By Topic

Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on

Date 18-20 July 2012

Filter Results

Displaying Results 1 - 25 of 135
  • IIH-MSP 2012: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1593 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (1593 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2012, Page(s):xv - xx
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Ear Detection in 3D Profile Images Based on Surface Curvature

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Although a number of different ear recognition techniques have been proposed, not much work has been done in the field of ear detection. In this work we present a new ear detection approach for 3D profile images based on surface curvature and semantic analysis of edge-patterns. The algorithm applies edge-based detection techniques, which are known from 2D approaches, to a 3D data model. As an addi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Chronological Information be Used as a Soft Biometric in Keystroke Dynamics?

    Publication Year: 2012, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Keystroke dynamics is a behavioral biometric modality which uses typing patterns on a keyboard to recognize individuals. The way of typing the password slightly changes with time, because of various factors (including user's training). This modification in the way of typing results in a decrease of performance recognition over time. In this paper, we analyse the correlation between the comparison ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis

    Publication Year: 2012, Page(s):11 - 15
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Most keystroke dynamics studies have been evaluated using a specific kind of dataset in which users type an imposed login and password. Moreover, these studies are optimistics since most of them use different acquisition protocols, private datasets, controlled environment, etc. In order to enhance the accuracy of keystroke dynamics' performance, the main contribution of this paper is twofold. Firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm

    Publication Year: 2012, Page(s):16 - 20
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Accelerometer-based biometric gait recognition offers a convenient way to authenticate users on their mobile devices. Modern smartphones contain in-built accelerometers which can be used as sensors to acquire the necessary data while the subjects are walking. Hence, no additional costs for special sensors are imposed to the user. In this publication we extract several features from the gait data a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ear Recognition Using Multi-Scale Histogram of Oriented Gradients

    Publication Year: 2012, Page(s):21 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1130 KB) | HTML iconHTML

    Ear recognition is a promising biometric measure, especially with the growing interest in multi-modal biometrics. Histogram of Oriented Gradients (HOG) have been effectively and efficiently used solving the problems of object detection and recognition, especially when illumination variations are present. This work presents a robust approach for ear recognition using multi-scale dense HOG features ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Implications of Identity References in Biometrics Databases

    Publication Year: 2012, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    We analyze the privacy implications of identity references in biometric databases in which either raw biometric samples or templates are stored. The analysis was inspired by the privacy requirement imposed by the Norwegian National DPA (Data Protection Act Privacy Advisor) on the fingerprint data collection for one of our research projects. The respective DPA approved maintenance of a fingerprint ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Segmentation of 3D Face Reconstructions

    Publication Year: 2012, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    The segmentation of the face in 3D reconstructions is a crucial processing step within 3D face recognition systems. At this early processing stage discarding other surface portions such as collars, hats or hairstyle shall reduce the amount of data. In contrast to other approaches, the proposed algorithm uses only the face geometry and is therefore robust with respect to lighting conditions or text... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hiding Identities in Spin Glasses

    Publication Year: 2012, Page(s):35 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Biometric traits are increasingly viewed as the ultimate proof of identity. Unfortunately, biometrics also raises many privacy concerns. In order to overcome these, template protection technologies have been developed in which privacy protection is embedded at the technological level. Standard template protection schemes, however either require secret key management or are vulnerable to brute forc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sparse Representation for Accurate Person Recognition Using Hand Vein Biometrics

    Publication Year: 2012, Page(s):41 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1104 KB) | HTML iconHTML

    The sparse representation theories are emerging as a more elegant and powerful technique to represent and analyze the biometric samples. In this paper, we study the feasibility of sparse representation on hand vein biometric data. Since hand vein data consists of rich set of textures, we first represent this texture information using Gabor transform. We then employ the sparse representation classi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finger-vein Verification Using Gabor Filter and SIFT Feature Matching

    Publication Year: 2012, Page(s):45 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    In this paper, a novel method to verify the infrared finger-vein patterns is proposed for biometric purposes. Firstly, we select parameters for Gabor filter with eight orientations to exploit finger-vein network, then we extract vein patterns by the fusion of two distinct orientation results. Secondly, we utilize SIFT features to offset the effect of images rotation and shift impact during finger-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revocable ID-based Signature Scheme with Batch Verifications

    Publication Year: 2012, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Signature scheme is one of important primitives in modern cryptography, which may offer functionalities of user identification, non-repudiation, and message authentication. With the advent of identity (ID)-based public key system (IDPKS) with bilinear pairings, many cryptographic schemes and protocols based on the IDPKS system have been proposed. Though the IDPKS system has the advantage to elimin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Data Hiding Based on Smart Boundary Adjustment

    Publication Year: 2012, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2014 KB) | HTML iconHTML

    In this paper, we propose a lossless data hiding based on smart boundary adjustment approach. More specifically, by preserving either the minimum or the maximum pixel values of the blocks, data bits can be effectively embedded into the blocks without any occurrence of overflow and underflow. Experiments confirm that perceived quality is good and the payload is large while our peak signal-to-noise ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data

    Publication Year: 2012, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Encoding data based on binary encoding methods and visual cryptography schemes is presented in this paper. First, a visual cryptography scheme is used to share pixels of a covert data to form two shadow matrices by using a specified sharing matrix. Then, the two shadow matrices are encoded into a host image to form an overt image by using a specific encoding rule. The overt image contains four gro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Flash Player Supporting Stereoscopic Image

    Publication Year: 2012, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB) | HTML iconHTML

    Adobe Flash is one of the popular multimedia presentation types in modern computer applications. A Flash player renders 2D vector graphics images, while the image quality is not degraded no matter how it is scaled up or down. A variety of Flash animations and games have been implemented on mobile devices recently, but they are difficult to be played smoothly without a high end processor. Since the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm for Protecting and Authenticating Medical Image

    Publication Year: 2012, Page(s):67 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    With the advance in the medical image from photographic ï¬lm (analogy) to digital ï¬le, how to avoid medical image modiï¬ed by malice and hide the patient's information into their medical image has become the promising research issue. It is difï¬cult to embed the information of patient to medical images because most pixels of this kind of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hiding Secret Messages in Huffman Trees

    Publication Year: 2012, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    A novel scheme for hiding information in Huffman trees is presented. Huffman trees are graphical representations of Huffman codes, which are optimal prefix-free codes generated by a simple algorithm given the distribution of the symbols. Huffman codes are used by MP3 and JPEG file formats for compressing audio and image files, but are also used for text documents and other digital media. The capac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspective Rectification of Integral Images Produced Using Hexagonal Lens Arrays

    Publication Year: 2012, Page(s):75 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    Nowadays a plethora of three-dimensional (3D) systems claim users' increasing preference for delivering 3D content. In recent years an increasing number of systems utilize autostereoscopic techniques and hence provide glasses free viewing and adequate resolutions in full color. In addition certain autostereoscopic techniques like Integral Imaging provide two-dimensional (2D) parallax and further i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.