Scheduled Maintenance on August 31st, 2016:
IEEE Xplore will undergo system maintenance from 1:00 - 3:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on

Date 15-17 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 355
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xxx
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xxxii - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Challenges of Location Tracking Techniques in Wireless Forensics

    Publication Year: 2008, Page(s):3 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    Comparing to wired networks, wireless networks provide several advantages. However, these advantages come at a price. Wireless networks do not carry over the same security features as its wired counterpart. An unprotected wireless network can be easily used by a hacker as a steppingstone in attacks. Due to the nature of wireless networks, it is very difficult to trace back to the hacker. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copyright Protection in Wireless Sensor Networks by Watermarking

    Publication Year: 2008, Page(s):7 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Since the data of wireless sensor networks play an important role in the communication, many strategies have been devised to protect the security of sensor networks. Due to the importance of copyright protection for valuable sensor data, we present a robust watermark algorithm as the solution in this paper. We make use of the numerical characteristic of sending time of the sensor packet to embed w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File-Update Based Steganography for Microsoft PowerPoint Files

    Publication Year: 2008, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Microsoft PowerPoint files (PPT files for short) are widely used today but steganographic schemes for them have rarely been reported. Through detailed analysis, we discover that the PPT file update mechanism, which is employed by Microsoft PowerPoint Application to update the corresponding PPT file when saving a modified presentation, can produce redundant data in a PPT file. In light of the fact,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images

    Publication Year: 2008, Page(s):16 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    In this work we propose a random index modulation (RIM) based fragile watermarking scheme for authenticating RGB colour images. To thwart counterfeiting attacks, block-wise dependence neighbourhood is established, under the control of a secret key, and a content-dependent watermark is created by picking a certain number of bits from the dependence neighbourhood after scrambling its members. To min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Steganography Scheme in P2P Network

    Publication Year: 2008, Page(s):20 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    With the extensive application of the peer-to-peer (P2P) network, the torrent file, a vital part of the BitTorrent P2P network, has become a very popular file format over the Internet. Through detailed analysis, we found that the torrent files are ideal host carriers of steganography. In this paper, we propose a steganography scheme for torrent files, in which two approaches, namely Letter Case Ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fragile Document Watermarking Technique Based on Wet Paper Code

    Publication Year: 2008, Page(s):25 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    This paper proposes a new fragile watermarking algorithm which is mainly applied to binary document image based on the wet paper code. In order to improve embedding capacity and locating tampered area, some work is done base on the prior research of fragile in this paper. First, we dynamically adjust the bits which are embedded into image according to the number of turnover pixels and make the tur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Watermark Attacking Method Based on Eigen-Image Energy

    Publication Year: 2008, Page(s):29 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    On the basis of the energy distribution of eigen-images of an image, a new watermark attacking method is proposed. For most removal attacking methods, they regard watermark as noise and adopt denoising methods to remove watermark. However, when the energy of watermark is removed from a watermarked image, the energy of the original image is also removed at the same time. To solve this problem, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building an Online Game-Based Learning System for Elementary School

    Publication Year: 2008, Page(s):35 - 38
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Computer games are widely applied in the field of education. The games can be used for improving learning motivation and effectiveness, especially for the students who encounter difficulties or feel uninteresting in learning. Combined with a quiz database established by nature science specialists, the system uses an online game platform suitable for elementary school students to assist them study ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of Balance Traffic Load with Genetic Algorithm for PON

    Publication Year: 2008, Page(s):39 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Passive optical networks (EPONs) technology is being considered as a promising solution for next- generation broadband access network due to the convergence of low-cost Ethernet equipment and fiber infrastructure. Nevertheless, subcarrier often install telecommunications only according to the order of applying for to the newly-increased user's disposition in the end, but not dispose considering ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Fast Approach to Secure Group-Oriented Management of Key Trees on Internet

    Publication Year: 2008, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    In this paper, a group-oriented management of key trees (GMKT) is proposed. In GMKT, a hybrid key distribution management is developed to ensure the group security in communications when the group membership is change such as member joining and leaving. The re-keying procedures of two basic operations are presented. The simulation results show the performance improvements of computation cost. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Remote Monitoring and Control System Key Techniques Based on Data Point Table

    Publication Year: 2008, Page(s):47 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    In view of many issues from the present coal gas detection systems on operation parameters, data point table-based a kind of remote multi-stage monitoring & management system frame for the coal mine gas is designed. Structure of data point table, file format of data gathering, data format of data transmission and producing and uploading basic data for remote monitoring system are integrated in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Cross-Layer Scheduling Algorithm for Multimedia Networks

    Publication Year: 2008, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Nowadays wireless networks standards, e.g. IEEE 802.16, aim to accommodate diverse QoS requirements for multimedia users. The standard provided four kinds of multimedia data services, associated with QoS parameters and left the QoS scheduling algorithm undefined. In this paper, we propose an adaptive cross physical (PHY) layer and MAC layer scheduling algorithm for IEEE 802.16 BWA system. The prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model of Smart Home Fusing Multi-intelligence

    Publication Year: 2008, Page(s):56 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Effectively fusing the technologies of sense intelligence, emotion intelligence and communication intelligence, we design a new model of smart home. The system can implement unsupervised and continuous smart monitor for empty nest elder in terms of non obtrusive methods in home environment. It is a multi-agent system based on middleware, and implements the mechanism that both low level sensors and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting Multiple Classes of Services in IP over WDM Ring Network

    Publication Year: 2008, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    In our previous paper, we proposed a novel carrier preemption MAC protocol based on carrier sense multiple access schemes has been designed to supporting IP packets over all optical WDM MAN ring networks. Since the traditional IP provides the best effort service only, the issue of supporting IP packets with QoS transfer has become a crucial issue for multimedia transmission. We do so by addressing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode

    Publication Year: 2008, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    In order to connect the block cipher into stream cipher mode, the middleware about output of the block cipher was designed according to flexible and scalable principle. The byte wise operation can be paralleled to more large scale such as 32 bit wise or 16 bit wise. Secure of this design was demonstrated by the block cipher algorithm itself and the complexity of mask algorithm. The middleware mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shape Feature Extraction Using Fourier Descriptors with Brightness in Content-Based Medical Image Retrieval

    Publication Year: 2008, Page(s):71 - 74
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Contour-based shape feature extraction is one of the important research contents in content-based medical image retrieval. The paper presents a method using Fourier descriptors with brightness. The method uses centroid distance function to compute shape signature from boundary pixels of a shape. Fourier transform is used for shape signature to compute Fourier coefficients, and standardized pixel b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Retrieval Based on Fuzzy Color Histogram

    Publication Year: 2008, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Due to its simple, low computation complexity and invariant to geometric transform, color feature is widely used in content-based image retrieval (CBIR). In this paper, a new fuzzy method of color histogram is proposed based on the Lab color space, which links the three histograms created by the three components of the color space and provides a histogram which contains only ten bins. The experime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination of Wavelet snd SIFT Features for Image Classification Using Trained Gaussion Mixture Model

    Publication Year: 2008, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    This paper presents an effective combination of Wavelet-based features and SIFT features. For the combined feature patches extracted from images we then adopt the PCA transformation to reduce the dimensionality of their feature vectors. And the reduced vectors are used to train Gaussian Mixture Models (GMMs) in which the mixture weights and Gaussian parameters are updated iteratively. We performed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.