By Topic

Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on

Date 16-18 Oct. 2013

Filter Results

Displaying Results 1 - 25 of 171
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1314 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (205 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (364 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2013, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (197 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (203 KB)
    Freely Available from IEEE
  • Program Committee and Reviewers

    Publication Year: 2013, Page(s):xxi - xxv
    Request permission for commercial reuse | PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • Editors

    Publication Year: 2013, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Design of High Gain Planar Dipole Array Antenna for WLAN Application

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (807 KB) | HTML iconHTML

    This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufactur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction-Based Reversible Data Hiding for Medical Images with Genetic Algorithms

    Publication Year: 2013, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the scheme by predicting the difference between output... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments on Genetic Programming Based Image Artefact Detection

    Publication Year: 2013, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    One of the interesting image processing applications is to detect and/or restore a damaged image. Because image damage would vary in different ways, a straightforward method is to use a program to represent the damage. Then, the type of artefact can be searched by applying programs to the original image and comparing with the target image. The run-time environment of a program is the structure of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction-Based Reversible Data Hiding with Content Characteristics

    Publication Year: 2013, Page(s):13 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (867 KB) | HTML iconHTML

    Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of Theme Park Queuing System by Using Arena

    Publication Year: 2013, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    Queuing in theme parks is a significant factor decreasing customer satisfaction. Visitors spend much time standing and waiting for the rides. If the visitors can register in a virtual queue for the rides while engaging some other activities, the wasted time will be reduced and the customer satisfaction level increases. This study is first to design a queuing system for theme parks that visitors ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Data Hiding with Quadtree Decomposition

    Publication Year: 2013, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1118 KB) | HTML iconHTML

    In this paper, we present the loss less data hiding algorithm based on the concept of quad tree decomposition. With the slight changes of original images, by altering the shape of histogram, or by modifying the difference value between two consecutive pixels, loss less data hiding can be achieved at the encoder. Correspondingly, at the receiver, both the original image and the embedded data should... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wavelet-Based Image Watermarking Scheme for Stereoscopic Video Frames

    Publication Year: 2013, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1473 KB) | HTML iconHTML

    In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Multi-thresholding Image Denoising Method

    Publication Year: 2013, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (631 KB) | HTML iconHTML

    In this paper, a new adaptive multi-thretholding image denoising method based on the decomposition order is presented, which is built upon the ideas of Embedded Zero tree Wavelet (EZW) encoder and separate character of signals and noises. This method is not increase in operation amounts but excellent in image denoising results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual Watermarking for Image Tamper Detection and Self-Recovery

    Publication Year: 2013, Page(s):33 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Digital image processing technology presents new challenges for the security of the image information, which makes image authentication as a problem to be addressed. Digital watermarking plays an important role in multimedia information security. This paper proposed a dual watermarking method to do tamper location and self-recovery, which utilizes self-embedding technology to hide eigenface into t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thermal Analysis of Power MMICs Based on Computerization

    Publication Year: 2013, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    A novel modeling approach and a computerized analysis were introduced to perform analysis for MMIC FET's, aiming at understanding the heat conduction process of the MMICs and providing thermal information for MMIC design. Experiments show the efficiency and effectiveness of the proposed method. The computer's result accuracy can be achieved as 85 percents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Stage Verification Based on Watermarking for Electronic Passport

    Publication Year: 2013, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    This paper provides a novel two-stage verification scheme based on watermarking for electronic passport. The watermarking includes the multimodal biometric feature of the passport owner and the parity check codes of multimodal feature. The first part is taken as the template to do field certification which confirms whether the person is the true passport holder. The parity check codes verify the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Up-Sampling Based Watermarking Multiple Description Coding Frame

    Publication Year: 2013, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    A novel watermarking scheme is proposed for up-sampling based multiple description coding frame in this paper. Secret information is embedded in the DWT image. Up-sampling algorithm is applied on transformed image to introduce some redundancy between different channels. Good performance of the new frame to against noise and to resist the compression attacks is shown in the experimental results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fall Detection System Based on Human Body Silhouette

    Publication Year: 2013, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    Elderly care system is one among the most popular research topics in biomedical health-care system design as aging has emerged in different countries. We present a biologically-motivated system to detect unexpected falls in real-time video sequences. The system employs event-based temporal difference image between video sequences as input and extracts static features like aspect ratio and inclinat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Creative 3D Game Platform Interacted with Laser Beam

    Publication Year: 2013, Page(s):53 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wearable Bio-potential Monitor System with Capacitive Coupling Electrode

    Publication Year: 2013, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Electrocardiography (ECG) is a kind of electrical activities of the heart measured along the skin, and is also an important tool to diagnosis heart decease. In clinical, the conventional ECG electrode is generally used for measuring ECG signal. However, it requires skin preparation and conductive gels to reduce the impedance of the skin-electrode interface. These preparation procedures easily caus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Model-Based Prosody Coder for Mandarin Speech

    Publication Year: 2013, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In this paper, a novel parametric prosody coding approach for Mandarin speech is proposed. It employs a hierarchical prosodic model (HPM) as a prosody generating model in the encoder to analyze the speech prosody of the input utterance to obtain a parametric representation of four prosodic-acoustic features of syllable pitch contour, syllable duration, syllable energy level, and syllable-juncture ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.