By Topic

Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on

Date 15-17 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 190
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (603 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (18 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (164 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2010 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010 , Page(s): xix - xxiv
    Save to Project icon | Request Permissions | PDF file iconPDF (88 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010 , Page(s): xxv - xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Possible Disease-Link Genetic Pathways Constructed by Hierarchical Clustering and Conditional Probabilities of Ovarian Carcinoma Microarray Data

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (559 KB) |  | HTML iconHTML  

    Different genes have different biological functions, these functions interactions between genes, moreover they play an important role in gene regulatory networks. In the recent cancer research field, a definite conclusion for the regulatory mechanisms of tumor genesis and metastasis has yet been found. Therefore we will apply oncogenes and suppressor genes from ovarian carcinoma micro array data a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Source Authentication for Multicast Based on Merkle Hash Tree

    Publication Year: 2010 , Page(s): 5 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    Source authentication is necessary in many multicast applications, especially in the real-time applications such as stream-video and online-news. In these applications, we should assure that all the packets received are from the same legal source and this can be done efficiently. In this paper, we propose an efficient scheme to decrease both communication cost and computation cost of source authen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Digital Signature Scheme with Fault Tolerance in RSA

    Publication Year: 2010 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    The integrality and security of data transfer are very important issues in cloud computing. In this paper, we have review a digital signature scheme with fault tolerance based on the RSA cryptosystem proposed by Zhang in 1999. The proposed scheme can efficiently keep the confidentiality of the transferred message. Furthermore, the scheme is able to detect and correct the error occurring in the com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaos-Based Image Integrity Authentication Code

    Publication Year: 2010 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investiga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Information Hiding Technology Based on the Similar Sample Blocks of Grayscale Image

    Publication Year: 2010 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (568 KB) |  | HTML iconHTML  

    This paper proposes an information hiding method based on similar sample block. The proposed scheme divides a standard contrast image into several blocks, called sample blocks, and takes the sample block as the contrast benchmark for embedding the secret information. This method provides a simple embedding process but a better result. The standard image can be placed on the web or specific places ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Public Watermarking Scheme Based on DWT

    Publication Year: 2010 , Page(s): 21 - 26
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (575 KB) |  | HTML iconHTML  

    Watermarking is a simple and effective method that is frequently used to protect the copyright of an image. However, watermarks must be strong enough to resist various attacks. In this paper, two-level Discrete Wavelet Transform (DWT) and a trusted third party are applied to ensure the robustness of the watermarks and protect the copyright of an image. The experimental results showed that our prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement of Two-Factor User Authentication in Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 27 - 30
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (137 KB) |  | HTML iconHTML  

    Wireless sensor networks are widely used for applications such as environmental monitoring, airport safety, health care, etc. For user authentication, in 2009, Das proposed a two-factor user authentication scheme in wireless sensor networks. They claimed that this scheme provided efficiency, strong security, and user anonymity property. However, we find that Das's scheme is still vulnerable to mas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System

    Publication Year: 2010 , Page(s): 31 - 33
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (244 KB) |  | HTML iconHTML  

    A novel data hiding scheme in the word document files are to be proposed. There are two basic concepts in our approach. First of all, let the spaces of each line, which the number of spaces is more than one of cover files embeds secret messages. In the past, the data hiding schemes on document files usually used a pair or block of inter-word spaces to embed secret messages. Comparatively, our sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction

    Publication Year: 2010 , Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (277 KB) |  | HTML iconHTML  

    In 2004, Chang and Tseng proposed a side-match approach that used neighboring pixels value to evaluate how many secret will be embed into the cover pixels. Although, their approach can provide high capacity and keep acceptable quality of stego-image, pixel recovery can not be accomplished after data have been extracted. The proposed method is based on left-and-upper side-match prediction (also cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Watermarking by Coefficient Adjustment Method

    Publication Year: 2010 , Page(s): 39 - 42
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (381 KB) |  | HTML iconHTML  

    In this paper, a novel reversible watermarking method based on the coefficient adjustment technique is proposed. A host image is first decomposed into the integer wavelet transform (IWT) domain. Subsequently, a secret message is embedded into the low-high (LH), high-low (HL), and high-high (HH) sub-bands of the IWT using the coefficient adjustment method. Experiments confirm that the proposed meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A (2, 3) Threshold Secret Sharing Scheme Using Sudoku

    Publication Year: 2010 , Page(s): 43 - 46
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (558 KB) |  | HTML iconHTML  

    Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achiev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking

    Publication Year: 2010 , Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    This paper presents an image authentication scheme to verify the integrity of images. The method protects a group of n images mutually by applying a threshold mechanism to manipulate the recovery data. The authentication code and the recovery data are embedded using a modified reversible contrast mapping watermarking scheme. The proposed method not only can detect and locate the tampering activiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling

    Publication Year: 2010 , Page(s): 51 - 54
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    This paper proposes a steganalysis scheme using the difference histogram and image calibration. The message embedding makes the correlation with the neighboring pixels weaken and the random changes of the pixel values generate the block effects among the pixels. The proposed method crops a suspicious image by 1 pixel in a row or column direction and compares the difference histograms. Two distance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Watermark Estimation Scheme Based on Neighborhood Filter

    Publication Year: 2010 , Page(s): 55 - 58
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    This paper introduces a new watermark estimation scheme for an additive watermark embedding model in spatial domain. Unlike traditional estimating filters only considering spatially adjacent pixels, the proposed method takes into account pixels which are both in close intensity value and spatially near distance. Thus, it is possible for the proposed method to estimate stably the watermark signal f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-layer Secret Image Sharing

    Publication Year: 2010 , Page(s): 59 - 61
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    Secret image sharing is a sharing method to transmit and store images with fault tolerance property. The paper proposes a recursive method to extend conventional secret image sharing more general in application which is named multi-layer secret image sharing. It enables users more controllability to secret images than conventional secret image sharing. Moreover, a useful application is also introd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graylevel Images Encrypting Based on the n-Graylevel Encoding Method and the Lowest Common Multiple Technique

    Publication Year: 2010 , Page(s): 62 - 65
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (340 KB) |  | HTML iconHTML  

    This paper proposes an encoding method to encrypt multiple covert images into a host image to form an overt image. The codes encoded in the overt image are classified into seven groups. Identification codes are used to determine whether the overt image contains codes proposed in this paper or not, image number codes are used to indicate the number of covert images encoded in the overt image, base ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Hiding Based on Side Match Vector Quantization and Modulus Function

    Publication Year: 2010 , Page(s): 66 - 69
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (383 KB) |  | HTML iconHTML  

    Side match vector quantization (SMVQ) is an image compression scheme that reduces the redundancy of a digital image. Some data hiding methods utilize SMVQ to embed secret data in an SMVQ-decompressed image, and reconstruct the original SMVQ code after the secret data have been extracted. This work proposes a data hiding scheme that embeds secret data in an SMVQ-decompressed image. A modulus functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.