Abstract is missing.
- Challenges of Location Tracking Techniques in Wireless ForensicsEmmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh. 3-6 [doi]
- Copyright Protection in Wireless Sensor Networks by WatermarkingRong Xiao, Xingming Sun, Ying Yang. 7-10 [doi]
- File-Update Based Steganography for Microsoft PowerPoint FilesYongping Liu, Xingming Sun, Yuling Liu, Rong Xiao. 11-15 [doi]
- Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour ImagesChang-Tsun Li, Yue Li. 16-19 [doi]
- A Steganography Scheme in P2P NetworkZishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang. 20-24 [doi]
- A Fragile Document Watermarking Technique Based on Wet Paper CodeJiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan. 25-28 [doi]
- A New Watermark Attacking Method Based on Eigen-Image EnergyTe-Cheng Hsu, Wen-Shyong Hsieh, Tung-Shih Su. 29-32 [doi]
- Building an Online Game-Based Learning System for Elementary SchoolYuh-Ming Cheng, Peng-fei Chen. 35-38 [doi]
- The Study of Balance Traffic Load with Genetic Algorithm for PONChun-Ting Huang. 39-42 [doi]
- A Hybrid Fast Approach to Secure Group-Oriented Management of Key Trees on InternetChien-Ming You, Mong-Fong Horng, Yau-Hwang Kuo, Wan-Ling Du. 43-46 [doi]
- Research on Remote Monitoring and Control System Key Techniques Based on Data Point TableHan Xiao, Chao Wang, Na Feng. 47-51 [doi]
- An Adaptive Cross-Layer Scheduling Algorithm for Multimedia NetworksXiuyuan Li, Xiaojuan Wu, Wenming Li, Xiaogang Wang. 52-55 [doi]
- A Model of Smart Home Fusing Multi-intelligenceJun-feng Man, Lu-ming Yang, Wen-qiu Zhu, Qian-Qian Li. 56-59 [doi]
- Supporting Multiple Classes of Services in IP over WDM Ring NetworkJih-Hsin Ho, Wen-Shyang Hwang. 60-63 [doi]
- A Middleware Design for Block Cipher Seamless Connected into Stream Cipher ModeLan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang. 64-67 [doi]
- Shape Feature Extraction Using Fourier Descriptors with Brightness in Content-Based Medical Image RetrievalGang Zhang, Z. M. Ma, Qiang Tong, Ying He, Tie-Nan Zhao. 71-74 [doi]
- Image Retrieval Based on Fuzzy Color HistogramKai-xing Wu, Qiang Xu. 75-78 [doi]
- Combination of Wavelet snd SIFT Features for Image Classification Using Trained Gaussion Mixture ModelKejun Wang, Zhen Ren, Xinyan Xiong. 79-82 [doi]
- Media Adaptation in MPEG-21 DIA, Framework, Activities and Open IssuesTian-yun Huang. 83-86 [doi]
- A Novel Facial Image Retrieval Algorithm Based on PLT-PCAQi Han, Chen Song, Meihui Zhang, Xiamu Niu. 87-90 [doi]
- An Improved Presentation Method for Relevance Feedback in a Content-Based Image Retrieval SystemFeng-Cheng Chang, Hsueh-Ming Hang. 91-94 [doi]
- A Study on the Meta-data Design for Long-Term Digital Multimedia PreservationFeng-Cheng Chang, Chin-Yuan Chang, Hsueh-Ming Hang. 95-98 [doi]
- Performance Framework for P2P Overlay NetworkTakuo Nakashima, Akari Ono, Toshinori Sueyoshi. 101-104 [doi]
- Queueing Property for Different Type of Self-Similar TrafficsTakuo Nakashima, Yusuke Shomura, Toshinori Sueyoshi. 105-108 [doi]
- An Animation Engine with the Cubic Spline InterpolationNingping Sun, Toru Ayabe, Kentarou Okumura. 109-112 [doi]
- An Approach to Speech Driven AnimationNingping Sun, Kaori Suigetsu, Toru Ayabe. 113-116 [doi]
- IPTV QoS Implement Mechanism in WLANJin-Yu Zhang, Man-Gui Liang. 117-120 [doi]
- Location Scheme in Wireless Sensor NetworksYe Yao, Wandong Cai, Vincent Hilaire, Abder Koukam. 121-125 [doi]
- Secure Peer Joining Process in Structured P2P SystemWei Song, Yuelong Zhao. 126-129 [doi]
- Reducing Signaling cost with Simplifed mSCTP In Fast Mobile IPv6Jiemin Liu, Jingxin Dou, Hongxing Zou, Yuan Gao. 130-133 [doi]
- A Proposal of Falsification Detection System in Structural DesignKenshi Uematsu, RyƓichi Sasaki. 137-142 [doi]
- Fingerprinting Traffic LogKatsunari Yoshioka, Tsutomu Matsumoto. 143-146 [doi]
- Expiration Dated FingerprintingMaki Yoshida, Toru Fujiwara. 147-150 [doi]
- Lossless Data Hiding Using Bit-Depth Embedding for JPEG2000 Compressed Bit-StreamShogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda. 151-154 [doi]
- Performance Improvement of JPEG2000 Steganography Using QIMTakayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi. 155-158 [doi]
- An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic SystemShengbing Che, Bin Ma, Zuguo Che. 159-162 [doi]
- Robust Audio Watermarking Algorithm Based on Histogram SpecificationXiaoming Zhang, Xiong Yin, Zhaoyang Yu. 163-166 [doi]
- Parameter Modulation Secure Communication Based on Active ControlShao-Cheng Qu, Mei-jing Gong, Xiao-Yan Wang. 167-170 [doi]
- Face Detection with Automatic White Balance for Digital Still CameraYuan-Kai Wang, Chin-Fa Wang. 173-178 [doi]
- Human Action Recognition Using Star Templates and Delaunay TriangulationChi-Hung Chuang, Jun-Wei Hsieh, Luo-Wei Tsai, Kuo-Chin Fan. 179-182 [doi]
- Iris Recognition Based on Matching PursuitsYueh-Shiun Lee, Jinn Ho, Wen-Liang Hwang, Chung-Lin Huang. 183-187 [doi]
- Dynamic Visual Saliency Modeling for Video SemanticsDuan-Yu Chen, Hsiao-Rong Tyan, Sheng-Wen Shih, Hong-Yuan Mark Liao. 188-191 [doi]
- Digital Image Forgery Detection Based on the Consistency of Defocus BlurXin Wang, Bo Xuan, Silong Peng. 192-195 [doi]
- Video Key Frame Extraction Based on Spatial-Temporal Color DistributionZhonghua Sun, Kebin Jia, Hexin Chen. 196-199 [doi]
- A Speaker Identification System for Video Content AnalysisJing Bi, Shu-Chang Liu. 200-203 [doi]
- Detection of H.264 Shot Change Using Intra Predicted DirectionTien-Ying Kuo, Yi-Chung Lo. 204-207 [doi]
- An Asymmetric Multicast Fingerprinting Scheme Based on Secret SharingYanzhen Ren, Ruimin Hu, Haojun Ai. 211-214 [doi]
- A Forward Secure Ring Signature SchemeWansu Bao, Yun Wei. 215-218 [doi]
- Trust Derivation and Recommendation Management in a Trust ModelLifen Li. 219-222 [doi]
- Curve Watermarking Technique for Fingerprinting Digital MapsYongjian Hu, Heung-Kyu Lee, Huafei Zeng. 223-226 [doi]
- An Image Fingerprinting Method Robust to Complicated Image ModificationsXinghua Yu, Tiejun Huang. 227-230 [doi]
- Multicast Video Fingerprinting Scheme with Genetic AlgorithmHsiang-Cheh Huang, Yueh-Hong Chen. 231-234 [doi]
- Designated Verifier Proxy Signature SchemeYongjian Liao, Qing Lu, Zhiguang Qin. 235-238 [doi]
- Copyright Protection for Images with EXIF MetadataHsiang-Cheh Huang, Yueh-Hong Chen, Shin-Chang Chen. 239-242 [doi]
- A Steganalysis Method Based on Contourlet Transform CoefficientsHedieh Sajedi, Mansour Jamzad. 245-248 [doi]
- Reversible Data Hiding for Audio Based on Prediction Error ExpansionDiqun Yan, Rangding Wang. 249-252 [doi]
- Damageless Information Hiding Technique Using Neural NetworkKensuke Naoe, Yoshiyasu Takefuji. 253-256 [doi]
- An Algorithm of Webpage Information Hiding Based on Attributes PermutationHuajun Huang, Shaohong Zhong, Xingming Sun. 257-260 [doi]
- Estimating Data Hiding Capacity of Gray Scale Images Based on Its bitplanes StructureFarzin Yaghmaee, Mansour Jamzad. 261-264 [doi]
- Halftone Image Data Hiding with Reference to Original Multitone ImageChih-Cheng Lo, Chien-Ming Lee, Bin-Yih Liao, Jeng-Shyang Pan. 265-268 [doi]
- High Capacity Information Hiding Algorithm for DCT Domain of ImageJianquan Xie, Chunhua Yang, Dazu Huang. 269-272 [doi]
- A Blind Steganalysis Algorithm of QIM-Based HidingHai-ying Gao. 273-276 [doi]
- A Certificateless Restrictive Partially Blind Signature SchemeChangji Wang, Rongbo Lu. 279-282 [doi]
- A Speech Chaotic Encryption Algorithm Based on NetworkJing Liu, Fei Gao, Haiyan Ma. 283-286 [doi]
- Fast Implementation of SMS4 Cryptographic Algorithms on Smart CardDawei Zhang, Wenrui Ding, Ding Ding. 287-290 [doi]
- A Method of Big Prime Number Generator Based on NTLTao Meng, Xiaoqian Wu, Shenghe Sun. 291-293 [doi]
- A Security Threshold Subliminal Channel Based on Elliptic Curve CryptosystemYuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo. 294-297 [doi]
- An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor NetworkYi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Myong-Soon Park. 298-303 [doi]
- Data Study on the Chaotic Synchronization Driven by External Chaotic SignalChun-Yan Song, Yu-Long Qiao, Xing-Zhou Zhang. 304-307 [doi]
- JPEG Encryption with File Size PreservationXiamu Niu, Chongqing Zhou, Jianghua Ding, Bian Yang. 308-311 [doi]
- Picture Watermarks Surviving General Affine Transformation and Random DistortionYusuke Atomori, Isao Echizen, Hiroshi Yoshiura. 315-318 [doi]
- Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed DocumentsKitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai. 319-322 [doi]
- A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile SizesKitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, Seiichiro Hangai. 323-326 [doi]
- Development of Benchmark Tool for Digital WatermarkingKosuke Kamiya, Takuma Mori, Keiichi Iwamura. 327-330 [doi]
- Design and Implementation of Synchronized Audio-to-Audio Steganography SchemeXuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe. 331-334 [doi]
- A Chinese Text Watermarking Based on Statistic of Phrase FrequencyQingcheng Li, Jin Zhang, Zhenhua Zhang, Jia-xin Liu. 335-338 [doi]
- A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number SystemXiaofeng Huang, Fei Peng, Tao Deng. 339-342 [doi]
- A Robust Image Watermarking Scheme Based on a Novel HVS Model in Curvelet DomainYi Xiao, Lee-Ming Cheng, L. L. Cheng. 343-347 [doi]
- Comparison of Two Modern Pattern Recognition MethodsXiaochun Shi. 351-353 [doi]
- Sign Language Synthesis of Individuation Based on Data ModelXiaoyu Wang, Feng Jiang, Hongxun Yao. 354-357 [doi]
- An Efficient Model for Isolated Vietnamese Handwritten RecognitionPham Anh Phuong, Ngo Quoc Tao, Chi Mai Luong. 358-361 [doi]
- New Criterion for Mining Strong Association Rules in Unbalanced EventsTong-Yan Li, Xing ming Li. 362-365 [doi]
- Using Semantics for Dynamic Access Control of XML Documents in Dynamic Coalition EnvironmentTao Peng 0006, Minghua Jiang, Ming Hu. 366-369 [doi]
- MST Clustering Algorithm Based on Optimized GridJianLiang Meng, Weixiang Cheng. 370-373 [doi]
- A Template Protection Scheme For Statistic Feature-based 2D Face RecognitionQianwen Wang, Wenjun Huang, Xiamu Niu, Xiuzhan Jiang. 374-377 [doi]
- A Face Recognition Algorithm Decreasing the Effect of IlluminationYung-Mao Lu, Bin-Yih Liao, Jeng-Shyang Pan. 378-381 [doi]
- An Embedded and Efficient Low Memory Hierarchical Image CoderRenlong Wang, Yanling Hao, Ying Liu, Jin Xi. 385-388 [doi]
- Improved Hidden Markov Tree Model and Its Application in Image DenoisingWenzhe Lv, Zhe Zhang, Xixian Niu. 389-392 [doi]
- Image Recovery Based on Effective Image CompletionChung Ming Kuo, Nai-Chung Yang, Wei-Han Chang, Chi-Lin Wu. 393-396 [doi]
- Image Editing without Color Inconsistency Using Modified Poisson EquationChuan Qin, Shuozhong Wang, Xinpeng Zhang. 397-401 [doi]
- The Study of 3D Reconstruction Method Based on Dynamic Threshold Method and Improved Ray Casting AlgorithmHuiyan Jiang, Yudong Zhao, Ning Li. 402-405 [doi]
- Perceptually Transparent Information Hiding in G.729 BitstreamLihua Liu, Mingyu Li, Qiong Li, Yan Liang. 406-409 [doi]
- Compressed Domain Perceptual Hashing for MELP Coded SpeechYuhua Jiao, Qiong Li, Xiamu Niu. 410-413 [doi]
- Automatic Target Detection and Tracking in FLIR Image Sequences Using Morphological Connected OperatorChang'an Wei, Shouda Jiang. 414-417 [doi]
- An Extended Self-Adaptive Kalman Filtering Object Motion Prediction ModelYunpeng Zhang, Zhengjun Zhai, Xuan Nie, Chunyan Ma, Fei Zuo. 421-424 [doi]
- A Novel Algorithm of Fast Detection and Segmentation of Moving ObjectZhuoyi Lv, Kebin Jia. 425-428 [doi]
- Content-Aware Video Transcoding via Visual Attention Model AnalysisChia-Hung Yeh, Shih-Meng Chen, Shiunn-Jang Chern. 429-432 [doi]
- A Data Layout and Access Control Strategies of the Video Storage Server Based Disk ArrayYuan-Qing He, Shi-Xin Sun. 433-437 [doi]
- A Multi-view Video Coding Method Based on Distributed Source Coding for Free Viewpoint SwitchingGuiguang Ding. 438-441 [doi]
- Fast Local Motion Estimation and Robust Global Motion Decision for Digital Image StabilizationTien-Ying Kuo, Chung-Hsin Wang. 442-445 [doi]
- Efficient Block-Matching Motion Estimation Algorithm Based on Temporal and Spatial Correlation for H.264Zu-jue Chen, Zhi-Xiong Zhang, Xing Luo. 446-449 [doi]
- A Video Summarization Approach Based on Machine LearningWei Ren, Yuesheng Zhu. 450-453 [doi]
- A New Visually Imperceptible and Robust Image Watermarking Scheme in Contourlet DomainElham Salahi, M. Shahram Moin, Ahmad Salahi. 457-460 [doi]
- Software Watermarking Based on Dynamic Program SlicingXiaohong Deng, Guowen Xu, Guang Sun, Junfeng Man. 461-464 [doi]
- A Robust Watermarking Scheme Using Selective Curvelet CoefficientsH. Y. Leung, L. M. Cheng, L. L. Cheng. 465-468 [doi]
- Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic AlgorithmChih-Chin Lai, Hsiang-Cheh Huang, Cheng-Chih Tsai. 469-472 [doi]
- The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image WatermarkingLarbi Boubchir, Ayoub Otmani, Nadia Zerida. 473-476 [doi]
- Stylometric WatermarkingQian Zhang, Nigel Boston. 477-480 [doi]
- Multiplicative Watermark Detection Using Locally Optimum NonlinearityTianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang. 481-484 [doi]
- Mean-Classified and Hierarchical Block Matching Watermarking in Fractal CodingJing-Ming Guo, Chung-Te Yang, Jiann-Der Lee. 485-488 [doi]
- A Holonic Model in Wireless Sensor NetworksYe Yao, Vincent Hilaire, Abder Koukam, Wandong Cai. 491-495 [doi]
- Notice of Violation of IEEE Publication PrinciplesAsymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia TransportJiemin Liu, Hongxing Zou, Jingxin Dou, Yuan Gao. 496-499 [doi]
- Research on Three-Dimensional Localization Algorithm in Wireless Sensor NetworkKai Li, Shijue Zheng, Zhenhua Zheng, Xiaoyan Chen. 500-503 [doi]
- Intelligent Campus Multi-application RFID Integration SystemYuan-Bo Chen, Chih-Jen Yang, Gwo-Jia Jong. 504-507 [doi]
- Wireless Grid and Storage System DesignWenying Zeng, Yuelong Zhao, Wei Song, Wenfeng Wang. 508-511 [doi]
- A Metrics Suite for Static Structure of Large-Scale Software Based on Complex NetworksHaohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo. 512-515 [doi]
- On the Security of WAI Protocol in the Third Version of WAPIZhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo. 516-519 [doi]
- Application-Layer Implementation of Service MigrationChin-Shiuh Shieh, Che-Wei Hsu, Wei Kuang Lai. 520-525 [doi]
- Symbian Forensics: An OverviewAntonio Savoldi, Paolo Gubian. 529-533 [doi]
- Measure of Integrity Leakage in Live Forensic ContextLei Pan, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten. 534-537 [doi]
- Methodologies for Detecting Covert DatabaseKeun-Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung-Soo Lim, Seokhee Lee, Sangjin Lee. 538-541 [doi]
- Design and Implementation of a Tool for System Restore Point AnalysisSunmi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, Sangjin Lee. 542-546 [doi]
- Design and Implementation of a Tool to Detect Accounting FraudsYeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim. 547-552 [doi]
- A Gene Immune Detection Algorithm with Complement Operator on the Basis of Biological Immune PrinciplesYa Jing Zhang, Shuan-Hu Wu. 553-556 [doi]
- An Improved Steganalysis Method of LSB MatchingXiaoyi Yu, Noboru Babaguchi. 557-560 [doi]
- An Evaluation Framework for Kernel-Mode Security ModulesHui Zhang, Shenghong Chen, Yuqin Sun, Xiamu Niu. 561-564 [doi]
- Face Recognition by Integrating Chin OutlineJiann-Shu Lee, Kai-Yang Huang, Sho-Tsung Kao, Seng-Fong Lin. 567-571 [doi]
- Face Recognition Based on Gabor Features and Two-Dimensional PCAYi-Chun Lee, Chin-Hsing Chen. 572-576 [doi]
- Hand Detections Based on Invariant Skin-Color Models Constructed Using Linear and Nonlinear Color SpacesCheung-Wen Chang, Yung-Nien Sun. 577-580 [doi]
- Knapsack Model for Pixel Based Skin DetectionSajad Shirali-Shahreza, Hamid Beigy, Mohammad Hassan Shirali-Shahreza. 581-584 [doi]
- Face Localization in Cluttered BackgroundJing-Wein Wang. 585-589 [doi]
- Research of Gravity-Based Outliers DetectionJianLiang Meng, Weixiang Cheng. 590-593 [doi]
- Sensation Based Clothes Search SystemDamon Shing-Min Liu, Ching-I Cheng. 594-597 [doi]
- Data Hiding for Audio Signals That Are Robust with Respect to Air Transmission and a Speech CodecAkira Nishimura. 601-604 [doi]
- Steganography in Silence Intervals of SpeechSajad Shirali-Shahreza, Mohammad Shirali-Shahreza. 605-607 [doi]
- A Technique of Lossless Steganography for G.711 Telephony SpeechNaofumi Aoki. 608-611 [doi]
- Packet Loss Concealment for MDCT-Based Audio Codec Using Correlation-Based Side InformationAkinori Ito, Kiyoshi Konno, Shozo Makino, Motoyuki Suzuki. 612-615 [doi]
- Audio Watermarking Method Based on the Cochlear Delay CharacteristicsMasashi Unoki, Daiki Hamada. 616-619 [doi]
- Content-Based Authentication Watermarking with Improved Audio Content Feature ExtractionMichael Gulbis, Erika Müller, Martin Steinebach. 620-623 [doi]
- A Digital Watermark for Stereo Audio Signals Using Variable Interchannel Delay in High Frequency BandsKazuhiro Kondo, Kiyoshi Nakagawa. 624-627 [doi]
- On the Accuracy of Estimated Synchronization Positions for Audio Digital Watermarks Using the Modified Patchwork Algorithm on Analog ChannelsKoudai Hiratsuka, Kazuhiro Kondo, Kiyoshi Nakagawa. 628-631 [doi]
- Generalized Bilinear Interpolation of Motion Vectors for Quad-Tree MeshChih-Cheng Wei, Chin-Hsing Chen. 635-638 [doi]
- Robust Superresolution Reconstruction from Compressed Video Sequences with OcclusionHsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang. 639-642 [doi]
- An Adaptive Image Frequency Subbanding Method for High-Frequency Pixel EstimationChao-Yu Chen, Chao-Ho Chen, Tien-Hsiang Huang, Chin-Hsing Chen. 643-646 [doi]
- A Novel Efficient VLSI Architecture of 2-D Discrete Wavelet TransformChin-Fa Hsieh, Tsung-Han Tsai, Chih-Hung Lai, Tai-An Shan. 647-650 [doi]
- Low Power Adders Design for Portable Video TerminalChien-Hung Lin, Shu-Chung Yi, Jin-Jia Chen. 651-654 [doi]
- The Study on Ship-Flow Analysis and Counting System in a Specific Sea-Area Based on Video ProcessingDa-Jinn Wang, Wen-Sheng Chen, Thou-Ho Chen, Tsong-Yi Chen. 655-658 [doi]
- H.264 Video Authentication Based on Semi-fragile WatermarkingTsong-Yi Chen, Thou-Ho Chen, Yin-Ting Lin, Yin-Chan Chang, Da-Jinn Wang. 659-662 [doi]
- A Delivery System for Scalable Video Streaming Using the Scalability Extension of H.264/AVC over DiffServ NetworksLishui Chen, Guizhong Liu. 665-669 [doi]
- GM/LM Based Error Concealment for MPEG-4 Video Transmission over High Lossy and Noisy NetworksXueming Qian, Guizhong Liu, Huan Wang. 670-674 [doi]
- A Refined Algorithm for the Side Information in DVCYing Feng, Song Xiao, Chengke Wu, Rui Song. 675-678 [doi]
- An Approach to Side Information Estimation Based on Universal Prediction and Motion Compensated InterpolationYangli Wang, Jechang Jeong, Chengke Wu, Song Xiao, Min Zhou. 679-682 [doi]
- A H.264 Based Joint Source Channel Coding Scheme over Wireless ChannelsXuejuan Gao, Li Zhuo, Suyu Wang, Lansun Shen. 683-686 [doi]
- Double-Domains-Based Covert Communication Scheme for a RS-Code-Based Multiple Description Image Coding SystemChuang Lin, Jeng-Shyang Pan. 687-690 [doi]
- Multiple Description Image Coding Based on DSC and Pixel InterleavingAnhong Wang, Yao Zhao, Jeng-Shyang Pan. 691-694 [doi]
- Multiple Descriptions and Adaptive Delivery of Media Content over WirelessTian-yun Huang. 695-698 [doi]
- Robust Face Recognition Based on Modified ICA without Training Sample of Test SubjectsXian-Hua Han, Yen-Wei Chen, Akihiko Yamada, Hideto Fujita. 701-704 [doi]
- Gaze Tracking by Binocular Vision Technology and PPBTF FeaturesHuchuan Lu, Chao Wang, Yen-Wei Chen. 705-708 [doi]
- Region-Based Segmentation and Auto-Annotation for Color ImagesYohei Tsurugai, Yuuta Iwasaki, Xian-Hua Han, Yen-Wei Chen. 709-712 [doi]
- Classification of Brain Matters in MRI by Kernel Independent Component AnalysisTomoko Tateyama, Zensho Nakao, Yen-Wei Chen. 713-716 [doi]
- Enhancement and detection of lung nodules with Multiscale filters in CT imagesShingo Takemura, Xian-Hua Han, Yen-Wei Chen, Kazuhiro Ito, Ikuko Nishikawa, Masahiro Ito. 717-720 [doi]
- Interactive System of Artificial Fish School Based on the Extended Boid ModelHisashi Kawabayashi, Yen-Wei Chen. 721-724 [doi]
- Mapping Functions of Color Image Features and Human KANSEIYen-Wei Chen, Shouta Sobue, Xinyin Huang. 725-728 [doi]
- A Robust Image Watermarking Scheme Based on the Relationship of SVDXiangyang Sun, Ju Liu, Jiande Sun, Qiang Zhang, Wei Ji. 731-734 [doi]
- Intelligent Watermark Recovery Using Spatial Domain ExtensionShiraz Ahmad, Zhe-Ming Lu. 735-739 [doi]
- A Novel ICA-Based Extraction Scheme for Image WatermarkingGaorong Zeng, ZhengDing Qiu. 740-743 [doi]
- Digital Watermarking Algorithms for Vector ImagesYi Wang, Kuilong Xia, Yu Fan, Qiong Li. 744-747 [doi]
- An Improved Adaptive QIM Watermark Iterative AlgorithmXinghua Sun, Ju Liu, Jiande Sun, Niqing Yang, Shilong Wu. 748-751 [doi]
- Image Registration Using Feature Points Extraction and Pseudo-Zernike MomentsZhan-long Yang, Bao-Long Guo. 752-755 [doi]
- Heritage Debris Classification Based on 3D Texture Feature and SVMMeng Li, Canjie Huang, Ping Fu, Suyan Yue. 756-759 [doi]
- A Novel Preservation Framework for Digital Image Archiving SystemTien-Ying Kuo, Wen-Hai Hsiao. 760-763 [doi]
- An Efficient Data Replication Scheme for Peer-to-Peer Video Streaming over Wireless-Mesh Community NetworksJen-Wen Ding, Wan-Ting Wang, Chu-Fu Wang. 767-770 [doi]
- Improving Harbin Method for Content Based Landscape Image RetrievalNguyen Huu Quynh, Ngo Quoc Tao. 771-774 [doi]
- Feature Selection Based on Correlation between Fuzzy Features and Optimal Fuzzy-Valued Feature Subset SelectionJirong Li. 775-778 [doi]
- Road Extraction in Remote Sensing Images Using a New AlgorithmHua Hu, Ying Liu, Xun Wang, Xia-jun Zhu, Bin Xu. 779-782 [doi]
- A Novel Information Entropy Shift Based Image Retrieval AlgorithmYan Wang, Kebin Jia. 783-786 [doi]
- A Unified System for Web Personal Image RetrievalLin Xie, Yao Zhao, Zhenfeng Zhu. 787-790 [doi]
- Content-Based Audio Retrieval Using Perceptual HashQiong Li, Jing Wu, Xin He. 791-794 [doi]
- An Effective Motion Estimation Scheme for H.264/AVCPengyu Liu, Kebin Jia. 797-801 [doi]
- Deblocking Filter by Color Psychology Analysis for H.264/AVC Video CodersChia-Hung Yeh, Kai-Lin Huang, Shiunn-Jang Chern. 802-805 [doi]
- Motion Vector Re-estimation for Video Trans-coding with Arbitrary DownsizingChih-Shan Liu, Wen-Li Wei, Nai-Chung Yang, Chung Ming Kuo. 806-809 [doi]
- Path Virtualization Using Fountain Code for Video Streaming over Heterogeneous NetworksSangchun Han, Hwangjun Song, Jun Heo. 810-813 [doi]
- Subblock-Based BPE Scheme to Conquer Mismatch in Memory Access PatternBaofeng Li, Yong Dou. 814-817 [doi]
- A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVCMohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh. 818-821 [doi]
- Video Monitoring System Based on Amending Model of Motion VectorZu-jue Chen, Wei Jia, Zhi-Xiong Zhang. 822-825 [doi]
- Framework for Distributed Video Surveillance in Heterogeneous EnvironmentXiang Fu, Bao-Long Guo. 826-829 [doi]
- A Real-Time Video Watermarking Using Adjacent Luminance Blocks Correlation Based on Compressed DomainShaohui Liu, Tianhang Chen, Hongxun Yao, Wen Gao. 833-836 [doi]
- Broadcast Video Logo Detection and RemovingChung Ming Kuo, Cheng-Ping Chao, Wei-Han Chang, Jin-Long Shen. 837-840 [doi]
- Digital Video Multicasting System with Seamless Handover MechanismRen-Guey Lee, Chun-Chieh Hsiao, Hsin-Hao Tseng, Chih-Chun Lai. 841-844 [doi]
- Self-Adaptive Video Watermarking Based on the Motion Characteristic Detection and the Model of EntropyZhi Li 0012, Xiaowei Chen. 845-848 [doi]
- A Content-Adaptive Digital Watermarking Scheme in H.264/AVC Compressed VideosPo-Chyi Su, Ming-Lun Li, Ing-Fan Chen. 849-852 [doi]
- Fragile Video Watermarking Technique by Motion Field Embedding with Rate-Distortion MinimizationTien-Ying Kuo, Yi-Chung Lo, Chen-I. Lin. 853-856 [doi]
- A Novel Watermarking Method For Wyner-Ziv Video CodingNing Zhu, Guiguang Ding, Yaguang Yin, Jianmin Wang 0001. 857-860 [doi]
- Face Recognition Based on Chaotic Fuzzy RBF Neural NetworkJian-liang Meng, Wan-qing Gao, Hui-jing Pang, Wei-hua Niu. 863-866 [doi]
- Shallow Semantic Parsing for Lexical Units in Chinese FrameNetXiaoyan Hao, Xiaoming Chang, Kaiying Liu. 867-872 [doi]
- An Algorithm for License Plate Recognition System for Non-stop Toll StationsBo Li, Zhi-yuan Zeng, Jian-zhong Zhou. 873-876 [doi]
- Grid Distance-Based Improving Accuracy Clustering AlgorithmChunjiang Pang, Weixiang Cheng, Weihua Niu. 877-880 [doi]
- A Volume Segmentation Algorithm for Medical Image Based on K-Means ClusteringXinwu Li. 881-884 [doi]
- IGSOM: Incremental Clustering Based on Self-Organizing-MappingMing Liu, Yuanchao Liu, Xiaolong Wang. 885-890 [doi]
- Image Recognition Based on a Novel Data Fusion MethodQingdong Du, Jin Li, Xiao Chen. 891-894 [doi]
- Parallel Genetic Algorithm Model Based on AHP and Neural Networks for Enterprise Comprehensive BusinessXilong Qu, Jian Feng, Wenfang Sun. 897-900 [doi]
- Parameter Selection of Generalized Fuzzy Entropy-Based Thresholding Segmentation Method with Particle Swarm OptimizationBo Lei, Jiu-Lun Fan. 901-904 [doi]
- Fault Diagnosis of Distribution System Based on Distributed Chaotic Fuzzy RBF Neural NetworksJian-liang Meng, Wan-qing Gao, Hui-jing Pang, Wei-hua Niu. 905-908 [doi]
- The FastICA Algorithm Based on Successive Approximations with Superior Convergence RateDoru Constantin, Luminita State. 909-912 [doi]
- Incomplete Points Cloud Data Surface Reconstruction Based on Neural NetworkXue-mei Wu, Gui-xian Li, Wei-min Zhao. 913-916 [doi]
- Parameters Optimization of Fuzzy Controller Based on Improved Particle Swarm OptimizationDongyun Wang, Guan Wang. 917-921 [doi]
- Notice of Violation of IEEE Publication PrinciplesAn Implementation of Fuzzy Clustering with Size and Shape ConstraintsJian-hui Wang, Yan Jiang, Hai-long Zhang. 922-925 [doi]
- An Optimal Predictive Polling Mechanism on EPONJin-Yu Zhang, Man-Gui Liang. 929-932 [doi]
- Design and Implementation of A New Practical GridLi Ang, Geng Nan nan, Gao Hong. 933-936 [doi]
- Research on the Application of Six Sigma in Software Process ImprovementXiaosong Zhao, Zhen He, Fangfang Gui, Shenqing Zhang. 937-940 [doi]
- The Research of Trusted Computing Based on the Model of Trusted Meta Data of BSCMLiu Zhong. 941-945 [doi]
- Configuring RBAC to Simulate Bell ModelYong-Zhong He, Zhan Han, Ye Du. 946-949 [doi]
- Development on the Partial Discharge On-Line Monitoring System of Transformer Based on Embedded SystemDening Zhang, Shuguang Zhang, Xuesong Suo, Man Cheng, Hong Juan Kou, Xiang Ling Shi, Su Zhang, Haiquan Li. 950-953 [doi]
- Visualization and Cognition of Large-Scale Software Structure Using the k-Core AnalysisHaohua Zhang, Hai Zhao, Wei Cai, Ming Zhao, Guilan Luo. 954-957 [doi]
- Research and Design of Autonomic Software Agent ArchitectureChuan-Sheng Zhou. 958-961 [doi]
- Source Code Watermarking Based on Function Dependency Oriented SequencingGaurav Gupta, Josef Pieprzyk. 965-968 [doi]
- A New Approach against Color Attacks of Watermarked ImagesAbdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu. 969-972 [doi]
- Watermark Detection Using Channel Estimation in the Quantization Based Watermarking SystemCagatay Karabat, Mehmet Keskinoz. 973-976 [doi]
- Variance-Classified Capacity Watermarking Using Discrete Cosine TransformJing-Ming Guo, Yu-Cheng Lu, Jiann-Der Lee. 977-980 [doi]
- Introducing a New Method for Estimation Image Complexity According To Calculate Watermark CapacityFarzin Yaghmaee, Mansour Jamzad. 981-984 [doi]
- A Novel Relational Database Watermarking Algorithm for Joint OwnershipYu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang. 985-988 [doi]
- Review on Copyright Marking Techniques of GIS Vector DataAnbo Li, Ying Chen, Bingxian Lin, Wei Zhou, Guonian Lv. 989-993 [doi]
- A New Wavelet Watermark Scheme of Color Image Based on Chaotic SequencesNiansheng Liu, Guo-hao Yang, Donghui Guo, L. L. Cheng. 994-998 [doi]
- Intelligent Hospital Space Platform Combined with RFID and Wireless Sensor NetworkSheng-Rong Huang, Gwo-Jiun Horng, Gwo-Jia Jong. 1001-1004 [doi]
- Rethinking Retransmission Policy In Concurrent Multipath TransferJiemin Liu, Hongxing Zou, Jingxin Dou, Yuan Gao. 1005-1008 [doi]
- Cooperative QoS-Aware Routing Algorithm Based on IEEE 802.11 Multi-rate over Mobile Ad Hoc NetworksZae-Kwun Lee, Hwangjun Song, GyeongCheol Lee. 1009-1012 [doi]
- An Information Hiding Scheme for the MDC-OFDM Wireless NetworksChuang Lin, Jeng-Shyang Pan. 1013-1016 [doi]
- The Design and Analysis of Constraint Networks for Uncertain Temporal Interval RelationsLiguo Deng, Z. M. Ma, Qiang Tong. 1017-1020 [doi]
- Vehicle Information Communication Safety Combined with Mobile RFID SystemWen-Hao Hsieh, Chien-Jung Ho, Gwo-Jia Jong. 1021-1024 [doi]
- Mobile RFID Integration Home-Care System for Wireless NetworkJing-Cyun You, Yao-Lung Yeh, Gwo-Jia Jong. 1025-1028 [doi]
- Application of MAC-Based VLANs for Mobile Office in Campus Area NetworkNing Jiang, Liancheng Shan. 1029-1032 [doi]
- Face Recognition Using Separate Layers of the RGB ImagePatrick Bours, Kirsi Helkala. 1035-1042 [doi]
- Biometric Fusion Using Enhanced SVM ClassificationMenrit S. Fahmy, Amir F. Atyia, Raafat S. Elfouly. 1043-1048 [doi]
- Common Interface for Connecting of Low Profile Biometric ModulesRaul SƔnchez-Reillo, L. Mengibar-Pozo, Michael G. Lorenz, Raul Alonso-Moreno. 1049-1055 [doi]
- Visible-Spectrum Biometric Retina RecognitionHalvor Borgen, Patrick Bours, Stephen D. Wolthusen. 1056-1062 [doi]
- Pseudo Identities Based on Fingerprint CharacteristicsNicolas Delvaux, HervƩ Chabanne, Julien Bringer, Bruno Kindarji, Patrik Lindeberg, Johannes Midgren, Jeroen Breebaart, Ton H. Akkermans, Michiel van der Veen, Raymond N. J. Veldhuis, Els Kindt, Koen Simoens, Christoph Busch, Patrick Bours, Davrondzhon Gafurov, Bian Yang, Julien Stern, Carsten Rust, Bruno Cucinelli, Dimitrios Skepastianos. 1063-1068 [doi]
- Fuzzy Vault for 3D Face Recognition SystemsThomas Frassen, Xuebing Zhou, Christoph Busch. 1069-1074 [doi]
- Experiments with Skin Resistance and Temperature for Liveness DetectionMartin Drahanský. 1075-1079 [doi]
- Arm Swing as a Weak Biometric for Unobtrusive User AuthenticationDavrondzhon Gafurov, Einar Snekkenes. 1080-1087 [doi]
- Biometric Systems and Data Protection Legislation in GermanyMartin Meints, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung, Gisela Quiring-Kock. 1088-1093 [doi]
- Steganalysis Based on Co-occurrence Matrix of Differential ImageZiwen Sun, Maomao Hui, Chao Guan. 1097-1100 [doi]
- A New Iris Recognition Method Based on Gabor Wavelet Neural NetworkZhiping Zhou, Huijun Wu, Qianxing Lv. 1101-1104 [doi]
- Document Watermarking Robust to CopyingBin Luo, Li Li. 1105-1108 [doi]
- A Robust Double Watermarking 3D Mesh Model Based On FeatureXiaoqing Feng, Li Li 0014, Zhigeng Pan, Shusen Sun, Daxing Zhang. 1109-1112 [doi]
- Robust Remote Authentication for Scalable Web-Based ServicesJian-Bin Li, Kwok-Yan Lam, Hong-Wei Sun, Siu Leung Chung. 1113-1117 [doi]
- Reversible Data Embedding Using the Sliding WindowChin-Feng Lee, Hsing-Ling Chen. 1118-1121 [doi]
- A Blind Associative Watermark Detection Scheme Using Self-Embedding TechniqueChin-Feng Lee, Huai-En Lee. 1122-1125 [doi]
- Software Integration for Applications with Audio StreamJim-Min Lin, Wen-Gung Cheng, Guo-Ming Fang. 1126-1129 [doi]
- The Distortion Control Method of Reversible Contrast Mapping Hiding SchemeTzu-Chuen Lu, Ying-Hsuan Huang. 1133-1136 [doi]
- A Robust Watermarking Algorithm Based on Salient Image FeaturesYuan-Liang Tang, Chih-Peng Wang. 1137-1140 [doi]
- Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding AlgorithmChang-Chin Huang, Du-shiau Tsai, Gwoboa Horng. 1141-1145 [doi]
- Secret Sharing Systems with Authentication-Based SteganographyShiuh-Jeng Wang, I.-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng. 1146-1149 [doi]
- An Effective Demosaicking and Zooming Algorithm for CFA ImagesChin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang. 1150-1153 [doi]
- A Computation Model for Capacity and Robustness of Robust Image Watermarking Scheme in Spatial DomaiYan-Jun Hu, Xiaoping Ma, Linming Dou, Li Gao. 1154-1157 [doi]
- Research on the Capacity of Error-Correcting Codes-Based Information HidingXuehu Yan, Shuai Guan, Xiamu Niu. 1158-1161 [doi]
- IWT-Based Watermarking By Adaptive Bit-Labeling SchemeChing-Yu Yang, Wei-Ying Hwang, Ya-Fen Cheng. 1165-1168 [doi]
- Use of Quotient-Embedding Scheme with Smart Arrangement Technique to Hide Gray-Scale DataChing-Yu Yang, Chen-Yuan Lai. 1169-1172 [doi]
- A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in E-commerce ApplicationsDa-Chun Wu, Jiun-Sheng Li. 1173-1176 [doi]
- Enhance the Image Sharing with Steganography and AuthenticationChia Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang. 1177-1181 [doi]
- Multi-Purpose Image Watermarking Method Based on Wavelet TransformChih-Hung Lin, Sheng-Lung Chien, Hsiao-Fen Chien. 1182-1185 [doi]
- Multipurpose Image Authentication Method based on Vector QuantizationChih-Hung Lin, Hsiao-Fen Chien, Sheng-Lung Chien. 1186-1189 [doi]
- Robust Digital Image Watermarking Based on Haar Orthogonal Function SystemMinghui Deng, Fang Yang, Jingbo Zhen. 1190-1193 [doi]
- An FFT-Based DS-SS Signal Acquisition Algorithm ResearchJing Xue, Qi Zhao, Zhijie Wu. 1197-1200 [doi]
- The Design and Research of Remote Terminal Unit Based on Radio TechnologyChuntao Man, Zhenqi Wang. 1201-1204 [doi]
- Reduced-State Detection for Continuous Phase Modulation (CPM) SignalsZhang Nan, Yang Ping. 1205-1208 [doi]
- Low-Complexity Real-Time LDPC Encoder Design for CMMBPeng Wang, Yong-en Chen. 1209-1212 [doi]
- A Novel Soft-In-Soft-Out Decoder for Nordstrom-Robinson CodeHuan Li, Zhiyong Zou, Xiaoxiang Zhao, Kuang Wang. 1213-1216 [doi]
- Wide-Band Low-Noise Quadrature VCO DesignYong-Hong Yan, Yan Xie, Wei Peng, Yun Zeng. 1217-1220 [doi]
- Robust Non-blind Detection for Spread Spectrum Watermarking SystemCagatay Karabat, Mehmet Keskinoz. 1221-1224 [doi]
- A Novel Grading Noise-Pretreatment Algorithm Based on Time-Frequency Blind Source SeparationEr-Fu Chen, Nai-tong Zhang, Wei-Xiao Meng. 1225-1228 [doi]
- Multiview Video Service Framework for 3D Mobile DevicesJunsup Kwon, Manbae Kim, Changyeol Choi. 1231-1234 [doi]
- An Object Removal Using Multi-view Sequence Inpainting TechniqueSoon-Young Lee, Junhee Heu, Chang-Su Kim, Sang Uk Lee. 1235-1238 [doi]
- Challenges and Realization of Real-Time Multi-view Video Transport Systems over IP NetworksJongryool Kim, Koh Choi, Changhyeok Bae, JongWon Kim 0001. 1239-1242 [doi]
- Efficient Prediction Structure for 2-D Wide Multi-view Video SequenceTaeyoung Chung, Kwanwoong Song, Chang-Su Kim. 1243-1246 [doi]
- A Motion Vector Prediction Method For Multi-view Video CodingSang-Heon Lee, Sang Hwa Lee, Nam Ik Cho, Jeong-Hyu Yang. 1247-1250 [doi]
- Segment-based Foreground Object Disparity Estimation Using Zcam and Multiple-View StereoTae Hoon Kim, Ho Yub Jung, Kyoung Mu Lee, Sang Uk Lee. 1251-1254 [doi]
- High Performance Hardware Implementation Architecture for DWT of Lifting SchemeYanling Hao, Ying Liu, Renlong Wang. 1255-1258 [doi]
- A User Authentication Scheme Based on Fingerprint and USIM CardXian-ge Huang, Lei Shen, Yan-hong Feng. 1261-1264 [doi]
- Audio Quality-Based Authentication Using Wavelet Packet Decomposition and Best Tree SelectionFang Chen, Wei Li 0012, Xiaoqiang Li. 1265-1268 [doi]
- A Novel Watermarking-Based Reversible Image Authentication SchemeTiegang Gao, Qiaolun Gu. 1269-1272 [doi]
- Design and Implementation of Secure Active RFID System with Cyptography and Authentication MechanismsHsi-Wen Wang, Chien-Chih Lai, Chun-Chieh Hsiao, Guan-Yu Hsieh, Ren-Guey Lee. 1273-1276 [doi]
- A New Variant of the Diffie-Hellman Key-Exchange Protocol Based on Block Triangular Matrix GroupsJun Yang, Xianze Yang. 1277-1281 [doi]
- Efficient Many-to-One and One-to-Many Multiparty Quantum Secure Direct Dommunication with AuthenticationWenjie Liu, Hanwu Chen, Zhiqiang Li, Jun Zhao. 1282-1285 [doi]
- A 3D Model Authentication Algorithm Based on Reversible WatermarkingXiamu Niu, Wei Song, Meiyu Lu, Wenjun Huang. 1286-1289 [doi]
- Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning TreeChin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang. 1293-1296 [doi]
- An Image Authentication Scheme for Halftone Images Based upon Error DiffusionJun-Chou Chuang, Chin-Chen Chang. 1297-1300 [doi]
- Twice Gric Colorings in SteganographyWeiming Zhang, Xinpeng Zhang, Shuozhong Wang. 1301-1304 [doi]
- A New Probabilistic Visual Secret Sharing Scheme for Color ImagesChin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le. 1305-1308 [doi]
- Covert Communication Based on Subliminal Channel in Broadcast Multi SignatureTao Meng, Jianfeng Wang, Shenghe Sun. 1309-1311 [doi]
- A Color Image Digital Watermarking Method Based on Valve-Value SurfaceZhihua Hu, Jiping Niu. 1312-1315 [doi]
- Analysis Based on Generalized Vector Quantization for Information HidingChune Zhang, ZhengDing Qiu, L. L. Cheng, L. M. Cheng. 1316-1320 [doi]
- A Blocking-Resistant Method for Anonymity System Based on Proxy and Data HidingYong Zhang, Jianfeng Yin, Benyang Dai. 1321-1325 [doi]
- Based MATLAB on Advanced Encryption Standard (AES) IP ValidationXinsheng Wang, Liang Han, Chenxu Wang, Xiaoning Liu. 1329-1331 [doi]
- Breaking Instance II of New TTM CryptosystemsXuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin. 1332-1335 [doi]
- Secure Communication Based on Synchronization of Unified Chaotic SystemsShao-Cheng Qu, Xiao-Yan Wang, Mei-jing Gong. 1336-1339 [doi]
- A Novel Symmetric Image Encryption Approach Based on a New Invertible Two-Dimensional MapFeng Huang, Fangfang Lei. 1340-1343 [doi]
- A Public Key Cryptography Based Algorithm for Watermarking Relational DatabasesHaiting Cui, Xinchun Cui, Mailing Meng. 1344-1347 [doi]
- New Color Image Encryption Algorithm Based on Chaotic Sequences RankingJian-liang Meng, Hui-jing Pang, Wan-qing Gao. 1348-1351 [doi]
- A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos ScramblingTao Deng, Fei Peng, Xiaofeng Huang. 1352-1355 [doi]
- NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable CryptosystemChung-Ping Young, Chung-Chu Chia, Liang-Bi Chen, Ing-Jer Huang. 1356-1359 [doi]
- Assigning Keys in a HierarchyJieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, Tzungher Chen. 1363-1366 [doi]
- A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical OrganizationIuon-Chang Lin, Chin-Chen Chang. 1367-1370 [doi]
- An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS AttacksChu-Hsing Lin, Jung-Chun Liu, Fuu-Cheng Jiang, Chien-Ting Kuo. 1371-1374 [doi]
- An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile NetworksChin-Chen Chang, Shih-Chang Chang. 1375-1378 [doi]
- Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection SystemsJen-Ho Yang, Chin-Chen Chang. 1379-1382 [doi]
- A Fractional-Step DDoS Attack Source Traceback Algorithm Based on Autonomous SystemZhaoyang Qu, Chunfeng Huang. 1383-1387 [doi]
- Covert Channels Based on Jitter Field of the RTCP HeaderLinda Yunlu Bai, Yongfeng Huang, Guannan Hou, Bo Xiao. 1388-1391 [doi]
- Distinguishing Attack on SN3 Stream CipherMohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor. 1392-1395 [doi]
- DTW/ISODATA Algorithm and Multilayer Architecture in Sign Language Recognition with Large VocabularyXiaoyu Wang, Feng Jiang, Hongxun Yao. 1399-1402 [doi]
- Printed Chinese Character Recognition Based on Pixel Distribution Probability of Character ImageNing Wang. 1403-1407 [doi]
- Emotion Recognition of Finger BrailleYasuhiro Matsuda, Tsuneshi Isomura, Ichiro Sakuma, Yasuhiko Jimbo, Etsuko Kobayashi, Tatsuhiko Arafune. 1408-1411 [doi]
- The Research of Vehicle Driving Multimedia Data RecordingHao Meng, Fukang Sun. 1412-1415 [doi]
- A Combined Static and Dynamic Software Birthmark Based on Component Dependence GraphXiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang. 1416-1421 [doi]
- Image Mosaic Based on SIFTZhan-long Yang, Bao-Long Guo. 1422-1425 [doi]
- A New Face Recognition Scheme with Renewable TemplatesWenjun Huang, Xin Yu, Qiong Li, Xiamu Niu. 1426-1429 [doi]
- A Method on Impedance Control of Robots Based on the Neural NetworkZhen Yang, Mu-hai Li. 1433-1436 [doi]
- New Neural Network Based on Ant Colony Algorithm for Financial Data ForecastingW. Gao. 1437-1440 [doi]
- The Heuristic Route Algorithm of Multiple Restrictions Based on Quality of ServiceFu-sheng Dai, Xian-he Shao. 1441-1445 [doi]
- An Optimized Approach on Reduced Kernel Matrix to ClusterSVMYa-Li Qi, Wei He, Hou Shu. 1446-1449 [doi]
- On Ant Colony Algorithm for Solving Continuous Optimization ProblemLi Hong, Xiong Shibo. 1450-1453 [doi]
- Design Theory of Intellectualized Computer Aided Instruction and Its ApplicationsAimin Wang, Wenhua Liu. 1454-1458 [doi]
- Particle Swarm Optimization for Gray-Scale Image Noise CancellationTe-Jen Su, Tzu-Hsiang Lin, Jia-Wei Liu. 1459-1462 [doi]
- BP Neural Network to Distinguish Pregnant Woman by Arterial Pressure Pulse Waveform AnalysisLu Wang, Dianzhong Wen. 1463-1466 [doi]
- An Efficient USR Eliminating Mechanism on EPONJin-Yu Zhang, Man-Gui Liang. 1469-1472 [doi]
- Application Research of Secondary Development Technology for the Replacement of Furniture Part Based on Inventor APILexiao Ye, Yigang Wang, Dajian Liu, Jianqi Chen. 1473-1477 [doi]
- Research and Implementation on Middleware of Database Workload Autonomic AdaptationFu Duan, Yuxing Wang, Chanchan Zhao, Yueqin Zhang. 1478-1481 [doi]
- Trust Evaluation Model for Composite Service Based on Subjective LogicMeihua Chen, Liang He, Xueming Cai, Weiwei Xia. 1482-1485 [doi]
- WBISD: A Debugger of Web-Based Interactive ServicesLei Liu, Hong Ni. 1486-1489 [doi]
- Research and Analysis of Bias Voltage on Variable-Capacitance Micro-mechanical AccelerometerXuemei Hu, Linhong Tian. 1490-1493 [doi]
- The Research on Non-destructive Testing Method of Sheet Resistance in Micro Area of Silicon Wafer Based on EIT TechnologyXinfu Liu, Jinhe Liu, Zhanping Du, Quanming Zhao, Junying Zhao, Yuhui Huang. 1494-1497 [doi]
- Research on Communication Constellation Simulation Based on Exploratory AnalysisYing Yang, Ying-Hua Li, Yong Li. 1498-1500 [doi]
- A Statistical Attack on a Kind of Word-Shift Text-SteganographyLingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang, Zhili Chen. 1503-1507 [doi]
- Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass FilteringNima Asadi, Mansour Jamzad, Hedieh Sajedi. 1508-1511 [doi]
- Implementation of Covert Communication Based on SteganographyYongfeng Huang, Bo Xiao, Honghua Xiao. 1512-1515 [doi]
- Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters StatisticFei Peng, Xingming Sun. 1516-1519 [doi]
- New Steganography Scheme in Halftone ImagesChing-Nung Yang, Yao-Yu Yang, Tse-Shih Chen, Guo-Cin Ye. 1520-1523 [doi]
- A New Synonym Text SteganographyMohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza. 1524-1526 [doi]
- Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit PlanesMojtaba Abolghasemi, H. Aghainia, Karim Faez, Mohammad Ali Mehrabi. 1527-1530 [doi]
- An Iris Cryptosystem for Information SecurityXiangqian Wu, Ning Qi, Kuanquan Wang, David Zhang. 1533-1536 [doi]
- An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing PolicyIuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang. 1537-1540 [doi]
- An Efficient Non-repudiation Mechanism for SIP-Based ServicesMing-Way Huang, Hsing-Bai Chen, Wei-Bin Lee. 1541-1544 [doi]
- Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic TechniquesJing Li, Jung-San Lee, Chin-Chen Chang. 1545-1548 [doi]
- Programming Method for Failure of Network Security Based on Game ModelXuansen He. 1549-1552 [doi]
- A Grid Resource Discovery Model Using P2P TechnologyZenggang Xiong, Yang Yang, Xuemin Zhang, Ming Zeng, Li Liu. 1553-1556 [doi]
- ASCON - A Synchronization-Concurrency Control Model For Distributed Multimedia SystemsJanani Arthanari, A. Kannan. 1557-1560 [doi]
- Communications Security Research on "Man-in-the-Loop" Television Guidance System Data LinkChao Sun, Yukun Liu, Shouda Jiang. 1561-1564 [doi]