2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009) Kyoto, Japan 12-14 September 2009 Pages 1-664 CFP09IIH-PRT 978-1-4244-4717-6 IEEE Catalog Number: ISBN:
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009)
Kyoto, Japan 12-14 September 2009
Pages 1-664
CFP09IIH-PRT 978-1-4244-4717-6
IEEE Catalog Number: ISBN:
2009 Fifth InternationalConference on Intelligent
Information Hidingand Multimedia Signal
ProcessingIIH-MSP 2009
Table of ContentsConference Information
IIHMSP-2009-IS01 Intelligent Video Processing
Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVM ...............................................1
Deng-Yuan Huang, Wu-Chih Hu, and Sung-Hsiang Chang
A Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics .............................................5
Chao-Yu Chen, Chao-Ho (Thou-Ho) Chen, Yi-Li Kuo, and Chin-Hsing Chen
A Fast Template Matching Method for Rotation Invariance Using Two-Stage
Process ...........................................................................................................................................................................9
Wen-Chia Lee and Chin-Hsing Chen
A Watermarking Scheme Using Code Division Multiple Access and DWT ...................................................13
Ji-Hong Chen and Chin-Hsing Chen
A Compression-Resistant Invisible Watermarking Scheme for H.264 .............................................................17
Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho (Chao-Ho) Chen, and Yi-Long Lin
Information Embedding in MPEG-4 Scalable Lossless Audio ..........................................................................21
Te Li, Susanto Rahardja, Haiyan Shu, and Haibin Huang
An Algorithm for Packing Bitstream of Scalable Video Coding .......................................................................25
Jung-yang Kao and Jih-Sheng Tu
Fisherface vs. Eigenface in the Dual-tree Complex Wavelet Domain ..............................................................30
Bin Li and Kai-Kuang Ma
IIHMSP-2009-IS02 Techniques and Algorithms for Multimedia Security
Security Evaluation of Biometrics Authentications for Cellular Phones ..........................................................34
Hirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, and Ryoichi Sasaki
Watermarking Cryptographic Data .........................................................................................................................40
Maki Yoshida and Toru Fujiwara
Evaluation of Audio Watermark System Using Short Detection Time Frame ................................................44
Takaaki Yamada, Yoshiyasu Takahashi, Ryu Ebisawa, Yoshinori Sato, and Seiichi Susaki
Preventing False Positives in Content-Based Phishing Detection .....................................................................48
Shinta Nakayama, Isao Echizen, and Hiroshi Yoshiura
XPROB - A Generalized Pool-Based Anonymous Communication Framework ............................................52
Minh-Triet Tran, Anh-Duc Duong, and Isao Echizen
On Privacy-aware Delegation of Personal Data using Digital Watermarking ................................................56
Sven Wohlgemuth, Noboru Sonehara, Isao Echizen, and Günter Müller
Web behind Web - A Steganographic Web Framework .....................................................................................60
Hirohisa Hioki
Algorithm for Detecting Steganographic Information Based on Characteristic
of Embedded Message ..............................................................................................................................................64
Rongling Lang and Hui Lu
IIHMSP-2009-IS03 Advanced Data Hiding and Coding Techniques for AudioSignals
Multi-Layer Audio Watermarking Based on Amplitude Modification .............................................................68
Akio Ogihara, Harumi Murata, Motoi Iwata, and Akira Shiozaki
Audio Watermarking Using QIM on Wavelet Packet Coefficients ...................................................................72
Kotaro Sonoda and Osamu Takizawa
Robust Audio Watermarking with Time and Frequency Division .....................................................................76
Kotaro Yamamoto and Munetoshi Iwakiri
Embedding Limitations with Audio-watermarking Method Based
on Cochlear-delay Characteristics ...........................................................................................................................82
Kuniaki Imabeppu, Daiki Hamada, and Masashi Unoki
A Data Hiding Method for Stereo Audio Signals Using the Polarity of
the Inter-Channel Decorrelator ................................................................................................................................86
Kazuhiro Kondo
On the Channel Characteristic of Dither Modulation Data Hiding for MP3
Compression ...............................................................................................................................................................90
Raul Martinez-Noriega, Mariko Nakano, and Kazuhiko Yamaguchi
A Robust Content in DCT Domain for Image Authentication ...........................................................................94
Yuan-Gen Wang and Yan-Qiang Lei
Optimization of AVS-M Video Decoder for Real-time Implementation
on Embedded RISC Processors ...............................................................................................................................98
Guo-An Jian, Jui-Chin Chu, and Jiun-In Guo
IIHMSP-2009-IS04 Visual Based Context Awareness Computing
Image Watermarking Based on Multiple Objective Genetic Algorithm .........................................................102
Jiann-Shu Lee, Fong-Ping Chuang, and Kuen-Horng Tsai
Feature Extraction for Face Recognition Based on Gabor Filters
and Two-Dimensional Locality Preserving Projections ....................................................................................106
Yi-Chun Lee and Chin-Hsing Chen
An Autonomous License Plate Detection Method .............................................................................................110
Hsiao-Chen Kuo, Jiann-Shu Lee, and Sho-Tsung Kao
Eye Tracking in Visible Environment ..................................................................................................................114
Yung-Lung Kuo, Jiann-Shu Lee, and Sho-Tsung Kao
Aspect Ratio Waves for Gait Analysis .................................................................................................................118
Kuo-Wei Lin and Pau-Choo Chung
Adaptive Reed–Solomon Code Protection of Data Partitioned H.264 Video ................................................122
Heng Li and YanChun Zhong
Adaptive Rate Control Scheme in Frame-layer for Real-time H.264 ..............................................................128
Myoung-Jin Kim and Min-Cheol Hong
IIHMSP-2009-IS05 Steganography and Watermarking
A Semi-fragile Reversible Data Hiding by Coefficient-Bias Algorithm ........................................................132
Ching-Yu Yang, Wu-Chih Hu, Po-Yen Chang, and Chang-Min Hwang
3D Triangular Mesh Watermarking for Copyright Protection Using
Moment-Preserving .................................................................................................................................................136
Chen-Tsung Kuo, Da-Chun Wu, and Shyi-Chyi Cheng
Quality Evaluation of Digital Image Watermarking ..........................................................................................140
Qingtang Su, Xianxi Liu, and Steve Zhang
Color Image Watermarking Scheme Based on Support Vector Regression ...................................................144
Xiuli Lv, Hongyu Bian, Bo Yu, and Xinghui Quan
Digital Watermarking Method for Printed Materials Embedding in Hue
Component ................................................................................................................................................................148
Yuta Goto and Osamu Uchida
Robust Perceptual Image Hashing Based Temporal Synchronization
for Watermarked H.264 Frames ............................................................................................................................153
Xun Gong and Hai-Ming Lu
Time-Scale Invariant Zero-Watermarking Scheme for Audio .........................................................................157
Ming-Quan Fan and Hong-Xia Wang
Employing Optimal Matrix for Efficient Matrix Embedding ...........................................................................161
Yunkai Gao, Xiaolong Li, and Bin Yang
IIHMSP-2009-IS06 Advanced Multimedia Processing and Retrievals
An Attention Focusing Tree Based on Saliency and a Display Method
for Small Displays ...................................................................................................................................................166
Kenji Nakamura, Takashi Toriu, Shigeyoshi Nakajima, and Hiromitsu Hama
Collision Detection of 4-legged Robots Using Acceleration Sensors .............................................................170
Shigeyoshi Nakajima, Kana Sugimoto, and Takashi Toriu
Three-Dimensional Circular Camera System for the Three-Dimensional
Display Based on the Reconstruction of Parallax Rays .....................................................................................174
Shuhei Miyatake, Hideya Takahashi, and Kenji Yamada
Detection of Tire-Road Contact Point for Vehicle Position Estimate
Considering Shape Distortion in a Circular Fisheye Image ..............................................................................178
Kenichi Hirose, Takashi Toriu, and Hiromitsu Hama
Optimal Crawling Strategies for Multimedia Search Engines ..........................................................................182
Hiromitsu Hama, Thi Thi Zin, and Pyke Tin
Dominant Color Embedded Markov Chain Model for Object Image Retrieval ............................................186
Thi Thi Zin, Pyke Tin, Takashi Toriu, and Hiromitsu Hama
Mobile Sensor for Target Tracking via Modified Particle Filter ......................................................................190
Luke K. Wang, Shan-Chin Hsieh, Kou-Yuan Huang, and Wen-Cheng Chen
A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance
Videos ........................................................................................................................................................................194
Ching-Yu Wu and Po-Chyi Su
IIHMSP-2009-IS07 Wired and Wireless Multimedia Networking and Applications
A New Approach to the Dynamic Timeline of Animation Engine ..................................................................198
Ningping Sun, Kentarou Okumura, and Wenling Sun
An Alternative Algorithm of Triangulation of Polygons with Holes ..............................................................202
Ningping Sun, Satoshi Tanaka, and Wenling Sun
DoS/DDoS Detection Scheme Using Statistical Method Based on
the Destination Port Number ..................................................................................................................................206
Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, and Toshinori Sueyoshi
Multi Path Based on Cache Notification Algorithm in Wireless Sensor
Networks ...................................................................................................................................................................210
Kuang Zhufang and Yang Guogui
Random Number Generated from White Noise of Webcam ............................................................................214
Jer-Min Tsai, I-Te Chen, and Jengnan Tzeng
Quantization Parameter Decision of Initial and Scene Change Frame
in Real-Time H.264/AVC ......................................................................................................................................218
Szu-Hong Wang and Shih-Chang Hsia
An Observer-Based Method for Secure Communication ..................................................................................222
Long-Chang Chen, Tsair-Fwu Lee, Pei-Ju Chao, and Wen-Cheng Chen
Performance Study of Asymmetric Traffic Load for OBS Ring Networks ....................................................226
Shih-Wei Kau, Wei-Ting Lu, Wen-Ping Chen, Tsair-Fwu Lee, and Cheng-Nan Tsai
IIHMSP-2009-IS08 Intelligent Surveillance and Pattern Recognition
Applications of Ontology in Management of Information Asset .....................................................................230
Shing-Han Li and Kuo-Chung Wang
High Dynamic Range Color Image Rendering with Human Visual Adaptation
Simulation .................................................................................................................................................................234
Ping-Lin Fan, Shih-Ying Chen, Wei-Hsien Wu, Joey Lin, Su-Ju Lu, Hsueh-Wu Wang,
and Yuan-Fan Tsai
The Design of Remote Surveillance System for Digital Family ......................................................................238
Chung-Hsin Liu and Chih-Chieh Fan
To Build Tele-care System Network Environment ............................................................................................242
Chung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, and Chuen-Lung Chen
Traffic Warning and Vehicular Homogeneity Measurement Based
on Multidimensional HMM Algorithm ................................................................................................................246
Chang-Lung Tsai and Wei-Lieh Hsu
Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier
Filters .........................................................................................................................................................................250
Chih-Jen Lee, I-Horng Jeng, Tai-Ning Yang, Chun-Jung Chen, and Peng Su
Build a Home Security Surveillance System Using LEGO MINDSTORMS
NXT ...........................................................................................................................................................................254
Kuo-Kai Hsu and Dwen-Ren Tsai
Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based
on Hamilton-connected Subgraph Recognition ..................................................................................................258
I-Horng Jeng, Dwen-Ren Tsai, Hou-An Chen, Yi-Chun Yen, and Chien-Kang Cheng
IIHMSP-2009-IS10 Multimedia in Ubiquitous Computing and Application Services(1)
Comments on Gateway-Oriented Password-Based Authenticated Key
Exchange Protocol ...................................................................................................................................................262
Tzong-Chen Wu and Hung-Yu Chien
Meaningful Inner Link Objects for Automatic Text Categorization ...............................................................266
Jau-Ji Shen and Jia-Chiuan Wu
Identity-Based DRM in Ubiquitous Multimedia System ..................................................................................270
Chou-Chen Yang, Ju-Chun Hsiao, and Hung-Wen Yang
A Novel Mutual Authentication Based on Data Embedding Technique ........................................................274
Chia-Chen Lin and Po-Hsuan Chiang
Embedding Secret Messages Using Modified Huffman Coding ......................................................................278
Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, and Huang-Ching Lin
Joint Secret Image Sharing and Progressive Transmission Based on Integer
Discrete Cosine Transform .....................................................................................................................................282
Zhenfei Zhao, Hao Luo, and Zhe-Ming Lu
A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm
for H.264/AVC Based on the Characteristics of Macro-block .........................................................................286
Pengyu Liu and Kebin Jia
IIHMSP-2009-IS10 Multimedia in Ubiquitous Computing and Application Services(2)
A Fast Image Retrieval Method Using Multi-Feature Dimension Technique ...............................................290
Kuo Lung Hung and Yih Cheng Tsay
Secret Sharing Method for Gray-level Images ....................................................................................................295
Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, and Chao-Lung Chou
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator
and Edge Detector ...................................................................................................................................................299
Chin-Chen Chang, Chia-Chen Lin, Pei-Yan Pai, and Yen-Chang Chen
Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia
Systems ......................................................................................................................................................................303
Ming-Yen Lin, Sue-Chen Hsueh, Ming-Hong Chen, and Hong-Yang Hsu
Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise
Detectors ...................................................................................................................................................................307
Li-Chun Liao, Shin-Jung Gu, and Bin-Chyi Tseng
H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter ...........................................312
Nan Zhang and Siwei Ma
Shape-Based Depth Map Coding ..........................................................................................................................316
Nan Zhang, Siwei Ma, and Wen Gao
IIHMSP-2009-IS11 Intelligent Watermarking Techniques, Image Authenticationand Visual Cryptography
Reversible Steganography for VQ Indices Using the Modified State Codebook ..........................................320
Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, and Ming-Chu Li
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two
Meaningful Shadows ...............................................................................................................................................324
The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, and Ming-Chu Li
Matrix Selection in High Payload Embedding ....................................................................................................328
Zhenxing Qian, Xinpeng Zhang, and Shuozhong Wang
Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks ....................................................332
Zhi-Fang Yang, Po-Chen Lee, Wei-Hung Chen, and Jia-Guu Leu
Security of Indirect-Authenticated Key Exchange Protocol .............................................................................336
Hsu-Hung Chiang, Ching-Chung Liu, Ying-Ming Chen, and Ya-Fen Chang
A Video Watermarking in H.264/AVC Encoder ................................................................................................340
Shinfeng D. Lin, Chih-Yao Chuang, and Hsiang-Cheng Meng
Electrical Impedance Tomography for Washing out Undergound Pollution .................................................344
Kazuyo Yoneda, Shinichi Tamura, Yoshinori Nishino, Kazuki Nakamura,
Takio Shimosakon, Kyohei Shimada, Rong Long Wan, and Kozo Okazaki
Improved EMD Steganography with Great Embedding Rate and High
Embedding Efficiency .............................................................................................................................................348
Qu Zhiguo, Fu Yu, Niu Xinxin, Yang Yixian, and Zhang Ru
IIHMSP-2009-IS11 Intelligent Watermarking Techniques, Image Authenticationand Visual Cryptography (2)
Yet Another Friendly Progressive Visual Secret Sharing Scheme ..................................................................353
Tzung-Her Chen and Yao-Sheng Lee
Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation
Resistant Watermarking ..........................................................................................................................................357
Zhi-Fang Yang, Chih-Jung Su, Ping-Chang Tseng, and Chan-Ting Shu
An Embedding Technique Based upon Block Prediction and Code Cascading
Shift ............................................................................................................................................................................361
Chin-Feng Lee, Jau-Ji Shen, and Mei-Chun Chuang
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems ....................................................365
Hung-Min Sun, Chi-Yao Weng, and Shiuh-Jeng Wang
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix ........................................................369
Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, and Jason Lin
Lossless Information Hiding Scheme Based on Predictive Coding .................................................................374
Tzu-Chuen Lu, Cheng-Chun Huang, and Siang-Ru Liao
A Schema for Multi-Signature Handling Based on Workflow Model ............................................................378
Jin-Bao Liu, Zhi-Long Qiu, Hui Zhou, Bao-Hui Liu, and Xia-Mu Niu
A Robust Watermarking Algorithm Based on Differential Energy and QIM
for Uncompressed Video ........................................................................................................................................382
Zhaoqing Liu, Qiong Li, Shuai Guan, and Xiyuan Peng
IIHMSP-2009-IS12 Circuit Techniques for Multimedia Signal Processing
Image Object Detection and Tracking Implementation for Outdoor Scenes
on an Embedded Soc Platform ..............................................................................................................................386
Wen-Kai Tsai, Ming-hwa Sheu, Ching-lung Su, Jun-jie Lin, and Shau-Yin Tseng
Implementation and ESL Verification of New Earliest-Deadline-First
Scheduler for Video Streaming over Wireless Networks ..................................................................................390
Chao-Lieh Chen and Chien-Hao Lai
An Implementation of Frame Rate Control for Reducing Flicker in CSTN
Panel ..........................................................................................................................................................................394
Ya-Hsin Hsueh and Wei-Da Chen
A Novel Vehicle Brake Light System ..................................................................................................................398
Yang-Chiuan Lin, Hung-Yu Wang, and Wei-Jeng Cheng
A CMOS Variable-gain Fully-differential Transimpedance Amplifier
for Multimedia Data Links .....................................................................................................................................402
Roger Y. Chen and Ming-Jen Chang
System Performance Analyses on PAC Duo ESL Virtual Platform ................................................................406
Zhe-Mao Hsu, I-Yao Chuang, Wen-Chien Su, Jen-Chieh Yeh, Jen-Kuei Yang,
and Shau-Yin Tseng
Secret Sharing Protocol for Linguistic Threshold Schemes ..............................................................................410
Marek R. Ogiela and Urszula Ogiela
Association and Abstraction on Neural Circuit Loop and Coding ...................................................................414
Shinichi Tamura, Yuko Mizuno-Matsumoto, Yen-Wei Chen, and Kazuki Nakamura
IIHMSP-2009-IS13 Network-Aware Multimedia: QoS and Security
An Effective Network-Aware Peer Selection Algorithm in BitTorrent ..........................................................418
Fenglin Qin, Ju Liu, Lina Zheng, and Liansheng Ge
A Mutual Information Based Sub-Pixel Registration Method for Image Super
Resolution .................................................................................................................................................................422
Boyang Zhang, Ju Liu, Jinyu Chu, and Jianping Qiao
Performance Comparison of Several Watermarking Methods Based on ICA
and AQIM .................................................................................................................................................................426
Jie Ling, Ju Liu, and Zhaowan Sun
Watermarking for 3D Triangular Meshes Based on SVD .................................................................................430
Xiushan Nie, Ju Liu, Xianqing Wang, and Jiande Sun
A Blind Video Watermarking Scheme Based on DWT ....................................................................................434
Chun-Xing Wang, Xiushan Nie, Xianqing Wan, Wen Bo Wan, and Feng Chao
Optimizing Constrained Mixed-Integer Nonlinear Programming Problems
Using Nature Selection ...........................................................................................................................................438
Rong-Song He
A Novel Secure RFID System to Ensure Privacy ...............................................................................................442
Cagatay Karabat
Target Tracking in Clusters of Sensor Networks via Handoff Scheme
with Extended Kalman Filter .................................................................................................................................446
Luke K. Wang, Shan-Chin Hsieh, Kou-Yuan Huang, and Chien-Chang Wu
IIHMSP-2009-IS15 Semantic Annotation and Retrieval Techniques for Imageand Video Databases
A Histogram Descriptor Based on Co-occurrence Matrix and its Application
in Cloud Image Indexing and Retrieval ...............................................................................................................450
Qingyong Li and Weitao Lu
3D Object Classification by Fuzzy KNN and Bayesian Decision ...................................................................455
Li-Li Wan and Zhen-Jiang Miao
An Image Index Algorithm Based on Hierarchical Clustering .........................................................................459
Tao Yang and Hongli Xu
An Integrative Codebook for Natural Scene Categorization ............................................................................463
Guanghua Gu, Yao Zhao, and Zhenfeng Zhu
A Novel Texture Analysis Method Based on Graph Spectral Theory ............................................................467
Zhang Tao, Hong Wenxue, and Wang Jinjia
Image Denoising Based on Non-local Means with Wiener Filtering in Wavelet
Domain ......................................................................................................................................................................471
Li Lin and Kong Lingfu
Indexing and Querying in Multimedia Databases ..............................................................................................475
Hung-Yi Lin and Shih-Ying Chen
Orthogonal Functional Expansion Method of Optical Flow for Large
Displacement ............................................................................................................................................................479
Jinwoo Kim, Robert Close, Hisashi Taketani, Rong-Long Wan, Kozo Okazaki,
and Shinichi Tamura
IIHMSP-2009-IS17 Recent Technologies and Applications of Audio Data Hiding
Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band
Speech Codec ...........................................................................................................................................................483
Akira Nishimura
Improvement of a Band Extension Technique for G.711 Telephony Speech
by Using Steganography .........................................................................................................................................487
Naofumi Aoki
A Band Extension of G.711 Speech with Low Computational Cost for Data
Hiding Application ..................................................................................................................................................491
Akinori Ito, Hironori Handa, and Yôiti Suzuki
Data Hiding is a Better Way for Transmitting Side Information for MP3
Bitstream ...................................................................................................................................................................495
Akinori Ito and Shozo Makino
Spatial and Temporal Position Information Delivery to Mobile Terminals
Using Audio Watermarking Techniques ..............................................................................................................499
Toshio Modegi
Chinese Name Speech Classification Using Fisher Score Based on Continuous
Density Hidden Markov Models ...........................................................................................................................503
Yi Gao, John Han, Lei Lin, Congde Lu, and Qin Yang
Personal Photo Organizer Based on Automated Annotation Framework .......................................................507
Kai-En Tsay, Yi-Leh Wu, Maw-Kae Hor, and Cheng-Yuan Tang
Volume Image Segmentaton by Dual Multi-Scale Morphological
Reconstructions ........................................................................................................................................................511
Jiann-Jone Chen and Chun-Rong Su
IIHMSP-2009-IS18 Intelligent Image and Signal Processing
Extension Neural Network Approach to Classification of Brain MRI ............................................................515
Chuin-Mu Wang, Ming-Ju Wu, Jian-Hong Chen, and Cheng-Yi Yu
Applying Visual Image and Satellite Positioning for Fast Vehicle Detection
and Lane Marking Recognition .............................................................................................................................518
Bao Rong Chang and Hsiu Fen Tsai
Image Hidden Technique Using QR-Barcode .....................................................................................................522
Chin-Ho Chung, Wen-Yuan Chen, and Ching-Ming Tu
Design of a System with a Multielement Thermopile for Monitoring
the Temperature of Indoor Objects .......................................................................................................................526
Lung-Tsai Li, Chin-Fu Tsai, and Ming-Shing Young
Implementation of Thermistor Linearization Using LabVIEW .......................................................................530
Chin-Fu Tsai, Lung-Tsai Li, Chin-Hao Li, and Ming-Shing Young
Design High-Performance and Low-Power Adder Cores with Full-Swing
Nodes for Embedded Systems ...............................................................................................................................534
Ching -Hwa Cheng, Chiou-Kou Tung, Shao-Hui Shieh, and Yu-Cherng Hung
High-Speed CMOS Chip Design for Manchester and Miller Encoder ...........................................................538
Yu-Cherng Hung, Min-Ming Kuo, Chiou-Kou Tung, and Shao-Hui Shieh
A New Contrast Enhancement Technique Implemented on FPGA for Real
Time Image Processing ...........................................................................................................................................542
Ching-Hsi Lu, Hong-Yang Hsu, and Lei Wang
IIHMSP-2009-IS19 Digital Forensics and Data Hiding Discovery
A Comparison between Windows Mobile and Symbian S60 Embedded
Forensics ...................................................................................................................................................................546
Antonio Savoldi, Paolo Gubian, and Isao Echizen
On Acceptable Modification Limits of Electroacoustic Speech Signals for Data
Hiding ........................................................................................................................................................................551
Marina Ponomar
Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift Style ...........................................555
Wen-Pinn Fang
An Image Processing Based Visual Compensation System for Vision Defects ............................................559
ChinLun Lai and Shu-Wen Chang
Robust Data Hiding on Texture Images ...............................................................................................................563
Hirofumi Otori and Shigeru Kuriyama
An Adaptive Gradient-Projection Image Restoration Using Local Statistics
and Estimated Noise Characteristics .....................................................................................................................567
Joo-Yeon Hwang and Min-Cheol Hong
Histogram Shifting Lossless Data Hiding Based on Space Filling Curves ....................................................571
Xiao Yi Yu and Aiming Wang
Half-Zone Quantization Based Algorithm for Information Hiding .................................................................575
Ali Ameri Mahabadi and Mohammad Eshghi
IIHMSP-2009-IS20 Intelligent Document Processing and Management Systems
Adapting e-TOM Model to Improve Multimedia Network Management – A
Case Study with a Taiwan Multimedia Service Provider ..................................................................................579
Dominic Wong
A Fast Text-Based Communication System for Handicapped Aphasiacs ......................................................583
Yu-Fen Fu and Cheng-Seen Ho
Document Filing Approaches Using an Internal Based Folder Organization ................................................595
Jiann-Gwo Doong
Fast Algorithm for Decoding the Binary (23, 12, 7) Quadratic Residue Code ..............................................599
Hung-Peng Lee and Kunta Hsiesh
Identity Authentication in RFID Based Logistics-Customs Clearance Service
Platform .....................................................................................................................................................................604
Huifang Deng and Wen Deng
Extracting Invariable Features Using Geometry Projection Based Histogram
Model for 3D Object Description ..........................................................................................................................608
Jun-Bao Li, Long-Jiang Yu, and Shi-Ze Guo
A Multilingual Patent Text-Mining Approach for Computing Relatedness
Evaluation of Patent Documents ...........................................................................................................................612
Chung-Hong Lee, Hsin-Chang Yang, Chih-Hong Wu, and Yi-Ju Li
Exploring AUC Boosting Approach in Multimodal Biometrics Score Level
Fusion ........................................................................................................................................................................616
M. Shahram Moin and Mehdi Parviz
IIHMSP-2009-IS21 Protection and Authentication for Multimedia Information
Palette Partition Based Data Hiding for Color Images ......................................................................................620
Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang
A Simple and Efficient Data Hiding Scheme Suitable for Low Power
Computation Environments ...................................................................................................................................624
Chin-Chen Chang, Yung-Chen Chou, and Ming-Huang Hsieh
A New Approach to Image Authentication Using Chaotic Map and Sudoku
Puzzle ........................................................................................................................................................................628
Wen-Chuan Wu and Guang-Ruei Ren
Data Concealment Scheme for HTML Documents Based on Color Code .....................................................632
Chin-Feng Lee and Hsing-Ling Chen
Multipurpose Watermarking Method Based on Blind Vector Quantization ..................................................636
Chih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang, and Kuan-Ju Chen
Automatic Traffic Monitoring Method Based on Cellular Model ...................................................................640
Wei-Lieh Hsu, Chang-Lung Tsai, and Po-Lun Chang
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow ..........................................644
Mengbo Hou, Qiuliang Xu, and Tao Ban
Advanced Color Images Enhancement Using Wavelet and K-means Clustering .........................................648
Hassana Grema Kaganami, Zou Beiji, and M. Sami Soliman
IIHMSP-2009-IS22 Behavior Analysis and Abnormal Event Detection
A Novel Viewer Counter for Digital Billboards .................................................................................................653
Duan-Yu Chen and Kuan-Yi Lin
Vehicle Retrieval Using Eigen Color and Multiple Instance Learning ...........................................................657
Shin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, and Yung-Sheng Chen
Towards Efficient Copy Detection for Digital Videos by Using Spatial
and Temporal Features ............................................................................................................................................661
Chung-Chi Tsai, Chin-Song Wu, Ching-Yu Wu, and Po-Chyi Su
Driving Situations Understanding through Content Rhythm Analysis ...........................................................665
Yu-Dun Lin, Wen-Yu Tseng, Cheng-Jie Hsu, and Chia-Hung Yeh
Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling
Verification ...............................................................................................................................................................669
Hao-Chung Shih, Chian C. Ho, Hsuan T. Chang, and Chin-Song Wu
Face Recognition Based on Complementary Matching of Single Image
and Sequential Images ............................................................................................................................................673
Yea-Shuan Huang and Wei-Cheng Liu
Precision Segmentation Rendering for 3-D Coronary Angiography Medical
Image .........................................................................................................................................................................677
Tsair-Fwu Lee, Chang-Yu Lee, Pei-Ju Chao, and Chang-Yu Wang
Image Retrieval in Multimedia Databases: A Survey ........................................................................................681
Yihun Alemu, Jong-bin Koh, Muhammed Ikram, and Dong-Kyoo Kim
IIHMSP-2009-IS23 Statistical Image Processing and Application
Robust Tracking Based on PSO and On-line AdaBoost ....................................................................................690
Huchuan Lu, Wenling Zhang, Fan Yang, and Xiaojing Wang
Visual Search Based on Contour Salient ..............................................................................................................694
Haiyan Fu, Xiangwei Kong, Shijie Jia, and Yanqing Guo
The Parallelization Design of Chaotic Encryption System Based on Mulit-level
Shuffle-Exchange Network ....................................................................................................................................698
Ding Nan, Ma Honglian, and Tan Guozhen
Source Camera Identification Forensics Based on Wavelet Features .............................................................702
Bo Wang, Yiping Guo, Xiangwei Kong, and Fanjie Meng
SIFT-Based Image Retrieval Combining the Distance Measure of Global
Image and Sub-Image .............................................................................................................................................706
Bin Li, Xiangwei Kong, Zhe Wang, and Haiyan Fu
Level Set-Based Semiautomatic Bolus Segmentation in Bolus-Chasing CTA ..............................................710
Ying Hou and Yi Sun
Fairness Analysis of Electronic Commerce Protocol Based on Strand Space ...............................................714
Wenqi Liu, Jianhua Yang, and Zhixin Li
A Fast and Robust Algorithm of Detection and Segmentation for Moving
Object ........................................................................................................................................................................718
Jie He, Kebin Jia, and Zhuoyi Lv
IIHMSP-2009-IS25 Human Information Processing and Its Applications
Unskilled User Support for Network Operation Based on Service Composition
Using Web Ontology Languages ..........................................................................................................................722
Yoshihiro Nakamura
An Analysis of the Influence of Facial Feature for Apparent Age Estimation ..............................................728
Hironori Takimoto, Hironobu Fukai, Yasue Mitsukura, and Minoru Fukumi
A Method for Evaluating the Degree of Human’s Preference Based on EEG
Analysis .....................................................................................................................................................................732
Tsukasa Nakamura, Shin-ichi Ito, Yasue Mitsukura, and Hiroto Setokawa
A Method for Automatic Detection of Crimes for Public Security by Using
Motion Analysis .......................................................................................................................................................736
Koichiro Goya, Xiaoxue Zhang, Kouki Kitayama, and Itaru Nagayama
A High Speed Mixel Estimation Method by Using the Genetic Algorithm ...................................................742
Seiji Ito and Yoshinari Oguro
An Important Facial Parts Analysis for Evaluating the Impression - Difference
by Gender ..................................................................................................................................................................746
Seiki Yoshimori, Hironori Takimoto, Yasue Mitsukura, and Minoru Fukumi
Further Remarks on Identity-Based RSA Multi-signature ................................................................................750
Ya-Fen Chang, Yen-Cheng Lai, and Mu-Yen Chen
A ±1-Based Steganography by Minimizing the Distortion of First Order
Statistics ....................................................................................................................................................................754
Yifeng Lu, Xiaolong Li, and Bin Yang
IIHMSP-2009-IS26 Multimedia Signal Processing for Plasma Diagnostics
Fast Subsequence Matching in Plasma Waveform Databases ..........................................................................759
Teruhisa Hochin, Yoshihiro Yamauchi, Hiroki Nomiya, Hideya Nakanishi,
and Mamoru Kojima
Image Processing in Ultra Fast X-ray Imaging with Streak Cameras for Laser
Fusion Research .......................................................................................................................................................763
Eunjoo Choi, Jiayong Zhong, Shinsuke Fujioka, Hiroyuki Shiraga, and Hiroshi Azechi
Improvements of Signal-to-noise Ratio Utilizing Penumbral Imaging
with M-sequences Aperture and Its Heuristic Scheme ......................................................................................767
Tatsuki Ueda, Shinsuke Fujioka, Shinya Nozaki, Yen-Wei Chen, and Hiroaki Nishimura
A Heuristic Decoding Method for Coded Images of Random Uniformly
Redundant Array ......................................................................................................................................................771
Shinya Nozaki, Shinsuke Fujioka, Tatsuki Ueda, Yen-Wei Chen, and Yoshinori Namihira
Particle Swarm Optimization for Reconstruction of Penumbral Images ........................................................775
Yen-Wei Chen, Chen-Lun Lin, and Aya Mimori
Creating RSA Trapdoors Using Lagrange Four Square Theorem ...................................................................779
Constantinos Patsakis and Evangellos Fountas
Imperceptibility Evaluation for Color Stego Image ...........................................................................................783
Xiu-ying Ma and Jia-jun Lin
Detection of LSB Replacement and LSB Matching Steganography Using Gray
Level Run Length Matrix .......................................................................................................................................787
Seyed Mojtaba Seyedhosseini Tarzjani and Shahrokh Ghaemmaghami
IIHMSP-2009-IS27 Ubiquitous Multimedia Services and Applicationsfor Residential Users (1)
Forecasting Exchange Rates by Genetic Algorithms Based Back Propagation
Network Model ........................................................................................................................................................791
Jui-Fang Chang, Chi-Ming Kuan, and Yu-Wen Lin
A Study on the Cache Miss Rate in a Genetic Algorithm Implementation ....................................................795
Feng-Cheng Chang and Hsiang-Cheh Huang
Two-phase Fuzzy-ART with Independent Component Analysis for Semantic
Image Classification ................................................................................................................................................799
Chuan-Yu Chang, Ru-Hao Jian, and Hung-Jen Wang
Using ZigBee and Room-Based Location Technology to Constructing
an Indoor Location-Based Service Platform ........................................................................................................803
Yuh-Ming Cheng
Text Steganography Based on Online Chat .........................................................................................................807
Minhao Liu, Yunbiao Guo, and Linna Zhou
Perceptual Content Authentication and Tamper Detection of Facial Image ..................................................811
Qi Han, Qiong Li, and Xiamu Niu
Fast Channel Change IPTV System for Enhanced User Experience ...............................................................815
Young-Ho Song and Taeck-Geun Kwon
Mental Rotation by Neural Network ....................................................................................................................819
Toshihiko Sasama, Hiroshi Mitsumoto, Kazuyo Yoneda, and Shinichi Tamura
IIHMSP-2009-IS27 Ubiquitous Multimedia Services and Applicationsfor Residential Users (2)
An Adaptive Approach Based on Genetic Algorithm to Information Hiding
for Halftone Images .................................................................................................................................................823
Yi-Ting Chen, Shu-Chuan Chu, Mong-Fong Horng, and Jeng-Shyang Pan
Interactive Voice-Controller Applied to Home Automation .............................................................................828
Jinn-Kwei Guo, Chun-Lin Lu, Ju-Yun Chang, Yi-Jing Li, Ya-Chi Huang, Fu-Jiun Lu,
and Ching-Wen Hsu
Complex Wavelet-Based Face Recognition Using Independent Component
Analysis .....................................................................................................................................................................832
Zhi Chai, Kai-Kuang Ma, and Zhengguang Liu
Similarity-Based Watermarking for Sub-Sampling Images with Bacterial
Foraging Techniques ...............................................................................................................................................836
Hsiang-Cheh Huang and Feng-Cheng Chang
Defect Detection of Skewed Images for Multilayer Ceramic Capacitors .......................................................840
Chun-Chieh Tseng, Jia-Hao Wu, and Bin-Yih Liao
Adaptive Multicast Routing Protocol for Wireless Mobile Ad Hoc Networks ..............................................844
Wei Kuang Lai, Mu-Lung Weng, Chien-Hua Lin, and Chin-Shiuh Shieh
An Efficient Architecture for Deblocking Filter in H.264/AVC ......................................................................848
He Jing, Huang Yan, and Xu Xinyu
A 13.75 ns Holographic Reconfiguration of an Optically Differential
Reconfigurable Gate Array ....................................................................................................................................852
Mao Nakajima and Minoru Watanabe
IIHMSP-2009-IS28 Coding and Protocols in Security and Applications
Fast Deployment of Botnet Detection with Traffic Monitoring .......................................................................856
Chung-Huang Yang and Kuang-Li Ting
Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRM .......................................................861
Chung-Ming Ou and C. R. Ou
A Hybrid RFID Protocol against Tracking Attacks ...........................................................................................865
Jen-Chun Chang and Hsin-Lung Wu
User Friendly Digital Rights Management System Based on Smart Cards ....................................................869
Narn-Yih Lee and Tzu-Yi Lee
TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks ...................................................873
Wei-Chen Wu and Yi-Ming Chen
Emotion Feature Vector of Finger Braille ...........................................................................................................877
Yasuhiro Matsuda and Tsuneshi Isomura
Bilinear Coons Patch and its Application in Security Pattern Design .............................................................881
Wenfa Qi, Xiaolong Li, and Bin Yang
Age Estimation Using AAM and Local Facial Features ...................................................................................885
Jun-Da Txia and Chung-Lin Huang
IIHMSP-2009-IS28 Coding and Protocols in Security and Applications (2)
Medical Video Encryption Based on H.264/AVC with Near-Lossless
Compression .............................................................................................................................................................889
Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong Lin
Determinants of Satisfaction and Intention of Use Self-service Technology -
Technology Readiness and Computer Self-efficacy ..........................................................................................893
Chien-Lung Chan and Chia-Li Lin
Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve ...................................................898
Yu-Wei Lai, Chin-Chen Chang, and Shih-Chang Chang
Cryptanalysis and Improvement of a Secure Authentication Scheme
with Anonymity for Wireless Communications .................................................................................................902
Chin-Chen Chang, Chia-Yin Lee, and Wei-Bin Lee
Real-Time Hand Detection and Tracking against Complex Background .......................................................905
Gang-Zeng Mao, Yi-Leh Wu, Maw-Kae Hor, and Cheng-Yuan Tang
A Falsification Prevention Method for Face Authentication Using Light ......................................................909
Yosuke Horiuchi and Osamu Uchida
Image Watermarking in Face Recognition Systems Based on Contourlet
Transform ..................................................................................................................................................................913
Ehsan Ehsani, M. Shahram Moin, and Farbod Razzazi
Performance and Power Efficiency Analysis of the Symmetric Cryptograph
on Two Stream Processor Architectures ..............................................................................................................917
Guang Xu, Hong An, Gu Liu, Ping Yao, Mu Xu, Wenting Han, Xiaoqiang Li,
and Xiurui Hao
IIHMSP-2009-IS29 Advanced Reversible Data Hiding and Steganalysis
Novel Robust Image Watermarking Exploiting the Features of Double
Domains ....................................................................................................................................................................921
Xinshan Zhu, Yun Yang, and Yanming Chen
Study on Digital Watermarking in the Oracle Bone Inscriptions Rubbings ...................................................925
Liu Yongge and Ge Yanqiang
Revisit Steganalysis on QIM-Based Data Hiding ...............................................................................................929
Qinxia Wu, Weiping Li, and Xiao Yi Yu
Chain Coding Based Data Hiding in Binary Images ..........................................................................................933
Xiao Yi Yu and Aiming Wang
Robust Data Hiding by Hilbert Curve Decomposition ......................................................................................937
Brian K. Lien
Identity Based Authenticated Key Agreement for Tree-Based Group ............................................................941
Xiangfei Sun, Qiuliang Xu, and Tao Ban
Steganalysis Based on Weighted Stego-Image for 2LSB Replacement
Steganography ..........................................................................................................................................................945
Mao Ye, Fenlin Liu, Chunfang Yang, and Xiongfei He
Non-expansible Flip-flop Visual Cryptography with Perfect Security ...........................................................949
Shang-Kuan Chen and Sian-Jheng Lin
IIHMSP-2009-IS30 Intelligent Image Fusion and Its Application
Curvelet Based Image Fusion for Ultrasound Contrast Harmonic Imaging ...................................................953
Naizhang Feng, Mingjian Sun, Liyong Ma, and Jiachen Ma
Image Fast Template Matching Algorithm Based on Projection and Sequential
Similarity Detecting ................................................................................................................................................957
Liyong Ma, Yude Sun, Naizhang Feng, and Zheng Liu
A Fast Medical Image Registration Based on Steerable Pyramid ....................................................................961
Yuhao Gu, Qing Lin, Bo Hu, and Xiao Bo
Hyperspectral Feature Selection Based on Mutual Information and Nonlinear
Correlation Coefficient ...........................................................................................................................................965
Miao Zhang, Qiang Wang, Yi Shen, and Bo Zhang
Generalized Local Priority Based Medical Image Fusion Scheme ..................................................................969
Jiasheng Hao, Yi Shen, Hongbing Xu, and Jianxiao Zou
An Iterative Refinement DSA Image Registration Algorithm Using Structural
Image Quality Measure ...........................................................................................................................................973
Jiang Wang and Jiangqiu Zhang
Multisecret Image Sharing .....................................................................................................................................977
Ran-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang,
and Shyong-Jian Shyu
Study of Thangka Image Retrieval and Multimedia Presentation Management
System .......................................................................................................................................................................981
Weilan Wang
IIHMSP-2009-IS31 Internet Multimedia Technology and Applications
Seamless Handover for Multimedia Applications between Heterogeneous
Wireless Networks ...................................................................................................................................................985
Hung-Wei Lin, Kuo-Chih Chu, Wei-Tsong Lee, and Jim-Min Lin
A Novel Adaptive FEC and Interleaving Architecture for H.264/SVC Wireless
Video Transmission .................................................................................................................................................989
Po-Chang Huang, Kuo-Chih Chu, Hsiang-Fu Lo, Wei-Tsong Lee, and Tin-Yu Wu
Information Objects Encapsulating Multimedia and Intelligence ....................................................................993
Chia-Ming Lee, Shang-Rong Tsai, Yu-Sheng Huang, Yuan-Liang Tai,
Guang-Hung Huang, and Hewi-Jin Jiau
A Portable Feather-Weight Java-Based Graphic Library for Embedded
Systems on Java Processor .....................................................................................................................................998
Pang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang,
and Ting-Wei Hou
Automatic Internet Media Clipper ......................................................................................................................1002
Hewijin Christine Jiau and Ming Lun Lee
IDEA: An Interest-DrivEn Architecture for Establishing Personalized
Semantic Infrastructure .........................................................................................................................................1006
Feng-Pu Yang, Hewijin Christine Jiau, and Kuo-Feng Ssu
A Robust Contourlet Based Image Hash Algorithm ........................................................................................1010
Yanan Wang, Di Wu, Hui Zhang, and Xiamu Niu
Reversible Secret Image Sharing Based on Shamir’s Scheme .......................................................................1014
Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang
IIHMSP-2009-IS32 Multimedia Signal Processing for Intelligent Applications
People Counting Using Multi-Mode Multi-Target Tracking Scheme ...........................................................1018
Cheng-Chang Lien, Ya-Lin Huang, and Chin-Chuan Han
Human Behavior Description Model Based on Action Recognition .............................................................1022
Fang-Hsuan Cheng and Cheng-Yuan Chang
A New Feature Integration Approach and Its Application to 3D Model
Retrieval ..................................................................................................................................................................1026
Jau-Ling Shih, Chang-Hsing Lee, Chih-Hsun Chou, and Yu-Cheng Chang
Modulation Spectral Analysis of Static and Transitional Information
of Cepstral and Spectral Features for Music Genre Classification ................................................................1030
Chang-Hsing Lee, Hwai-San Lin, Chih-Hsun Chou, and Jau-Ling Shih
Face Image Super-Resolution Using Two-dimensional Locality Preserving
Projection ................................................................................................................................................................1034
Yuan-Kai Wang and Cai-Ren Huang
Random Number Generator Designed by the Divergence of Scaling Functions .........................................1038
Jengnan Tzeng, I-Te Chen, and Jer-Min Tsai
A Provably Secure Two-Party Attribute-Based Key Agreement Protocol ...................................................1042
Hao Wang, Qiuliang Xu, and Tao Ban
A Secure Steganography: Noisy Region Embedding ......................................................................................1046
Yifeng Lu, Xiaolong Li, and Bin Yang
IIHMSP-2009-IS33 Advances in Biometrics (1)
Experiments with Optical Liveness Testing Method .......................................................................................1052
Martin Drahanský and Dana Lodrova
Template Protection via Piecewise Hashing ......................................................................................................1056
Claudia Nickel, Xuebing Zhou, and Christoph Busch
Feature Correlation Attack on Biometric Privacy Protection Schemes .........................................................1061
Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, and Arjan Kuijper
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric
Infrastructure ..........................................................................................................................................................1066
Bendik B. Mjaaland, Danilo Gligoroski, and Svein J. Knapskog
A Login System Using Mouse Dynamics ..........................................................................................................1072
Patrick Bours and Christopher Johnsrud Fullu
A Video Retrieval Algorithm Based on Spatio-temporal Feature Curves
and Key Frames .....................................................................................................................................................1078
Xiuxin Chen, Kebin Jia, and Zhipin Deng
A Cancelable Biometric Hashing for Secure Biometric Verification System ..............................................1082
Cagatay Karabat and Hakan Erdogan
Blind Clustering of Music Recordings Based on Audio Fingerprinting .......................................................1086
Wei-Ho Tsai and Wei-Che Hsieh
IIHMSP-2009-IS33 Advances in Biometrics (2)
Why Vein Recognition Needs Privacy Protection ............................................................................................1090
Daniel Hartung and Christoph Busch
An Approach to Biometric Identity Management Using Low Cost Equipment ..........................................1096
Robert Mueller and Raul Sanchez-Reillo
Template Protection for Multimodal Biometric System ..................................................................................1101
Zhifang Wang, Qi Han, Xiamu Niu, and Christoph Busch
Non-Forensic Odontological Biometrics ...........................................................................................................1105
Stephen D. Wolthusen and Christoph Busch
Mean Best Basis Algorithm for Wavelet Speech Parameterization ...............................................................1110
Jakub Gałka and Mariusz Ziółko
A Steganalysis Algorithm Based on Denoising of Source Image Using ICA
and SVM .................................................................................................................................................................1114
Javad RavanJamJah, Soodeh Bakhshandeh, and Seyed Bahram ZahirAzami
An Investigation of Genetic Algorithm on Steganalysis Techniques ............................................................1118
Xiao Yi Yu and Aiming Wang
The Effects of Ambient Sounds on the Quality of 3D Virtual Sound Space ................................................1122
Satoshi Yairi, Yukio Iwaya, Maori Kobayashi, Makoto Otani, Yôiti Suzuki,
and Takeru Chiba
IIHMSP-2009-IS34 Digital Archives and Digital Heritages
Construction of Ancient-Modern Word Dictionary from Parallel Corpus
of Ancient Writings and Their Translations in Modern Language ................................................................1126
Fuminori Kimura and Akira Maeda
A Framework for Design and Evaluation of Digital Museums in Second Life
as Learning Institutions .........................................................................................................................................1130
Kingkarn Sookhanaphibarn and Ruck Thawonmas
Comparison of User Trajectories Based on Coordinate Data and State
Transitions ..............................................................................................................................................................1134
Junichi Oda, Ruck Thawonmas, and Kuan-Ta Chen
Automatic Modeling of Virtual 3D Streets Based on GIS Data - Application
to Generation of Kyoto in the Edo Era ...............................................................................................................1138
Masakazu Sawai, Yuzuru Isoda, Akihiro Tsukamoto, Yoshihiro Kosaka,
Kyoko Hasegawa, Susumu Nakata, and Satoshi Tanaka
A Retrieval System for Ballet Steps Using Three-dimensional Motion Data ..............................................1144
Tsuyoshi Matsuoka, Asako Soga, and Kazuhiro Fujita
A Method of Managing Distributed Contents in Heterogeneous Servers .....................................................1148
Masahito Shiba
A Pair-wise Key Establishment for Wireless Sensor Networks .....................................................................1152
Hung-Min Sun, Yue-Hsun Lin, Cheng-Ta Yang, and Mu-En Wu
A Fast Audio Retrieval Method Based on Negativity Judgment ...................................................................1156
Zheng Guibin, Li Miao, Han Jiqing, and Zheng Tieran
IIHMSP-2009-IS34 Digital Archives and Digital Heritages (2)
Digital Reconstruction of a Historical Kabuki Theater ...................................................................................1160
Kohei Furukawa, Ryo Akama, Chisako Hirose, and Kozaburo Hachimura
Analysis of Gait Motion by Using Motion Capture in the Japanese Traditional
Performing Arts .....................................................................................................................................................1164
Woong Choi, Hiroyuki Sekiguchi, and Kozaburo Hachimura
Extracting Tactile Sensation Information from Multi-illuminated Images
of Tangible Cultural Property ..............................................................................................................................1168
Xin Yin, Kazuyoshi Nomura, and Hiromi T. Tanaka
An Analysis of Body Movement on Music Expressivity Using Motion
Capture ....................................................................................................................................................................1172
Mamiko Sakata and Sayaka Wakamiya
Body Motion Analysis for Similarity Retrieval of Motion Data and Its
Evaluation ...............................................................................................................................................................1177
Woong Choi, Takatoshi Ono, and Kozaburo Hachimura
An Automated On-line Traffic Flow Classification Scheme ..........................................................................1181
Jian Zhang, Zongjue Qian, Guochu Shou, and Yihong Hu
Achieving Secure Fuzzy Commitment Scheme for Optical PUFs .................................................................1185
Tanya Ignatenko and Frans Willems
Information Hiding into Interaural Phase Differences for Stereo Audio Signals ........................................1189
Ryouichi Nishimura
IIHMSP-2009-IS35 Application of Intelligent Computing to Signal and ImageProcessing
Principal Component Analysis for Prediction of O-Linked Glycosylation Sites
in Protein by Multi-Layered Neural Networks .................................................................................................1193
Chu-Zheng Wang, Xian-Hua Han, Masahiro Ito, Ikuko Nishikawa, and Yen-Wei Chen
An Efficient Identity-Based Certified E-mail Protocol ....................................................................................1197
Caifen Wang, Xiaodong Yang, Caihui Lan, and Xiaojun Cao
Denoising by Anisotropic Diffusion in ICA Subspace ....................................................................................1201
Xiangyan Zeng, Yen-Wei Chen, and Caixia Tao
Feature Selection Using Recursive Feature Elimination for Handwritten Digit
Recognition .............................................................................................................................................................1205
Xiangyan Zeng, Yen-Wei Chen, Caixia Tao, and Deborah van Alphen
Prediction of the O-glycosylation by Support Vector Machines
and Characteristics of the Crowded and Isolated O-glycosylation Sites .......................................................1209
Yukiko Nakajima, Kazutoshi Sakakibara, Masahiro Ito, and Ikuko Nishikawa
A Research on Social Anxiety Individuals’ Emotion Recognition Using IEC ............................................1213
Xinyin Huang, Yan Zhang, Aibing Xu, Hisashi Kawabayashi, and Yen-Wei Chen
Region-Based Segmentation versus Edge Detection .......................................................................................1217
Hassana Grema Kaganami and Zou Beiji
Representing Meanings of Images Based on Associative Values with Lexicons ........................................1222
Ying Dai
IIHMSP-2009-IS36 Advances in Multimedia Signal Processingand Communications
P2P Multimedia Streaming Schedule for Maximum Network Capacity ......................................................1228
Chin-Feng Lai, Yi-Wei Ma, Chia-Cheng Hu, and Yueh-Min Huang
Optimal Rate Allocation and Admission Control Policy for P2P On-Demand
Streaming Systems ................................................................................................................................................1232
Jen-Wen Ding, Guan-Wei Wu, and Der-Jiunn Deng
Path Dependent Adaptive Forward Error Correction with Multipath
Interleaving Control Scheme for Video Streaming over Wireless Networks ...............................................1236
Ming-Fong Tsai, Chih-Heng Ke, Chun-I Kuo, and Ce-Kuen Shieh
Mining Temporal Region-Based Service Patterns for Cooperative Caching
in Wireless Multimedia Sensor Networks .........................................................................................................1240
Vincent S. Tseng, Kawuu W. Lin, and Ming-Hua Hsieh
A GeoTagging Scheme Using Image Steganography and GPS Information
Authentication ........................................................................................................................................................1245
Mei-Yi Wu, Chuan-Chi Hsu, and Jia-Hong Lee
Pre-Register Algorithm for SVC by Fast BSS Transition Wireless Networks ............................................1249
Huei-Yu Yang, Ya-Chun Li, Feng-Yi Chou, Tin-Yu Wu, and Wei-Tsong Lee
New Watermarking Algorithm with Coding Efficiency Improvement
and Authentication in Video Surveillance .........................................................................................................1253
Chuen-Ching Wang, Ming-Jun Chi, and Yao-Tang Chang
An Enlargement Method Using Undecimated Wavelet Transform and Shape
Function ...................................................................................................................................................................1258
Wen-Chien Yen, Yen-Yu Chen, and Ying-Wen Chang
IIHMSP-2009-IS37 Multimedia Signal Processing and Application
New Approach for Cancer Computer Aided Diagnosis and Treatment ........................................................1262
Menrit Samir Fahmy
2D-PCA Based Statistical Shape Model from few Medical Samples ...........................................................1266
Tomoko Tateyama, Hossein Foruzan, and Yen-Wei Chen
Compound Image Compression with Multi-step Text Extraction Method ...................................................1270
Qi Xi, XIng Wu, and Shensheng Zhang
Face Image Metamorphosis with an Improved Multilevel B-Spline
Approximation .......................................................................................................................................................1274
Masataka Seo and Yen-Wei Chen
Remote Control System of Artificial Fish School and Its Fast Implementation ..........................................1278
Hisashi Kawabayashi, Mohammad Khazab, Jeff Tweedale, Lakhmi C. Jain,
and Yen-Wei Chen
Image Categorization by Learned PCA Subspace of Combined Visual-words
and Low-level Features .........................................................................................................................................1282
Xian-Hua Han and Yen-Wei Chen
A Study of Rounding Error on CDMA-Based Fingerprinting Scheme .........................................................1286
Minoru Kuribayashi, Hiroshi Kato, and Masakatu Morii
Dual-Microphone Speech Extraction from Signals with Audio Background ..............................................1290
Mariusz Ziółko, Bartosz Ziółko, and Rafał Samborski
IIHMSP-2009-IS38 Multi-Dimensional Signal Processing, Modelingand Visualization
Multi-mode Narrow-band Thresholding with Application in Liver
Segmentation from Low-contrast CT Images ...................................................................................................1293
Amir H. Foruzan, Yen-Wei Chen, Reza A. Zoroofi, Akira Furukawa, Yoshinobu Sato,
and Masatoshi Hori
Evaluation of Liver Shape Approximation and Characterization ..................................................................1297
Farshid Babapour Mofrad, Reza Aghaeizadeh Zoroofi, Yen-Wei Chen,
Ali Abbaspour Tehrani-Fard, Yoshinobu Sato, and Akira Furukawa
Volume Visualization with Grid-Independent Adaptive Monte Carlo Sampling ........................................1301
Hideo Nakajima, Kyoko Hasegawa, Susumu Nakata, and Satoshi Tanaka
Detection and 3D Measurement of a Rectangular Solid in a Single Image ..................................................1305
Tomohiro Nakamichi and Gang Xu
Drowsiness Detection Based on Brightness and Numeral Features of Eye
Image .......................................................................................................................................................................1310
Pooneh. R. Tabrizi and Reza. A. Zoroofi
A Novel Clustering-Based Feature Extraction Method for an Automatic Facial
Expression Analysis System ................................................................................................................................1314
A. Ghahari, Y. Rakhshani Fatmehsari, and R.A. Zoroofi
Automated Dental Recognition in MSCT Images for Human Identification ...............................................1318
Mohammad Hosntalab, Reza Aghaeizadeh Zoroofi, Ali Abbaspour Tehrani-Fard,
and Gholamreza Shirani
Double-Density Dual-Tree Wavelet Transform Based Texture Classification ............................................1322
Yu-Long Qiao and Chun-Yan Song
IIHMSP-2009-IS39 Image Processing and VLSI Implementation
Parallel Implementation of Good Feature Extraction for Tracking on the Cell
Processor with OpenCV Interface .......................................................................................................................1326
Hiroki Sugano and Ryusuke Miyamoto
Hardware Architecture for HOG Feature Extraction .......................................................................................1330
Ryoji Kadota, Hiroki Sugano, Masayuki Hiromoto, Hiroyuki Ochi, Ryusuke Miyamoto,
and Yukihiro Nakamura
An FPGA-Based Real-Time Hardware Accelerator for Orientation Calculation
Part in SIFT ............................................................................................................................................................1334
Jingbang Qiu, Ying Lu, Tianci Huang, and Takeshi Ikenaga
Temporal Information Cooperated Gaussian Mixture Models for Real-time
Surveillance with Ghost Detection ......................................................................................................................1338
Tianci Huang, Chengjiao Guo, Jingbang Qiu, and Takeshi Ikenaga
A Gabor Pseudo Fisherface Based Face Recognition Algorithm for LSI
Implementation ......................................................................................................................................................1342
Yohei Fukumizu, Tomoaki Takano, Yasuyuki Oshima, Toshihiko Terada,
and Hironori Yamauchi
An Approach to Video Coding Using Parameter Estimation in the Decoding
Process .....................................................................................................................................................................1346
Gen Fujita and Tomokazu Matsuno
Wavelet-Based Sequence Codec Implementation on TMS320DM642 ........................................................1350
Ali Ghorbanian and Amir Moosavinia
VLSI Design and Analysis of Multipliers for Low Power ..............................................................................1354
Pachara V. Rao, Cyril Prasanna Raj, and S. Ravi
Author Index