Huang, Hsiang-Cheh
Advances in Intelligent Information Hiding and Multimedia Signal Processing
Part I. Information Hiding and Secret Sharing
1. Demonstration Experiment of Data Hiding into OOXML Document for Suppression of Plagiarism
Akinori Ito
2. A Revisit to LSB Substitution Based Data Hiding for Embedding More Information
Yanjun Liu, Chin-Chen Chang, Tzu-Yi Chien
3. Behavior Steganography in Social Network
Xinpeng Zhang
4. Robust Steganography Using Texture Synthesis
Zhenxing Qian, Hang Zhou, Weiming Zhang, Xinpeng Zhang
5. A Reversible Data Hiding Scheme in AMBTC Compression Code Using Joint Neighborhood Coding
Pei-Feng Shiu, Chia-Chen Lin, Jinn-ke Jan, Cheng-Lin Hsieh, Yi-Ming Tang
6. A Quantization-Based Image Watermarking Scheme Using Vector Dot Product
Yueh-Hong Chen, Hsiang-Cheh Huang
7. High-capacity Robust Watermarking Approach for Protecting Ownership Right
Chun-Yuan Hsiao, Ming-Feng Tsai, Ching-Yu Yang
8. High Payload Data Hiding Based on Just Noticeable Distortion Profile and LSB Substitution
Hui-Shih Leng, Hsien-Wen Tseng
9. An Improved Data Hiding Method of Five Pixel Pair Differencing and LSB Substitution Hiding Scheme
Tzu-Chuen Lu, Yu-Ching Lu
10. A Data Hiding Method based on Multi-predictor and Pixel Value Ordering
Yung-Chen Chou, Tzu-Chuen Lu, Jhih-Huei Wu
11. Advanced Center-Folding based Reversible Hiding Scheme with Pixel Value Ordering
Tzu-Chuen Lu, Chi-Quan Lin, Jia-Wei Liu, Yu-Ci Chen
12. A Large Payload Webpage Data Embedding Method Using CSS Attributes Modification
Jing-Xun Lai, Yung-Chen Chou, Chiung-Chen Tseng, Hsin-Chi Liao
13. The Study of Steganographic Algorithms Based on Pixel Value Difference
Chin-Feng Lee, Jau-Ji Shen, Kuan-Ting Lin
14. Improvement of the Embedding Capacity for Audio Watermarking Method Using Non-negative Matrix Factorization
Harumi Murata, Akio Ogihara
15. Digital audio watermarking robust against Locality Sensitive Hashing
Kotaro Sonoda, Kentaro Morisaki
16. On a Synchronization Method for Audio Watermarks Robust Against Aerial Transmission Using Embedded Random Synchronization Pattern
Kazuhiro Kondo, Joji Yamada
17. Tampering Detection in Speech Signals by Semi-Fragile Watermarking Based on Singular-Spectrum Analysis
Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai
18. Copyright Protection Method based on the Main Feature of Digital Images
Xinyi Wang, Zhenghong Yang, Shaozhang Niu
Part II. Audio and Speech Signal Processing
19. Cross-Similarity Measurement of Music Sections: A Framework for Large-scale Cover Song Identification
Kang Cai, Deshun Yang, Xiaoou Chen
20. A Study on Tailor-Made Speech Synthesis Based on Deep Neural Networks
Shuhei Yamada, Takashi Nose, Akinori Ito
21. Introduction and Comparison of Machine Learning Techniques to the Estimation of Binaural Speech Intelligibility
Kazuhiro Kondo, Kazuya Taira
22. Impact of variation in interaural level and time differences due to head rotation in localization of spatially segregated sound
Daisuke Morikawa
23. An improved 5-2 channel downmix algorithm for 3D audio reproduction
Xingwei Sun, Risheng Xia, Lei Yang, Lizhong Wang, Junfeng Li
24. Investigation on the head-related modulation transfer function for monaural DOA
Nguyen Khanh Bui, Daisuke Morikawa, Masashi Unoki
25. Temporal characteristics of perceived reality of multimodal contents
Shuichi Sakamoto, Hiroyuki Yagyu, Zhenglie Cui, Tomoko Ohtani, Yôiti Suzuki, Jiro Gyoba
Part III. Communication Protocols, Techniques, and Methods
26. An MTSA Algorithm for Unknown Protocol Format Reverse
Fanghui Sun, Shen Wang, Hongli Zhang
27. High Precision 3D Point Cloud with Modulated Pulses for LiDAR System
Kai-Jiun Yang, Chi-Tien Sun
28. Research on Frequency Automatically Switching Technology for China Highway Traffic Radio
Lei Cai, Zhong-teng Yu, Chun-lei Meng
29. An Automatic Decoding Method for Morse Signal based on Clustering Algorithm
Yaqi Wang, Zhonghua Sun, Kebin Jia
30. A Novel Digital Rights Management Mechanism on Peer-to-Peer Streaming System
Jin Zhang, Jinwen Cai, Zhengshun Zhang
31. Robust Transmission of Compressed Sensing Signals with Error Correction Codes
Hsiang-Cheh Huang, Feng-Cheng Chang, Yueh-Hong Chen, Po-Liang Chen
32. Comparison of IPv4-over-IPv6 (4over6) and Dual Stack Technologies in Dynamic Configuration for IPv4/IPv6 Address
Ta Te Lu, Cheng Yen Wu, Wen Yen Lin, Hsin Pei Chen, Kuang Po Hsueh
33. A Framework for Supporting Application Level Interoperability between IPv4 and IPv6
Yeong-Sheng Chen, Shang-Yi Liao
34. Design and Implementation of an IPv4/IPv6 Dual-Stack Automatic Service Discovery Mechanism for an Access Control System
Hui-Kai Su, Chih-Hsueh Lin, Jia-Long Hu, Chun Liang Chang, Wen Yen Lin
35. Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network
Shuen-Chih Tsai, I-Hsien Liu, Chien-Tung Lu, Chan-Hua Chang, Jung-Shian Li
36. Decision Support for IPv6 Migration Planning
Shian-Shyong Tseng, Ai-Chin Lu, Wen-Yen Lin, Ching-Heng Ku, Geng-Da Tsai
Part IV. Encryption and Authentication Methods
37. A Secure Authentication Scheme for Telecare Medical Information Systems
Chin-Chen Chang, Jung-San Lee, Yu-Ya Lo, Yanjun Liu
38. Reversible authentication scheme for demosaicked images without false detection
Xiao-Long Liu, Chia-Chen Lin, Cheng Han Lin, Li Juan Lin, Bo Jun Qiu
39. A New Image Encryption Instant Communication Method Based On Matrix Transformation
Jiancheng Zou, Tengfan Weng
40. A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks
Chien-Ming Chen, Linlin Xu, Weicheng Fang, Tsu-Yang Wu
Avainsanat: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)
- Toimittaja
- Huang, Hsiang-Cheh
- Pan, Jeng-Shyang
- Tsai, Pei-Wei
- Julkaisija
- Springer
- Julkaisuvuosi
- 2017
- Kieli
- en
- Painos
- 1
- Sarja
- Smart Innovation, Systems and Technologies
- Kategoria
- Tekniikka, energia, liikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9783319502090
- Painetun ISBN
- 978-3-319-50208-3