default search action
13th IIH-MSP 2017: Matsue, Shimane, Japan
- Jeng-Shyang Pan, Pei-Wei Tsai, Junzo Watada, Lakhmi C. Jain:
Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II. Smart Innovation, Systems and Technologies 82, Springer 2018, ISBN 978-3-319-63858-4
Massive Image/Video Compression and Transmission for Emerging Networks
- Xueying Zhang, Wei-Rong Wang, Cheng-Ye Shen, Ying Sun, Lixia Huang:
Extraction of EEG Components Based on Time - Frequency Blind Source Separation. 3-10 - Jiwei Zhang, Shaozhang Niu, Yueying Li, Yuhan Liu:
An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization. 11-18 - Jiancheng Zou, Xuan Yang, Honggen Zhang, Xiaoguang Chen:
Automatic Facial Age Estimate Based on Convolution Neural Network. 19-26 - Yuyang Sun, Qingzhong Li, Honggen Zhang, Jiancheng Zou:
The Application of Eye Tracking in Education. 27-33 - Jingyuan Ma, Huihui Bai, Meiqin Liu, Dongxia Chang, Rongrong Ni, Yao Zhao:
Adaptive Multiple Description Depth Image Coding Based on Wavelet Sub-band Coefficients. 34-41 - Yonggwon Ri, Jing Dong, Wei Wang, Tieniu Tan:
Adaptive Histogram Shifting Based Reversible Data Hiding. 42-50 - Xingyu Tian, Chunlei Fan, Jia Liu, Qun Ding:
Design and Implementation of Network Video Encryption System Based on STM32 and AES Algorithm. 51-58 - Xiujun Feng, Pengyu Liu, Kebin Jia:
Fast Intra Mode Decision Algorithm for 3D-HEVC Transcoding. 59-66 - Zhifei Fan, Baolong Guo, Jie Hou:
Implementation of a Drone-Based Video Streamer. 67-74
Advances in Speech and Language Processing
- Hayato Mori, Yuya Chiba, Takashi Nose, Akinori Ito:
Dialog-Based Interactive Movie Recommendation: Comparison of Dialog Strategies. 77-83 - Shunsuke Tada, Yuya Chiba, Takashi Nose, Akinori Ito:
Response Selection of Interview-Based Dialog System Using User Focus and Semantic Orientation. 84-90 - Yusuke Yamada, Takashi Nose, Yuya Chiba, Akinori Ito, Takahiro Shinozaki:
Development and Evaluation of Julius-Compatible Interface for Kaldi ASR. 91-96 - Sou Miyamoto, Takashi Nose, Suzunosuke Ito, Harunori Koike, Yuya Chiba, Akinori Ito, Takahiro Shinozaki:
Voice Conversion from Arbitrary Speakers Based on Deep Neural Networks with Adversarial Learning. 97-103 - Kosuke Nakamura, Yuya Chiba, Takashi Nose, Akinori Ito:
Evaluation of Nonlinear Tempo Modification Methods Based on Sinusoidal Modeling. 104-111 - Kazuki Sato, Takashi Nose, Akira Ito, Yuya Chiba, Akinori Ito, Takahiro Shinozaki:
A Study on 2D Photo-Realistic Facial Animation Generation Using 3D Facial Feature Points and Deep Neural Networks. 112-118
Recent Advances in Information Hiding and Signal Processing for Audio and Speech Signals
- Shinya Takahashi, Kazuhiro Kondo:
Towards an Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting. 121-129 - Isao Miyagawa, Yuya Chiba, Takashi Nose, Akinori Ito:
Detection of Singing Mistakes from Singing Voice. 130-136 - Harumi Murata, Akio Ogihara:
A Study of Audio Watermarking Method Using Non-negative Matrix Factorization for a Duet of Different Instruments. 137-144 - Ryouichi Nishimura, Shuichi Sakamoto, Yôiti Suzuki:
A Wind Noise Detection Algorithm for Monitoring Infrasound Using Smartphone as a Sensor Device. 145-152 - Dung Kim Tran, Masashi Unoki:
Study on Speech Representation Based on Spikegram for Speech Fingerprints. 153-160 - Naofumi Aoki:
Embedding Multiple Audio Data Using Information Misreading Technique. 161-168 - Ru Zhang, Jianyi Liu, Feng Zhu:
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword. 169-176 - Fenglian Li, Xueying Zhang, Hongle Zhang, Yu-Chu Tian:
An AFK-SVD Sparse Representation Approach for Speech Signal Processing. 177-184 - Zhihao Wei, Kebin Jia, Zhonghua Sun:
An Automatic Detection Method for Morse Signal Based on Machine Learning. 185-191
Intelligent Distribution Systems and Applications
- Yen-Ming Tseng, Li-Shan Chen, Jeng-Shyang Pan, Hsi-Shan Huang, Lee Ku:
Capacity Reduction of Distribution Transformer by Harmonic Effect. 195-204 - Yen-Ming Tseng, Rong-Ching Wu, Jeng-Shyang Pan, En-Chih Chang, Peijiang Li:
Base on Transmission Line Model to Investigate the Power Margins of Main Transformers. 205-214 - Hsi-Shan Huang, Jeng-Shyang Pan, Yen-Ming Tseng, Weidong Fang, Ruey-Ming Shih:
Development of Optical Fiber Stress Sensor Based on OTDR. 215-222 - Guo-Fu Lian, Ming-Der Jean, Tzu-Hsuan Chien:
Application of AlN-Coated Heat Sink to Improve the Thermal Management of Light-Emitting Diode Assembles. 223-227 - Chien-Hua Wang, Jich-Yan Tsai, I-Hsiang Lin, Chin-Tzong Pang:
A Fuzzy Neural Network on the Internet Addiction for University Students in China. 228-235 - Jing Tang, Jeng-Shyang Pan, Yen-Ming Tseng, Pei-Wei Tsai, Zhenyu Meng:
Optimal Economic Dispatch of Fuel Cost Based on Intelligent Monkey King Evolutionary Algorithm. 236-243 - Zhong-Shu Liu:
Optimum Design and Control Research of Direct Drive Hub Motor. 244-254 - Rong-Ching Wu, Yen-Ming Tseng, En-Chih Chang, Chih-Yang Hsiao:
Building of a Practical Monitoring System for the Small Wind Turbine. 255-263
Recent Advances in Security and Privacy for Multimodal Network Environments
- Raylin Tso, Ying Miao:
A Survey of Secret Sharing Schemes Based on Latin Squares. 267-272 - Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:
A NFC-Based Authentication Scheme for Personalized IPTV Services. 273-281 - Shi-Cho Cha, Wei-Ching Peng, Zijia Huang, Tzu-Yang Hsu, Jyun-Fu Chen, Tsung-Ying Tsai:
On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone Applications. 282-289 - Danyang Qin, Yan Zhang, Jingya Ma, Songxiang Yang, Erfu Wang:
Accelerated vBNN-IBS Authentication Scheme for WSN. 290-297 - Danyang Qin, Jingya Ma, Yan Zhang, Songxiang Yang, Zhifang Wang:
A Pre-assigned Key Management Scheme for Heterogeneous Wireless Sensor Networks. 298-305
Multimedia Signal Processing and Machine Learning
- Chunrui Zhang, Shen Wang, Dechen Zhan:
A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. 309-317 - Tingyue Yu, Shen Wang, Xiangzhan Yu:
A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes. 318-326 - Xiuli Ning, Yingcheng Xu, Ying Li, Ya Li:
Particle Swarm Optimization-Based Time Series Data Prediction. 327-334 - Xiuli Ning, Yingcheng Xu, Ying Li, Ya Li:
Time Series Data Analysis with Particle Filter-Based Relevance Vectors Machine Learning. 335-342 - Yeonchan Lee, Jaeseok Choi, Myeunghoon Jung, Junzo Watada:
GUI of GMS Simulation Tool Using Fuzzy Methods. 343-351 - Shusaku Tsumoto, Tomohiro Kimura, Haruko Iwata, Shoji Hirano:
Discharge Summaries Classifier. 352-360 - Kai Feng, Qun Ding:
Design and Implementation of Pseudo-Random Sequence Generator Based on Logistic Chaotic System and m-Sequence Using FPGA. 361-369 - Salih Ergün:
Cryptanalysis of a Random Number Generator Based on a Chaotic Circuit. 370-377 - Haydee Melo, Huiming Zhang, Pandian Vasant, Junzo Watada:
Training Method for a Feed Forward Neural Network Based on Meta-heuristics. 378-385 - Dan Wang, Baolong Guo, Yunyi Yan, Haibin Xu:
Hamming Code Protection Method of FPGA-Based Space System. 386-392 - Jia Liu, Chunlei Fan, Xingyu Tian, Qun Ding:
Optimization of AES and RSA Algorithm and Its Mixed Encryption System. 393-403 - Yueying Wu, Pengyu Liu, Zeqi Feng, Kebin Jia:
Fast Coding Unit Depth Decision for HEVC Intra Coding. 404-413 - Yan Zheng, Baolong Guo, Yunyi Yan:
A New Approach of Shape Recognition with Affine Invariance Based on HSC. 414-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.