By Topic

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)

26-28 Nov. 2007

Go

Filter Results

Displaying Results 1 - 25 of 167
  • Third International Conference on International Information Hiding and Multimedia Signal Processing - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Third International Conference on International Information Hiding and Multimedia Signal Processing - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Third International Conference on International Information Hiding and Multimedia Signal Processing - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Third International Conference on International Information Hiding and Multimedia Signal Processing - Table of contents

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2007, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Proposal of Digital Forensic System Using Security Device and Hysteresis Signature

    Publication Year: 2007, Page(s):3 - 7
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    With the development of the Internet society, digital forensics, i.e., the technology and procedures used to prepare digital evidence for litigating against Internet crime, has been used extensively. In particular, digital forensics used in the corporate world, primarily in relation to litigation involving computer-related evidence in civil matters such as breaches of contract or breaches of confi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera

    Publication Year: 2007, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    The digital forensics used in the corporate world primarily in relation to litigation involving computer- related evidence such as civil matters, breach of contract, breach of confidence, and so on, has recently been gaining a great deal of attention. In order to support the digital forensics in a stand-alone environment, we proposed a system named "Dig-Force (Digital Forensic System with Chaining... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Generation of Digital Signature on Compromised Computer

    Publication Year: 2007, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Although digital signatures are the basic elements of security-sensitive systems, the host computers that generate them are usually connected to the Internet and are constantly at risk of intrusion. The worst possible situation is when an intruder generates a user's legitimate signature against the user's intension. Therefore, unintended digital signatures must never be generated, even when the ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain

    Publication Year: 2007, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB) | HTML iconHTML

    This paper addresses the problem on digital watermarking, called the data hiding problem that refers to embedment and extraction of hidden information in a given image with the highest possible reliability. The performance of a watermarking system is measured by the probability of error for the extracted information. We present a new solution which significantly improves the performance of additiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HVS-Based Robust Video Watermarking with Dual-plane Correlation

    Publication Year: 2007, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking

    Publication Year: 2007, Page(s):25 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    A method for enhancing the image quality of watermarked binary images containing text, drawings, graphs and tables is described. Using the proposed method, we can construct binary watermarking methods that do not perceptually degrade image quality and are robust against image deformation. The method can enhance image quality by accurately detecting the gaps created by the conventional watermarking... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Reversible Information Hiding Using Complexity Measure for Binary Images

    Publication Year: 2007, Page(s):29 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Reversible information hiding for binary images is presented. A half of pixels in noisy blocks are replaced with secret messages. In order to recover original original cover images, changeable pixels are compressed by an efficient image coding, such as JBIG, and then the compressed bit-stream is embedded into cover images with the message. Simulation and experimental results demonstrate the effica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Host-Cooperative Metadata Embedding Framework

    Publication Year: 2007, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    This paper presents a new metadata embedding framework for multimedia content where the metadata and its related information are registered in a database. A watermarking method based on the framework computes the metadata that provides content with the smallest perceptual artifact by way of extracting the metadata from the original unwatermarked content. This can reduce the watermark power at the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Switchable DRM Structure for Embedded Device

    Publication Year: 2007, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB) | HTML iconHTML

    Digital Rights Management (DRM) is a concept for controlling the distribution and consumption of digital media. As embedded multimedia devices are becoming popular, there are strong demands for the light-weight DRM systems that can run smoothly in a resource-limited environment. Due to the variety of embedded devices, an ideal DRM system should be platform independent and interoperable. These requ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An H.264 Video Encryption Algorithm Based On Entropy Coding

    Publication Year: 2007, Page(s):41 - 44
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    H.264 video coding standard supports a broad range of application, and how to guarantee its security has already become an urgent problem. In this paper, we propose a video encryption algorithm for H.264, which combines stream cipher algorithm with entropy coding process. It obtains video content security by encrypting codeword index to scramble the position of the codeword. Experiments show that,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem

    Publication Year: 2007, Page(s):45 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (70 KB) | HTML iconHTML

    A non-interactive oblivious transfer scheme based on the standard ElGamal encryption scheme was proposed in 2003. The retrieved messages could not be verified by the receiver so the authors proposed an amendment. Unfortunately, this amendment makes itself impracticable. In this article, an efficient and practical non-interactive t-out-of-n oblivious transfer scheme based on the widespread RSA cryp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing Analysis for Self-similar Traffic by Simulator

    Publication Year: 2007, Page(s):51 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    The scale-invariant burstiness or self-similarity has been found in real network. Relation between self-similarity and network parameter is mainly discussed in the context of application layer, and this self-similarity is caused by the file size of Web servers or the duration of user sessions. Traffic dynamics, however, are mainly generated by physical conditions such as the resource restrainment,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis

    Publication Year: 2007, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    To defend DoS (denial of service) Attacks, the access filtering mechanism is adopted on the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules comes from the hardness to identify normal and anomaly packets from the incoming packets. In this paper, we analyze the amount of incoming packet to our college and extract characters of IP packets classified b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Spline Interpolation Curve Modeling

    Publication Year: 2007, Page(s):59 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    We present an approach to model handwriting like curves with the cubic spline interpolation function. Different from NURBS such as Bezier and B-spline curve modeling, the huge complexity of the traditional spline interpolation have been obstructed and limited the application of spline curve modeling. We propose an efficient local cubic spline interpolation curve modeling algorithm and provide an a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Camera Work Based Animation

    Publication Year: 2007, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    In 2D and 3D computer graphics software system the camera work technique plays a necessary and crucial role. The camera-work-based animation involves modeling and rendering of computer graphics, and image processing technologies. We provide a handy virtual camera to 2D animation manufacturing that is different from the complicated 3D camera. Our approaches such as the interactive camera interface ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of using L1-norm with Image Watermarking on SVD Domain

    Publication Year: 2007, Page(s):67 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    This paper presents a study of image watermarking using robust singular value decomposition in L1-norm sub-space. The watermarked image attacked by noise is greatly degraded. This results in the effects of transparency and robustness of the watermarked image. Although the watermarking in SVD domain is sensitive to noise and outliers, incorporating L1-norm regression to the watermarking algorithm c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Multimedia Network backbone Architecture base on Proportional Delay Differentiation

    Publication Year: 2007, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    This paper proposes a novel multimedia network backbone architecture that supports all-optical transmission and quality of service (QoS). A new media access control (MAC) protocol for this network named CSMA/CP (carrier sense multiple access/carrier preemption) is used to directly transport variable size IP packets on the DWDM ring network without encapsulating IP packets to SONET; it improves the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of P2P Traffic Identification Based on BP Neural Network

    Publication Year: 2007, Page(s):75 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    Today's P2P application is a big challenge to network traffic workload. In contrast to first generation P2P networks which used well-defined port numbers, current P2P applications have ability to disguise their existence through the use of arbitrary ports. Our goal is to give out a new approach for P2P traffic identification based BP Neural Network, and without relying on keyword matching. This ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.