By Topic

Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference on

Date 12-14 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 333
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (707 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xxvii
    Request permission for commercial reuse | PDF file iconPDF (239 KB)
    Freely Available from IEEE
  • Conference Information

    Publication Year: 2009, Page(s):xxviii - xxxix
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • A two-pass filter for impulse noise reduction based on edge characteristics

    Publication Year: 2009, Page(s):5 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1003 KB) | HTML iconHTML

    In this paper, a two-pass filter is proposed for removing impulse noise to improve image quality. Due to the fact that the edge is more obvious and detected easily, such characteristics of different edges are used to judge whether the pixel is on an edge. Then, the pixels are not on the edges will be filtered by median filter, and further, the other pixels will be detected to preserve original inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVM

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (534 KB) | HTML iconHTML

    In this paper we present a novel method for hand gesture recognition based on Gabor filters and support vector machine (SVM). Gabor filters are first convolved with images to acquire desirable hand gesture features. The principal components analysis (PCA) method is then used to reduce the dimensionality of the feature space. With the reduced Gabor features, SVM is trained and exploited to perform ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Template Matching Method for Rotation Invariance Using Two-Stage Process

    Publication Year: 2009, Page(s):9 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Template matching is a technique for finding the location of a reference image or an object inside a scene image. The conventional method of template matching uses cross correlation algorithms. The method is simple to implement and understand, but it is one of the slowest methods. Furthermore, if the object in the image is rotated, the tradition method can fail. In this paper, an algorithm for a r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Watermarking Scheme Using Code Division Multiple Access and DWT

    Publication Year: 2009, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Watermarking is a potential method for copyright protection and multimedia data authentication in the Internet. The watermarking process can be considered as a communication task, where the watermarking acting like information embedded into a host image, which acts like noise in a communication channel susceptible to all kinds of attacks acting like as jamming. In this paper, a novel watermarking ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Compression-Resistant Invisible Watermarking Scheme for H.264

    Publication Year: 2009, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    The proposed scheme of this paper is embedding watermark into intra frame (I-frame). The most challenge of watermark that embedded into intra frame is the selection of intra prediction might be changed. In the research, different AC coefficient gets different effect when the selection of intra prediction was changed in another compression course. Therefore, it's necessary that finding what AC coef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Embedding in MPEG-4 Scalable Lossless Audio

    Publication Year: 2009, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    The paper addresses an information embedding audio coder based on the MPEG-4 scalable lossless coding system. By replacing the last part of the bitstream in each frame with a fixed amount of embedded information, the proposed truncator is able to truncate the bitstream without affecting the embedded information. Evaluation results show that the bitstream with the proposed technique is able to carr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Packing Bitstream of Scalable Video Coding

    Publication Year: 2009, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB) | HTML iconHTML

    In this paper, there is provided a method for packing a bitstream of scalable video coding (SVC). We use the SVC extractor to perform bitstream extraction and allocation, and employs non-uniform cutting instead of the SVC standard's uniform cutting. First, a birstream is obtained, wherein the bitstream has a plurality of frames and each frame has a base layer and a plurality of enhancement layers.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fisherface vs. Eigenface in the Dual-tree Complex Wavelet Domain

    Publication Year: 2009, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (795 KB) | HTML iconHTML

    Inspired by the superior performance of the dual-tree complex wavelet transform (DT-CWT) on signal representation and feature extraction, the well-known fisherface which is based on the linear discriminant analysis (LDA) and the eigenface which is based on the principal component analysis (PCA) are investigated in the DT-CWT domain and benchmarked in this paper. For the eigenface, the probabilisti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Evaluation of Biometrics Authentications for Cellular Phones

    Publication Year: 2009, Page(s):34 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Cellular phones, which are now widely used, often contain significant amounts of personal information, and are also increasingly being used for money-related functions such as credit card purchases. Consequently, biometric authentication technologies are being introduced as a means to ensure higher security. However, these technologies can be vulnerable to criminal penetration. Because of this, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking Cryptographic Data

    Publication Year: 2009, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    This paper presents a novel watermarking scheme, which is designed for cryptographic data such as keys, cipher-texts, and signatures. Such a cryptographic data is defined carefully based on its mathematical structure in order to provide correctness and security. Thus, in general, cryptographic data has no redundancy and modified data cannot work for intended use. We first show a general solution t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Audio Watermark System Using Short Detection Time Frame

    Publication Year: 2009, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Assumed applications of copyright protection for music and synthesized voice are discussed. We developed a prototype audio watermark system combining the results of previous studies based on the patchwork algorithm, modifying the amplitude in the time-domain of voiced audio data, and using a reference signal. The results of experimental evaluation show that this our system can detect watermarks in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing False Positives in Content-Based Phishing Detection

    Publication Year: 2009, Page(s):48 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Content-based phishing detection extracts keywords from a target Web page, uses these keywords to retrieve the corresponding legitimate site, and detects phishing when the domain of the target page does not match that of the retrieved site. It often misidentifies a legitimate target site as a phishing site, however, because the extracted keywords do not charecterize the legitimate site with suffic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XPROB - A Generalized Pool-Based Anonymous Communication Framework

    Publication Year: 2009, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    We propose XPROB, a generalized pool-based anonymous communication framework. XPROB defines a family of infinite pool-based anonymous communication systems with resistance against global active adversary (adversary with all capabilities to monitor all external activities of system, to delay and to create messages in the system). Our proposal is to solve the limitation of APROB Channel that concern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Privacy-aware Delegation of Personal Data using Digital Watermarking

    Publication Year: 2009, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web behind Web - A Steganographic Web Framework

    Publication Year: 2009, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    This paper presents a Web framework as an application of steganography. The framework enables us to stealthily organize a tree of Web objects behind another. The Web objects to be embedded are automatically assigned to cover files appropriately. When embedding is done, we obtain stego-objects those can be uploaded to a Web server as ordinary Web objects. We can retrieve files embedded in stego-obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded Message

    Publication Year: 2009, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    A systematic steganographic detecting framework is analyzed and some factors that make detection effective are given. As embedded message is important object in steganography, different types of embedded massage are analyzed. Statistical characteristics of embedded message give clue to steganalysis. An analytical method, generalized character sequence, is proposed and a noval detection method base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Layer Audio Watermarking Based on Amplitude Modification

    Publication Year: 2009, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    In the conventional method proposed by W.N.Lie et al., it is difficult to satisfy both the capacity of watermark information and the robustness to MP3 compression. The objective of this work is to increase the capacity of watermark information in the audio watermarking based on low-frequency amplitude modification. We increase the capacity of watermark information by embedding multiple watermarks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Watermarking Using QIM on Wavelet Packet Coefficients

    Publication Year: 2009, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In this paper, we propose an audio watermarking method that is based on wavelet packet transform (DWPT) coefficients. One bit of watermark codes is embedded into the power ratio (quantization index) of a pair of DWPT coefficients by quantization index modulation (QIM). The encoded pair is selected from the higher harmonic regions of the most powerful coefficient in a DWPT. By using such a criterio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Audio Watermarking with Time and Frequency Division

    Publication Year: 2009, Page(s):76 - 81
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    This report proposes a robust audio watermarking technique. Watermarked acoustic contents have been attacked for removal of concealed signals, and robustness against the attacks should be provided. Additionally, the sound quality should be preserved within the embedding procedure. In the proposed method, time and frequency divisions are adopted to fulfill these two requirements. Frequency division... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.