Template Protection via Piecewise Hashing (English)
- New search for: Nickel, Claudia
- New search for: Zhou, Xuebing
- New search for: Busch, Christoph
- New search for: Nickel, Claudia
- New search for: Zhou, Xuebing
- New search for: Busch, Christoph
In:
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
;
1056-1060
;
2009
- Conference paper / Electronic Resource
-
Title:Template Protection via Piecewise Hashing
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2009-09-01
-
Size:339433 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVMHuang, Deng-Yuan / Hu, Wu-Chih / Chang, Sung-Hsiang et al. | 2009
- 5
-
A Two-Pass Filter for Impulse Noise Reduction Based on Edge CharacteristicsChen, Chao-Yu / Chen, Chao-Ho / Kuo, Yi-Li / Chen, Chin-Hsing et al. | 2009
- 9
-
A Fast Template Matching Method for Rotation Invariance Using Two-Stage ProcessLee, Wen-Chia / Chen, Chin-Hsing et al. | 2009
- 13
-
A Watermarking Scheme Using Code Division Multiple Access and DWTChen, Ji-Hong / Chen, Chin-Hsing et al. | 2009
- 17
-
A Compression-Resistant Invisible Watermarking Scheme for H.264Chen, Tsong-Yi / Wang, Da-Jinn / Chen, Thou-Ho / Lin, Yi-Long et al. | 2009
- 21
-
Information Embedding in MPEG-4 Scalable Lossless AudioLi, Te / Rahardja, Susanto / Shu, Haiyan / Huang, Haibin et al. | 2009
- 25
-
An Algorithm for Packing Bitstream of Scalable Video CodingKao, Jung-yang / Tu, Jih-Sheng et al. | 2009
- 30
-
Fisherface vs. Eigenface in the Dual-tree Complex Wavelet DomainLi, Bin / Ma, Kai-Kuang et al. | 2009
- 34
-
Security Evaluation of Biometrics Authentications for Cellular PhonesManabe, Hirokazu / Yamakawa, Yuta / Sasamoto, Tomohiro / Sasaki, Ryoichi et al. | 2009
- 40
-
Watermarking Cryptographic DataYoshida, Maki / Fujiwara, Toru et al. | 2009
- 44
-
Evaluation of Audio Watermark System Using Short Detection Time FrameYamada, Takaaki / Takahashi, Yoshiyasu / Ebisawa, Ryu / Sato, Yoshinori / Susaki, Seiichi et al. | 2009
- 48
-
Preventing False Positives in Content-Based Phishing DetectionNakayama, Shinta / Echizen, Isao / Yoshiura, Hiroshi et al. | 2009
- 52
-
XPROB - A Generalized Pool-Based Anonymous Communication FrameworkTran, Minh-Triet / Duong, Anh-Duc / Echizen, Isao et al. | 2009
- 56
-
On Privacy-aware Delegation of Personal Data using Digital WatermarkingWohlgemuth, Sven / Sonehara, Noboru / Echizen, Isao / Muller, Günter et al. | 2009
- 60
-
Web behind Web - A Steganographic Web FrameworkHioki, Hirohisa et al. | 2009
- 64
-
Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded MessageLang, Rongling / Lu, Hui et al. | 2009
- 68
-
Multi-Layer Audio Watermarking Based on Amplitude ModificationOgihara, Akio / Murata, Harumi / Iwata, Motoi / Shiozaki, Akira et al. | 2009
- 72
-
Audio Watermarking Using QIM on Wavelet Packet CoefficientsSonoda, Kotaro / Takizawa, Osamu et al. | 2009
- 76
-
Robust Audio Watermarking with Time and Frequency DivisionYamamoto, Kotaro / Iwakiri, Munetoshi et al. | 2009
- 82
-
Embedding Limitations with Audio-watermarking Method Based on Cochlear-delay CharacteristicsImabeppu, Kuniaki / Hamada, Daiki / Unoki, Masashi et al. | 2009
- 86
-
A Data Hiding Method for Stereo Audio Signals Using the Polarity of the Inter-Channel DecorrelatorKondo, Kazuhiro et al. | 2009
- 90
-
On the Channel Characteristic of Dither Modulation Data Hiding for MP3 CompressionMartinez-Noriega, Raul / Nakano, Mariko / Yamaguchi, Kazuhiko et al. | 2009
- 94
-
A Robust Content in DCT Domain for Image AuthenticationWang, Yuan-Gen / Lei, Yan-Qiang et al. | 2009
- 98
-
Optimization of AVS-M Video Decoder for Real-time Implementation on Embedded RISC ProcessorsJian, Guo-An / Chu, Jui-Chin / Guo, Jiun-In et al. | 2009
- 102
-
Image Watermarking Based on Multiple Objective Genetic AlgorithmLee, Jiann-Shu / Chuang, Fong-Ping / Tsai, Kuen-Horng et al. | 2009
- 106
-
Feature Extraction for Face Recognition Based on Gabor Filters and Two-Dimensional Locality Preserving ProjectionsLee, Yi-Chun / Chen, Chin-Hsing et al. | 2009
- 110
-
An Autonomous License Plate Detection MethodKuo, Hsiao-Chen / Lee, Jiann-Shu / Kao, Sho-Tsung et al. | 2009
- 114
-
Eye Tracking in Visible EnvironmentKuo, Yung-Lung / Lee, Jiann-Shu / Kao, Sho-Tsung et al. | 2009
- 118
-
Aspect Ratio Waves for Gait AnalysisLin, Kuo-Wei / Chung, Pau-Choo et al. | 2009
- 122
-
Adaptive Reed–Solomon Code Protection of Data Partitioned H.264 VideoLi, Heng / Zhong, YanChun et al. | 2009
- 128
-
Adaptive Rate Control Scheme in Frame-layer for Real-time H.264Kim, Myoung-Jin / Hong, Min-Cheol et al. | 2009
- 132
-
A Semi-fragile Reversible Data Hiding by Coefficient-Bias AlgorithmYang, Ching-Yu / Hu, Wu-Chih / Chang, Po-Yen / Hwang, Chang-Min et al. | 2009
- 136
-
3D Triangular Mesh Watermarking for Copyright Protection Using Moment-PreservingKuo, Chen-Tsung / Wu, Da-Chun / Cheng, Shyi-Chyi et al. | 2009
- 140
-
Quality Evaluation of Digital Image WatermarkingSu, Qingtang / Liu, Xianxi / Zhang, Steve et al. | 2009
- 144
-
Color Image Watermarking Scheme Based on Support Vector RegressionLv, Xiuli / Bian, Hongyu / Yu, Bo / Quan, Xinghui et al. | 2009
- 148
-
Digital Watermarking Method for Printed Materials Embedding in Hue ComponentGoto, Yuta / Uchida, Osamu et al. | 2009
- 153
-
Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 FramesGong, Xun / Lu, Hai-Ming et al. | 2009
- 157
-
Time-Scale Invariant Zero-Watermarking Scheme for AudioFan, Ming-Quan / Wang, Hong-Xia et al. | 2009
- 161
-
Employing Optimal Matrix for Efficient Matrix EmbeddingGao, Yunkai / Li, Xiaolong / Yang, Bin et al. | 2009
- 166
-
An Attention Focusing Tree Based on Saliency and a Display Method for Small DisplaysNakamura, Kenji / Toriu, Takashi / Nakajima, Shigeyoshi / Hama, Hiromitsu et al. | 2009
- 170
-
Collision Detection of 4-legged Robots Using Acceleration SensorsNakajima, Shigeyoshi / Sugimoto, Kana / Toriu, Takashi et al. | 2009
- 174
-
Three-Dimensional Circular Camera System for the Three-Dimensional Display Based on the Reconstruction of Parallax RaysMiyatake, Shuhei / Takahashi, Hideya / Yamada, Kenji et al. | 2009
- 178
-
Detection of Tire-Road Contact Point for Vehicle Position Estimate Considering Shape Distortion in a Circular Fisheye ImageHirose, Kenichi / Toriu, Takashi / Hama, Hiromitsu et al. | 2009
- 182
-
Optimal Crawling Strategies for Multimedia Search EnginesHama, Hiromitsu / Zin, Thi Thi / Tin, Pyke et al. | 2009
- 186
-
Dominant Color Embedded Markov Chain Model for Object Image RetrievalZin, Thi Thi / Tin, Pyke / Toriu, Takashi / Hama, Hiromitsu et al. | 2009
- 190
-
Mobile Sensor for Target Tracking via Modified Particle FilterWang, Luke K. / Hsieh, Shan-Chin / Huang, Kou-Yuan / Chen, Wen-Cheng et al. | 2009
- 194
-
A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance VideosWu, Ching-Yu / Su, Po-Chyi et al. | 2009
- 198
-
A New Approach to the Dynamic Timeline of Animation EngineSun, Ningping / Okumura, Kentarou / Sun, Wenling et al. | 2009
- 202
-
An Alternative Algorithm of Triangulation of Polygons with HolesSun, Ningping / Tanaka, Satoshi / Sun, Wenling et al. | 2009
- 206
-
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port NumberOshima, Shunsuke / Hirakawa, Arata / Nakashima, Takuo / Sueyoshi, Toshinori et al. | 2009
- 210
-
Multi Path Based on Cache Notification Algorithm in Wireless Sensor NetworksZhufang, Kuang / Guogui, Yang et al. | 2009
- 214
-
Random Number Generated from White Noise of WebcamTsai, Jer-Min / Chen, I-Te / Tzeng, Jengnan et al. | 2009
- 218
-
Quantization Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVCWang, Szu-Hong / Hsia, Shih-Chang et al. | 2009
- 222
-
An Observer-Based Method for Secure CommunicationChen, Long-Chang / Lee, Tsair-Fwu / Chao, Pei-Ju / Chen, Wen-Cheng et al. | 2009
- 226
-
Performance Study of Asymmetric Traffic Load for OBS Ring NetworksKau, Shih-Wei / Lu, Wei-Ting / Chen, Wen-Ping / Lee, Tsair-Fwu / Tsai, Cheng-Nan et al. | 2009
- 230
-
Applications of Ontology in Management of Information AssetLi, Shing-Han / Wang, Kuo-Chung et al. | 2009
- 234
-
High Dynamic Range Color Image Rendering with Human Visual Adaptation SimulationFan, Ping-Lin / Chen, Shih-Ying / Wu, Wei-Hsien / Lin, Joey / Lu, Su-Ju / Wang, Hsueh-Wu / Tsai, Yuan-Fan et al. | 2009
- 238
-
The Design of Remote Surveillance System for Digital FamilyLiu, Chung-Hsin / Fan, Chih-Chieh et al. | 2009
- 242
-
To Build Tele-care System Network EnvironmentLiu, Chung-Hsin / Chen, Jiun-Ting / Wu, Chung-Min / Chen, Chuen-Lung et al. | 2009
- 246
-
Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM AlgorithmTsai, Chang-Lung / Hsu, Wei-Lieh et al. | 2009
- 250
-
Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier FiltersLee, Chih-Jen / Jeng, I-Horng / Yang, Tai-Ning / Chen, Chun-Jung / Su, Peng et al. | 2009
- 254
-
Build a Home Security Surveillance System Using LEGO MINDSTORMS NXTHsu, Kuo-Kai / Tsai, Dwen-Ren et al. | 2009
- 258
-
Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based on Hamilton-connected Subgraph RecognitionJeng, I-Horng / Tsai, Dwen-Ren / Chen, Hou-An / Yen, Yi-Chun / Cheng, Chien-Kang et al. | 2009
- 262
-
Comments on Gateway-Oriented Password-Based Authenticated Key Exchange ProtocolWu, Tzong-Chen / Chien, Hung-Yu et al. | 2009
- 266
-
Meaningful Inner Link Objects for Automatic Text CategorizationShen, Jau-Ji / Wu, Jia-Chiuan et al. | 2009
- 270
-
Identity-Based DRM in Ubiquitous Multimedia SystemYang, Chou-Chen / Hsiao, Ju-Chun / Yang, Hung-Wen et al. | 2009
- 274
-
A Novel Mutual Authentication Based on Data Embedding TechniqueLin, Chia-Chen / Chiang, Po-Hsuan et al. | 2009
- 278
-
Embedding Secret Messages Using Modified Huffman CodingChen, Kuo-Nan / Lee, Chin-Feng / Chang, Chin-Chen / Lin, Huang-Ching et al. | 2009
- 282
-
Joint Secret Image Sharing and Progressive Transmission Based on Integer Discrete Cosine TransformZhao, Zhenfei / Luo, Hao / Lu, Zhe-Ming et al. | 2009
- 286
-
A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm for H.264/AVC Based on the Characteristics of Macro-blockLiu, Pengyu / Jia, Kebin et al. | 2009
- 290
-
A Fast Image Retrieval Method Using Multi-Feature Dimension TechniqueHung, Kuo Lung / Tsay, Yih Cheng et al. | 2009
- 295
-
Secret Sharing Method for Gray-level ImagesTso, Hao-Kuan / Lou, Der-Chyuan / Jeng, Dah-Lih / Chou, Chao-Lung et al. | 2009
- 299
-
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge DetectorChang, Chin-Chen / Lin, Chia-Chen / Pai, Pei-Yan / Chen, Yen-Chang et al. | 2009
- 303
-
Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia SystemsLin, Ming-Yen / Hsueh, Sue-Chen / Chen, Ming-Hong / Hsu, Hong-Yang et al. | 2009
- 307
-
Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise DetectorsLiao, Li-Chun / Gu, Shin-Jung / Tseng, Bin-Chyi et al. | 2009
- 312
-
H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filterZhang, Nan / Ma, Siwei et al. | 2009
- 316
-
Shape-Based Depth Map CodingZhang, Nan / Ma, Siwei / Gao, Wen et al. | 2009
- 320
-
Reversible Steganography for VQ Indices Using the Modified State CodebookChang, Chin-Chen / Chan, Chi-Shiang / Wang, Zhi-Hui / Li, Ming-Chu et al. | 2009
- 324
-
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful ShadowsKieu, The Duc / Chang, Chin-Chen / Wang, Zhi-Hui / Li, Ming-Chu et al. | 2009
- 328
-
Matrix Selection in High Payload EmbeddingQian, Zhenxing / Zhang, Xinpeng / Wang, Shuozhong et al. | 2009
- 332
-
Enlargement of Balanced-Incomplete-Block-Designs-Based WatermarksYang, Zhi-Fang / Lee, Po-Chen / Chen, Wei-Hung / Leu, Jia-Guu et al. | 2009
- 336
-
Security of Indirect-Authenticated Key Exchange ProtocolChiang, Hsu-Hung / Liu, Ching-Chung / Chen, Ying-Ming / Chang, Ya-Fen et al. | 2009
- 340
-
A Video Watermarking in H.264/AVC EncoderLin, Shinfeng D. / Chuang, Chih-Yao / Meng, Hsiang-Cheng et al. | 2009
- 344
-
Electrical Impedance Tomography for Washing out Undergound PollutionYoneda, Kazuyo / Tamura, Shinichi / Nishino, Yoshinori / Nakamura, Kazuki / Shimosakon, Takio / Shimada, Kyohei / Wan, Rong Long / Okazaki, Kozo et al. | 2009
- 348
-
Improved EMD Steganography with Great Embedding Rate and High Embedding EfficiencyZhiguo, Qu / Yu, Fu / Xinxin, Niu / Yixian, Yang / Ru, Zhang et al. | 2009
- 353
-
Yet Another Friendly Progressive Visual Secret Sharing SchemeChen, Tzung-Her / Lee, Yao-Sheng et al. | 2009
- 357
-
Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation Resistant WatermarkingYang, Zhi-Fang / Su, Chih-Jung / Tseng, Ping-Chang / Shu, Chan-Ting et al. | 2009
- 361
-
An Embedding Technique Based upon Block Prediction and Code Cascading ShiftLee, Chin-Feng / Shen, Jau-Ji / Chuang, Mei-Chun et al. | 2009
- 365
-
A Scheme of Modulo-Based Capacity-improvement upon EMD SystemsSun, Hung-Min / Weng, Chi-Yao / Wang, Shiuh-Jeng et al. | 2009
- 369
-
A Novel Secure Data Hiding Scheme Using a Secret Reference MatrixLin, Chi-Nan / Chang, Chin-Chen / Lee, Wei-Bin / Lin, Jason et al. | 2009
- 374
-
Lossless Information Hiding Scheme Based on Predictive CodingLu, Tzu-Chuen / Huang, Cheng-Chun / Liao, Siang-Ru et al. | 2009
- 378
-
A Schema for Multi-Signature Handling Based on Workflow ModelLiu, Jin-Bao / Qiu, Zhi-Long / Zhou, Hui / Liu, Bao-Hui / Niu, Xia-Mu et al. | 2009
- 382
-
A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed VideoLiu, Zhaoqing / Li, Qiong / Guan, Shuai / Peng, Xiyuan et al. | 2009
- 386
-
Image Object Detection and Tracking Implementation for Outdoor Scenes on an Embedded Soc PlatformTsai, Wen-Kai / Sheu, Ming-hwa / Su, Ching-lung / Lin, Jun-jie / Tseng, Shau-Yin et al. | 2009
- 390
-
Implementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless NetworksChen, Chao-Lieh / Lai, Chien-Hao et al. | 2009
- 394
-
An Implementation of Frame Rate Control for Reducing Flicker in CSTN PanelHsueh, Ya-Hsin / Chen, Wei-Da et al. | 2009
- 398
-
A Novel Vehicle Brake Light SystemLin, Yang-Chiuan / Wang, Hung-Yu / Cheng, Wei-Jeng et al. | 2009
- 402
-
A CMOS Variable-gain Fully-differential Transimpedance Amplifier for Multimedia Data LinksChen, Roger Y. / Chang, Ming-Jen et al. | 2009
- 406
-
System Performance Analyses on PAC Duo ESL Virtual PlatformHsu, Zhe-Mao / Chuang, I-Yao / Su, Wen-Chien / Yeh, Jen-Chieh / Yang, Jen-Kuei / Tseng, Shau-Yin et al. | 2009
- 410
-
Secret Sharing Protocol for Linguistic Threshold SchemesOgiela, Marek R. / Ogiela, Urszula et al. | 2009
- 414
-
Association and Abstraction on Neural Circuit Loop and CodingTamura, Shinichi / Mizuno-Matsumoto, Yuko / Chen, Yen-Wei / Nakamura, Kazuki et al. | 2009
- 418
-
An Effective Network-Aware Peer Selection Algorithm in BitTorrentQin, Fenglin / Liu, Ju / Zheng, Lina / Ge, Liansheng et al. | 2009
- 422
-
A Mutual Information Based Sub-Pixel Registration Method for Image Super ResolutionZhang, Boyang / Liu, Ju / Chu, Jinyu / Qiao, Jianping et al. | 2009
- 426
-
Performance Comparison of Several Watermarking Methods Based on ICA and AQIMLing, Jie / Liu, Ju / Sun, Zhaowan et al. | 2009
- 430
-
Watermarking for 3D Triangular Meshes Based on SVDNie, Xiushan / Liu, Ju / Wang, Xianqing / Sun, Jiande et al. | 2009
- 434
-
A Blind Video Watermarking Scheme Based on DWTWang, Chun-Xing / Nie, Xiushan / Wan, Xianqing / Wan, Wen Bo / Chao, Feng et al. | 2009
- 438
-
Optimizing Constrained Mixed-Integer Nonlinear Programming Problems Using Nature SelectionHe, Rong-Song et al. | 2009
- 442
-
A Novel Secure RFID System to Ensure PrivacyKarabat, Cagatay et al. | 2009
- 446
-
Target Tracking in Clusters of Sensor Networks via Handoff Scheme with Extended Kalman FilterWang, Luke K. / Hsieh, Shan-Chin / Huang, Kou-Yuan / Wu, Chien-Chang et al. | 2009
- 450
-
A Histogram Descriptor Based on Co-occurrence Matrix and its Application in Cloud Image Indexing and RetrievalLi, Qingyong / Lu, Weitao et al. | 2009
- 455
-
3D Object Classification by Fuzzy KNN and Bayesian DecisionWan, Li-Li / Miao, Zhen-Jiang et al. | 2009
- 459
-
An Image Index Algorithm Based on Hierarchical ClusteringYang, Tao / Xu, Hongli et al. | 2009
- 463
-
An Integrative Codebook for Natural Scene CategorizationGu, Guanghua / Zhao, Yao / Zhu, Zhenfeng et al. | 2009
- 467
-
A Novel Texture Analysis Method Based on Graph Spectral TheoryTao, Zhang / Wenxue, Hong / Jinjia, Wang et al. | 2009
- 471
-
Image Denoising Based on Non-local Means with Wiener Filtering in Wavelet DomainLin, Li / Lingfu, Kong et al. | 2009
- 475
-
Indexing and Querying in Multimedia DatabasesLin, Hung-Yi / Chen, Shih-Ying et al. | 2009
- 479
-
Orthogonal Functional Expansion Method of Optical Flow for Large DisplacementKim, Jinwoo / Close, Robert / Taketani, Hisashi / Wan, Rong-Long / Okazaki, Kozo / Tamura, Shinichi et al. | 2009
- 483
-
Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech CodecNishimura, Akira et al. | 2009
- 487
-
Improvement of a Band Extension Technique for G.711 Telephony Speech by Using SteganographyAoki, Naofumi et al. | 2009
- 491
-
A Band Extension of G.711 Speech with Low Computational Cost for Data Hiding ApplicationIto, Akinori / Handa, Hironori / Suzuki, Yôiti et al. | 2009
- 495
-
Data Hiding is a Better Way for Transmitting Side Information for MP3 BitstreamIto, Akinori / Makino, Shozo et al. | 2009
- 499
-
Spatial and Temporal Position Information Delivery to Mobile Terminals Using Audio Watermarking TechniquesModegi, Toshio et al. | 2009
- 503
-
Chinese Name Speech Classification Using Fisher Score Based on Continuous Density Hidden Markov ModelsGao, Yi / Han, John / Lin, Lei / Lu, Congde / Yang, Qin et al. | 2009
- 507
-
Personal Photo Organizer Based on Automated Annotation FrameworkTsay, Kai-En / Wu, Yi-Leh / Hor, Maw-Kae / Tang, Cheng-Yuan et al. | 2009
- 511
-
Volume image segmentation by dual multi-scale morphological reconstructionsChen, Jiann-Jone / Su, Chun-Rong et al. | 2009
- 511
-
Volume Image Segmentaton by Dual Multi-Scale Morphological ReconstructionsChen, Jiann-Jone / Su, Chun-Rong et al. | 2009
- 515
-
Extension Neural Network Approach to Classification of Brain MRIWang, Chuin-Mu / Wu, Ming-Ju / Chen, Jian-Hong / Yu, Cheng-Yi et al. | 2009
- 518
-
Applying Visual Image and Satellite Positioning for Fast Vehicle Detection and Lane Marking RecognitionChang, Bao Rong / Tsai, Hsiu Fen et al. | 2009
- 522
-
Image Hidden Technique Using QR-BarcodeChung, Chin-Ho / Chen, Wen-Yuan / Tu, Ching-Ming et al. | 2009
- 526
-
Design of a System with a Multielement Thermopile for Monitoring the Temperature of Indoor ObjectsLi, Lung-Tsai / Tsai, Chin-Fu / Young, Ming-Shing et al. | 2009
- 530
-
Implementation of Thermistor Linearization Using LabVIEWTsai, Chin-Fu / Li, Lung-Tsai / Li, Chin-Hao / Young, Ming-Shing et al. | 2009
- 534
-
Design High-Performance and Low-Power Adder Cores with Full-Swing Nodes for Embedded SystemsCheng, Ching -Hwa / Tung, Chiou-Kou / Shieh, Shao-Hui / Hung, Yu-Cherng et al. | 2009
- 538
-
High-Speed CMOS Chip Design for Manchester and Miller EncoderHung, Yu-Cherng / Kuo, Min-Ming / Tung, Chiou-Kou / Shieh, Shao-Hui et al. | 2009
- 542
-
A New Contrast Enhancement Technique Implemented on FPGA for Real Time Image ProcessingLu, Ching-Hsi / Hsu, Hong-Yang / Wang, Lei et al. | 2009
- 546
-
A Comparison between Windows Mobile and Symbian S60 Embedded ForensicsSavoldi, Antonio / Gubian, Paolo / Echizen, Isao et al. | 2009
- 551
-
On Acceptable Modification Limits of Electroacoustic Speech Signals for Data HidingPonomar, Marina et al. | 2009
- 555
-
Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift StyleFang, Wen-Pinn et al. | 2009
- 559
-
An Image Processing Based Visual Compensation System for Vision DefectsLai, ChinLun / Chang, Shu-Wen et al. | 2009
- 563
-
Robust Data Hiding on Texture ImagesOtori, Hirofumi / Kuriyama, Shigeru et al. | 2009
- 567
-
An Adaptive Gradient-Projection Image Restoration Using Local Statistics and Estimated Noise CharacteristicsHwang, Joo-Yeon / Hong, Min-Cheol et al. | 2009
- 571
-
Histogram Shifting Lossless Data Hiding Based on Space Filling CurvesYu, Xiao Yi / Wang, Aiming et al. | 2009
- 575
-
Half-Zone Quantization Based Algorithm for Information HidingMahabadi, Ali Ameri / Eshghi, Mohammad et al. | 2009
- 579
-
Adapting e-TOM Model to Improve Multimedia Network Management--A Case Study with a Taiwan Multimedia Service ProviderWong, Dominic et al. | 2009
- 583
-
A Fast Text-Based Communication System for Handicapped AphasiacsFu, Yu-Fen / Ho, Cheng-Seen et al. | 2009
- 595
-
Document Filing Approaches Using an Internal Based Folder OrganizationDoong, Jiann-Gwo et al. | 2009
- 599
-
Fast Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue CodeLee, Hung-Peng / Hsiesh, Kunta et al. | 2009
- 604
-
Identity Authentication in RFID Based Logistics-Customs Clearance Service PlatformDeng, Huifang / Deng, Wen et al. | 2009
- 608
-
Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object DescriptionLi, Jun-Bao / Yu, Long-Jiang / Guo, Shi-Ze et al. | 2009
- 612
-
A Multilingual Patent Text-Mining Approach for Computing Relatedness Evaluation of Patent DocumentsLee, Chung-Hong / Yang, Hsin-Chang / Wu, Chih-Hong / Li, Yi-Ju et al. | 2009
- 616
-
Exploring AUC Boosting Approach in Multimodal Biometrics Score Level FusionMoin, M. Shahram / Parviz, Mehdi et al. | 2009
- 620
-
Palette Partition Based Data Hiding for Color ImagesLi, Yu-Chiang / Tsai, Piyu / Lin, Chih-Hung / Yeh, Hsiu-Lien / Huang, Chien-Ting et al. | 2009
- 624
-
A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation EnvironmentsChang, Chin-Chen / Chou, Yung-Chen / Hsieh, Ming-Huang et al. | 2009
- 628
-
A New Approach to Image Authentication Using Chaotic Map and Sudoku PuzzleWu, Wen-Chuan / Ren, Guang-Ruei et al. | 2009
- 632
-
Data Concealment Scheme for HTML Documents Based on Color CodeLee, Chin-Feng / Chen, Hsing-Ling et al. | 2009
- 636
-
Multipurpose Watermarking Method Based on Blind Vector QuantizationLin, Chih-Hung / Li, Yu-Chiang / Wu, Ming-Ni / Yang, Shun-Sheng / Chen, Kuan-Ju et al. | 2009
- 640
-
Automatic Traffic Monitoring Method Based on Cellular ModelHsu, Wei-Lieh / Tsai, Chang-Lung / Chang, Po-Lun et al. | 2009
- 644
-
Perfect Forward Secure Two-Party Key Agreement Protocol with Key EscrowHou, Mengbo / Xu, Qiuliang / Ban, Tao et al. | 2009
- 648
-
Advanced Color Images Enhancement Using Wavelet and K-means ClusteringKaganami, Hassana Grema / Beiji, Zou / Soliman, M. Sami et al. | 2009
- 653
-
A Novel Viewer Counter for Digital BillboardsChen, Duan-Yu / Lin, Kuan-Yi et al. | 2009
- 657
-
Vehicle Retrieval Using Eigen Color and Multiple Instance LearningChen, Shin-Yu / Hsieh, Jun-Wei / Wu, Jui-Chen / Chen, Yung-Sheng et al. | 2009
- 661
-
Towards Efficient Copy Detection for Digital Videos by Using Spatial and Temporal FeaturesTsai, Chung-Chi / Wu, Chin-Song / Wu, Ching-Yu / Su, Po-Chyi et al. | 2009
- 665
-
Driving Situations Understanding through Content Rhythm AnalysisLin, Yu-Dun / Tseng, Wen-Yu / Hsu, Cheng-Jie / Yeh, Chia-Hung et al. | 2009
- 669
-
Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling VerificationShih, Hao-Chung / Ho, Chian C. / Chang, Hsuan T. / Wu, Chin-Song et al. | 2009
- 673
-
Face Recognition Based on Complementary Matching of Single Image and Sequential ImagesHuang, Yea-Shuan / Liu, Wei-Cheng et al. | 2009
- 677
-
Precision Segmentation Rendering for 3-D Coronary Angiography Medical ImageLee, Tsair-Fwu / Lee, Chang-Yu / Chao, Pei-Ju / Wang, Chang-Yu et al. | 2009
- 681
-
Image Retrieval in Multimedia Databases: A SurveyAlemu, Yihun / Koh, Jong-bin / Ikram, Muhammed / Kim, Dong-Kyoo et al. | 2009
- 690
-
Robust Tracking Based on PSO and On-line AdaBoostLu, Huchuan / Zhang, Wenling / Yang, Fan / Wang, Xiaojing et al. | 2009
- 694
-
Visual Search Based on Contour SalientFu, Haiyan / Kong, Xiangwei / Jia, Shijie / Guo, Yanqing et al. | 2009
- 698
-
The Parallelization Design of Chaotic Encryption System Based on Mulit-level Shuffle-Exchange NetworkNan, Ding / Honglian, Ma / Guozhen, Tan et al. | 2009
- 702
-
Source Camera Identification Forensics Based on Wavelet FeaturesWang, Bo / Guo, Yiping / Kong, Xiangwei / Meng, Fanjie et al. | 2009
- 706
-
SIFT-Based Image Retrieval Combining the Distance Measure of Global Image and Sub-ImageLi, Bin / Kong, Xiangwei / Wang, Zhe / Fu, Haiyan et al. | 2009
- 710
-
Level Set-Based Semiautomatic Bolus Segmentation in Bolus-Chasing CTAHou, Ying / Sun, Yi et al. | 2009
- 714
-
Fairness Analysis of Electronic Commerce Protocol Based on Strand SpaceLiu, Wenqi / Yang, Jianhua / Li, Zhixin et al. | 2009
- 718
-
A Fast and Robust Algorithm of Detection and Segmentation for Moving ObjectHe, Jie / Jia, Kebin / Lv, Zhuoyi et al. | 2009
- 722
-
Unskilled User Support for Network Operation Based on Service Composition Using Web Ontology LanguagesNakamura, Yoshihiro et al. | 2009
- 728
-
An Analysis of the Influence of Facial Feature for Apparent Age EstimationTakimoto, Hironori / Fukai, Hironobu / Mitsukura, Yasue / Fukumi, Minoru et al. | 2009
- 732
-
A Method for Evaluating the Degree of Human's Preference Based on EEG AnalysisNakamura, Tsukasa / Ito, Shin-ichi / Mitsukura, Yasue / Setokawa, Hiroto et al. | 2009
- 736
-
A Method for Automatic Detection of Crimes for Public Security by Using Motion AnalysisGoya, Koichiro / Zhang, Xiaoxue / Kitayama, Kouki / Nagayama, Itaru et al. | 2009
- 742
-
A High Speed Mixel Estimation Method by Using the Genetic AlgorithmIto, Seiji / Oguro, Yoshinari et al. | 2009
- 746
-
An Important Facial Parts Analysis for Evaluating the Impression - Difference by GenderYoshimori, Seiki / Takimoto, Hironori / Mitsukura, Yasue / Fukumi, Minoru et al. | 2009
- 750
-
Further Remarks on Identity-Based RSA Multi-signatureChang, Ya-Fen / Lai, Yen-Cheng / Chen, Mu-Yen et al. | 2009
- 754
-
A ±1-Based Steganography by Minimizing the Distortion of First Order StatisticsLu, Yifeng / Li, Xiaolong / Yang, Bin et al. | 2009
- 759
-
Fast Subsequence Matching in Plasma Waveform DatabasesHochin, Teruhisa / Yamauchi, Yoshihiro / Nomiya, Hiroki / Nakanishi, Hideya / Kojima, Mamoru et al. | 2009
- 763
-
Image Processing in Ultra Fast X-ray Imaging with Streak Cameras for Laser Fusion ResearchChoi, Eunjoo / Zhong, Jiayong / Fujioka, Shinsuke / Shiraga, Hiroyuki / Azechi, Hiroshi et al. | 2009
- 767
-
Improvements of Signal-to-noise Ratio Utilizing Penumbral Imaging with M-sequences Aperture and Its Heuristic SchemeUeda, Tatsuki / Fujioka, Shinsuke / Nozaki, Shinya / Chen, Yen-Wei / Nishimura, Hiroaki et al. | 2009
- 771
-
A Heuristic Decoding Method for Coded Images of Random Uniformly Redundant ArrayNozaki, Shinya / Fujioka, Shinsuke / Ueda, Tatsuki / Chen, Yen-Wei / Namihira, Yoshinori et al. | 2009
- 775
-
Particle Swarm Optimization for Reconstruction of Penumbral ImagesChen, Yen-Wei / Lin, Chen-Lun / Mimori, Aya et al. | 2009
- 779
-
Creating RSA Trapdoors Using Lagrange Four Square TheoremPatsakis, Constantinos / Fountas, Evangellos et al. | 2009
- 783
-
Imperceptibility Evaluation for Color Stego ImageMa, Xiu-ying / Lin, Jia-jun et al. | 2009
- 787
-
Detection of LSB Replacement and LSB Matching Steganography Using Gray Level Run Length MatrixTarzjani, Seyed Mojtaba Seyedhosseini / Ghaemmaghami, Shahrokh et al. | 2009
- 791
-
Forecasting Exchange Rates by Genetic Algorithms Based Back Propagation Network ModelChang, Jui-Fang / Kuan, Chi-Ming / Lin, Yu-Wen et al. | 2009
- 795
-
A Study on the Cache Miss Rate in a Genetic Algorithm ImplementationChang, Feng-Cheng / Huang, Hsiang-Cheh et al. | 2009
- 799
-
Two-phase Fuzzy-ART with Independent Component Analysis for Semantic Image ClassificationChang, Chuan-Yu / Jian, Ru-Hao / Wang, Hung-Jen et al. | 2009
- 803
-
Using ZigBee and Room-Based Location Technology to Constructing an Indoor Location-Based Service PlatformCheng, Yuh-Ming et al. | 2009
- 807
-
Text Steganography Based on Online ChatLiu, Minhao / Guo, Yunbiao / Zhou, Linna et al. | 2009
- 811
-
Perceptual Content Authentication and Tamper Detection of Facial ImageHan, Qi / Li, Qiong / Niu, Xiamu et al. | 2009
- 815
-
Fast Channel Change IPTV System for Enhanced User ExperienceSong, Young-Ho / Kwon, Taeck-Geun et al. | 2009
- 819
-
Mental Rotation by Neural NetworkSasama, Toshihiko / Mitsumoto, Hiroshi / Yoneda, Kazuyo / Tamura, Shinichi et al. | 2009
- 823
-
An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone ImagesChen, Yi-Ting / Chu, Shu-Chuan / Horng, Mong-Fong / Pan, Jeng-Shyang et al. | 2009
- 828
-
Interactive Voice-Controller Applied to Home AutomationGuo, Jinn-Kwei / Lu, Chun-Lin / Chang, Ju-Yun / Li, Yi-Jing / Huang, Ya-Chi / Lu, Fu-Jiun / Hsu, Ching-Wen et al. | 2009
- 832
-
Complex Wavelet-Based Face Recognition Using Independent Component AnalysisChai, Zhi / Ma, Kai-Kuang / Liu, Zhengguang et al. | 2009
- 836
-
Similarity-Based Watermarking for Sub-Sampling Images with Bacterial Foraging TechniquesHuang, Hsiang-Cheh / Chang, Feng-Cheng et al. | 2009
- 840
-
Defect Detection of Skewed Images for Multilayer Ceramic CapacitorsTseng, Chun-Chieh / Wu, Jia-Hao / Liao, Bin-Yih et al. | 2009
- 844
-
Adaptive Multicast Routing Protocol for Wireless Mobile Ad Hoc NetworksLai, Wei Kuang / Weng, Mu-Lung / Lin, Chien-Hua / Shieh, Chin-Shiuh et al. | 2009
- 848
-
An Efficient Architecture for Deblocking Filter in H.264/AVCJing, He / Yan, Huang / Xinyu, Xu et al. | 2009
- 852
-
A 13.75 ns Holographic Reconfiguration of an Optically Differential Reconfigurable Gate ArrayNakajima, Mao / Watanabe, Minoru et al. | 2009
- 856
-
Fast Deployment of Botnet Detection with Traffic MonitoringYang, Chung-Huang / Ting, Kuang-Li et al. | 2009
- 861
-
Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRMOu, Chung-Ming / Ou, C. R. et al. | 2009
- 865
-
A Hybrid RFID Protocol against Tracking AttacksChang, Jen-Chun / Wu, Hsin-Lung et al. | 2009
- 869
-
User Friendly Digital Rights Management System Based on Smart CardsLee, Narn-Yih / Lee, Tzu-Yi et al. | 2009
- 873
-
TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P NetworksWu, Wei-Chen / Chen, Yi-Ming et al. | 2009
- 877
-
Emotion Feature Vector of Finger BrailleMatsuda, Yasuhiro / Isomura, Tsuneshi et al. | 2009
- 881
-
Bilinear Coons Patch and its Application in Security Pattern DesignQi, Wenfa / Li, Xiaolong / Yang, Bin et al. | 2009
- 885
-
Age Estimation Using AAM and Local Facial FeaturesTxia, Jun-Da / Huang, Chung-Lin et al. | 2009
- 889
-
Medical Video Encryption Based on H.264/AVC with Near-Lossless CompressionChen, Tzung-Her / Wu, Yan-Ting / Lin, Yue-Rong et al. | 2009
- 893
-
Determinants of Satisfaction and Intention of Use Self-service Technology - Technology Readiness and Computer Self-efficacyChan, Chien-Lung / Lin, Chia-Li et al. | 2009
- 898
-
Novel Efficient Electronic Voting Mechanism Based upon Elliptic CurveLai, Yu-Wei / Chang, Chin-Chen / Chang, Shih-Chang et al. | 2009
- 902
-
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless CommunicationsChang, Chin-Chen / Lee, Chia-Yin / Lee, Wei-Bin et al. | 2009
- 905
-
Real-Time Hand Detection and Tracking against Complex BackgroundMao, Gang-Zeng / Wu, Yi-Leh / Hor, Maw-Kae / Tang, Cheng-Yuan et al. | 2009
- 909
-
A Falsification Prevention Method for Face Authentication Using LightHoriuchi, Yosuke / Uchida, Osamu et al. | 2009
- 913
-
Image Watermarking in Face Recognition Systems Based on Contourlet TransformEhsani, Ehsan / Moin, M. Shahram / Razzazi, Farbod et al. | 2009
- 917
-
Performance and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream Processor ArchitecturesXu, Guang / An, Hong / Liu, Gu / Yao, Ping / Xu, Mu / Han, Wenting / Li, Xiaoqiang / Hao, Xiurui et al. | 2009
- 921
-
Novel Robust Image Watermarking Exploiting the Features of Double DomainsZhu, Xinshan / Yang, Yun / Chen, Yanming et al. | 2009
- 925
-
Study on Digital Watermarking in the Oracle Bone Inscriptions RubbingsYongge, Liu / Yanqiang, Ge et al. | 2009
- 929
-
Revisit Steganalysis on QIM-Based Data HidingWu, Qinxia / Li, Weiping / Yu, Xiao Yi et al. | 2009
- 933
-
Chain Coding Based Data Hiding in Binary ImagesYu, Xiao Yi / Wang, Aiming et al. | 2009
- 937
-
Robust Data Hiding by Hilbert Curve DecompositionLien, Brian K. et al. | 2009
- 941
-
Identity Based Authenticated Key Agreement for Tree-Based GroupSun, Xiangfei / Xu, Qiuliang / Ban, Tao et al. | 2009
- 945
-
Steganalysis Based on Weighted Stego-Image for 2LSB Replacement SteganographyYe, Mao / Liu, Fenlin / Yang, Chunfang / He, Xiongfei et al. | 2009
- 949
-
Non-expansible Flip-flop Visual Cryptography with Perfect SecurityChen, Shang-Kuan / Lin, Sian-Jheng et al. | 2009
- 953
-
Curvelet Based Image Fusion for Ultrasound Contrast Harmonic ImagingFeng, Naizhang / Sun, Mingjian / Ma, Liyong / Ma, Jiachen et al. | 2009
- 957
-
Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity DetectingMa, Liyong / Sun, Yude / Feng, Naizhang / Liu, Zheng et al. | 2009
- 961
-
A Fast Medical Image Registration Based on Steerable PyramidGu, Yuhao / Lin, Qing / Hu, Bo / Bo, Xiao et al. | 2009
- 965
-
Hyperspectral Feature Selection Based on Mutual Information and Nonlinear Correlation CoefficientZhang, Miao / Wang, Qiang / Shen, Yi / Zhang, Bo et al. | 2009
- 969
-
Generalized Local Priority Based Medical Image Fusion SchemeHao, Jiasheng / Shen, Yi / Xu, Hongbing / Zou, Jianxiao et al. | 2009
- 973
-
An Iterative Refinement DSA Image Registration Algorithm Using Structural Image Quality MeasureWang, Jiang / Zhang, Jiangqiu et al. | 2009
- 977
-
Multisecret Image SharingWang, Ran-Zan / Lin, Yung-Yi / Chen, Shang-Kuan / Lee, Yeuan-Kuen / Huang, Shih-Yu / Shyu, Shyong-Jian et al. | 2009
- 981
-
Study of Thangka Image Retrieval and Multimedia Presentation Management SystemWang, Weilan et al. | 2009
- 985
-
Seamless Handover for Multimedia Applications between Heterogeneous Wireless NetworksLin, Hung-Wei / Chu, Kuo-Chih / Lee, Wei-Tsong / Lin, Jim-Min et al. | 2009
- 989
-
A Novel Adaptive FEC and Interleaving Architecture for H.264/SVC Wireless Video TransmissionHuang, Po-Chang / Chu, Kuo-Chih / Lo, Hsiang-Fu / Lee, Wei-Tsong / Wu, Tin-Yu et al. | 2009
- 993
-
Information Objects Encapsulating Multimedia and IntelligenceLee, Chia-Ming / Tsai, Shang-Rong / Huang, Yu-Sheng / Tai, Yuan-Liang / Huang, Guang-Hung / Jiau, Hewi-Jin et al. | 2009
- 998
-
A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java ProcessorWang, Pang-Chieh / Lin, Chin-Yang / Lin, Cheng-Liang / Li, Yi-Fang / Yang, Cheng-Kai / Hou, Ting-Wei et al. | 2009
- 1002
-
Automatic Internet Media ClipperJiau, Hewijin Christine / Lee, Ming Lun et al. | 2009
- 1006
-
IDEA: An Interest-DrivEn Architecture for Establishing Personalized Semantic InfrastructureYang, Feng-Pu / Jiau, Hewijin Christine / Ssu, Kuo-Feng et al. | 2009
- 1010
-
A Robust Contourlet Based Image Hash AlgorithmWang, Yanan / Wu, Di / Zhang, Hui / Niu, Xiamu et al. | 2009
- 1014
-
Reversible Secret Image Sharing Based on Shamir's SchemeWu, Chia-Chun / Kao, Shang-Juh / Kuo, Wen-Chung / Hwang, Min-Shiang et al. | 2009
- 1018
-
People Counting Using Multi-Mode Multi-Target Tracking SchemeLien, Cheng-Chang / Huang, Ya-Lin / Han, Chin-Chuan et al. | 2009
- 1022
-
Human Behavior Description Model Based on Action RecognitionCheng, Fang-Hsuan / Chang, Cheng-Yuan et al. | 2009
- 1026
-
A New Feature Integration Approach and Its Application to 3D Model RetrievalShih, Jau-Ling / Lee, Chang-Hsing / Chou, Chih-Hsun / Chang, Yu-Cheng et al. | 2009
- 1030
-
Modulation Spectral Analysis of Static and Transitional Information of Cepstral and Spectral Features for Music Genre ClassificationLee, Chang-Hsing / Lin, Hwai-San / Chou, Chih-Hsun / Shih, Jau-Ling et al. | 2009
- 1034
-
Face Image Super-Resolution Using Two-dimensional Locality Preserving ProjectionWang, Yuan-Kai / Huang, Cai-Ren et al. | 2009
- 1038
-
Random Number Generator Designed by the Divergence of Scaling FunctionsTzeng, Jengnan / Chen, I-Te / Tsai, Jer-Min et al. | 2009
- 1042
-
A Provably Secure Two-Party Attribute-Based Key Agreement ProtocolWang, Hao / Xu, Qiuliang / Ban, Tao et al. | 2009
- 1046
-
A Secure Steganography: Noisy Region EmbeddingLu, Yifeng / Li, Xiaolong / Yang, Bin et al. | 2009
- 1052
-
Experiments with Optical Liveness Testing MethodDrahansky, Martin / Lodrova, Dana et al. | 2009
- 1056
-
Template Protection via Piecewise HashingNickel, Claudia / Zhou, Xuebing / Busch, Christoph et al. | 2009
- 1061
-
Feature Correlation Attack on Biometric Privacy Protection SchemesZhou, Xuebing / Wolthusen, Stephen D. / Busch, Christoph / Kuijper, Arjan et al. | 2009
- 1066
-
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric InfrastructureMjaaland, Bendik B. / Gligoroski, Danilo / Knapskog, Svein J. et al. | 2009
- 1072
-
A Login System Using Mouse DynamicsBours, Patrick / Fullu, Christopher Johnsrud et al. | 2009
- 1078
-
A Video Retrieval Algorithm Based on Spatio-temporal Feature Curves and Key FramesChen, Xiuxin / Jia, Kebin / Deng, Zhipin et al. | 2009
- 1082
-
A Cancelable Biometric Hashing for Secure Biometric Verification SystemKarabat, Cagatay / Erdogan, Hakan et al. | 2009
- 1086
-
Blind Clustering of Music Recordings Based on Audio FingerprintingTsai, Wei-Ho / Hsieh, Wei-Che et al. | 2009
- 1090
-
Why Vein Recognition Needs Privacy ProtectionHartung, Daniel / Busch, Christoph et al. | 2009
- 1096
-
An Approach to Biometric Identity Management Using Low Cost EquipmentMueller, Robert / Sanchez-Reillo, Raul et al. | 2009
- 1101
-
Template Protection for Multimodal Biometric SystemWang, Zhifang / Han, Qi / Niu, Xiamu / Busch, Christoph et al. | 2009
- 1105
-
Non-Forensic Odontological BiometricsWolthusen, Stephen D. / Busch, Christoph et al. | 2009
- 1110
-
Mean Best Basis Algorithm for Wavelet Speech ParameterizationGalka, Jakub / Ziolko, Mariusz et al. | 2009
- 1114
-
A Steganalysis Algorithm Based on Denoising of Source Image Using ICA and SVMRavanJamJah, Javad / Bakhshandeh, Soodeh / ZahirAzami, Seyed Bahram et al. | 2009
- 1118
-
An Investigation of Genetic Algorithm on Steganalysis TechniquesYu, Xiao Yi / Wang, Aiming et al. | 2009
- 1122
-
The Effects of Ambient Sounds on the Quality of 3D Virtual Sound SpaceYairi, Satoshi / Iwaya, Yukio / Kobayashi, Maori / Otani, Makoto / Suzuki, Yôiti / Chiba, Takeru et al. | 2009
- 1126
-
Construction of Ancient-Modern Word Dictionary from Parallel Corpus of Ancient Writings and Their Translations in Modern LanguageKimura, Fuminori / Maeda, Akira et al. | 2009
- 1130
-
A Framework for Design and Evaluation of Digital Museums in Second Life as Learning InstitutionsSookhanaphibarn, Kingkarn / Thawonmas, Ruck et al. | 2009
- 1134
-
Comparison of User Trajectories Based on Coordinate Data and State TransitionsOda, Junichi / Thawonmas, Ruck / Chen, Kuan-Ta et al. | 2009
- 1138
-
Automatic Modeling of Virtual 3D Streets Based on GIS Data - Application to Generation of Kyoto in the Edo EraSawai, Masakazu / Isoda, Yuzuru / Tsukamoto, Akihiro / Kosaka, Yoshihiro / Hasegawa, Kyoko / Nakata, Susumu / Tanaka, Satoshi et al. | 2009
- 1144
-
A Retrieval System for Ballet Steps Using Three-dimensional Motion DataMatsuoka, Tsuyoshi / Soga, Asako / Fujita, Kazuhiro et al. | 2009
- 1148
-
A Method of Managing Distributed Contents in Heterogeneous ServersShiba, Masahito et al. | 2009
- 1152
-
A Pair-wise Key Establishment for Wireless Sensor NetworksSun, Hung-Min / Lin, Yue-Hsun / Yang, Cheng-Ta / Wu, Mu-En et al. | 2009
- 1156
-
A Fast Audio Retrieval Method Based on Negativity JudgmentGuibin, Zheng / Miao, Li / Jiqing, Han / Tieran, Zheng et al. | 2009
- 1160
-
Digital Reconstruction of a Historical Kabuki TheaterFurukawa, Kohei / Akama, Ryo / Hirose, Chisako / Hachimura, Kozaburo et al. | 2009
- 1164
-
Analysis of Gait Motion by Using Motion Capture in the Japanese Traditional Performing ArtsChoi, Woong / Sekiguchi, Hiroyuki / Hachimura, Kozaburo et al. | 2009
- 1168
-
Extracting Tactile Sensation Information from Multi-illuminated Images of Tangible Cultural PropertyYin, Xin / Nomura, Kazuyoshi / Tanaka, Hiromi T. et al. | 2009
- 1172
-
An Analysis of Body Movement on Music Expressivity Using Motion CaptureSakata, Mamiko / Wakamiya, Sayaka et al. | 2009
- 1177
-
Body Motion Analysis for Similarity Retrieval of Motion Data and Its EvaluationChoi, Woong / Ono, Takatoshi / Hachimura, Kozaburo et al. | 2009
- 1181
-
An Automated On-line Traffic Flow Classification SchemeZhang, Jian / Qian, Zongjue / Shou, Guochu / Hu, Yihong et al. | 2009
- 1185
-
Achieving Secure Fuzzy Commitment Scheme for Optical PUFsIgnatenko, Tanya / Willems, Frans et al. | 2009
- 1189
-
Information Hiding into Interaural Phase Differences for Stereo Audio SignalsNishimura, Ryouichi et al. | 2009
- 1193
-
Principal Component Analysis for Prediction of O-Linked Glycosylation Sites in Protein by Multi-Layered Neural NetworksWang, Chu-Zheng / Han, Xian-Hua / Ito, Masahiro / Nishikawa, Ikuko / Chen, Yen-Wei et al. | 2009
- 1197
-
An Efficient Identity-Based Certified E-mail ProtocolWang, Caifen / Yang, Xiaodong / Lan, Caihui / Cao, Xiaojun et al. | 2009
- 1201
-
Denoising by Anisotropic Diffusion in ICA SubspaceZeng, Xiangyan / Chen, Yen-Wei / Tao, Caixia et al. | 2009
- 1205
-
Feature Selection Using Recursive Feature Elimination for Handwritten Digit RecognitionZeng, Xiangyan / Chen, Yen-Wei / Tao, Caixia / Alphen, Deborah van et al. | 2009
- 1209
-
Prediction of the O-glycosylation by Support Vector Machines and Characteristics of the Crowded and Isolated O-glycosylation SitesNakajima, Yukiko / Sakakibara, Kazutoshi / Ito, Masahiro / Nishikawa, Ikuko et al. | 2009
- 1213
-
A Research on Social Anxiety Individuals' Emotion Recognition Using IECHuang, Xinyin / Zhang, Yan / Xu, Aibing / Kawabayashi, Hisashi / Chen, Yen-Wei et al. | 2009
- 1217
-
Region-Based Segmentation versus Edge DetectionKaganami, Hassana Grema / Beiji, Zou et al. | 2009
- 1222
-
Representing Meanings of Images Based on Associative Values with LexiconsDai, Ying et al. | 2009
- 1228
-
P2P Multimedia Streaming Schedule for Maximum Network CapacityLai, Chin-Feng / Ma, Yi-Wei / Hu, Chia-Cheng / Huang, Yueh-Min et al. | 2009
- 1232
-
Optimal Rate Allocation and Admission Control Policy for P2P On-Demand Streaming SystemsDing, Jen-Wen / Wu, Guan-Wei / Deng, Der-Jiunn et al. | 2009
- 1236
-
Path Dependent Adaptive Forward Error Correction with Multipath Interleaving Control Scheme for Video Streaming over Wireless NetworksTsai, Ming-Fong / Ke, Chih-Heng / Kuo, Chun-I / Shieh, Ce-Kuen et al. | 2009
- 1240
-
Mining Temporal Region-Based Service Patterns for Cooperative Caching in Wireless Multimedia Sensor NetworksTseng, Vincent S. / Lin, Kawuu W. / Hsieh, Ming-Hua et al. | 2009
- 1245
-
A GeoTagging Scheme Using Image Steganography and GPS Information AuthenticationWu, Mei-Yi / Hsu, Chuan-Chi / Lee, Jia-Hong et al. | 2009
- 1249
-
Pre-Register Algorithm for SVC by Fast BSS Transition Wireless NetworksYang, Huei-Yu / Li, Ya-Chun / Chou, Feng-Yi / Wu, Tin-Yu / Lee, Wei-Tsong et al. | 2009
- 1253
-
New Watermarking Algorithm with Coding Efficiency Improvement and Authentication in Video SurveillanceWang, Chuen-Ching / Chi, Ming-Jun / Chang, Yao-Tang et al. | 2009
- 1258
-
An Enlargement Method Using Undecimated Wavelet Transform and Shape FunctionYen, Wen-Chien / Chen, Yen-Yu / Chang, Ying-Wen et al. | 2009
- 1262
-
New Approach for Cancer Computer Aided Diagnosis and TreatmentFahmy, Menrit Samir et al. | 2009
- 1266
-
2D-PCA Based Statistical Shape Model from few Medical SamplesTateyama, Tomoko / Foruzan, Hossein / Chen, Yen-Wei et al. | 2009
- 1270
-
Compound Image Compression with Multi-step Text Extraction MethodXi, Qi / Wu, XIng / Zhang, Shensheng et al. | 2009
- 1274
-
Face Image Metamorphosis with an Improved Multilevel B-Spline ApproximationSeo, Masataka / Chen, Yen-Wei et al. | 2009
- 1278
-
Remote Control System of Artificial Fish School and Its Fast ImplementationKawabayashi, Hisashi / Khazab, Mohammad / Tweedale, Jeff / Jain, Lakhmi C. / Chen, Yen-Wei et al. | 2009
- 1282
-
Image Categorization by Learned PCA Subspace of Combined Visual-words and Low-level FeaturesHan, Xian-Hua / Chen, Yen-Wei et al. | 2009
- 1286
-
A Study of Rounding Error on CDMA-Based Fingerprinting SchemeKuribayashi, Minoru / Kato, Hiroshi / Morii, Masakatu et al. | 2009
- 1290
-
Dual-Microphone Speech Extraction from Signals with Audio BackgroundZiolko, Mariusz / Ziolko, Bartosz / Samborski, Rafal et al. | 2009
- 1293
-
Multi-mode Narrow-band Thresholding with Application in Liver Segmentation from Low-contrast CT ImagesForuzan, Amir H. / Chen, Yen-Wei / Zoroofi, Reza A. / Furukawa, Akira / Sato, Yoshinobu / Hori, Masatoshi et al. | 2009
- 1297
-
Evaluation of Liver Shape Approximation and CharacterizationMofrad, Farshid Babapour / Zoroofi, Reza Aghaeizadeh / Chen, Yen-Wei / Tehrani-Fard, Ali Abbaspour / Sato, Yoshinobu / Furukawa, Akira et al. | 2009
- 1301
-
Volume Visualization with Grid-Independent Adaptive Monte Carlo SamplingNakajima, Hideo / Hasegawa, Kyoko / Nakata, Susumu / Tanaka, Satoshi et al. | 2009
- 1305
-
Detection and 3D Measurement of a Rectangular Solid in a Single ImageNakamichi, Tomohiro / Xu, Gang et al. | 2009
- 1310
-
Drowsiness Detection Based on Brightness and Numeral Features of Eye ImageTabrizi, Pooneh. R. / Zoroofi, Reza. A. et al. | 2009
- 1314
-
A Novel Clustering-Based Feature Extraction Method for an Automatic Facial Expression Analysis SystemGhahari, A. / Fatmehsari, Y. Rakhshani / Zoroofi, R.A. et al. | 2009
- 1318
-
Automated Dental Recognition in MSCT Images for Human IdentificationHosntalab, Mohammad / Zoroofi, Reza Aghaeizadeh / Tehrani-Fard, Ali Abbaspour / Shirani, Gholamreza et al. | 2009
- 1322
-
Double-Density Dual-Tree Wavelet Transform Based Texture ClassificationQiao, Yu-Long / Song, Chun-Yan et al. | 2009
- 1326
-
Parallel Implementation of Good Feature Extraction for Tracking on the Cell Processor with OpenCV InterfaceSugano, Hiroki / Miyamoto, Ryusuke et al. | 2009
- 1330
-
Hardware Architecture for HOG Feature ExtractionKadota, Ryoji / Sugano, Hiroki / Hiromoto, Masayuki / Ochi, Hiroyuki / Miyamoto, Ryusuke / Nakamura, Yukihiro et al. | 2009
- 1334
-
An FPGA-Based Real-Time Hardware Accelerator for Orientation Calculation Part in SIFTQiu, Jingbang / Lu, Ying / Huang, Tianci / Ikenaga, Takeshi et al. | 2009
- 1338
-
Temporal Information Cooperated Gaussian Mixture Models for Real-time Surveillance with Ghost DetectionHuang, Tianci / Guo, Chengjiao / Qiu, Jingbang / Ikenaga, Takeshi et al. | 2009
- 1342
-
A Gabor Pseudo Fisherface Based Face Recognition Algorithm for LSI ImplementationFukumizu, Yohei / Takano, Tomoaki / Oshima, Yasuyuki / Terada, Toshihiko / Yamauchi, Hironori et al. | 2009
- 1346
-
An Approach to Video Coding Using Parameter Estimation in the Decoding ProcessFujita, Gen / Matsuno, Tomokazu et al. | 2009
- 1350
-
Wavelet-Based Sequence Codec Implementation on TMS320DM642Ghorbanian, Ali / Moosavinia, Amir et al. | 2009
- 1354
-
VLSI Design and Analysis of Multipliers for Low PowerRao, Pachara V. / Raj, Cyril Prasanna / Ravi, S. et al. | 2009
- 1358
-
Author index| 2009
- 1366
-
Publisher's Information| 2009
- C1
-
Cover Art| 2009
- i
-
Title Page i| 2009
- iii
-
Title Page iii| 2009
- iv
-
Copyright Page| 2009
- v
-
Table of Contents| 2009
- xxviii
-
Conference Information| 2009