227 [doi]
- Medical Image Noise Reduction Using Cellular Neural NetworksTe-Jen Su, Jyun-Wei Jhang. 228-231 [doi]
- A Dynamic Clustering Algorithm Based on PSO and Its Application in Fuzzy IdentificationDingxue Zhang, Xinzhi Liu, Zhihong Guan. 232-235 [doi]
- Forensic Analysis of Document Fragment Based on SVMBinglong Li, QingXian Wang, Junyong Luo. 236-239 [doi]
- Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm OptimizationWei Fang, Jun Sun, Wenbo Xu. 240-243 [doi]
- Analysis and Problems on Fuzzy Vault SchemeQiong Li, Zhaoqing Liu, Xiamu Niu. 244-250 [doi]
- GA-Based Internet Traffic Classification Technique for QoS ProvisioningJunghun Park, Hsiao-Rong Tyan, C. C. Jay Kuo. 251-254 [doi]
- Multi-user Video Streaming over Multi-hop Wireless Networks: A Cross-Layer Priority Queuing SchemeHsien-Po Shiang, Mihaela van der Schaar. 255-258 [doi]
- H.264 Error Resilience Coding Based on Multi-hypothesis Motion Compensated Prediction and Adaptive Intra-refreshYuh-Chou Tsai, Chia-Ming Tsai, Chia-Wen Lin. 259-262 [doi]
- Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia ApplicationsPasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto, Enrico Magli. 263-266 [doi]
- HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual ComputingDeepa Kundur, Unoma Ndili Okorafor, William Luh. 267-270 [doi]
- Positioning Algorithm of Wireless Sensor Network NodesWenhui Zhao, Daxin Liu, Yu Jiang. 271-273 [doi]
- Evaluation of Signal Processing Effect in Media Gateway Based on Cross CorrelationHao Wang, Yanying Wang, Jikun Guo, Dianwu Gao. 274-277 [doi]
- Curve-Based Secure Routing Algorithm for Sensor NetworkFen-hua Cheng, Jin Zhang, Zheng Ma. 278-281 [doi]
- Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid ApplicationGuomin Zhang, Yong Zhang, Ming Chen, Huan Xiong. 282-288 [doi]
- Symmetrical Color-Spatial Feature for Medical Image RetrievalJingyi Qu, Haoshan Shi. 289-292 [doi]
- Face Detection Based on Complexional Segmentation and Feature ExtractionQian Zhang, Zhi-Jing Liu. 293-296 [doi]
- Gabor Filter Based Text Extraction from Digital Document ImagesYu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun. 297-300 [doi]
- Discriminant Feature Fusion Strategy for Supervised LearningJun-Bao Li, Shu-Chuan Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan. 301-304 [doi]
- A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of ImagesJun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan, Jiun-Huei Ho. 305-308 [doi]
- A Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine TreeQinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He. 309-312 [doi]
- An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile DevicesChi Cui. 313-316 [doi]
- A Method of Biomimetic Pattern Recognition for Speaker RecognitionBo Qian, Yanping Li, Limin Xu, Zhenmin Tang. 317-320 [doi]
- A PCA Based Visual DCT Feature Extraction Method for Lip-ReadingXiaopeng Hong, Hongxun Yao, Yuqi Wan, Rong Chen. 321-326 [doi]
- Atomic Human Action Segmentation Using a Spatio-Temporal Probabilistic FrameworkDuan-Yu Chen, Sheng-Wen Shih, Hong-Yuan Mark Liao. 327-330 [doi]
- Understanding Human Behavior Using a Language Modeling ApproachYu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao. 331-334 [doi]
- Human Motion Recognition Using Clay Representation of TrajectoriesYu-Chun Lai, Hong-Yuan Mark Liao. 335-338 [doi]
- Boosted String Representation and Its Application to Video SurveillanceYung-Tai Hsu, Jun-Wei Hsieh. 339-342 [doi]
- Comparison Study on SVD-Based Face ClassificationYong Xu, Yingnan Zhao. 343-346 [doi]
- Image Retrieval Based on Improved Entropy and MomentsJunding Sun. 347-350 [doi]
- SVD Based Robust Image Content RetrievalYuhua Jiao, Bian Yang, He Wang, Xiamu Niu. 351-354 [doi]
- Emotion Recognition Using Physiological Signals from Multiple SubjectsLan Li, Ji-hua Chen. 355-358 [doi]
- A Fire-Alarming Method Based on Video ProcessingPing-He Huang, Jing-Yong Su, Zhe-Ming Lu, Jeng-Shyang Pan. 359-364 [doi]
- A New Steganalysis Method for Adaptive Spread Spectrum SteganographyRongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang, Jianchao Sun. 365-368 [doi]
- A Steganalysis Method Based on the Distribution of First Letters of WordsXin-guang Sui, Hui Luo, Zhong-liang Zhu. 369-372 [doi]
- A Methodology to Improve the Detection Accuracy in Digital SteganalysisAntonio Savoldi, Paolo Gubian. 373-376 [doi]
- A Research on Steganography Method Based on Error-Correcting CodesCui-Qing Liu, Xijian Ping, Tao Zhang, Linna Zhou, Yun-He Wang. 377-380 [doi]
- Research of Chaos Encryption Algorithm Based on Logistic MappingJinhong Luo, Haiyi Shi. 381-383 [doi]
- Analysis of Current Steganography Tools: Classifications & FeaturesMing Chen, Ru Zhang, Xinxin Niu, Yixian Yang. 384-387 [doi]
- Java Applets Copy Protection by SteganographyMohammad Shirali-Shahreza. 388-391 [doi]
- Novel Steganographic Schemes Based on Row-Major Mapping RelationChung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh. 392-395 [doi]
- An Improved Secret Key Estimation Method for Sequential SteganographyPing Wang, Xiangyang Luo, Fenlin Liu. 396-402 [doi]
- Design of Gabor Filter Banks for Iris RecognitionChia-Te Chou, Sheng-Wen Shih, Duan-Yu Chen. 403-406 [doi]
- Abnormal Event Detection in Video Using N-cut ClusteringChun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang. 407-410 [doi]
- Efficient Moving Object Extraction in Compressed Low-Bit-Rate VideoChih-Chung Hsu, Hsuan-Ting Chang, Ting Cheng Chang. 411-414 [doi]
- Vision-Based Autonomous Vehicle Guidance in Indoor Environments Using Odometer and House Corner Location InformationKai-Li Chiang, Wen-Hsiang Tsai. 415-418 [doi]
- A Fast Facial Expression Recognition Method at Low-Resolution ImagesCheng-Chang Lien, Yang-Kai Chang, Chih-Chiang Tien. 419-422 [doi]
- The Effect of Frame Freezing and Frame Skipping on Video QualityYining Qi, Mingyuan Dai. 423-426 [doi]
- The Smoke Detection for Early Fire-Alarming System Base on Video ProcessingThou-Ho Chen, Yen-Hui Yin, Shi-Feng Huang, Yan-Ting Ye. 427-430 [doi]
- An Adjustable Multipath Flatted-Hexagon Search Algorithm for Block Motion EstimationTsong-Yi Chen, Thou-Ho Chen, Shi-Feng Huang, Yi-Fan Li. 431-434 [doi]
- Automatic Real-Time Moving Target Detection from Infrared VideoShahryar Karimi-Ashtiani, C. C. Jay Kuo. 435-440 [doi]
- Interlacing Domain Partition for Fractal WatermarkingPing-Sung Liao, Cheng-Yi Chen, Chun-Chi Chen, Jeng-Shyang Pan. 441-444 [doi]
- Improved Video Verification Method Using Digital WatermarkingIsao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura. 445-448 [doi]
- Blind Watermarking in Contourlet Domain with Improved DetectionM. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai. 449-452 [doi]
- A Heuristic Method for Extracting Enhanced Watermarks from Digital ImagesChin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen. 453-456 [doi]
- Image Watermarking Based on Singular Value DecompositionJie Liu, Xiamu Niu, Wenhai Kong. 457-460 [doi]
- A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and AuthenticationZhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang. 461-464 [doi]
- Geometrically Invariant Watermark Using Fast Correlation AttacksDan Wang, Peizhong Lu. 465-468 [doi]
- Audio Integrity Protection and Falsification Estimation by Embedding Multiple WatermarksMichael Gulbis, Erika Müller, Martin Steinebach. 469-472 [doi]
- The Attacking Method for DC Components WatermarkingPei-wei Tsai, Shu-Chuan Chu, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao. 473-478 [doi]
- VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition479-482 [doi]
- Codec Design for Variable-Length to Fixed-Length Data Conversion for H.263Chua-Chin Wang, Gang-Neng Sung, Jia-Hao Li. 483-486 [doi]
- Reversible Data Hiding for 3D Point Cloud ModelHao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Hsiang-Cheh Huang. 487-490 [doi]
- Multiple Description Image Coding Using Shifted Lattice Vector QuantizationHuihui Bai, Yao Zhao. 491-494 [doi]
- Implications of a Novel Family of Stochastic Methods for Function RecoveryJoseph Kolibal, Daniel Howard. 495-498 [doi]
- A Motion-Compensated Error Concealment Scheme for H.264 Video TransmissionChun-Ting Hung, Jin-Jang Leou. 499-502 [doi]
- H.264/AVC Video Encoder Implementation Based on TI TMS320DM642Hong-Jun Wang, Yong-Jian Huang, Hua Li. 503-506 [doi]
- R-D Optimized Frame-Layer Bit Allocation for H.264Do-Kyoung Kwon, Mei-Yin Shen, C. C. Jay Kuo. 507-510 [doi]
- Fast H.264/AVC Inter-Mode Decision with RDC OptimizationYu Hu, Qing Li, Siwei Ma, C. C. Jay Kuo. 511-516 [doi]
- Chaotic Signal Design with Selected ParametersBaishan Zhao, Yi-Sheng Zhu. 517-520 [doi]
- Error-Tolerance and Multi-MediaMelvin A. Breuer, Haiyang (Henry) Zhu. 521-524 [doi]
- An Improved Technique for Blind Audio Source SeparationNamgook Cho, Yu Shiu, C. C. Jay Kuo. 525-528 [doi]
- Adaptive Working Window for Impulse Noise ReductionThou-Ho Chen, Shi-Feng Huang, Chao-Yu Chen, Zhi-Hong Lin. 529-532 [doi]
- Improved Linear Prediction Technique for Musical Onset DetectionWan-Chi Lee, C. C. Jay Kuo. 533-536 [doi]
- A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch DetectionHui Ding, Bo Qian, Yanping Li, Zhenmin Tang. 537-540 [doi]
- Improved SMVQ Scheme with Edge-Directed PredictionChin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li. 541-544 [doi]
- A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded CodewordsChin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen. 545-548 [doi]
- Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook SearchChin-Chen Chang, Yung-Chen Chou. 549-554 [doi]
- Design of AC-PDP Signal Processor for SoC ApplicationSong Qiu, Wai-yun Li, Jin-gao Liu, Wen-jing Hu. 555-558 [doi]
- A Novel Low-IF Topology for High Performance Integrated ReceiversLingjun Xu, Qiang Wang, Jiansong Gao, Yong Wang, Ping Zhang. 559-562 [doi]
- Power Optimization for Bus on Multimedia SoCRu Yang, Gang Feng, Donghai Li. 563-566 [doi]
- Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 PlatformMin-Hong Chen, Feng-Cheng Chang, Hsueh-Ming Hang. 567-570 [doi]
- A Single-Stream Pipelined Instruction Decompression System for Embedded MicroprocessorsYuan-Long Jeang, Tzuu-Shaang Wey, Hung-Yu Wang, Chih-Chung Tai. 571-574 [doi]
- Research on Applying Java Card to Database Encryption SystemsHan Yu, Xiamu Niu, Duohe Ma, ChangXiang Shen. 575-578 [doi]
- System-on-Chip Architecture Design for Intelligent Sensor NetworksWai-Chi Fang, Sharon Kedar, Susan Owen, Gu-Yeon Wei, David Brooks, Jonathan Lees. 579-582 [doi]
- Low-Power Radio Design for Wireless Smart Sensor NetworksWai-Chi Fang, Tsung-Hsien Lin. 583-586 [doi]
- VS-ISA: A Video Specific Instruction Set Architecture for ASIP DesignZheng Shen, Hu He, Yanjun Zhang, Yihe Sun. 587-592 [doi]
- Reversible Data Hiding for 3D Meshes in the PVQ-Compressed DomainZhen Sun, Zhe-Ming Lu, Zhen Li. 593-596 [doi]
- Utilization of Maximum Data Hiding Capacity in Object-Based Text Document AuthenticationImtiaz Awan, S. A. M. Gilani, S. A. Shah. 597-600 [doi]
- A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic MappingLiehuang Zhu, Wenzhuo Li, Lejian Liao, Hong Li. 601-604 [doi]
- Focus on the Generalized Information Hiding TechnologyDaimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu. 605-608 [doi]
- Information Hiding Method in Digital Audio Signal Based on Perfect CodesLinna Zhou, Cui-Qing Liu, Xijian Ping, Tao Zhang, Yun-He Wang. 609-612 [doi]
- A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic SequencesYaqin Zhao, Nan Zhao, Guanghui Ren, Bo Zhang. 613-616 [doi]
- An Image Hiding Scheme Based on Du s Disk Allocation MethodChia-Chen Lin, Chin-Chen Chang. 617-620 [doi]
- Analysis of Anonymity on the Signatures of KnowledgeXin-guang Zou, Sheng-He Sun. 621-624 [doi]
- An Efficient Attestation for Trustworthiness of Computing PlatformXiao-Yong Li, Chang-xiang Shen, Xiao-Dong Zuo. 625-630 [doi]
- Effects on Statistical Features for Image by QuantizationYanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong. 631-634 [doi]
- A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet TransformBei-bei Li, Xin Li, Shuxun Wang, Haifeng Li. 635-638 [doi]
- Design of Collusion-Free Codes Based on MAI-Free PrincipleByung-Ho Cha, C. C. Jay Kuo. 639-642 [doi]
- Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2Zhenyu Wu, Hongyang Yu, Bin Tang, Hong Hu. 643-646 [doi]
- Chirp-Based Image Watermarking as Error-Control CodingBehnaz Ghoraani, Sridhar Krishnan. 647-650 [doi]
- Performance Analysis of Color Image Watermarking Schemes Using Perceptually Redundant Signal SpacesChun-Hsien Chou, Kuo-Cheng Liu. 651-654 [doi]
- Decoder-Friendly Subpel MV Selection for H.264/AVC Video EncodingQi Zhang, Yunyang Dai, Siwei Ma, C. C. Jay Kuo. 655-658 [doi]
- Image Inspection System for Defect Detection of Multilayer Ceramic CapacitorsChun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee. 659-662 [doi]
- Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech RecognitionJianjun Lei, Jian Wang, Jun Guo, Gang Liu, Haifeng Shen. 663-668 [doi]
- Fast Algorithm of Trigonometric Function of Specific AngleQiusheng He, Wending Liu, Fuzeng Wang, Jianjun Hao, Hui Li, Yaqi Cheng. 669-672 [doi]
- Voice2SQL: A Hybrid Intelligent System for the Recovery of Information from Databases by Means of Spoken Natural LanguageOmar U. Flórez-Choque. 673-676 [doi]
- The Watermarking Model for Relational Database Based on Watermarking SharingCong Jin, Yu Fu, Feng Tao. 677-680 [doi]
- Progressive Image Transmission Using Significant Features and Linear Regression PredictionChin-Chen Chang, Jun-Chou Chuang. 681-684 [doi]
- The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos SystemXiao-jun Tong, Ming Gen Cui, Wei Jiang. 685-688 [doi]
- Pervasive Computing Context Access Control Based on UCON_ABC ModelFang Pu, Daoqin Sun, Qiying Cao, Haibin Cai, Fan Yang. 689-692 [doi]
- A Non-uniform Quantizing Approach to Protect Biometric TemplatesQi Han, Zhifang Wang, Xiamu Niu. 693-698 [doi]
- Detecting the Theft of Natural Language Text Using BirthmarkJianlong Yang, Jianmin Wang, Deyi Li. 699-702 [doi]
- A Context-Aware AmI System Based on MAS ModelYong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, Rui Chen. 703-706 [doi]