By Topic

Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on

Date 14-16 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 106
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (707 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (138 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (144 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2011 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committee Lists

    Publication Year: 2011 , Page(s): xiii - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (162 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011 , Page(s): xxi - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011 , Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • Design of 3-D FIR Cone-Shaped Filters by McClellan Transformation and Least-Squares Contour Mapping

    Publication Year: 2011 , Page(s): 1 - 4
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    In this paper, the techniques of McClellan transformation and least-squares contour mapping are applied for the design of 3-D FIR cone-shaped filters directly. While it is difficult to find an unified set of constraints for the design of 3-D transformation sub filters with wide range of inclination degree θ, 0° <; θ <; 90° for example, two approaches are proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of 2.45GHz Planar Meander Dipole Antenna

    Publication Year: 2011 , Page(s): 5 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (553 KB) |  | HTML iconHTML  

    In this study, we propose the simple structure design of planar meander dipole antennas with various shapes of stubs. The antenna which operates at 2.45 GHz is designed and fabricated successfully. The influences of stub parameters of the planar meander dipole antennas on the resonant frequency, bandwidth, and gain are described. We use IE3D software to design planar dipole antennas and choose the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on ENF Discontinuity Detection Techniques

    Publication Year: 2011 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (375 KB) |  | HTML iconHTML  

    Electrical network frequency (ENF) is known to be useful for audio authentication. In a digital archive system, error concealment of the audio files are sometimes required. Firstly, assuming that traditional recordings were produced by AC-powered devices, the ENF is coupled into the recorded signals. Secondly, assuming that damaging and editing produce similar data error patterns, the ENF phase di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Data Hiding with Difference Modification and Rhombus Relationships in Quadtree Decomposition

    Publication Year: 2011 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (196 KB) |  | HTML iconHTML  

    Digital watermarking has been an effective means for copyright protection and digital rights management (DRM). One of the current trends for researches in this field would focus on reversible data hiding. Considering the ease of implementation and employing the inherent characteristics of original images, we propose our reversible data hiding algorithm with the rhombus relationships of original pi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Building Fire Evacuation System with RFID and Cloud Computing

    Publication Year: 2011 , Page(s): 17 - 20
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    Building fire is a common disaster happening in our daily life that causes unfortunate casualties and deaths. Successfully escaping from fire depends on the design of evacuation route and time, as most of the damage of fire is caused due to lack of evacuation equipments or poor design of the emergency route. In this research work, we designed a hybrid building fire evacuation system (HBFES) on a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Copyright Information Embedding System for Android Platform

    Publication Year: 2011 , Page(s): 21 - 24
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (522 KB) |  | HTML iconHTML  

    In recent years, Camera Smart phone has become a popular consumer electronics product. Young people like to use that to record their daily lives, moreover, they will share these photos and information to others. However, the photos may be used without consent after they are uploaded to Internet. To avoid this problem, one can embed visible and invisible watermarks into images. However, an addition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Packet Scheduling Scheme for Downlink LTE System

    Publication Year: 2011 , Page(s): 25 - 28
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (412 KB) |  | HTML iconHTML  

    Long term evolution (LTE) is the next generation wireless system. There are not many researches for LTE downlink scheduling. It uses orthogonal frequency division multiple access (OFDMA) in downlink. Until now, the goal for the LTE scheduler is achieving the system highest performance, but it will cause to lower priority connection delay or starvation under limited bandwidth resources. Therefore, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-Adaptive Multi-level Data Embedding for Lossless Data Hiding

    Publication Year: 2011 , Page(s): 29 - 32
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    Loss less data hiding, also known as reversible data hiding, is a newly developed research field and relating applications in digital rights management (DRM). Secret information can be hidden into original image at the encoder, and then image containing secret data is delivered to the decoder. For decoding, original image and secret information need to be perfectly recovered from the received imag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of an XMPP-based Service Integration Scheme

    Publication Year: 2011 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    The advances in network-enabled software development raises the demands on the service oriented architecture (SOA). Popular implementations of SOA uses XML-based representations, such as SOAP and WSDL, to enable remote function invocation and service discovery. Our previous experiences show that a sophisticated XML representation is often over-complex for a controlled environment. We also found th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Histogram-Based Difference Expansion for Reversible Data Hiding with Content Statistics

    Publication Year: 2011 , Page(s): 37 - 40
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (651 KB) |  | HTML iconHTML  

    Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Acoustic Emission Signal Classification

    Publication Year: 2011 , Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (178 KB) |  | HTML iconHTML  

    When using acoustic emission (AE) monitoring of rock burst, the signals received by AE monitoring device are related to the type of AE source type, which influences predicting the AE monitoring accuracy. In view of the time-varying characteristics of acoustic emission signals, we adopt the Short-Time analysis technology, in other words, to acoustic emission signal transient analysis technique to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Blind Digital Steganography Scheme Based on Complete Complementary Codes

    Publication Year: 2011 , Page(s): 45 - 48
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (313 KB) |  | HTML iconHTML  

    Digital watermarking schemes based on complete complementary codes have been proposed. It has been pointed out that the watermarking schemes can be extended to the steganography scheme because complete complementary code has good correlation properties. In this paper, we propose a blind steganography algorithm which does not need to refer any cover data in the extraction process. In addition, we t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous Stochastic Decoder for Spread Spectrum Digital Watermarking

    Publication Year: 2011 , Page(s): 49 - 52
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    We propose decoding algorithms that introduce asynchronous dynamics and a stochastic algorithm for spread spectrum digital watermarking. A synchronous deterministic decoder was used for existing decoding algorithms based on Bayes' estimation. Adopting asynchronous dynamics makes it possible to suppress the occurrences of oscillatory solutions and introducing a stochastic algorithm makes it possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-Based De-anonymisation of Tweets

    Publication Year: 2011 , Page(s): 53 - 56
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    Various types of personal information are accessible through the Web, and they can be accessed in number of ways. Linking of the personal information obtained with other personal information can lead to a serious violation of privacy. To address this problem, we developed a method that matches the information individuals place in a profile to the information they post on social media sites. It use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Compression-Based Method for Estimating LSB Replacement Rate in Color and Grayscale Images

    Publication Year: 2011 , Page(s): 57 - 60
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (347 KB) |  | HTML iconHTML  

    In this paper a new compression-based method for estimating LSB replacement rate in color and grayscale images is introduced. We compare this method experimentally with the state-of-the-art improved WS steganalysis. The results of our experiments show that depending on the archiver the new method can be more effective than improved WS steganalysis for noisy color images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet-Based Entropy for Digital Audio Watermarking

    Publication Year: 2011 , Page(s): 61 - 64
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (217 KB) |  | HTML iconHTML  

    Unlike traditional entropy in information theory, this work uses the normalized energy instead of probability to obtain a low-frequency amplitude transform (LAT) on coefficients of discrete wavelet transform (DWT). The watermark is embedded based on the properties and characteristics of this transform. Finally, performance of the proposed scheme is assessed by signal-to-watermark (SWR) and bit err... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.