Abstract is missing.
- Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVMDeng-Yuan Huang, Wu-Chih Hu, Sung-Hsiang Chang. 1-4 [doi]
- A Two-Pass Filter for Impulse Noise Reduction Based on Edge CharacteristicsChao-Yu Chen, Chao-Ho Chen, Yi-Li Kuo, Chin-Hsing Chen. 5-8 [doi]
- A Fast Template Matching Method for Rotation Invariance Using Two-Stage ProcessWen-Chia Lee, Chin-Hsing Chen. 9-12 [doi]
- A Watermarking Scheme Using Code Division Multiple Access and DWTJi-Hong Chen, Chin-Hsing Chen. 13-16 [doi]
- A Compression-Resistant Invisible Watermarking Scheme for H.264Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Yi-Long Lin. 17-20 [doi]
- Information Embedding in MPEG-4 Scalable Lossless AudioTe Li, Susanto Rahardja, Haiyan Shu, Haibin Huang. 21-24 [doi]
- An Algorithm for Packing Bitstream of Scalable Video CodingJung-Yang Kao, Jih-Sheng Tu. 25-29 [doi]
- Fisherface vs. Eigenface in the Dual-tree Complex Wavelet DomainBin Li, Kai-Kuang Ma. 30-33 [doi]
- Security Evaluation of Biometrics Authentications for Cellular PhonesHirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, Ryoichi Sasaki. 34-39 [doi]
- Watermarking Cryptographic DataMaki Yoshida, Toru Fujiwara. 40-43 [doi]
- Evaluation of Audio Watermark System Using Short Detection Time FrameTakaaki Yamada, Yoshiyasu Takahashi, Ryu Ebisawa, Yoshinori Sato, Seiichi Susaki. 44-47 [doi]
- Preventing False Positives in Content-Based Phishing DetectionShinta Nakayama, Hiroshi Yoshiura, Isao Echizen. 48-51 [doi]
- XPROB - A Generalized Pool-Based Anonymous Communication FrameworkMinh-Triet Tran, Anh Duc Duong, Isao Echizen. 52-55 [doi]
- On Privacy-aware Delegation of Personal Data using Digital WatermarkingSven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller. 56-59 [doi]
- Web behind Web - A Steganographic Web FrameworkHirohisa Hioki. 60-63 [doi]
- Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded MessageRongling Lang, Hui Lu. 64-67 [doi]
- Multi-Layer Audio Watermarking Based on Amplitude ModificationAkio Ogihara, Harumi Murata, Motoi Iwata, Akira Shiozaki. 68-71 [doi]
- Audio Watermarking Using QIM on Wavelet Packet CoefficientsKotaro Sonoda, Osamu Takizawa. 72-75 [doi]
- Robust Audio Watermarking with Time and Frequency DivisionKotaro Yamamoto, Munetoshi Iwakiri. 76-81 [doi]
- Embedding Limitations with Audio-watermarking Method Based on Cochlear-delay CharacteristicsKuniaki Imabeppu, Daiki Hamada, Masashi Unoki. 82-85 [doi]
- A Data Hiding Method for Stereo Audio Signals Using the Polarity of the Inter-Channel DecorrelatorKazuhiro Kondo. 86-89 [doi]
- On the Channel Characteristic of Dither Modulation Data Hiding for MP3 CompressionRaúl Martínez-Noriega, Mariko Nakano, Kazuhiko Yamaguchi. 90-93 [doi]
- A Robust Content in DCT Domain for Image AuthenticationYuan-Gen Wang, Yanqiang Lei. 94-97 [doi]
- Optimization of AVS-M Video Decoder for Real-time Implementation on Embedded RISC ProcessorsGuo-An Jian, Jui-Chin Chu, Jiun-In Guo. 98-101 [doi]
- Image Watermarking Based on Multiple Objective Genetic AlgorithmJiann-Shu Lee, Fong-Ping Chuang, Kuen-Horng Tsai. 102-105 [doi]
- Feature Extraction for Face Recognition Based on Gabor Filters and Two-Dimensional Locality Preserving ProjectionsYi-Chun Lee, Chin-Hsing Chen. 106-109 [doi]
- An Autonomous License Plate Detection MethodHsiao-Chen Kuo, Jiann-Shu Lee, Sho-Tsung Kao. 110-113 [doi]
- Eye Tracking in Visible EnvironmentYung-Lung Kuo, Jiann-Shu Lee, Sho-Tsung Kao. 114-117 [doi]
- Aspect Ratio Waves for Gait AnalysisKuo-Wei Lin, Pau-Choo Chung. 118-121 [doi]
- Adaptive Reed - Solomon Code Protection of Data Partitioned H.264 VideoHeng Li, Yanchun Zhong. 122-127 [doi]
- Adaptive Rate Control Scheme in Frame-layer for Real-time H.264Myoung Jin Kim, Min-Cheol Hong. 128-131 [doi]
- A Semi-fragile Reversible Data Hiding by Coefficient-Bias AlgorithmChing-Yu Yang, Wu-Chih Hu, Po-Yen Chang, Chang-Min Hwang. 132-135 [doi]
- 3D Triangular Mesh Watermarking for Copyright Protection Using Moment-PreservingChen-Tsung Kuo, Da-Chun Wu, Shyi-Chyi Cheng. 136-139 [doi]
- Quality Evaluation of Digital Image WatermarkingQingtang Su, Xianxi Liu, Steve Zhang. 140-143 [doi]
- Color Image Watermarking Scheme Based on Support Vector RegressionXiuli Lv, Hongyu Bian, Bo Yu, Xinghui Quan. 144-147 [doi]
- Digital Watermarking Method for Printed Materials Embedding in Hue ComponentYuta Goto, Osamu Uchida. 148-152 [doi]
- Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 FramesXun Gong, Hai-Ming Lu. 153-156 [doi]
- Time-Scale Invariant Zero-Watermarking Scheme for AudioMing-Quan Fan, Hong-Xia Wang. 157-160 [doi]
- Employing Optimal Matrix for Efficient Matrix EmbeddingYunkai Gao, Xiaolong Li, Bin Yang. 161-165 [doi]
- An Attention Focusing Tree Based on Saliency and a Display Method for Small DisplaysKenji Nakamura, Takashi Toriu, Shigeyoshi Nakajima, Hiromitsu Hama. 166-169 [doi]
- Collision Detection of 4-legged Robots Using Acceleration SensorsShigeyoshi Nakajima, Kana Sugimoto, Takashi Toriu. 170-173 [doi]
- Three-Dimensional Circular Camera System for the Three-Dimensional Display Based on the Reconstruction of Parallax RaysShuhei Miyatake, Hideya Takahashi, Kenji Yamada. 174-177 [doi]
- Detection of Tire-Road Contact Point for Vehicle Position Estimate Considering Shape Distortion in a Circular Fisheye ImageKenichi Hirose, Takashi Toriu, Hiromitsu Hama. 178-181 [doi]
- Optimal Crawling Strategies for Multimedia Search EnginesHiromitsu Hama, Thi Thi Zin, Pyke Tin. 182-185 [doi]
- Dominant Color Embedded Markov Chain Model for Object Image RetrievalThi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama. 186-189 [doi]
- Mobile Sensor for Target Tracking via Modified Particle FilterLuke K. Wang, Shan-Chih Hsieh, Kou-Yuan Huang, Wen-Cheng Chen. 190-193 [doi]
- A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance VideosChing-Yu Wu, Po-Chyi Su. 194-197 [doi]
- A New Approach to the Dynamic Timeline of Animation EngineNingping Sun, Kentarou Okumura, Wenling Sun. 198-201 [doi]
- An Alternative Algorithm of Triangulation of Polygons with HolesNingping Sun, Satoshi Tanaka, Wenling Sun. 202-205 [doi]
- DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port NumberShunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi. 206-209 [doi]
- Multi Path Based on Cache Notification Algorithm in Wireless Sensor NetworksZhufang Kuang, Guogui Yang. 210-213 [doi]
- Random Number Generated from White Noise of WebcamJer-Min Tsai, I-Te Chen, Jengnan Tzeng. 214-217 [doi]
- Quantization Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVCSzu-Hong Wang, Shih-Chang Hsia. 218-221 [doi]
- An Observer-Based Method for Secure CommunicationLong-Chang Chen, Tsair-Fwu Lee, Pei-Ju Chao, Wen-Cheng Chen. 222-225 [doi]
- Performance Study of Asymmetric Traffic Load for OBS Ring NetworksShih-Wei Kau, Wei-Ting Lu, Wen-Ping Chen, Tsair-Fwu Lee, Cheng-Nan Tsai. 226-229 [doi]
- Applications of Ontology in Management of Information AssetShing-Han Li, Kuo-Chung Wang. 230-233 [doi]
- High Dynamic Range Color Image Rendering with Human Visual Adaptation SimulationPing-Lin Fan, Shih-Ying Chen, Wei-Hsien Wu, Joey Lin, Su-ju Lu, Hsueh-Wu Wang, Yuan-Fan Tsai. 234-237 [doi]
- The Design of Remote Surveillance System for Digital FamilyChung-Hsin Liu, Chih-Chieh Fan. 238-241 [doi]
- To Build Tele-care System Network EnvironmentChung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, Chuen-Lung Chen. 242-245 [doi]
- Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM AlgorithmChang-Lung Tsai, Wei-Lieh Hsu. 246-249 [doi]
- Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier FiltersChih-Jen Lee, I-Horng Jeng, Tai-Ning Yang, Chun-Jung Chen, Peng Su. 250-253 [doi]
- Build a Home Security Surveillance System Using LEGO MINDSTORMS NXTKuo-Kai Hsu, Dwen-Ren Tsai. 254-257 [doi]
- Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based on Hamilton-connected Subgraph RecognitionI-Horng Jeng, Dwen-Ren Tsai, Hou-An Chen, Yi-Chun Yen, Chien-Kang Cheng. 258-261 [doi]
- Comments on Gateway-Oriented Password-Based Authenticated Key Exchange ProtocolTzong-Chen Wu, Hung-Yu Chien. 262-265 [doi]
- Meaningful Inner Link Objects for Automatic Text CategorizationJau-Ji Shen, Jia-Chiuan Wu. 266-269 [doi]
- Identity-Based DRM in Ubiquitous Multimedia SystemChou Chen Yang, Ju-Chun Hsiao, Hung-Wen Yang. 270-273 [doi]
- A Novel Mutual Authentication Based on Data Embedding TechniqueChia-Chen Lin, Po-Hsuan Chiang. 274-277 [doi]
- Embedding Secret Messages Using Modified Huffman CodingKuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin. 278-281 [doi]
- Joint Secret Image Sharing and Progressive Transmission Based on Integer Discrete Cosine TransformZhenfei Zhao, Hao Luo, Zhe-Ming Lu. 282-285 [doi]
- A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm for H.264/AVC Based on the Characteristics of Macro-blockPengyu Liu, Kebin Jia. 286-289 [doi]
- A Fast Image Retrieval Method Using Multi-Feature Dimension TechniqueKuo-Lung Hung, Yih Cheng Tsay. 290-294 [doi]
- Secret Sharing Method for Gray-level ImagesHao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, Chao-Lung Chou. 295-298 [doi]
- A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge DetectorChin-Chen Chang, Chia-Chen Lin, Pei-Yan Pai, Yen-Chang Chen. 299-302 [doi]
- Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia SystemsMing-Yen Lin, Sue-Chen Hsueh, Ming-Hong Chen, Hong-Yang Hsu. 303-306 [doi]
- Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise DetectorsLi Chun Liao, Shin-Jung Gu, Bin-Chyi Tseng. 307-311 [doi]
- H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filterNan Zhang, Siwei Ma. 312-315 [doi]
- Shape-Based Depth Map CodingNan Zhang, Siwei Ma, Wen Gao. 316-319 [doi]
- Reversible Steganography for VQ Indices Using the Modified State CodebookChin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, MingChu Li. 320-323 [doi]
- Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful ShadowsThe Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, MingChu Li. 324-327 [doi]
- Matrix Selection in High Payload EmbeddingZhenxing Qian, Xinpeng Zhang, Shuozhong Wang. 328-331 [doi]
- Enlargement of Balanced-Incomplete-Block-Designs-Based WatermarksZhi-Fang Yang, Po-Chen Lee, Wei-Hung Chen, Jia-Guu Leu. 332-335 [doi]
- Security of Indirect-Authenticated Key Exchange ProtocolHsu-Hung Chiang, Ching-Chung Liu, Ying-Ming Chen, Ya-Fen Chang. 336-339 [doi]
- A Video Watermarking in H.264/AVC EncoderShinfeng D. Lin, Chih-Yao Chuang, Hsiang-Cheng Meng. 340-343 [doi]
- Electrical Impedance Tomography for Washing out Undergound PollutionKazuyo Yoneda, Shinichi Tamura, Yoshinori Nishino, Kazuki Nakamura, Takio Shimosakon, Kyohei Shimada, Rong Long Wang, Kozo Okazaki. 344-347 [doi]
- Improved EMD Steganography with Great Embedding Rate and High Embedding EfficiencyZhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang. 348-352 [doi]
- Yet Another Friendly Progressive Visual Secret Sharing SchemeTzung-Her Chen, Yao-Sheng Lee. 353-356 [doi]
- Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation Resistant WatermarkingZhi-Fang Yang, Chih-Jung Su, Ping-Chang Tseng, Chan-Ting Shu. 357-360 [doi]
- An Embedding Technique Based upon Block Prediction and Code Cascading ShiftChin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang. 361-364 [doi]
- A Scheme of Modulo-Based Capacity-improvement upon EMD SystemsHung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang. 365-368 [doi]
- A Novel Secure Data Hiding Scheme Using a Secret Reference MatrixChi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, Jason Lin. 369-373 [doi]
- Lossless Information Hiding Scheme Based on Predictive CodingTzu-Chuen Lu, Cheng-Chun Huang, Siang-Ru Liao. 374-377 [doi]
- A Schema for Multi-Signature Handling Based on Workflow ModelJin-Bao Liu, Zhi-Long Qiu, Hui Zhou, Bao-Hui Liu, Xiamu Niu. 378-381 [doi]
- A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed VideoZhaoqing Liu, Qiong Li, Shuai Guan, Xiyuan Peng. 382-385 [doi]
- Image Object Detection and Tracking Implementation for Outdoor Scenes on an Embedded Soc PlatformWen-Kai Tsai, Ming-Hwa Sheu, Ching-Lung Su, Jun-Jie Lin, Shau-Yin Tseng. 386-389 [doi]
- Implementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless NetworksChao-Lieh Chen, Chien-Hao Lai. 390-393 [doi]
- An Implementation of Frame Rate Control for Reducing Flicker in CSTN PanelYa-Hsin Hsueh, Wei-Da Chen. 394-397 [doi]
- A Novel Vehicle Brake Light SystemYang-Chiuan Lin, Hung-Yu Wang, Wei-Jeng Cheng. 398-401 [doi]
- A CMOS Variable-gain Fully-differential Transimpedance Amplifier for Multimedia Data LinksRoger Y. Chen, Ming-Jen Chang. 402-405 [doi]
- System Performance Analyses on PAC Duo ESL Virtual PlatformZhe-Mao Hsu, I-Yao Chuang, Wen-Chien Su, Jen-Chieh Yeh, Jen-Kuei Yang, Shau-Yin Tseng. 406-409 [doi]
- Secret Sharing Protocol for Linguistic Threshold SchemesMarek R. Ogiela, Urszula Ogiela. 410-413 [doi]
- Association and Abstraction on Neural Circuit Loop and CodingShinichi Tamura, Yuko Mizuno-Matsumoto, Yen-Wei Chen, Kazuki Nakamura. 414-417 [doi]
- An Effective Network-Aware Peer Selection Algorithm in BitTorrentFenglin Qin, Ju Liu, Lina Zheng, Liansheng Ge. 418-421 [doi]
- A Mutual Information Based Sub-Pixel Registration Method for Image Super ResolutionBoyang Zhang, Ju Liu, Jinyu Chu, Jianping Qiao. 422-425 [doi]
- Performance Comparison of Several Watermarking Methods Based on ICA and AQIMJie Ling, Ju Liu, Zhaowan Sun. 426-429 [doi]
- Watermarking for 3D Triangular Meshes Based on SVDXiushan Nie, Ju Liu, Xianqing Wang, Jiande Sun. 430-433 [doi]
- A Blind Video Watermarking Scheme Based on DWTChun-Xing Wang, Xiushan Nie, Xianqing Wan, Wen Bo Wan, Feng Chao. 434-437 [doi]
- Optimizing Constrained Mixed-Integer Nonlinear Programming Problems Using Nature SelectionRong-Song He. 438-441 [doi]
- A Novel Secure RFID System to Ensure PrivacyCagatay Karabat. 442-445 [doi]
- Target Tracking in Clusters of Sensor Networks via Handoff Scheme with Extended Kalman FilterLuke K. Wang, Shan-Chih Hsieh, Kou-Yuan Huang, Chien-Chang Wu. 446-449 [doi]
- A Histogram Descriptor Based on Co-occurrence Matrix and its Application in Cloud Image Indexing and RetrievalQingyong Li, Weitao Lu. 450-454 [doi]
- 3D Object Classification by Fuzzy KNN and Bayesian DecisionLi-Li Wan, Zhen-Jiang Miao. 455-458 [doi]
- An Image Index Algorithm Based on Hierarchical ClusteringTao Yang, Hongli Xu. 459-462 [doi]
- An Integrative Codebook for Natural Scene CategorizationGuanghua Gu, Yao Zhao, Zhenfeng Zhu. 463-466 [doi]
- A Novel Texture Analysis Method Based on Graph Spectral TheoryTao Zhang, Wenxue Hong, Jinjia Wang. 467-470 [doi]
- Image Denoising Based on Non-local Means with Wiener Filtering in Wavelet DomainLin Li, Lingfu Kong. 471-474 [doi]
- Indexing and Querying in Multimedia DatabasesHung-Yi Lin, Shih-Ying Chen. 475-478 [doi]
- Orthogonal Functional Expansion Method of Optical Flow for Large DisplacementJinwoo Kim, Robert Close, Hisashi Taketani, Rong-Long Wan, Kozo Okazaki, Shinichi Tamura. 479-482 [doi]
- Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech CodecAkira Nishimura. 483-486 [doi]
- Improvement of a Band Extension Technique for G.711 Telephony Speech by Using SteganographyNaofumi Aoki. 487-490 [doi]
- A Band Extension of G.711 Speech with Low Computational Cost for Data Hiding ApplicationAkinori Ito, Hironori Handa, Yôiti Suzuki. 491-494 [doi]
- Data Hiding is a Better Way for Transmitting Side Information for MP3 BitstreamAkinori Ito, Shozo Makino. 495-498 [doi]
- Spatial and Temporal Position Information Delivery to Mobile Terminals Using Audio Watermarking TechniquesToshio Modegi. 499-502 [doi]
- Chinese Name Speech Classification Using Fisher Score Based on Continuous Density Hidden Markov ModelsYi Gao, John Han, Lei Lin, Congde Lu, Qin Yang. 503-506 [doi]
- Personal Photo Organizer Based on Automated Annotation FrameworkKai-En Tsay, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang. 507-510 [doi]
- Volume Image Segmentaton by Dual Multi-Scale Morphological ReconstructionsJiann-Jone Chen, Chun-Rong Su. 511-514 [doi]
- Extension Neural Network Approach to Classification of Brain MRIChuin-Mu Wang, Ming-Ju Wu, Jian-Hong Chen, Cheng-Yi Yu. 515-517 [doi]
- Applying Visual Image and Satellite Positioning for Fast Vehicle Detection and Lane Marking RecognitionBao Rong Chang, Hsiu Fen Tsai. 518-521 [doi]
- Image Hidden Technique Using QR-BarcodeChin-Ho Chung, Wen-Yuan Chen, Ching-Ming Tu. 522-525 [doi]
- Design of a System with a Multielement Thermopile for Monitoring the Temperature of Indoor ObjectsLung-Tsai Li, Chin-Fu Tsai, Ming-Shing Young. 526-529 [doi]
- Implementation of Thermistor Linearization Using LabVIEWChin-Fu Tsai, Lung-Tsai Li, Chin-Hao Li, Ming-Shing Young. 530-533 [doi]
- Design High-Performance and Low-Power Adder Cores with Full-Swing Nodes for Embedded SystemsChing-Hwa Cheng, Chiou-Kou Tung, Shao-Hui Shieh, Yu-Cherng Hung. 534-537 [doi]
- High-Speed CMOS Chip Design for Manchester and Miller EncoderYu-Cherng Hung, Min-Ming Kuo, Chiou-Kou Tung, Shao-Hui Shieh. 538-541 [doi]
- A New Contrast Enhancement Technique Implemented on FPGA for Real Time Image ProcessingChing-Hsi Lu, Hong-Yang Hsu, Lei Wang. 542-545 [doi]
- A Comparison between Windows Mobile and Symbian S60 Embedded ForensicsAntonio Savoldi, Paolo Gubian, Isao Echizen. 546-550 [doi]
- On Acceptable Modification Limits of Electroacoustic Speech Signals for Data HidingMarina Ponomar. 551-554 [doi]
- Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift StyleWen-Pinn Fang. 555-558 [doi]
- An Image Processing Based Visual Compensation System for Vision DefectsChinLun Lai, Shu-Wen Chang. 559-562 [doi]
- Robust Data Hiding on Texture ImagesHirofumi Otori, Shigeru Kuriyama. 563-566 [doi]
- An Adaptive Gradient-Projection Image Restoration Using Local Statistics and Estimated Noise CharacteristicsJoo-Yeon Hwang, Min-Cheol Hong. 567-570 [doi]
- Histogram Shifting Lossless Data Hiding Based on Space Filling CurvesXiao Yi Yu, Aiming Wang. 571-574 [doi]
- Half-Zone Quantization Based Algorithm for Information HidingAli Ameri Mahabadi, Mohammad Eshghi. 575-578 [doi]
- Adapting e-TOM Model to Improve Multimedia Network Management-A Case Study with a Taiwan Multimedia Service ProviderDominic Wong. 579-582 [doi]
- A Fast Text-Based Communication System for Handicapped AphasiacsYu-Fen Fu, Cheng-Seen Ho. 583-594 [doi]
- Document Filing Approaches Using an Internal Based Folder OrganizationJiann-Gwo Doong. 595-598 [doi]
- Fast Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue CodeHung-Peng Lee, Kunta Hsiesh. 599-603 [doi]
- Identity Authentication in RFID Based Logistics-Customs Clearance Service PlatformHuifang Deng, Wen Deng. 604-607 [doi]
- Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object DescriptionJun-Bao Li, Longjiang Yu, Shize Guo. 608-611 [doi]
- A Multilingual Patent Text-Mining Approach for Computing Relatedness Evaluation of Patent DocumentsChung-Hong Lee, Hsin-Chang Yang, Chih-Hong Wu, Yi-Ju Li. 612-615 [doi]
- Exploring AUC Boosting Approach in Multimodal Biometrics Score Level FusionMohammad Shahram Moin, Mehdi Parviz. 616-619 [doi]
- Palette Partition Based Data Hiding for Color ImagesYu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, Chien-Ting Huang. 620-623 [doi]
- A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation EnvironmentsChin-Chen Chang, Yung-Chen Chou, Ming-Huang Hsieh. 624-627 [doi]
- A New Approach to Image Authentication Using Chaotic Map and Sudoku PuzzleWen-Chuan Wu, Guang-Ruei Ren. 628-631 [doi]
- Data Concealment Scheme for HTML Documents Based on Color CodeChin-Feng Lee, Hsing-Ling Chen. 632-635 [doi]
- Multipurpose Watermarking Method Based on Blind Vector QuantizationChih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang, Kuan-Ju Chen. 636-639 [doi]
- Automatic Traffic Monitoring Method Based on Cellular ModelWei-Lieh Hsu, Chang-Lung Tsai, Po-Lun Chang. 640-643 [doi]
- Perfect Forward Secure Two-Party Key Agreement Protocol with Key EscrowMengbo Hou, Qiuliang Xu, Tao Ban. 644-647 [doi]
- Advanced Color Images Enhancement Using Wavelet and K-means ClusteringHassana Grema Kaganami, Zou Beiji, M. Sami Soliman. 648-652 [doi]
- A Novel Viewer Counter for Digital BillboardsDuan-Yu Chen, Kuan-Yi Lin. 653-656 [doi]
- Vehicle Retrieval Using Eigen Color and Multiple Instance LearningSin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, Yung-Sheng Chen. 657-660 [doi]
- Towards Efficient Copy Detection for Digital Videos by Using Spatial and Temporal FeaturesChung-Chi Tsai, Chin-Song Wu, Ching-Yu Wu, Po-Chyi Su. 661-664 [doi]
- Driving Situations Understanding through Content Rhythm AnalysisYu-Dun Lin, Wen-Yu Tseng, Cheng-Jie Hsu, Chia-Hung Yeh. 665-668 [doi]
- Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling VerificationHao-Chung Shih, Chian C. Ho, Hsuan T. Chang, Chin-Song Wu. 669-672 [doi]
- Face Recognition Based on Complementary Matching of Single Image and Sequential ImagesYea-Shuan Huang, Wei-Cheng Liu. 673-676 [doi]
- Precision Segmentation Rendering for 3-D Coronary Angiography Medical ImageTsair-Fwu Lee, Chang-Yu Lee, Pei-Ju Chao, Chang-yu Wang. 677-680 [doi]
- Image Retrieval in Multimedia Databases: A SurveyYihun Alemu, Jong-bin Koh, Muhammad Ikram, Dong Kyoo Kim. 681-689 [doi]
- Robust Tracking Based on PSO and On-line AdaBoostHuchuan Lu, Wenling Zhang, Fan Yang, Xiaojing Wang. 690-693 [doi]
- Visual Search Based on Contour SalientHaiyan Fu, Xiangwei Kong, Shijie Jia, Yanqing Guo. 694-697 [doi]
- The Parallelization Design of Chaotic Encryption System Based on Mulit-level Shuffle-Exchange NetworkNan Ding, Honglian Ma, Guozhen Tan. 698-701 [doi]
- Source Camera Identification Forensics Based on Wavelet FeaturesBo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng. 702-705 [doi]
- SIFT-Based Image Retrieval Combining the Distance Measure of Global Image and Sub-ImageBin Li, Xiangwei Kong, Zhe Wang, Haiyan Fu. 706-709 [doi]
- Level Set-Based Semiautomatic Bolus Segmentation in Bolus-Chasing CTAYing Hou, Yi Sun. 710-713 [doi]
- Fairness Analysis of Electronic Commerce Protocol Based on Strand SpaceWenqi Liu, Jianhua Yang, Zhixin Li. 714-717 [doi]
- A Fast and Robust Algorithm of Detection and Segmentation for Moving ObjectJie He, Kebin Jia, Zhuoyi Lv. 718-721 [doi]
- Unskilled User Support for Network Operation Based on Service Composition Using Web Ontology LanguagesYoshihiro Nakamura. 722-727 [doi]
- An Analysis of the Influence of Facial Feature for Apparent Age EstimationHironori Takimoto, Hironobu Fukai, Yasue Mitsukura, Minoru Fukumi. 728-731 [doi]
- A Method for Evaluating the Degree of Human's Preference Based on EEG AnalysisTsukasa Nakamura, Shin-ichi Ito, Yasue Mitsukura, Hiroto Setokawa. 732-735 [doi]
- A Method for Automatic Detection of Crimes for Public Security by Using Motion AnalysisKoichiro Goya, Xiaoxue Zhang, Kouki Kitayama, Itaru Nagayama. 736-741 [doi]
- A High Speed Mixel Estimation Method by Using the Genetic AlgorithmSeiji Ito, Yoshinari Oguro. 742-745 [doi]
- An Important Facial Parts Analysis for Evaluating the Impression - Difference by GenderSeiki Yoshimori, Hironori Takimoto, Yasue Mitsukura, Minoru Fukumi. 746-749 [doi]
- Further Remarks on Identity-Based RSA Multi-signatureYa-Fen Chang, Yen-Cheng Lai, Mu-Yen Chen. 750-753 [doi]
- A ±1-Based Steganography by Minimizing the Distortion of First Order StatisticsYifeng Lu, Xiaolong Li, Bin Yang. 754-758 [doi]
- Fast Subsequence Matching in Plasma Waveform DatabasesTeruhisa Hochin, Yoshihiro Yamauchi, Hiroki Nomiya, Hideya Nakanishi, Mamoru Kojima. 759-762 [doi]
- Image Processing in Ultra Fast X-ray Imaging with Streak Cameras for Laser Fusion ResearchEunjoo Choi, Jiayong Zhong, Shinsuke Fujioka, Hiroyuki Shiraga, Hiroshi Azechi. 763-766 [doi]
- Improvements of Signal-to-noise Ratio Utilizing Penumbral Imaging with M-sequences Aperture and Its Heuristic SchemeTatsuki Ueda, Shinsuke Fujioka, Shinya Nozaki, Yen-Wei Chen, Hiroaki Nishimura. 767-770 [doi]
- A Heuristic Decoding Method for Coded Images of Random Uniformly Redundant ArrayShinya Nozaki, Yen-Wei Chen, Shinsuke Fujioka, Tatsuki Ueda, Yoshinori Namihira. 771-774 [doi]
- Particle Swarm Optimization for Reconstruction of Penumbral ImagesYen-Wei Chen, Chen-Lun Lin, Aya Mimori. 775-778 [doi]
- Creating RSA Trapdoors Using Lagrange Four Square TheoremConstantinos Patsakis, Evangellos Fountas. 779-782 [doi]
- Imperceptibility Evaluation for Color Stego ImageXiu-ying Ma, Jia-jun Lin. 783-786 [doi]
- Detection of LSB Replacement and LSB Matching Steganography Using Gray Level Run Length MatrixSeyed Mojtaba Seyedhosseini Tarzjani, Shahrokh Ghaemmaghami. 787-790 [doi]
- Forecasting Exchange Rates by Genetic Algorithms Based Back Propagation Network ModelJui-Fang Chang, Chi-Ming Kuan, Yu-Wen Lin. 791-794 [doi]
- A Study on the Cache Miss Rate in a Genetic Algorithm ImplementationFeng-Cheng Chang, Hsiang-Cheh Huang. 795-798 [doi]
- Two-phase Fuzzy-ART with Independent Component Analysis for Semantic Image ClassificationChuan-Yu Chang, Ru-Hao Jian, Hung-Jen Wang. 799-802 [doi]
- Using ZigBee and Room-Based Location Technology to Constructing an Indoor Location-Based Service PlatformYuh-Ming Cheng. 803-806 [doi]
- Text Steganography Based on Online ChatMinhao Liu, Yunbiao Guo, Linna Zhou. 807-810 [doi]
- Perceptual Content Authentication and Tamper Detection of Facial ImageQi Han, Qiong Li, Xiamu Niu. 811-814 [doi]
- Fast Channel Change IPTV System for Enhanced User ExperienceYoung-Ho Song, Taeck-Geun Kwon. 815-818 [doi]
- Mental Rotation by Neural NetworkToshihiko Sasama, Hiroshi Mitsumoto, Kazuyo Yoneda, Shinichi Tamura. 819-822 [doi]
- An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone ImagesYi-Ting Chen, Shu-Chuan Chu, Mong-Fong Horng, Jeng-Shyang Pan. 823-827 [doi]
- Interactive Voice-Controller Applied to Home AutomationJinn-Kwei Guo, Chun-Lin Lu, Ju-Yun Chang, Yi-Jing Li, Ya-Chi Huang, Fu-Jiun Lu, Ching-Wen Hsu. 828-831 [doi]
- Complex Wavelet-Based Face Recognition Using Independent Component AnalysisZhi Chai, Kai-Kuang Ma, Zhengguang Liu. 832-835 [doi]
- Similarity-Based Watermarking for Sub-Sampling Images with Bacterial Foraging TechniquesHsiang-Cheh Huang, Feng-Cheng Chang. 836-839 [doi]
- Defect Detection of Skewed Images for Multilayer Ceramic CapacitorsChun-Chieh Tseng, Jia Hao Wu, Bin-Yih Liao. 840-843 [doi]
- Adaptive Multicast Routing Protocol for Wireless Mobile Ad Hoc NetworksWei Kuang Lai, Mu-Lung Weng, Chien-Hua Lin, Chin-Shiuh Shieh. 844-847 [doi]
- An Efficient Architecture for Deblocking Filter in H.264/AVCHe Jing, Huang Yan, Xu Xinyu. 848-851 [doi]
- A 13.75 ns Holographic Reconfiguration of an Optically Differential Reconfigurable Gate ArrayMao Nakajima, Minoru Watanabe. 852-855 [doi]
- Fast Deployment of Botnet Detection with Traffic MonitoringChung-Huang Yang, Kuang-Li Ting. 856-860 [doi]
- Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRMChung-Ming Ou, Chung-Ren Ou. 861-864 [doi]
- A Hybrid RFID Protocol against Tracking AttacksJen-Chun Chang, Hsin-Lung Wu. 865-868 [doi]
- User Friendly Digital Rights Management System Based on Smart CardsNarn-Yih Lee, Tzu-Yi Lee. 869-872 [doi]
- TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P NetworksWei-Chen Wu, Yi-Ming Chen. 873-876 [doi]
- Emotion Feature Vector of Finger BrailleYasuhiro Matsuda, Tsuneshi Isomura. 877-880 [doi]
- Bilinear Coons Patch and its Application in Security Pattern DesignWenfa Qi, Xiaolong Li, Bin Yang. 881-884 [doi]
- Age Estimation Using AAM and Local Facial FeaturesJun-Da Txia, Chung-Lin Huang. 885-888 [doi]
- Medical Video Encryption Based on H.264/AVC with Near-Lossless CompressionTzung-Her Chen, Yan-Ting Wu, Yue-Rong Lin. 889-892 [doi]
- Determinants of Satisfaction and Intention of Use Self-service Technology - Technology Readiness and Computer Self-efficacyChien-Lung Chan, Chia-Li Lin. 893-897 [doi]
- Novel Efficient Electronic Voting Mechanism Based upon Elliptic CurveYu-Wei Lai, Chin-Chen Chang, Shih-Chang Chang. 898-901 [doi]
- Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless CommunicationsChin-Chen Chang, Chia-Yin Lee, Wei-Bin Lee. 902-904 [doi]
- Real-Time Hand Detection and Tracking against Complex BackgroundGang-Zeng Mao, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang. 905-908 [doi]
- A Falsification Prevention Method for Face Authentication Using LightYosuke Horiuchi, Osamu Uchida. 909-912 [doi]
- Image Watermarking in Face Recognition Systems Based on Contourlet TransformEhsan Ehsani, M. Shahram Moin, Farbod Razzazi. 913-916 [doi]
- Performance and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream Processor ArchitecturesGuang Xu, Hong An, Gu Liu, Ping Yao, Mu Xu, Wenting Han, Xiaoqiang Li, Xiurui Hao. 917-920 [doi]
- Novel Robust Image Watermarking Exploiting the Features of Double DomainsXinshan Zhu, Yun Yang, Yanming Chen. 921-924 [doi]
- Study on Digital Watermarking in the Oracle Bone Inscriptions RubbingsYongge Liu, Yanqiang Ge. 925-928 [doi]
- Revisit Steganalysis on QIM-Based Data HidingQinxia Wu, Weiping Li, Xiao Yi Yu. 929-932 [doi]
- Chain Coding Based Data Hiding in Binary ImagesXiao Yi Yu, Aiming Wang. 933-936 [doi]
- Robust Data Hiding by Hilbert Curve DecompositionBrian K. Lien. 937-940 [doi]
- Identity Based Authenticated Key Agreement for Tree-Based GroupXiangfei Sun, Qiuliang Xu, Tao Ban. 941-944 [doi]
- Steganalysis Based on Weighted Stego-Image for 2LSB Replacement SteganographyMao Ye, Fenlin Liu, Chunfang Yang, Xiongfei He. 945-948 [doi]
- Non-expansible Flip-flop Visual Cryptography with Perfect SecurityShang-Kuan Chen, Sian-Jheng Lin. 949-952 [doi]
- Curvelet Based Image Fusion for Ultrasound Contrast Harmonic ImagingNaizhang Feng, Mingjian Sun, Liyong Ma, Jiachen Ma. 953-956 [doi]
- Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity DetectingLiyong Ma, Yude Sun, Naizhang Feng, Zheng Liu. 957-960 [doi]
- A Fast Medical Image Registration Based on Steerable PyramidYuhao Gu, Qing Lin, Bo Hu, Xiao Bo. 961-964 [doi]
- Hyperspectral Feature Selection Based on Mutual Information and Nonlinear Correlation CoefficientMiao Zhang, Qiang Wang, Yi Shen, Bo Zhang. 965-968 [doi]
- Generalized Local Priority Based Medical Image Fusion SchemeJiasheng Hao, Yi Shen, Hongbing Xu, Jianxiao Zou. 969-972 [doi]
- An Iterative Refinement DSA Image Registration Algorithm Using Structural Image Quality MeasureJiang Wang, Jian Qiu Zhang. 973-976 [doi]
- Multisecret Image SharingRan-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang, Shyong Jian Shyu. 977-980 [doi]
- Study of Thangka Image Retrieval and Multimedia Presentation Management SystemWeilan Wang. 981-984 [doi]
- Seamless Handover for Multimedia Applications between Heterogeneous Wireless NetworksHung-Wei Lin, Kuo-Chih Chu, Wei-Tsong Lee, Jim-Min Lin. 985-988 [doi]
- A Novel Adaptive FEC and Interleaving Architecture for H.264/SVC Wireless Video TransmissionPo-Chang Huang, Kuo-Chih Chu, Hsiang-Fu Lo, Wei-Tsong Lee, Tin Yu Wu. 989-992 [doi]
- Information Objects Encapsulating Multimedia and IntelligenceChia-Ming Lee, Shang-Rong Tsai, Yu-Sheng Huang, Yuan-Liang Tai, Guang-Hung Huang, Hewijin Christine Jiau. 993-997 [doi]
- A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java ProcessorPang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang, Ting-Wei Hou. 998-1001 [doi]
- Automatic Internet Media ClipperHewijin Christine Jiau, Ming-Lun Lee. 1002-1005 [doi]
- IDEA: An Interest-DrivEn Architecture for Establishing Personalized Semantic InfrastructureFeng-Pu Yang, Hewijin Christine Jiau, Kuo-Feng Ssu. 1006-1009 [doi]
- A Robust Contourlet Based Image Hash AlgorithmYanan Wang, Di Wu, Hui Zhang, Xiamu Niu. 1010-1013 [doi]
- Reversible Secret Image Sharing Based on Shamir's SchemeChia Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang. 1014-1017 [doi]
- People Counting Using Multi-Mode Multi-Target Tracking SchemeCheng-Chang Lien, Ya-Lin Huang, Chin-Chuan Han. 1018-1021 [doi]
- Human Behavior Description Model Based on Action RecognitionFang-Hsuan Cheng, Cheng-Yuan Chang. 1022-1025 [doi]
- A New Feature Integration Approach and Its Application to 3D Model RetrievalJau-Ling Shih, Chang-Hsing Lee, Chih-Hsun Chou, Yu-Cheng Chang. 1026-1029 [doi]
- Modulation Spectral Analysis of Static and Transitional Information of Cepstral and Spectral Features for Music Genre ClassificationChang-Hsing Lee, Hwai-San Lin, Chih-Hsun Chou, Jau-Ling Shih. 1030-1033 [doi]
- Face Image Super-Resolution Using Two-dimensional Locality Preserving ProjectionYuan-Kai Wang, Cai-Ren Huang. 1034-1037 [doi]
- Random Number Generator Designed by the Divergence of Scaling FunctionsJengnan Tzeng, I-Te Chen, Jer-Min Tsai. 1038-1041 [doi]
- A Provably Secure Two-Party Attribute-Based Key Agreement ProtocolHao Wang, Qiuliang Xu, Tao Ban. 1042-1045 [doi]
- A Secure Steganography: Noisy Region EmbeddingYifeng Lu, Xiaolong Li, Bin Yang. 1046-1051 [doi]
- Experiments with Optical Liveness Testing MethodMartin Drahanský, Dana Lodrova. 1052-1055 [doi]
- Template Protection via Piecewise HashingClaudia Nickel, Christoph Busch, Xuebing Zhou. 1056-1060 [doi]
- Feature Correlation Attack on Biometric Privacy Protection SchemesXuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper. 1061-1065 [doi]
- The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric InfrastructureBendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog. 1066-1071 [doi]
- A Login System Using Mouse DynamicsPatrick Bours, Christopher Johnsrud Fullu. 1072-1077 [doi]
- A Video Retrieval Algorithm Based on Spatio-temporal Feature Curves and Key FramesXiuxin Chen, Kebin Jia, Zhipin Deng. 1078-1081 [doi]
- A Cancelable Biometric Hashing for Secure Biometric Verification SystemCagatay Karabat, Hakan Erdogan. 1082-1085 [doi]
- Blind Clustering of Music Recordings Based on Audio FingerprintingWei-Ho Tsai, Wei-Che Hsieh. 1086-1089 [doi]
- Why Vein Recognition Needs Privacy ProtectionDaniel Hartung, Christoph Busch. 1090-1095 [doi]
- An Approach to Biometric Identity Management Using Low Cost EquipmentRobert Mueller, Raul Sánchez-Reillo. 1096-1100 [doi]
- Template Protection for Multimodal Biometric SystemZhifang Wang, Qi Han, Xiamu Niu, Christoph Busch. 1101-1104 [doi]
- Non-Forensic Odontological BiometricsStephen D. Wolthusen, Christoph Busch. 1105-1109 [doi]
- Mean Best Basis Algorithm for Wavelet Speech ParameterizationJakub Galka, Mariusz Ziólko. 1110-1113 [doi]
- A Steganalysis Algorithm Based on Denoising of Source Image Using ICA and SVMJavad RavanJamJah, Soodeh Bakhshandeh, Seyed Bahram ZahirAzami. 1114-1117 [doi]
- An Investigation of Genetic Algorithm on Steganalysis TechniquesXiao Yi Yu, Aiming Wang. 1118-1121 [doi]
- The Effects of Ambient Sounds on the Quality of 3D Virtual Sound SpaceSatoshi Yairi, Yukio Iwaya, Maori Kobayashi, Makoto Otani, Yôiti Suzuki, Takeru Chiba. 1122-1125 [doi]
- Construction of Ancient-Modern Word Dictionary from Parallel Corpus of Ancient Writings and Their Translations in Modern LanguageFuminori Kimura, Akira Maeda. 1126-1129 [doi]
- A Framework for Design and Evaluation of Digital Museums in Second Life as Learning InstitutionsKingkarn Sookhanaphibarn, Ruck Thawonmas. 1130-1133 [doi]
- Comparison of User Trajectories Based on Coordinate Data and State TransitionsJunichi Oda, Ruck Thawonmas, Kuan-Ta Chen. 1134-1137 [doi]
- Automatic Modeling of Virtual 3D Streets Based on GIS Data - Application to Generation of Kyoto in the Edo EraMasakazu Sawai, Yuzuru Isoda, Akihiro Tsukamoto, Yoshihiro Kosaka, Kyoko Hasegawa, Susumu Nakata, Satoshi Tanaka. 1138-1143 [doi]
- A Retrieval System for Ballet Steps Using Three-dimensional Motion DataTsuyoshi Matsuoka, Asako Soga, Kazuhiro Fujita. 1144-1147 [doi]
- A Method of Managing Distributed Contents in Heterogeneous ServersMasahito Shiba. 1148-1151 [doi]
- A Pair-wise Key Establishment for Wireless Sensor NetworksHung-Min Sun, Cheng-Ta Yang, Yue-Hsun Lin, Mu-En Wu. 1152-1155 [doi]
- A Fast Audio Retrieval Method Based on Negativity JudgmentGuibin Zheng, Miao Li, Jiqing Han, Tieran Zheng. 1156-1159 [doi]
- Digital Reconstruction of a Historical Kabuki TheaterKohei Furukawa, Ryo Akama, Chisako Hirose, Kozaburo Hachimura. 1160-1163 [doi]
- Analysis of Gait Motion by Using Motion Capture in the Japanese Traditional Performing ArtsWoong Choi, Hiroyuki Sekiguchi, Kozaburo Hachimura. 1164-1167 [doi]
- Extracting Tactile Sensation Information from Multi-illuminated Images of Tangible Cultural PropertyXin Yin, Kazuyoshi Nomura, Hiromi T. Tanaka. 1168-1171 [doi]
- An Analysis of Body Movement on Music Expressivity Using Motion CaptureMamiko Sakata, Sayaka Wakamiya. 1172-1176 [doi]
- Body Motion Analysis for Similarity Retrieval of Motion Data and Its EvaluationWoong Choi, Takatoshi Ono, Kozaburo Hachimura. 1177-1180 [doi]
- An Automated On-line Traffic Flow Classification SchemeJian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu. 1181-1184 [doi]
- Achieving Secure Fuzzy Commitment Scheme for Optical PUFsTanya Ignatenko, Frans M. J. Willems. 1185-1188 [doi]
- Information Hiding into Interaural Phase Differences for Stereo Audio SignalsRyouichi Nishimura. 1189-1192 [doi]
- Principal Component Analysis for Prediction of O-Linked Glycosylation Sites in Protein by Multi-Layered Neural NetworksChu-Zheng Wang, Xian-Hua Han, Masahiro Ito, Ikuko Nishikawa, Yen-Wei Chen. 1193-1196 [doi]
- An Efficient Identity-Based Certified E-mail ProtocolCaifen Wang, Xiaodong Yang, Caihui Lan, Xiaojun Cao. 1197-1200 [doi]
- Denoising by Anisotropic Diffusion in ICA SubspaceXiang-Yan Zeng, Yen-Wei Chen, Caixia Tao. 1201-1204 [doi]
- Feature Selection Using Recursive Feature Elimination for Handwritten Digit RecognitionXiang-Yan Zeng, Yen-Wei Chen, Caixia Tao, Deborah van Alphen. 1205-1208 [doi]
- Prediction of the O-glycosylation by Support Vector Machines and Characteristics of the Crowded and Isolated O-glycosylation SitesYukiko Nakajima, Kazutoshi Sakakibara, Masahiro Ito, Ikuko Nishikawa. 1209-1212 [doi]
- A Research on Social Anxiety Individuals' Emotion Recognition Using IECXinyin Huang, Yan Zhang, Aibing Xu, Hisashi Kawabayashi, Yen-Wei Chen. 1213-1216 [doi]
- Region-Based Segmentation versus Edge DetectionHassana Grema Kaganami, Zou Beiji. 1217-1221 [doi]
- Representing Meanings of Images Based on Associative Values with LexiconsYing Dai. 1222-1227 [doi]
- P2P Multimedia Streaming Schedule for Maximum Network CapacityChin-Feng Lai, Yi-Wei Ma, Chia-Cheng Hu, Yueh-Min Huang. 1228-1231 [doi]
- Optimal Rate Allocation and Admission Control Policy for P2P On-Demand Streaming SystemsJen-Wen Ding, Guan-Wei Wu, Der-Jiunn Deng. 1232-1235 [doi]
- Path Dependent Adaptive Forward Error Correction with Multipath Interleaving Control Scheme for Video Streaming over Wireless NetworksMing-Fong Tsai, Chih-Heng Ke, Chun-I. Kuo, Ce-Kuen Shieh. 1236-1239 [doi]
- Mining Temporal Region-Based Service Patterns for Cooperative Caching in Wireless Multimedia Sensor NetworksKawuu Weicheng Lin, Ming-Hua Hsieh, Vincent S. Tseng. 1240-1244 [doi]
- A GeoTagging Scheme Using Image Steganography and GPS Information AuthenticationMei-Yi Wu, Chuan-Chi Hsu, Jia-Hong Lee. 1245-1248 [doi]
- Pre-Register Algorithm for SVC by Fast BSS Transition Wireless NetworksHuei-Yu Yang, Ya-Chun Li, Feng-Yi Chou, Tin Yu Wu, Wei-Tsong Lee. 1249-1252 [doi]
- New Watermarking Algorithm with Coding Efficiency Improvement and Authentication in Video SurveillanceChuen-Ching Wang, Ming-Jun Chi, Yao-Tang Chang. 1253-1257 [doi]
- An Enlargement Method Using Undecimated Wavelet Transform and Shape FunctionWen-Chien Yen, Yen-Yu Chen, Ying-Wen Chang. 1258-1261 [doi]
- New Approach for Cancer Computer Aided Diagnosis and TreatmentMenrit Samir Fahmy. 1262-1265 [doi]
- 2D-PCA Based Statistical Shape Model from few Medical SamplesTomoko Tateyama, Amir Hossein Foruzan, Yen-Wei Chen. 1266-1269 [doi]
- Compound Image Compression with Multi-step Text Extraction MethodQi Xi, Xing Wu, Shensheng Zhang. 1270-1273 [doi]
- Face Image Metamorphosis with an Improved Multilevel B-Spline ApproximationMasataka Seo, Yen-Wei Chen. 1274-1277 [doi]
- Remote Control System of Artificial Fish School and Its Fast ImplementationHisashi Kawabayashi, Mohammad Khazab, Jeffrey Tweedale, Lakhmi C. Jain, Yen-Wei Chen. 1278-1281 [doi]
- Image Categorization by Learned PCA Subspace of Combined Visual-words and Low-level FeaturesXian-Hua Han, Yen-Wei Chen. 1282-1285 [doi]
- A Study of Rounding Error on CDMA-Based Fingerprinting SchemeMinoru Kuribayashi, Hiroshi Kato, Masakatu Morii. 1286-1289 [doi]
- Dual-Microphone Speech Extraction from Signals with Audio BackgroundMariusz Ziólko, Bartosz Ziólko, Rafal Samborski. 1290-1292 [doi]
- Multi-mode Narrow-band Thresholding with Application in Liver Segmentation from Low-contrast CT ImagesAmir Hossein Foruzan, Yen-Wei Chen, Reza Aghaeizadeh Zoroofi, Akira Furukawa, Yoshinobu Sato, Masatoshi Hori. 1293-1296 [doi]
- Evaluation of Liver Shape Approximation and CharacterizationFarshid Babapour Mofrad, Reza Aghaeizadeh Zoroofi, Yen-Wei Chen, Ali Abbaspour Tehrani-Fard, Yoshinobu Sato, Akira Furukawa. 1297-1300 [doi]
- Volume Visualization with Grid-Independent Adaptive Monte Carlo SamplingHideo Nakajima, Kyoko Hasegawa, Susumu Nakata, Satoshi Tanaka. 1301-1304 [doi]
- Detection and 3D Measurement of a Rectangular Solid in a Single ImageTomohiro Nakamichi, Gang Xu. 1305-1309 [doi]
- Drowsiness Detection Based on Brightness and Numeral Features of Eye ImageP. R. Tabrizi, Reza Aghaeizadeh Zoroofi. 1310-1313 [doi]
- A Novel Clustering-Based Feature Extraction Method for an Automatic Facial Expression Analysis SystemAlireza Ghahari, Y. Rakhshani Fatmehsari, Reza Aghaeizadeh Zoroofi. 1314-1317 [doi]
- Automated Dental Recognition in MSCT Images for Human IdentificationMohammad Hosntalab, Reza Aghaeizadeh Zoroofi, Ali Abbaspour Tehrani-Fard, Gholamreza Shirani. 1318-1321 [doi]
- Double-Density Dual-Tree Wavelet Transform Based Texture ClassificationYu-Long Qiao, Chun-Yan Song. 1322-1325 [doi]
- Parallel Implementation of Good Feature Extraction for Tracking on the Cell Processor with OpenCV InterfaceHiroki Sugano, Ryusuke Miyamoto. 1326-1329 [doi]
- Hardware Architecture for HOG Feature ExtractionRyoji Kadota, Hiroki Sugano, Masayuki Hiromoto, Hiroyuki Ochi, Ryusuke Miyamoto, Yukihiro Nakamura. 1330-1333 [doi]
- An FPGA-Based Real-Time Hardware Accelerator for Orientation Calculation Part in SIFTJingbang Qiu, Ying Lu, Tianci Huang, Takeshi Ikenaga. 1334-1337 [doi]
- Temporal Information Cooperated Gaussian Mixture Models for Real-time Surveillance with Ghost DetectionTianci Huang, Chengjiao Guo, Jingbang Qiu, Takeshi Ikenaga. 1338-1341 [doi]
- A Gabor Pseudo Fisherface Based Face Recognition Algorithm for LSI ImplementationYohei Fukumizu, Tomoaki Takano, Yasuyuki Oshima, Toshihiko Terada, Hironori Yamauchi. 1342-1345 [doi]
- An Approach to Video Coding Using Parameter Estimation in the Decoding ProcessGen Fujita, Tomokazu Matsuno. 1346-1349 [doi]
- Wavelet-Based Sequence Codec Implementation on TMS320DM642Ali Ghorbanian, Amir Moosavinia. 1350-1353 [doi]
- VLSI Design and Analysis of Multipliers for Low PowerPachara V. Rao, Cyril Prasanna Raj P, S. Ravi. 1354-1357 [doi]