Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

筛选
英文 中文
An Intellectual Capital Performance Evaluation Based on Fuzzy Linguistic 基于模糊语言的智力资本绩效评价
W. Tai, Chen-Tung Chen
{"title":"An Intellectual Capital Performance Evaluation Based on Fuzzy Linguistic","authors":"W. Tai, Chen-Tung Chen","doi":"10.1109/IIH-MSP.2007.330","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.330","url":null,"abstract":"In a knowledge era, intellectual capital has become a determinant resource for enterprise to retain and improve competitive advantage. Because the nature of intellectual capital is abstract, intangible, and difficult to measure, it becomes a challenge for business managers to evaluate intellectual capital performance effectively. Therefore, this paper proposes a suitable model for intellectual capital performance evaluation by combining 2-tuple fuzzy linguistic approach with multiple criteria decision-making (MCDM) method. It is feasible to manipulate the processes of evaluation integration and avoid the information loss effectively. Based on the proposed model, its feasibility is demonstrated by the result of intellectual capital performance evaluation for a high-technology company in Taiwan.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Robust Eye Detection and Tracking Technique Using Gabor Filters 基于Gabor滤波器的鲁棒眼检测与跟踪技术
Yenwei Chen, K. Kubo
{"title":"A Robust Eye Detection and Tracking Technique Using Gabor Filters","authors":"Yenwei Chen, K. Kubo","doi":"10.1109/IIH-MSP.2007.58","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.58","url":null,"abstract":"Eye detection is an important issue in the area of face recognition and vision based human-machine interface and so on. In this paper, we propose a robust eye (pupil) detection and tracking technique using Gabor filters. We first use Gabor filter and skin color information to detect the face and then an eye candidate region is automatically determined based on the geometric structure of human face. We then four Gabor filters with different directions (0, pi/4, pi/2, 3pi/4) to the eye candidate region. Since the pupil of eye do not have any directions, the pupil or the eye can be easily detected by combining the four responses of Gabor filters with a logical product. The proposed method is able to robustly detect and track eyes, and is insensitive to distance, pose and glass. In addition, the proposed method is also able to simultaneously detect and track multiple people.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131547117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation 基于颜色的k均值聚类分割的脑肿瘤检测
Ming-Ni Wu, Chia-Chen Lin, Chinchen Chang
{"title":"Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation","authors":"Ming-Ni Wu, Chia-Chen Lin, Chinchen Chang","doi":"10.1109/IIH-MSP.2007.356","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.356","url":null,"abstract":"In this paper, we propose a color-based segmentation method that uses the K-means clustering technique to track tumor objects in magnetic resonance (MR) brain images. The key concept in this color-based segmentation algorithm with K-means is to convert a given gray-level MR image into a color space image and then separate the position of tumor objects from other items of an MR image by using K-means clustering and histogram-clustering. Experiments demonstrate that the method can successfully achieve segmentation for MR brain images to help pathologists distinguish exactly lesion size and region.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 192
Analysis of Insurance Contract with the Auditing Efforts 保险合同审计分析
Xiaogang Xiang, Zhenwen Zhang
{"title":"Analysis of Insurance Contract with the Auditing Efforts","authors":"Xiaogang Xiang, Zhenwen Zhang","doi":"10.1109/IIH-MSP.2007.335","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.335","url":null,"abstract":"Depending on the game theory and the hypothesis that the insured's auditing efforts could be measured, the paper analyses the problem that the insured often exaggerate the loss state to extract more compensation in the insurance market, and leads to the optimal insurance contract model and the optimal solution. Because of the auditing cost, the insurer's optimal auditing strategy is the no-effort-auditing strategy, not the effort-auditing strategy. The insured's expected marginal utility with respect to final wealth is the same in the accident state as in the no accident state. Moreover, the paper concludes the conclusion that the insured deserve overcompensation in the high-loss state and under compensation in the low-loss state, which is contrary to the common insurance contracts as we can see in the insurance market.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Reversible Information Hiding Using Complexity Measure for Binary Images 基于复杂度度量的二值图像可逆信息隐藏研究
Sho Tanaka, M. Niimi, H. Noda
{"title":"A Study on Reversible Information Hiding Using Complexity Measure for Binary Images","authors":"Sho Tanaka, M. Niimi, H. Noda","doi":"10.1109/IIH-MSP.2007.65","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.65","url":null,"abstract":"Reversible information hiding for binary images is presented. A half of pixels in noisy blocks are replaced with secret messages. In order to recover original original cover images, changeable pixels are compressed by an efficient image coding, such as JBIG, and then the compressed bit-stream is embedded into cover images with the message. Simulation and experimental results demonstrate the efficacy of the proposed method.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Blind Color Watermarking Approach for Secret Text Hiding 秘密文本隐藏的盲彩色水印方法
Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang
{"title":"Blind Color Watermarking Approach for Secret Text Hiding","authors":"Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang","doi":"10.1109/IIH-MSP.2007.352","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.352","url":null,"abstract":"This paper presents a new secret text hiding technique, where the secret text is embedded into the low frequency sub-band of the saturation component of a color image via redundant discrete wavelet transform (RDWT), while the intensity and hue components are preserved with direct saturation adjustment. The secret text can be extracted from the watermarked image based on independent component analysis (ICA) without the existences of the original cover image. Experimental results demonstrate that our scheme successfully makes the secret text invisible and provides sufficient robustness to against the most prominent attacks.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of LDPC Codes over GF(q) to DFH Communication System 基于GF(q)的LDPC码在DFH通信系统中的应用
Bai Yu-Jie, Luo Wei-Xiong, Han Li
{"title":"Application of LDPC Codes over GF(q) to DFH Communication System","authors":"Bai Yu-Jie, Luo Wei-Xiong, Han Li","doi":"10.1109/IIH-MSP.2007.340","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.340","url":null,"abstract":"This paper presents the design and performance of a LDPC-DFH technique. We apply the low-density parity-check codes over GF(q) to differential frequency hopping (DFH) communications system. Homogeneity and randomness of its frequency hopping sequences are analyzed. The structure and decode algorithm of LDPC-DFH system are proposed. Simulation results show LDPC-DFH system outperforms conventional DFH system and Turbo- DFH system.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Halftone Image Watermarking Based on the Binary Pseudo-Wavelet Transform 基于二值伪小波变换的半色调图像水印
Hao Luo, Zhenfei Zhao, Jian-Ping Huang, Zhe-ming Lu
{"title":"Halftone Image Watermarking Based on the Binary Pseudo-Wavelet Transform","authors":"Hao Luo, Zhenfei Zhao, Jian-Ping Huang, Zhe-ming Lu","doi":"10.1109/IIH-MSP.2007.424","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.424","url":null,"abstract":"With halftone images widely used in books, magazines, printer outputs, and fax documents, it is desirable to embed data in halftone images for copyright protection, content authentication and tamper detection. This paper proposes a novel watermarking method for error diffused halftone images based on the binary pseudo-wavelet transform. We employ the binary pseudo-wavelet coefficients' distribution properties to embed data by modifying some highest frequency coefficients. Then the modified coefficients are inverse transformed into the spatial domain and meanwhile the watermarked image is obtained. Watermark extraction is the inverse process of watermark embedding. Experimental results show that this method is robust to attacks such as human marking and cropping, furthermore it achieves a good tradeoff between the high data capacity and the slight visual distortion.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Simulation of VHDL based ARP Cache 基于VHDL的ARP缓存的设计与仿真
Liu Tian-hua, Zhu Hong-feng, Zhou Chuan-sheng, Chang Gui-ran
{"title":"Design and Simulation of VHDL based ARP Cache","authors":"Liu Tian-hua, Zhu Hong-feng, Zhou Chuan-sheng, Chang Gui-ran","doi":"10.1109/IIHMSP.2007.4457727","DOIUrl":"https://doi.org/10.1109/IIHMSP.2007.4457727","url":null,"abstract":"In order to working together with ARP module in TCP/IP stack and making sure the high speed of ARP module, in this paper, with hardware language VHDL we re-code the cache portion of ARP protocol. According to the functional requirements of ARP cache by system, we re-code it in Xilinx ISE7.ll intergration environment, and in the meantime we did the simulation test in ModelSim. The simulation test results indicate that the re-designed ARP cache drops down a lot of cost both in space and time. The success of re-design of ARP cache with VHDL, will improve a lot of ARP working efficiency and as results to improve the whole system working speed of TCP/IP stack.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera 键盘和相机数据数字取证记录系统的开发与应用
Mariko Irisawa, Yuki Ashino, K. Fujita, R. Sasaki
{"title":"Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera","authors":"Mariko Irisawa, Yuki Ashino, K. Fujita, R. Sasaki","doi":"10.1109/IIH-MSP.2007.383","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.383","url":null,"abstract":"The digital forensics used in the corporate world primarily in relation to litigation involving computer- related evidence such as civil matters, breach of contract, breach of confidence, and so on, has recently been gaining a great deal of attention. In order to support the digital forensics in a stand-alone environment, we proposed a system named \"Dig-Force (Digital Forensic System with Chaining Signature for Evidence)\" that uses a USB device with a smart card function and a hysteresis signature based on digital signature technology. In the present paper, we discuss an application suitable for our system, and pro-pose a practical use such as surgical procedures where misconduct and mistakes are not permissible. In such a scene, not only data from a keyboard but also data from a camera are required. We also report on a program for the Dig-Force system that uses a function suitable for a camera application. Moreover, we show the result of an experiment that applies this program. The result shows the system is useful for keyboard as well as camera applications.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信