default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 1
Volume 1, Number 1, January 2010
- Zhi-Hui Wang, The Duc Kieu, Chin-Chen Chang, Mingchu Li:
A Novel Information Concealing Method Based on Exploiting Modification Direction. 1-9 - Akinori Ito, Shozo Makino:
Designing Side Information of Multiple Description Coding. 10-19 - Gang Cao, Yao Zhao, Rongrong Ni:
Edge-based Blur Metric for Tamper Detection. 20-27 - Shen Wang, Bian Yang, Xiamu Niu:
A Secure Steganography Method based on Genetic Algorithm. 28-35 - Hui Wang, Joyce Liang, C.-C. Jay Kuo:
Overview of Robust Video Streaming with Network Coding. 36-50 - Hsiang-Cheh Huang, Yueh-Hong Chen, Ajith Abraham:
Optimized Watermarking Using Swarm-Based Bacterial Foraging. 51-58
Volume 1, Number 2, April 2010
- Kotaro Yamamoto, Munetoshi Iwakiri:
Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument. 59-71 - Xuping Huang, Yoshihiko Abe, Isao Echizen:
Capacity Adaptive Synchronized Acoustic Steganography Scheme. 72-90 - Ching-Yu Yang, Wu-Chih Hu, Chih-Hung Lin:
Reversible Data Hiding by Coefficient-bias Algorithm. 91-100 - Halim Sayoud, Siham Ouamour:
Proposal of a New Confidence Parameter Estimating the Number of Speakers -An experimental investigation-. 101-109 - Chao-Ho Chen, Tsong-Yi Chen, Da-Jinn Wang, Yi-Fan Li:
Multipath Flatted-Hexagon Search for Block Motion Estimation. 110-131 - Jian Lou, Shan Liu, Anthony Vetro, Ming-Ting Sun:
Trick-Play Optimization for H.264 Video Decoding. 132-144
Volume 1, Number 3, July 2010
- Abdelrahman Desoky:
NORMALS: Normal Linguistic Steganography Methodology. 145-171 - Zhe-Ming Lu, Yue-Nan Li:
Image Compression Based on Mean Value Predictive Vector Quantization. 172-178 - Hameed Al-Qaheri, Abhijit Mustafi, Soumya Banerjee:
Digital Watermarking using Ant Colony Optimization in Fractional Fourier Domain. 179-189 - Tzu-Chuen Lu, Chin-Chen Chang:
A Survey of VQ Codebook Generation. 190-203 - Ryouichi Nishimura, Shun'ichiro Abe, Norihiro Fujita, Yôiti Suzuki:
Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme. 204-219 - Chia-Chen Lin, Pei-Feng Shiu:
HighCapacity Data Hiding Scheme for DCT-based Images. 220-240 - Stelios Krinidis, Ioannis Pitas:
Statistical Analysis of Human Facial Expressions. 241-260 - Xiaohong Zhou, Zhe Nie, Yueping Li:
Fast Algorithm for Searching Adjacent Communities and Its Application in Hierarchical Community Discovery. 261-268
Volume 1, Number 4, October 2010
- Hoseok Wey, Akinori Ito, Takuma Okamoto, Yôiti Suzuki:
Multiple Description Coding Using Time Domain Division for MP3 coded Sound Signal. 269-285 - Fa-Xin Yu, Yanqiang Lei, Yuan-Gen Wang, Zhe-Ming Lu:
Robust Image Hashing Based on Statistical Invariance of DCT Coefficients. 286-291 - Chao-Hsing Hsu, Wen-Jye Shyr, Kun-Huang Kuo:
Optimizing Multiple Interference Cancellations of Linear Phase Array Based on Particle Swarm Optimization. 292-300 - Martin Drahanský, Dana Hejtmankova:
New Experiments with Optical Liveness Testing Methods. 301-309 - Chin-Feng Lee, Wan-Ting Chang:
Recovery of Color Images by Composed Associative Mining and Edge Detection. 310-324 - Milind Khanapurkar, Jayant Y. Hande, Preeti R. Bajaj:
Approach for VHDL and FPGA Implementation of Communication Controller of FlexRay Controller. 325-336 - M. B. Ould Medeni, El Mamoun Souidi:
A Novel Steganographic Protocol from Error-correcting Codes. 337-343 - Halim Sayoud, Siham Ouamour:
Speaker Clustering of Stereo Audio Documents Based on Sequential Gathering Process. 344-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.