Top Banner
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009) Kyoto, Japan 12-14 September 2009 Pages 1-664 CFP09IIH-PRT 978-1-4244-4717-6 IEEE Catalog Number: ISBN:
24

2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Aug 03, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009)

Kyoto, Japan 12-14 September 2009

Pages 1-664

CFP09IIH-PRT 978-1-4244-4717-6

IEEE Catalog Number: ISBN:

Page 2: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

2009 Fifth InternationalConference on Intelligent

Information Hidingand Multimedia Signal

ProcessingIIH-MSP 2009

Table of ContentsConference Information

IIHMSP-2009-IS01 Intelligent Video Processing

Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVM ...............................................1

Deng-Yuan Huang, Wu-Chih Hu, and Sung-Hsiang Chang

A Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics .............................................5

Chao-Yu Chen, Chao-Ho (Thou-Ho) Chen, Yi-Li Kuo, and Chin-Hsing Chen

A Fast Template Matching Method for Rotation Invariance Using Two-Stage

Process ...........................................................................................................................................................................9

Wen-Chia Lee and Chin-Hsing Chen

A Watermarking Scheme Using Code Division Multiple Access and DWT ...................................................13

Ji-Hong Chen and Chin-Hsing Chen

A Compression-Resistant Invisible Watermarking Scheme for H.264 .............................................................17

Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho (Chao-Ho) Chen, and Yi-Long Lin

Information Embedding in MPEG-4 Scalable Lossless Audio ..........................................................................21

Te Li, Susanto Rahardja, Haiyan Shu, and Haibin Huang

An Algorithm for Packing Bitstream of Scalable Video Coding .......................................................................25

Jung-yang Kao and Jih-Sheng Tu

Fisherface vs. Eigenface in the Dual-tree Complex Wavelet Domain ..............................................................30

Bin Li and Kai-Kuang Ma

IIHMSP-2009-IS02 Techniques and Algorithms for Multimedia Security

Security Evaluation of Biometrics Authentications for Cellular Phones ..........................................................34

Hirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, and Ryoichi Sasaki

Watermarking Cryptographic Data .........................................................................................................................40

Maki Yoshida and Toru Fujiwara

Page 3: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Evaluation of Audio Watermark System Using Short Detection Time Frame ................................................44

Takaaki Yamada, Yoshiyasu Takahashi, Ryu Ebisawa, Yoshinori Sato, and Seiichi Susaki

Preventing False Positives in Content-Based Phishing Detection .....................................................................48

Shinta Nakayama, Isao Echizen, and Hiroshi Yoshiura

XPROB - A Generalized Pool-Based Anonymous Communication Framework ............................................52

Minh-Triet Tran, Anh-Duc Duong, and Isao Echizen

On Privacy-aware Delegation of Personal Data using Digital Watermarking ................................................56

Sven Wohlgemuth, Noboru Sonehara, Isao Echizen, and Günter Müller

Web behind Web - A Steganographic Web Framework .....................................................................................60

Hirohisa Hioki

Algorithm for Detecting Steganographic Information Based on Characteristic

of Embedded Message ..............................................................................................................................................64

Rongling Lang and Hui Lu

IIHMSP-2009-IS03 Advanced Data Hiding and Coding Techniques for AudioSignals

Multi-Layer Audio Watermarking Based on Amplitude Modification .............................................................68

Akio Ogihara, Harumi Murata, Motoi Iwata, and Akira Shiozaki

Audio Watermarking Using QIM on Wavelet Packet Coefficients ...................................................................72

Kotaro Sonoda and Osamu Takizawa

Robust Audio Watermarking with Time and Frequency Division .....................................................................76

Kotaro Yamamoto and Munetoshi Iwakiri

Embedding Limitations with Audio-watermarking Method Based

on Cochlear-delay Characteristics ...........................................................................................................................82

Kuniaki Imabeppu, Daiki Hamada, and Masashi Unoki

A Data Hiding Method for Stereo Audio Signals Using the Polarity of

the Inter-Channel Decorrelator ................................................................................................................................86

Kazuhiro Kondo

On the Channel Characteristic of Dither Modulation Data Hiding for MP3

Compression ...............................................................................................................................................................90

Raul Martinez-Noriega, Mariko Nakano, and Kazuhiko Yamaguchi

A Robust Content in DCT Domain for Image Authentication ...........................................................................94

Yuan-Gen Wang and Yan-Qiang Lei

Optimization of AVS-M Video Decoder for Real-time Implementation

on Embedded RISC Processors ...............................................................................................................................98

Guo-An Jian, Jui-Chin Chu, and Jiun-In Guo

IIHMSP-2009-IS04 Visual Based Context Awareness Computing

Image Watermarking Based on Multiple Objective Genetic Algorithm .........................................................102

Jiann-Shu Lee, Fong-Ping Chuang, and Kuen-Horng Tsai

Page 4: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Feature Extraction for Face Recognition Based on Gabor Filters

and Two-Dimensional Locality Preserving Projections ....................................................................................106

Yi-Chun Lee and Chin-Hsing Chen

An Autonomous License Plate Detection Method .............................................................................................110

Hsiao-Chen Kuo, Jiann-Shu Lee, and Sho-Tsung Kao

Eye Tracking in Visible Environment ..................................................................................................................114

Yung-Lung Kuo, Jiann-Shu Lee, and Sho-Tsung Kao

Aspect Ratio Waves for Gait Analysis .................................................................................................................118

Kuo-Wei Lin and Pau-Choo Chung

Adaptive Reed–Solomon Code Protection of Data Partitioned H.264 Video ................................................122

Heng Li and YanChun Zhong

Adaptive Rate Control Scheme in Frame-layer for Real-time H.264 ..............................................................128

Myoung-Jin Kim and Min-Cheol Hong

IIHMSP-2009-IS05 Steganography and Watermarking

A Semi-fragile Reversible Data Hiding by Coefficient-Bias Algorithm ........................................................132

Ching-Yu Yang, Wu-Chih Hu, Po-Yen Chang, and Chang-Min Hwang

3D Triangular Mesh Watermarking for Copyright Protection Using

Moment-Preserving .................................................................................................................................................136

Chen-Tsung Kuo, Da-Chun Wu, and Shyi-Chyi Cheng

Quality Evaluation of Digital Image Watermarking ..........................................................................................140

Qingtang Su, Xianxi Liu, and Steve Zhang

Color Image Watermarking Scheme Based on Support Vector Regression ...................................................144

Xiuli Lv, Hongyu Bian, Bo Yu, and Xinghui Quan

Digital Watermarking Method for Printed Materials Embedding in Hue

Component ................................................................................................................................................................148

Yuta Goto and Osamu Uchida

Robust Perceptual Image Hashing Based Temporal Synchronization

for Watermarked H.264 Frames ............................................................................................................................153

Xun Gong and Hai-Ming Lu

Time-Scale Invariant Zero-Watermarking Scheme for Audio .........................................................................157

Ming-Quan Fan and Hong-Xia Wang

Employing Optimal Matrix for Efficient Matrix Embedding ...........................................................................161

Yunkai Gao, Xiaolong Li, and Bin Yang

IIHMSP-2009-IS06 Advanced Multimedia Processing and Retrievals

An Attention Focusing Tree Based on Saliency and a Display Method

for Small Displays ...................................................................................................................................................166

Kenji Nakamura, Takashi Toriu, Shigeyoshi Nakajima, and Hiromitsu Hama

Collision Detection of 4-legged Robots Using Acceleration Sensors .............................................................170

Shigeyoshi Nakajima, Kana Sugimoto, and Takashi Toriu

Page 5: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Three-Dimensional Circular Camera System for the Three-Dimensional

Display Based on the Reconstruction of Parallax Rays .....................................................................................174

Shuhei Miyatake, Hideya Takahashi, and Kenji Yamada

Detection of Tire-Road Contact Point for Vehicle Position Estimate

Considering Shape Distortion in a Circular Fisheye Image ..............................................................................178

Kenichi Hirose, Takashi Toriu, and Hiromitsu Hama

Optimal Crawling Strategies for Multimedia Search Engines ..........................................................................182

Hiromitsu Hama, Thi Thi Zin, and Pyke Tin

Dominant Color Embedded Markov Chain Model for Object Image Retrieval ............................................186

Thi Thi Zin, Pyke Tin, Takashi Toriu, and Hiromitsu Hama

Mobile Sensor for Target Tracking via Modified Particle Filter ......................................................................190

Luke K. Wang, Shan-Chin Hsieh, Kou-Yuan Huang, and Wen-Cheng Chen

A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance

Videos ........................................................................................................................................................................194

Ching-Yu Wu and Po-Chyi Su

IIHMSP-2009-IS07 Wired and Wireless Multimedia Networking and Applications

A New Approach to the Dynamic Timeline of Animation Engine ..................................................................198

Ningping Sun, Kentarou Okumura, and Wenling Sun

An Alternative Algorithm of Triangulation of Polygons with Holes ..............................................................202

Ningping Sun, Satoshi Tanaka, and Wenling Sun

DoS/DDoS Detection Scheme Using Statistical Method Based on

the Destination Port Number ..................................................................................................................................206

Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, and Toshinori Sueyoshi

Multi Path Based on Cache Notification Algorithm in Wireless Sensor

Networks ...................................................................................................................................................................210

Kuang Zhufang and Yang Guogui

Random Number Generated from White Noise of Webcam ............................................................................214

Jer-Min Tsai, I-Te Chen, and Jengnan Tzeng

Quantization Parameter Decision of Initial and Scene Change Frame

in Real-Time H.264/AVC ......................................................................................................................................218

Szu-Hong Wang and Shih-Chang Hsia

An Observer-Based Method for Secure Communication ..................................................................................222

Long-Chang Chen, Tsair-Fwu Lee, Pei-Ju Chao, and Wen-Cheng Chen

Performance Study of Asymmetric Traffic Load for OBS Ring Networks ....................................................226

Shih-Wei Kau, Wei-Ting Lu, Wen-Ping Chen, Tsair-Fwu Lee, and Cheng-Nan Tsai

IIHMSP-2009-IS08 Intelligent Surveillance and Pattern Recognition

Applications of Ontology in Management of Information Asset .....................................................................230

Shing-Han Li and Kuo-Chung Wang

Page 6: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

High Dynamic Range Color Image Rendering with Human Visual Adaptation

Simulation .................................................................................................................................................................234

Ping-Lin Fan, Shih-Ying Chen, Wei-Hsien Wu, Joey Lin, Su-Ju Lu, Hsueh-Wu Wang,

and Yuan-Fan Tsai

The Design of Remote Surveillance System for Digital Family ......................................................................238

Chung-Hsin Liu and Chih-Chieh Fan

To Build Tele-care System Network Environment ............................................................................................242

Chung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, and Chuen-Lung Chen

Traffic Warning and Vehicular Homogeneity Measurement Based

on Multidimensional HMM Algorithm ................................................................................................................246

Chang-Lung Tsai and Wei-Lieh Hsu

Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier

Filters .........................................................................................................................................................................250

Chih-Jen Lee, I-Horng Jeng, Tai-Ning Yang, Chun-Jung Chen, and Peng Su

Build a Home Security Surveillance System Using LEGO MINDSTORMS

NXT ...........................................................................................................................................................................254

Kuo-Kai Hsu and Dwen-Ren Tsai

Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based

on Hamilton-connected Subgraph Recognition ..................................................................................................258

I-Horng Jeng, Dwen-Ren Tsai, Hou-An Chen, Yi-Chun Yen, and Chien-Kang Cheng

IIHMSP-2009-IS10 Multimedia in Ubiquitous Computing and Application Services(1)

Comments on Gateway-Oriented Password-Based Authenticated Key

Exchange Protocol ...................................................................................................................................................262

Tzong-Chen Wu and Hung-Yu Chien

Meaningful Inner Link Objects for Automatic Text Categorization ...............................................................266

Jau-Ji Shen and Jia-Chiuan Wu

Identity-Based DRM in Ubiquitous Multimedia System ..................................................................................270

Chou-Chen Yang, Ju-Chun Hsiao, and Hung-Wen Yang

A Novel Mutual Authentication Based on Data Embedding Technique ........................................................274

Chia-Chen Lin and Po-Hsuan Chiang

Embedding Secret Messages Using Modified Huffman Coding ......................................................................278

Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, and Huang-Ching Lin

Joint Secret Image Sharing and Progressive Transmission Based on Integer

Discrete Cosine Transform .....................................................................................................................................282

Zhenfei Zhao, Hao Luo, and Zhe-Ming Lu

A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm

for H.264/AVC Based on the Characteristics of Macro-block .........................................................................286

Pengyu Liu and Kebin Jia

Page 7: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

IIHMSP-2009-IS10 Multimedia in Ubiquitous Computing and Application Services(2)

A Fast Image Retrieval Method Using Multi-Feature Dimension Technique ...............................................290

Kuo Lung Hung and Yih Cheng Tsay

Secret Sharing Method for Gray-level Images ....................................................................................................295

Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, and Chao-Lung Chou

A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator

and Edge Detector ...................................................................................................................................................299

Chin-Chen Chang, Chia-Chen Lin, Pei-Yan Pai, and Yen-Chang Chen

Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia

Systems ......................................................................................................................................................................303

Ming-Yen Lin, Sue-Chen Hsueh, Ming-Hong Chen, and Hong-Yang Hsu

Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise

Detectors ...................................................................................................................................................................307

Li-Chun Liao, Shin-Jung Gu, and Bin-Chyi Tseng

H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter ...........................................312

Nan Zhang and Siwei Ma

Shape-Based Depth Map Coding ..........................................................................................................................316

Nan Zhang, Siwei Ma, and Wen Gao

IIHMSP-2009-IS11 Intelligent Watermarking Techniques, Image Authenticationand Visual Cryptography

Reversible Steganography for VQ Indices Using the Modified State Codebook ..........................................320

Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, and Ming-Chu Li

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two

Meaningful Shadows ...............................................................................................................................................324

The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, and Ming-Chu Li

Matrix Selection in High Payload Embedding ....................................................................................................328

Zhenxing Qian, Xinpeng Zhang, and Shuozhong Wang

Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks ....................................................332

Zhi-Fang Yang, Po-Chen Lee, Wei-Hung Chen, and Jia-Guu Leu

Security of Indirect-Authenticated Key Exchange Protocol .............................................................................336

Hsu-Hung Chiang, Ching-Chung Liu, Ying-Ming Chen, and Ya-Fen Chang

A Video Watermarking in H.264/AVC Encoder ................................................................................................340

Shinfeng D. Lin, Chih-Yao Chuang, and Hsiang-Cheng Meng

Electrical Impedance Tomography for Washing out Undergound Pollution .................................................344

Kazuyo Yoneda, Shinichi Tamura, Yoshinori Nishino, Kazuki Nakamura,

Takio Shimosakon, Kyohei Shimada, Rong Long Wan, and Kozo Okazaki

Improved EMD Steganography with Great Embedding Rate and High

Embedding Efficiency .............................................................................................................................................348

Qu Zhiguo, Fu Yu, Niu Xinxin, Yang Yixian, and Zhang Ru

Page 8: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

IIHMSP-2009-IS11 Intelligent Watermarking Techniques, Image Authenticationand Visual Cryptography (2)

Yet Another Friendly Progressive Visual Secret Sharing Scheme ..................................................................353

Tzung-Her Chen and Yao-Sheng Lee

Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation

Resistant Watermarking ..........................................................................................................................................357

Zhi-Fang Yang, Chih-Jung Su, Ping-Chang Tseng, and Chan-Ting Shu

An Embedding Technique Based upon Block Prediction and Code Cascading

Shift ............................................................................................................................................................................361

Chin-Feng Lee, Jau-Ji Shen, and Mei-Chun Chuang

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems ....................................................365

Hung-Min Sun, Chi-Yao Weng, and Shiuh-Jeng Wang

A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix ........................................................369

Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, and Jason Lin

Lossless Information Hiding Scheme Based on Predictive Coding .................................................................374

Tzu-Chuen Lu, Cheng-Chun Huang, and Siang-Ru Liao

A Schema for Multi-Signature Handling Based on Workflow Model ............................................................378

Jin-Bao Liu, Zhi-Long Qiu, Hui Zhou, Bao-Hui Liu, and Xia-Mu Niu

A Robust Watermarking Algorithm Based on Differential Energy and QIM

for Uncompressed Video ........................................................................................................................................382

Zhaoqing Liu, Qiong Li, Shuai Guan, and Xiyuan Peng

IIHMSP-2009-IS12 Circuit Techniques for Multimedia Signal Processing

Image Object Detection and Tracking Implementation for Outdoor Scenes

on an Embedded Soc Platform ..............................................................................................................................386

Wen-Kai Tsai, Ming-hwa Sheu, Ching-lung Su, Jun-jie Lin, and Shau-Yin Tseng

Implementation and ESL Verification of New Earliest-Deadline-First

Scheduler for Video Streaming over Wireless Networks ..................................................................................390

Chao-Lieh Chen and Chien-Hao Lai

An Implementation of Frame Rate Control for Reducing Flicker in CSTN

Panel ..........................................................................................................................................................................394

Ya-Hsin Hsueh and Wei-Da Chen

A Novel Vehicle Brake Light System ..................................................................................................................398

Yang-Chiuan Lin, Hung-Yu Wang, and Wei-Jeng Cheng

A CMOS Variable-gain Fully-differential Transimpedance Amplifier

for Multimedia Data Links .....................................................................................................................................402

Roger Y. Chen and Ming-Jen Chang

System Performance Analyses on PAC Duo ESL Virtual Platform ................................................................406

Zhe-Mao Hsu, I-Yao Chuang, Wen-Chien Su, Jen-Chieh Yeh, Jen-Kuei Yang,

and Shau-Yin Tseng

Page 9: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Secret Sharing Protocol for Linguistic Threshold Schemes ..............................................................................410

Marek R. Ogiela and Urszula Ogiela

Association and Abstraction on Neural Circuit Loop and Coding ...................................................................414

Shinichi Tamura, Yuko Mizuno-Matsumoto, Yen-Wei Chen, and Kazuki Nakamura

IIHMSP-2009-IS13 Network-Aware Multimedia: QoS and Security

An Effective Network-Aware Peer Selection Algorithm in BitTorrent ..........................................................418

Fenglin Qin, Ju Liu, Lina Zheng, and Liansheng Ge

A Mutual Information Based Sub-Pixel Registration Method for Image Super

Resolution .................................................................................................................................................................422

Boyang Zhang, Ju Liu, Jinyu Chu, and Jianping Qiao

Performance Comparison of Several Watermarking Methods Based on ICA

and AQIM .................................................................................................................................................................426

Jie Ling, Ju Liu, and Zhaowan Sun

Watermarking for 3D Triangular Meshes Based on SVD .................................................................................430

Xiushan Nie, Ju Liu, Xianqing Wang, and Jiande Sun

A Blind Video Watermarking Scheme Based on DWT ....................................................................................434

Chun-Xing Wang, Xiushan Nie, Xianqing Wan, Wen Bo Wan, and Feng Chao

Optimizing Constrained Mixed-Integer Nonlinear Programming Problems

Using Nature Selection ...........................................................................................................................................438

Rong-Song He

A Novel Secure RFID System to Ensure Privacy ...............................................................................................442

Cagatay Karabat

Target Tracking in Clusters of Sensor Networks via Handoff Scheme

with Extended Kalman Filter .................................................................................................................................446

Luke K. Wang, Shan-Chin Hsieh, Kou-Yuan Huang, and Chien-Chang Wu

IIHMSP-2009-IS15 Semantic Annotation and Retrieval Techniques for Imageand Video Databases

A Histogram Descriptor Based on Co-occurrence Matrix and its Application

in Cloud Image Indexing and Retrieval ...............................................................................................................450

Qingyong Li and Weitao Lu

3D Object Classification by Fuzzy KNN and Bayesian Decision ...................................................................455

Li-Li Wan and Zhen-Jiang Miao

An Image Index Algorithm Based on Hierarchical Clustering .........................................................................459

Tao Yang and Hongli Xu

An Integrative Codebook for Natural Scene Categorization ............................................................................463

Guanghua Gu, Yao Zhao, and Zhenfeng Zhu

A Novel Texture Analysis Method Based on Graph Spectral Theory ............................................................467

Zhang Tao, Hong Wenxue, and Wang Jinjia

Page 10: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Image Denoising Based on Non-local Means with Wiener Filtering in Wavelet

Domain ......................................................................................................................................................................471

Li Lin and Kong Lingfu

Indexing and Querying in Multimedia Databases ..............................................................................................475

Hung-Yi Lin and Shih-Ying Chen

Orthogonal Functional Expansion Method of Optical Flow for Large

Displacement ............................................................................................................................................................479

Jinwoo Kim, Robert Close, Hisashi Taketani, Rong-Long Wan, Kozo Okazaki,

and Shinichi Tamura

IIHMSP-2009-IS17 Recent Technologies and Applications of Audio Data Hiding

Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band

Speech Codec ...........................................................................................................................................................483

Akira Nishimura

Improvement of a Band Extension Technique for G.711 Telephony Speech

by Using Steganography .........................................................................................................................................487

Naofumi Aoki

A Band Extension of G.711 Speech with Low Computational Cost for Data

Hiding Application ..................................................................................................................................................491

Akinori Ito, Hironori Handa, and Yôiti Suzuki

Data Hiding is a Better Way for Transmitting Side Information for MP3

Bitstream ...................................................................................................................................................................495

Akinori Ito and Shozo Makino

Spatial and Temporal Position Information Delivery to Mobile Terminals

Using Audio Watermarking Techniques ..............................................................................................................499

Toshio Modegi

Chinese Name Speech Classification Using Fisher Score Based on Continuous

Density Hidden Markov Models ...........................................................................................................................503

Yi Gao, John Han, Lei Lin, Congde Lu, and Qin Yang

Personal Photo Organizer Based on Automated Annotation Framework .......................................................507

Kai-En Tsay, Yi-Leh Wu, Maw-Kae Hor, and Cheng-Yuan Tang

Volume Image Segmentaton by Dual Multi-Scale Morphological

Reconstructions ........................................................................................................................................................511

Jiann-Jone Chen and Chun-Rong Su

IIHMSP-2009-IS18 Intelligent Image and Signal Processing

Extension Neural Network Approach to Classification of Brain MRI ............................................................515

Chuin-Mu Wang, Ming-Ju Wu, Jian-Hong Chen, and Cheng-Yi Yu

Applying Visual Image and Satellite Positioning for Fast Vehicle Detection

and Lane Marking Recognition .............................................................................................................................518

Bao Rong Chang and Hsiu Fen Tsai

Page 11: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Image Hidden Technique Using QR-Barcode .....................................................................................................522

Chin-Ho Chung, Wen-Yuan Chen, and Ching-Ming Tu

Design of a System with a Multielement Thermopile for Monitoring

the Temperature of Indoor Objects .......................................................................................................................526

Lung-Tsai Li, Chin-Fu Tsai, and Ming-Shing Young

Implementation of Thermistor Linearization Using LabVIEW .......................................................................530

Chin-Fu Tsai, Lung-Tsai Li, Chin-Hao Li, and Ming-Shing Young

Design High-Performance and Low-Power Adder Cores with Full-Swing

Nodes for Embedded Systems ...............................................................................................................................534

Ching -Hwa Cheng, Chiou-Kou Tung, Shao-Hui Shieh, and Yu-Cherng Hung

High-Speed CMOS Chip Design for Manchester and Miller Encoder ...........................................................538

Yu-Cherng Hung, Min-Ming Kuo, Chiou-Kou Tung, and Shao-Hui Shieh

A New Contrast Enhancement Technique Implemented on FPGA for Real

Time Image Processing ...........................................................................................................................................542

Ching-Hsi Lu, Hong-Yang Hsu, and Lei Wang

IIHMSP-2009-IS19 Digital Forensics and Data Hiding Discovery

A Comparison between Windows Mobile and Symbian S60 Embedded

Forensics ...................................................................................................................................................................546

Antonio Savoldi, Paolo Gubian, and Isao Echizen

On Acceptable Modification Limits of Electroacoustic Speech Signals for Data

Hiding ........................................................................................................................................................................551

Marina Ponomar

Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift Style ...........................................555

Wen-Pinn Fang

An Image Processing Based Visual Compensation System for Vision Defects ............................................559

ChinLun Lai and Shu-Wen Chang

Robust Data Hiding on Texture Images ...............................................................................................................563

Hirofumi Otori and Shigeru Kuriyama

An Adaptive Gradient-Projection Image Restoration Using Local Statistics

and Estimated Noise Characteristics .....................................................................................................................567

Joo-Yeon Hwang and Min-Cheol Hong

Histogram Shifting Lossless Data Hiding Based on Space Filling Curves ....................................................571

Xiao Yi Yu and Aiming Wang

Half-Zone Quantization Based Algorithm for Information Hiding .................................................................575

Ali Ameri Mahabadi and Mohammad Eshghi

Page 12: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

IIHMSP-2009-IS20 Intelligent Document Processing and Management Systems

Adapting e-TOM Model to Improve Multimedia Network Management – A

Case Study with a Taiwan Multimedia Service Provider ..................................................................................579

Dominic Wong

A Fast Text-Based Communication System for Handicapped Aphasiacs ......................................................583

Yu-Fen Fu and Cheng-Seen Ho

Document Filing Approaches Using an Internal Based Folder Organization ................................................595

Jiann-Gwo Doong

Fast Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue Code ..............................................599

Hung-Peng Lee and Kunta Hsiesh

Identity Authentication in RFID Based Logistics-Customs Clearance Service

Platform .....................................................................................................................................................................604

Huifang Deng and Wen Deng

Extracting Invariable Features Using Geometry Projection Based Histogram

Model for 3D Object Description ..........................................................................................................................608

Jun-Bao Li, Long-Jiang Yu, and Shi-Ze Guo

A Multilingual Patent Text-Mining Approach for Computing Relatedness

Evaluation of Patent Documents ...........................................................................................................................612

Chung-Hong Lee, Hsin-Chang Yang, Chih-Hong Wu, and Yi-Ju Li

Exploring AUC Boosting Approach in Multimodal Biometrics Score Level

Fusion ........................................................................................................................................................................616

M. Shahram Moin and Mehdi Parviz

IIHMSP-2009-IS21 Protection and Authentication for Multimedia Information

Palette Partition Based Data Hiding for Color Images ......................................................................................620

Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang

A Simple and Efficient Data Hiding Scheme Suitable for Low Power

Computation Environments ...................................................................................................................................624

Chin-Chen Chang, Yung-Chen Chou, and Ming-Huang Hsieh

A New Approach to Image Authentication Using Chaotic Map and Sudoku

Puzzle ........................................................................................................................................................................628

Wen-Chuan Wu and Guang-Ruei Ren

Data Concealment Scheme for HTML Documents Based on Color Code .....................................................632

Chin-Feng Lee and Hsing-Ling Chen

Multipurpose Watermarking Method Based on Blind Vector Quantization ..................................................636

Chih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang, and Kuan-Ju Chen

Automatic Traffic Monitoring Method Based on Cellular Model ...................................................................640

Wei-Lieh Hsu, Chang-Lung Tsai, and Po-Lun Chang

Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow ..........................................644

Mengbo Hou, Qiuliang Xu, and Tao Ban

Page 13: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Advanced Color Images Enhancement Using Wavelet and K-means Clustering .........................................648

Hassana Grema Kaganami, Zou Beiji, and M. Sami Soliman

IIHMSP-2009-IS22 Behavior Analysis and Abnormal Event Detection

A Novel Viewer Counter for Digital Billboards .................................................................................................653

Duan-Yu Chen and Kuan-Yi Lin

Vehicle Retrieval Using Eigen Color and Multiple Instance Learning ...........................................................657

Shin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, and Yung-Sheng Chen

Towards Efficient Copy Detection for Digital Videos by Using Spatial

and Temporal Features ............................................................................................................................................661

Chung-Chi Tsai, Chin-Song Wu, Ching-Yu Wu, and Po-Chyi Su

Driving Situations Understanding through Content Rhythm Analysis ...........................................................665

Yu-Dun Lin, Wen-Yu Tseng, Cheng-Jie Hsu, and Chia-Hung Yeh

Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling

Verification ...............................................................................................................................................................669

Hao-Chung Shih, Chian C. Ho, Hsuan T. Chang, and Chin-Song Wu

Face Recognition Based on Complementary Matching of Single Image

and Sequential Images ............................................................................................................................................673

Yea-Shuan Huang and Wei-Cheng Liu

Precision Segmentation Rendering for 3-D Coronary Angiography Medical

Image .........................................................................................................................................................................677

Tsair-Fwu Lee, Chang-Yu Lee, Pei-Ju Chao, and Chang-Yu Wang

Image Retrieval in Multimedia Databases: A Survey ........................................................................................681

Yihun Alemu, Jong-bin Koh, Muhammed Ikram, and Dong-Kyoo Kim

IIHMSP-2009-IS23 Statistical Image Processing and Application

Robust Tracking Based on PSO and On-line AdaBoost ....................................................................................690

Huchuan Lu, Wenling Zhang, Fan Yang, and Xiaojing Wang

Visual Search Based on Contour Salient ..............................................................................................................694

Haiyan Fu, Xiangwei Kong, Shijie Jia, and Yanqing Guo

The Parallelization Design of Chaotic Encryption System Based on Mulit-level

Shuffle-Exchange Network ....................................................................................................................................698

Ding Nan, Ma Honglian, and Tan Guozhen

Source Camera Identification Forensics Based on Wavelet Features .............................................................702

Bo Wang, Yiping Guo, Xiangwei Kong, and Fanjie Meng

SIFT-Based Image Retrieval Combining the Distance Measure of Global

Image and Sub-Image .............................................................................................................................................706

Bin Li, Xiangwei Kong, Zhe Wang, and Haiyan Fu

Level Set-Based Semiautomatic Bolus Segmentation in Bolus-Chasing CTA ..............................................710

Ying Hou and Yi Sun

Fairness Analysis of Electronic Commerce Protocol Based on Strand Space ...............................................714

Wenqi Liu, Jianhua Yang, and Zhixin Li

Page 14: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

A Fast and Robust Algorithm of Detection and Segmentation for Moving

Object ........................................................................................................................................................................718

Jie He, Kebin Jia, and Zhuoyi Lv

IIHMSP-2009-IS25 Human Information Processing and Its Applications

Unskilled User Support for Network Operation Based on Service Composition

Using Web Ontology Languages ..........................................................................................................................722

Yoshihiro Nakamura

An Analysis of the Influence of Facial Feature for Apparent Age Estimation ..............................................728

Hironori Takimoto, Hironobu Fukai, Yasue Mitsukura, and Minoru Fukumi

A Method for Evaluating the Degree of Human’s Preference Based on EEG

Analysis .....................................................................................................................................................................732

Tsukasa Nakamura, Shin-ichi Ito, Yasue Mitsukura, and Hiroto Setokawa

A Method for Automatic Detection of Crimes for Public Security by Using

Motion Analysis .......................................................................................................................................................736

Koichiro Goya, Xiaoxue Zhang, Kouki Kitayama, and Itaru Nagayama

A High Speed Mixel Estimation Method by Using the Genetic Algorithm ...................................................742

Seiji Ito and Yoshinari Oguro

An Important Facial Parts Analysis for Evaluating the Impression - Difference

by Gender ..................................................................................................................................................................746

Seiki Yoshimori, Hironori Takimoto, Yasue Mitsukura, and Minoru Fukumi

Further Remarks on Identity-Based RSA Multi-signature ................................................................................750

Ya-Fen Chang, Yen-Cheng Lai, and Mu-Yen Chen

A ±1-Based Steganography by Minimizing the Distortion of First Order

Statistics ....................................................................................................................................................................754

Yifeng Lu, Xiaolong Li, and Bin Yang

IIHMSP-2009-IS26 Multimedia Signal Processing for Plasma Diagnostics

Fast Subsequence Matching in Plasma Waveform Databases ..........................................................................759

Teruhisa Hochin, Yoshihiro Yamauchi, Hiroki Nomiya, Hideya Nakanishi,

and Mamoru Kojima

Image Processing in Ultra Fast X-ray Imaging with Streak Cameras for Laser

Fusion Research .......................................................................................................................................................763

Eunjoo Choi, Jiayong Zhong, Shinsuke Fujioka, Hiroyuki Shiraga, and Hiroshi Azechi

Improvements of Signal-to-noise Ratio Utilizing Penumbral Imaging

with M-sequences Aperture and Its Heuristic Scheme ......................................................................................767

Tatsuki Ueda, Shinsuke Fujioka, Shinya Nozaki, Yen-Wei Chen, and Hiroaki Nishimura

A Heuristic Decoding Method for Coded Images of Random Uniformly

Redundant Array ......................................................................................................................................................771

Shinya Nozaki, Shinsuke Fujioka, Tatsuki Ueda, Yen-Wei Chen, and Yoshinori Namihira

Particle Swarm Optimization for Reconstruction of Penumbral Images ........................................................775

Yen-Wei Chen, Chen-Lun Lin, and Aya Mimori

Page 15: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Creating RSA Trapdoors Using Lagrange Four Square Theorem ...................................................................779

Constantinos Patsakis and Evangellos Fountas

Imperceptibility Evaluation for Color Stego Image ...........................................................................................783

Xiu-ying Ma and Jia-jun Lin

Detection of LSB Replacement and LSB Matching Steganography Using Gray

Level Run Length Matrix .......................................................................................................................................787

Seyed Mojtaba Seyedhosseini Tarzjani and Shahrokh Ghaemmaghami

IIHMSP-2009-IS27 Ubiquitous Multimedia Services and Applicationsfor Residential Users (1)

Forecasting Exchange Rates by Genetic Algorithms Based Back Propagation

Network Model ........................................................................................................................................................791

Jui-Fang Chang, Chi-Ming Kuan, and Yu-Wen Lin

A Study on the Cache Miss Rate in a Genetic Algorithm Implementation ....................................................795

Feng-Cheng Chang and Hsiang-Cheh Huang

Two-phase Fuzzy-ART with Independent Component Analysis for Semantic

Image Classification ................................................................................................................................................799

Chuan-Yu Chang, Ru-Hao Jian, and Hung-Jen Wang

Using ZigBee and Room-Based Location Technology to Constructing

an Indoor Location-Based Service Platform ........................................................................................................803

Yuh-Ming Cheng

Text Steganography Based on Online Chat .........................................................................................................807

Minhao Liu, Yunbiao Guo, and Linna Zhou

Perceptual Content Authentication and Tamper Detection of Facial Image ..................................................811

Qi Han, Qiong Li, and Xiamu Niu

Fast Channel Change IPTV System for Enhanced User Experience ...............................................................815

Young-Ho Song and Taeck-Geun Kwon

Mental Rotation by Neural Network ....................................................................................................................819

Toshihiko Sasama, Hiroshi Mitsumoto, Kazuyo Yoneda, and Shinichi Tamura

IIHMSP-2009-IS27 Ubiquitous Multimedia Services and Applicationsfor Residential Users (2)

An Adaptive Approach Based on Genetic Algorithm to Information Hiding

for Halftone Images .................................................................................................................................................823

Yi-Ting Chen, Shu-Chuan Chu, Mong-Fong Horng, and Jeng-Shyang Pan

Interactive Voice-Controller Applied to Home Automation .............................................................................828

Jinn-Kwei Guo, Chun-Lin Lu, Ju-Yun Chang, Yi-Jing Li, Ya-Chi Huang, Fu-Jiun Lu,

and Ching-Wen Hsu

Complex Wavelet-Based Face Recognition Using Independent Component

Analysis .....................................................................................................................................................................832

Zhi Chai, Kai-Kuang Ma, and Zhengguang Liu

Page 16: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Similarity-Based Watermarking for Sub-Sampling Images with Bacterial

Foraging Techniques ...............................................................................................................................................836

Hsiang-Cheh Huang and Feng-Cheng Chang

Defect Detection of Skewed Images for Multilayer Ceramic Capacitors .......................................................840

Chun-Chieh Tseng, Jia-Hao Wu, and Bin-Yih Liao

Adaptive Multicast Routing Protocol for Wireless Mobile Ad Hoc Networks ..............................................844

Wei Kuang Lai, Mu-Lung Weng, Chien-Hua Lin, and Chin-Shiuh Shieh

An Efficient Architecture for Deblocking Filter in H.264/AVC ......................................................................848

He Jing, Huang Yan, and Xu Xinyu

A 13.75 ns Holographic Reconfiguration of an Optically Differential

Reconfigurable Gate Array ....................................................................................................................................852

Mao Nakajima and Minoru Watanabe

IIHMSP-2009-IS28 Coding and Protocols in Security and Applications

Fast Deployment of Botnet Detection with Traffic Monitoring .......................................................................856

Chung-Huang Yang and Kuang-Li Ting

Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRM .......................................................861

Chung-Ming Ou and C. R. Ou

A Hybrid RFID Protocol against Tracking Attacks ...........................................................................................865

Jen-Chun Chang and Hsin-Lung Wu

User Friendly Digital Rights Management System Based on Smart Cards ....................................................869

Narn-Yih Lee and Tzu-Yi Lee

TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks ...................................................873

Wei-Chen Wu and Yi-Ming Chen

Emotion Feature Vector of Finger Braille ...........................................................................................................877

Yasuhiro Matsuda and Tsuneshi Isomura

Bilinear Coons Patch and its Application in Security Pattern Design .............................................................881

Wenfa Qi, Xiaolong Li, and Bin Yang

Age Estimation Using AAM and Local Facial Features ...................................................................................885

Jun-Da Txia and Chung-Lin Huang

IIHMSP-2009-IS28 Coding and Protocols in Security and Applications (2)

Medical Video Encryption Based on H.264/AVC with Near-Lossless

Compression .............................................................................................................................................................889

Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong Lin

Determinants of Satisfaction and Intention of Use Self-service Technology -

Technology Readiness and Computer Self-efficacy ..........................................................................................893

Chien-Lung Chan and Chia-Li Lin

Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve ...................................................898

Yu-Wei Lai, Chin-Chen Chang, and Shih-Chang Chang

Page 17: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Cryptanalysis and Improvement of a Secure Authentication Scheme

with Anonymity for Wireless Communications .................................................................................................902

Chin-Chen Chang, Chia-Yin Lee, and Wei-Bin Lee

Real-Time Hand Detection and Tracking against Complex Background .......................................................905

Gang-Zeng Mao, Yi-Leh Wu, Maw-Kae Hor, and Cheng-Yuan Tang

A Falsification Prevention Method for Face Authentication Using Light ......................................................909

Yosuke Horiuchi and Osamu Uchida

Image Watermarking in Face Recognition Systems Based on Contourlet

Transform ..................................................................................................................................................................913

Ehsan Ehsani, M. Shahram Moin, and Farbod Razzazi

Performance and Power Efficiency Analysis of the Symmetric Cryptograph

on Two Stream Processor Architectures ..............................................................................................................917

Guang Xu, Hong An, Gu Liu, Ping Yao, Mu Xu, Wenting Han, Xiaoqiang Li,

and Xiurui Hao

IIHMSP-2009-IS29 Advanced Reversible Data Hiding and Steganalysis

Novel Robust Image Watermarking Exploiting the Features of Double

Domains ....................................................................................................................................................................921

Xinshan Zhu, Yun Yang, and Yanming Chen

Study on Digital Watermarking in the Oracle Bone Inscriptions Rubbings ...................................................925

Liu Yongge and Ge Yanqiang

Revisit Steganalysis on QIM-Based Data Hiding ...............................................................................................929

Qinxia Wu, Weiping Li, and Xiao Yi Yu

Chain Coding Based Data Hiding in Binary Images ..........................................................................................933

Xiao Yi Yu and Aiming Wang

Robust Data Hiding by Hilbert Curve Decomposition ......................................................................................937

Brian K. Lien

Identity Based Authenticated Key Agreement for Tree-Based Group ............................................................941

Xiangfei Sun, Qiuliang Xu, and Tao Ban

Steganalysis Based on Weighted Stego-Image for 2LSB Replacement

Steganography ..........................................................................................................................................................945

Mao Ye, Fenlin Liu, Chunfang Yang, and Xiongfei He

Non-expansible Flip-flop Visual Cryptography with Perfect Security ...........................................................949

Shang-Kuan Chen and Sian-Jheng Lin

IIHMSP-2009-IS30 Intelligent Image Fusion and Its Application

Curvelet Based Image Fusion for Ultrasound Contrast Harmonic Imaging ...................................................953

Naizhang Feng, Mingjian Sun, Liyong Ma, and Jiachen Ma

Image Fast Template Matching Algorithm Based on Projection and Sequential

Similarity Detecting ................................................................................................................................................957

Liyong Ma, Yude Sun, Naizhang Feng, and Zheng Liu

Page 18: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

A Fast Medical Image Registration Based on Steerable Pyramid ....................................................................961

Yuhao Gu, Qing Lin, Bo Hu, and Xiao Bo

Hyperspectral Feature Selection Based on Mutual Information and Nonlinear

Correlation Coefficient ...........................................................................................................................................965

Miao Zhang, Qiang Wang, Yi Shen, and Bo Zhang

Generalized Local Priority Based Medical Image Fusion Scheme ..................................................................969

Jiasheng Hao, Yi Shen, Hongbing Xu, and Jianxiao Zou

An Iterative Refinement DSA Image Registration Algorithm Using Structural

Image Quality Measure ...........................................................................................................................................973

Jiang Wang and Jiangqiu Zhang

Multisecret Image Sharing .....................................................................................................................................977

Ran-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang,

and Shyong-Jian Shyu

Study of Thangka Image Retrieval and Multimedia Presentation Management

System .......................................................................................................................................................................981

Weilan Wang

IIHMSP-2009-IS31 Internet Multimedia Technology and Applications

Seamless Handover for Multimedia Applications between Heterogeneous

Wireless Networks ...................................................................................................................................................985

Hung-Wei Lin, Kuo-Chih Chu, Wei-Tsong Lee, and Jim-Min Lin

A Novel Adaptive FEC and Interleaving Architecture for H.264/SVC Wireless

Video Transmission .................................................................................................................................................989

Po-Chang Huang, Kuo-Chih Chu, Hsiang-Fu Lo, Wei-Tsong Lee, and Tin-Yu Wu

Information Objects Encapsulating Multimedia and Intelligence ....................................................................993

Chia-Ming Lee, Shang-Rong Tsai, Yu-Sheng Huang, Yuan-Liang Tai,

Guang-Hung Huang, and Hewi-Jin Jiau

A Portable Feather-Weight Java-Based Graphic Library for Embedded

Systems on Java Processor .....................................................................................................................................998

Pang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang,

and Ting-Wei Hou

Automatic Internet Media Clipper ......................................................................................................................1002

Hewijin Christine Jiau and Ming Lun Lee

IDEA: An Interest-DrivEn Architecture for Establishing Personalized

Semantic Infrastructure .........................................................................................................................................1006

Feng-Pu Yang, Hewijin Christine Jiau, and Kuo-Feng Ssu

A Robust Contourlet Based Image Hash Algorithm ........................................................................................1010

Yanan Wang, Di Wu, Hui Zhang, and Xiamu Niu

Reversible Secret Image Sharing Based on Shamir’s Scheme .......................................................................1014

Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang

Page 19: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

IIHMSP-2009-IS32 Multimedia Signal Processing for Intelligent Applications

People Counting Using Multi-Mode Multi-Target Tracking Scheme ...........................................................1018

Cheng-Chang Lien, Ya-Lin Huang, and Chin-Chuan Han

Human Behavior Description Model Based on Action Recognition .............................................................1022

Fang-Hsuan Cheng and Cheng-Yuan Chang

A New Feature Integration Approach and Its Application to 3D Model

Retrieval ..................................................................................................................................................................1026

Jau-Ling Shih, Chang-Hsing Lee, Chih-Hsun Chou, and Yu-Cheng Chang

Modulation Spectral Analysis of Static and Transitional Information

of Cepstral and Spectral Features for Music Genre Classification ................................................................1030

Chang-Hsing Lee, Hwai-San Lin, Chih-Hsun Chou, and Jau-Ling Shih

Face Image Super-Resolution Using Two-dimensional Locality Preserving

Projection ................................................................................................................................................................1034

Yuan-Kai Wang and Cai-Ren Huang

Random Number Generator Designed by the Divergence of Scaling Functions .........................................1038

Jengnan Tzeng, I-Te Chen, and Jer-Min Tsai

A Provably Secure Two-Party Attribute-Based Key Agreement Protocol ...................................................1042

Hao Wang, Qiuliang Xu, and Tao Ban

A Secure Steganography: Noisy Region Embedding ......................................................................................1046

Yifeng Lu, Xiaolong Li, and Bin Yang

IIHMSP-2009-IS33 Advances in Biometrics (1)

Experiments with Optical Liveness Testing Method .......................................................................................1052

Martin Drahanský and Dana Lodrova

Template Protection via Piecewise Hashing ......................................................................................................1056

Claudia Nickel, Xuebing Zhou, and Christoph Busch

Feature Correlation Attack on Biometric Privacy Protection Schemes .........................................................1061

Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, and Arjan Kuijper

The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric

Infrastructure ..........................................................................................................................................................1066

Bendik B. Mjaaland, Danilo Gligoroski, and Svein J. Knapskog

A Login System Using Mouse Dynamics ..........................................................................................................1072

Patrick Bours and Christopher Johnsrud Fullu

A Video Retrieval Algorithm Based on Spatio-temporal Feature Curves

and Key Frames .....................................................................................................................................................1078

Xiuxin Chen, Kebin Jia, and Zhipin Deng

A Cancelable Biometric Hashing for Secure Biometric Verification System ..............................................1082

Cagatay Karabat and Hakan Erdogan

Blind Clustering of Music Recordings Based on Audio Fingerprinting .......................................................1086

Wei-Ho Tsai and Wei-Che Hsieh

Page 20: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

IIHMSP-2009-IS33 Advances in Biometrics (2)

Why Vein Recognition Needs Privacy Protection ............................................................................................1090

Daniel Hartung and Christoph Busch

An Approach to Biometric Identity Management Using Low Cost Equipment ..........................................1096

Robert Mueller and Raul Sanchez-Reillo

Template Protection for Multimodal Biometric System ..................................................................................1101

Zhifang Wang, Qi Han, Xiamu Niu, and Christoph Busch

Non-Forensic Odontological Biometrics ...........................................................................................................1105

Stephen D. Wolthusen and Christoph Busch

Mean Best Basis Algorithm for Wavelet Speech Parameterization ...............................................................1110

Jakub Gałka and Mariusz Ziółko

A Steganalysis Algorithm Based on Denoising of Source Image Using ICA

and SVM .................................................................................................................................................................1114

Javad RavanJamJah, Soodeh Bakhshandeh, and Seyed Bahram ZahirAzami

An Investigation of Genetic Algorithm on Steganalysis Techniques ............................................................1118

Xiao Yi Yu and Aiming Wang

The Effects of Ambient Sounds on the Quality of 3D Virtual Sound Space ................................................1122

Satoshi Yairi, Yukio Iwaya, Maori Kobayashi, Makoto Otani, Yôiti Suzuki,

and Takeru Chiba

IIHMSP-2009-IS34 Digital Archives and Digital Heritages

Construction of Ancient-Modern Word Dictionary from Parallel Corpus

of Ancient Writings and Their Translations in Modern Language ................................................................1126

Fuminori Kimura and Akira Maeda

A Framework for Design and Evaluation of Digital Museums in Second Life

as Learning Institutions .........................................................................................................................................1130

Kingkarn Sookhanaphibarn and Ruck Thawonmas

Comparison of User Trajectories Based on Coordinate Data and State

Transitions ..............................................................................................................................................................1134

Junichi Oda, Ruck Thawonmas, and Kuan-Ta Chen

Automatic Modeling of Virtual 3D Streets Based on GIS Data - Application

to Generation of Kyoto in the Edo Era ...............................................................................................................1138

Masakazu Sawai, Yuzuru Isoda, Akihiro Tsukamoto, Yoshihiro Kosaka,

Kyoko Hasegawa, Susumu Nakata, and Satoshi Tanaka

A Retrieval System for Ballet Steps Using Three-dimensional Motion Data ..............................................1144

Tsuyoshi Matsuoka, Asako Soga, and Kazuhiro Fujita

A Method of Managing Distributed Contents in Heterogeneous Servers .....................................................1148

Masahito Shiba

A Pair-wise Key Establishment for Wireless Sensor Networks .....................................................................1152

Hung-Min Sun, Yue-Hsun Lin, Cheng-Ta Yang, and Mu-En Wu

Page 21: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

A Fast Audio Retrieval Method Based on Negativity Judgment ...................................................................1156

Zheng Guibin, Li Miao, Han Jiqing, and Zheng Tieran

IIHMSP-2009-IS34 Digital Archives and Digital Heritages (2)

Digital Reconstruction of a Historical Kabuki Theater ...................................................................................1160

Kohei Furukawa, Ryo Akama, Chisako Hirose, and Kozaburo Hachimura

Analysis of Gait Motion by Using Motion Capture in the Japanese Traditional

Performing Arts .....................................................................................................................................................1164

Woong Choi, Hiroyuki Sekiguchi, and Kozaburo Hachimura

Extracting Tactile Sensation Information from Multi-illuminated Images

of Tangible Cultural Property ..............................................................................................................................1168

Xin Yin, Kazuyoshi Nomura, and Hiromi T. Tanaka

An Analysis of Body Movement on Music Expressivity Using Motion

Capture ....................................................................................................................................................................1172

Mamiko Sakata and Sayaka Wakamiya

Body Motion Analysis for Similarity Retrieval of Motion Data and Its

Evaluation ...............................................................................................................................................................1177

Woong Choi, Takatoshi Ono, and Kozaburo Hachimura

An Automated On-line Traffic Flow Classification Scheme ..........................................................................1181

Jian Zhang, Zongjue Qian, Guochu Shou, and Yihong Hu

Achieving Secure Fuzzy Commitment Scheme for Optical PUFs .................................................................1185

Tanya Ignatenko and Frans Willems

Information Hiding into Interaural Phase Differences for Stereo Audio Signals ........................................1189

Ryouichi Nishimura

IIHMSP-2009-IS35 Application of Intelligent Computing to Signal and ImageProcessing

Principal Component Analysis for Prediction of O-Linked Glycosylation Sites

in Protein by Multi-Layered Neural Networks .................................................................................................1193

Chu-Zheng Wang, Xian-Hua Han, Masahiro Ito, Ikuko Nishikawa, and Yen-Wei Chen

An Efficient Identity-Based Certified E-mail Protocol ....................................................................................1197

Caifen Wang, Xiaodong Yang, Caihui Lan, and Xiaojun Cao

Denoising by Anisotropic Diffusion in ICA Subspace ....................................................................................1201

Xiangyan Zeng, Yen-Wei Chen, and Caixia Tao

Feature Selection Using Recursive Feature Elimination for Handwritten Digit

Recognition .............................................................................................................................................................1205

Xiangyan Zeng, Yen-Wei Chen, Caixia Tao, and Deborah van Alphen

Prediction of the O-glycosylation by Support Vector Machines

and Characteristics of the Crowded and Isolated O-glycosylation Sites .......................................................1209

Yukiko Nakajima, Kazutoshi Sakakibara, Masahiro Ito, and Ikuko Nishikawa

A Research on Social Anxiety Individuals’ Emotion Recognition Using IEC ............................................1213

Xinyin Huang, Yan Zhang, Aibing Xu, Hisashi Kawabayashi, and Yen-Wei Chen

Page 22: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Region-Based Segmentation versus Edge Detection .......................................................................................1217

Hassana Grema Kaganami and Zou Beiji

Representing Meanings of Images Based on Associative Values with Lexicons ........................................1222

Ying Dai

IIHMSP-2009-IS36 Advances in Multimedia Signal Processingand Communications

P2P Multimedia Streaming Schedule for Maximum Network Capacity ......................................................1228

Chin-Feng Lai, Yi-Wei Ma, Chia-Cheng Hu, and Yueh-Min Huang

Optimal Rate Allocation and Admission Control Policy for P2P On-Demand

Streaming Systems ................................................................................................................................................1232

Jen-Wen Ding, Guan-Wei Wu, and Der-Jiunn Deng

Path Dependent Adaptive Forward Error Correction with Multipath

Interleaving Control Scheme for Video Streaming over Wireless Networks ...............................................1236

Ming-Fong Tsai, Chih-Heng Ke, Chun-I Kuo, and Ce-Kuen Shieh

Mining Temporal Region-Based Service Patterns for Cooperative Caching

in Wireless Multimedia Sensor Networks .........................................................................................................1240

Vincent S. Tseng, Kawuu W. Lin, and Ming-Hua Hsieh

A GeoTagging Scheme Using Image Steganography and GPS Information

Authentication ........................................................................................................................................................1245

Mei-Yi Wu, Chuan-Chi Hsu, and Jia-Hong Lee

Pre-Register Algorithm for SVC by Fast BSS Transition Wireless Networks ............................................1249

Huei-Yu Yang, Ya-Chun Li, Feng-Yi Chou, Tin-Yu Wu, and Wei-Tsong Lee

New Watermarking Algorithm with Coding Efficiency Improvement

and Authentication in Video Surveillance .........................................................................................................1253

Chuen-Ching Wang, Ming-Jun Chi, and Yao-Tang Chang

An Enlargement Method Using Undecimated Wavelet Transform and Shape

Function ...................................................................................................................................................................1258

Wen-Chien Yen, Yen-Yu Chen, and Ying-Wen Chang

IIHMSP-2009-IS37 Multimedia Signal Processing and Application

New Approach for Cancer Computer Aided Diagnosis and Treatment ........................................................1262

Menrit Samir Fahmy

2D-PCA Based Statistical Shape Model from few Medical Samples ...........................................................1266

Tomoko Tateyama, Hossein Foruzan, and Yen-Wei Chen

Compound Image Compression with Multi-step Text Extraction Method ...................................................1270

Qi Xi, XIng Wu, and Shensheng Zhang

Face Image Metamorphosis with an Improved Multilevel B-Spline

Approximation .......................................................................................................................................................1274

Masataka Seo and Yen-Wei Chen

Page 23: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Remote Control System of Artificial Fish School and Its Fast Implementation ..........................................1278

Hisashi Kawabayashi, Mohammad Khazab, Jeff Tweedale, Lakhmi C. Jain,

and Yen-Wei Chen

Image Categorization by Learned PCA Subspace of Combined Visual-words

and Low-level Features .........................................................................................................................................1282

Xian-Hua Han and Yen-Wei Chen

A Study of Rounding Error on CDMA-Based Fingerprinting Scheme .........................................................1286

Minoru Kuribayashi, Hiroshi Kato, and Masakatu Morii

Dual-Microphone Speech Extraction from Signals with Audio Background ..............................................1290

Mariusz Ziółko, Bartosz Ziółko, and Rafał Samborski

IIHMSP-2009-IS38 Multi-Dimensional Signal Processing, Modelingand Visualization

Multi-mode Narrow-band Thresholding with Application in Liver

Segmentation from Low-contrast CT Images ...................................................................................................1293

Amir H. Foruzan, Yen-Wei Chen, Reza A. Zoroofi, Akira Furukawa, Yoshinobu Sato,

and Masatoshi Hori

Evaluation of Liver Shape Approximation and Characterization ..................................................................1297

Farshid Babapour Mofrad, Reza Aghaeizadeh Zoroofi, Yen-Wei Chen,

Ali Abbaspour Tehrani-Fard, Yoshinobu Sato, and Akira Furukawa

Volume Visualization with Grid-Independent Adaptive Monte Carlo Sampling ........................................1301

Hideo Nakajima, Kyoko Hasegawa, Susumu Nakata, and Satoshi Tanaka

Detection and 3D Measurement of a Rectangular Solid in a Single Image ..................................................1305

Tomohiro Nakamichi and Gang Xu

Drowsiness Detection Based on Brightness and Numeral Features of Eye

Image .......................................................................................................................................................................1310

Pooneh. R. Tabrizi and Reza. A. Zoroofi

A Novel Clustering-Based Feature Extraction Method for an Automatic Facial

Expression Analysis System ................................................................................................................................1314

A. Ghahari, Y. Rakhshani Fatmehsari, and R.A. Zoroofi

Automated Dental Recognition in MSCT Images for Human Identification ...............................................1318

Mohammad Hosntalab, Reza Aghaeizadeh Zoroofi, Ali Abbaspour Tehrani-Fard,

and Gholamreza Shirani

Double-Density Dual-Tree Wavelet Transform Based Texture Classification ............................................1322

Yu-Long Qiao and Chun-Yan Song

IIHMSP-2009-IS39 Image Processing and VLSI Implementation

Parallel Implementation of Good Feature Extraction for Tracking on the Cell

Processor with OpenCV Interface .......................................................................................................................1326

Hiroki Sugano and Ryusuke Miyamoto

Page 24: 2009 Fifth International Conference on Intelligent Information Hiding …toc.proceedings.com/06742webtoc.pdf · A Data Hiding Method for Stereo Audio Signals Using the Polarity of

Hardware Architecture for HOG Feature Extraction .......................................................................................1330

Ryoji Kadota, Hiroki Sugano, Masayuki Hiromoto, Hiroyuki Ochi, Ryusuke Miyamoto,

and Yukihiro Nakamura

An FPGA-Based Real-Time Hardware Accelerator for Orientation Calculation

Part in SIFT ............................................................................................................................................................1334

Jingbang Qiu, Ying Lu, Tianci Huang, and Takeshi Ikenaga

Temporal Information Cooperated Gaussian Mixture Models for Real-time

Surveillance with Ghost Detection ......................................................................................................................1338

Tianci Huang, Chengjiao Guo, Jingbang Qiu, and Takeshi Ikenaga

A Gabor Pseudo Fisherface Based Face Recognition Algorithm for LSI

Implementation ......................................................................................................................................................1342

Yohei Fukumizu, Tomoaki Takano, Yasuyuki Oshima, Toshihiko Terada,

and Hironori Yamauchi

An Approach to Video Coding Using Parameter Estimation in the Decoding

Process .....................................................................................................................................................................1346

Gen Fujita and Tomokazu Matsuno

Wavelet-Based Sequence Codec Implementation on TMS320DM642 ........................................................1350

Ali Ghorbanian and Amir Moosavinia

VLSI Design and Analysis of Multipliers for Low Power ..............................................................................1354

Pachara V. Rao, Cyril Prasanna Raj, and S. Ravi

Author Index