{"title":"An Intellectual Capital Performance Evaluation Based on Fuzzy Linguistic","authors":"W. Tai, Chen-Tung Chen","doi":"10.1109/IIH-MSP.2007.330","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.330","url":null,"abstract":"In a knowledge era, intellectual capital has become a determinant resource for enterprise to retain and improve competitive advantage. Because the nature of intellectual capital is abstract, intangible, and difficult to measure, it becomes a challenge for business managers to evaluate intellectual capital performance effectively. Therefore, this paper proposes a suitable model for intellectual capital performance evaluation by combining 2-tuple fuzzy linguistic approach with multiple criteria decision-making (MCDM) method. It is feasible to manipulate the processes of evaluation integration and avoid the information loss effectively. Based on the proposed model, its feasibility is demonstrated by the result of intellectual capital performance evaluation for a high-technology company in Taiwan.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Eye Detection and Tracking Technique Using Gabor Filters","authors":"Yenwei Chen, K. Kubo","doi":"10.1109/IIH-MSP.2007.58","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.58","url":null,"abstract":"Eye detection is an important issue in the area of face recognition and vision based human-machine interface and so on. In this paper, we propose a robust eye (pupil) detection and tracking technique using Gabor filters. We first use Gabor filter and skin color information to detect the face and then an eye candidate region is automatically determined based on the geometric structure of human face. We then four Gabor filters with different directions (0, pi/4, pi/2, 3pi/4) to the eye candidate region. Since the pupil of eye do not have any directions, the pupil or the eye can be easily detected by combining the four responses of Gabor filters with a logical product. The proposed method is able to robustly detect and track eyes, and is insensitive to distance, pose and glass. In addition, the proposed method is also able to simultaneously detect and track multiple people.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131547117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation","authors":"Ming-Ni Wu, Chia-Chen Lin, Chinchen Chang","doi":"10.1109/IIH-MSP.2007.356","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.356","url":null,"abstract":"In this paper, we propose a color-based segmentation method that uses the K-means clustering technique to track tumor objects in magnetic resonance (MR) brain images. The key concept in this color-based segmentation algorithm with K-means is to convert a given gray-level MR image into a color space image and then separate the position of tumor objects from other items of an MR image by using K-means clustering and histogram-clustering. Experiments demonstrate that the method can successfully achieve segmentation for MR brain images to help pathologists distinguish exactly lesion size and region.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Insurance Contract with the Auditing Efforts","authors":"Xiaogang Xiang, Zhenwen Zhang","doi":"10.1109/IIH-MSP.2007.335","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.335","url":null,"abstract":"Depending on the game theory and the hypothesis that the insured's auditing efforts could be measured, the paper analyses the problem that the insured often exaggerate the loss state to extract more compensation in the insurance market, and leads to the optimal insurance contract model and the optimal solution. Because of the auditing cost, the insurer's optimal auditing strategy is the no-effort-auditing strategy, not the effort-auditing strategy. The insured's expected marginal utility with respect to final wealth is the same in the accident state as in the no accident state. Moreover, the paper concludes the conclusion that the insured deserve overcompensation in the high-loss state and under compensation in the low-loss state, which is contrary to the common insurance contracts as we can see in the insurance market.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Reversible Information Hiding Using Complexity Measure for Binary Images","authors":"Sho Tanaka, M. Niimi, H. Noda","doi":"10.1109/IIH-MSP.2007.65","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.65","url":null,"abstract":"Reversible information hiding for binary images is presented. A half of pixels in noisy blocks are replaced with secret messages. In order to recover original original cover images, changeable pixels are compressed by an efficient image coding, such as JBIG, and then the compressed bit-stream is embedded into cover images with the message. Simulation and experimental results demonstrate the efficacy of the proposed method.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang
{"title":"Blind Color Watermarking Approach for Secret Text Hiding","authors":"Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang","doi":"10.1109/IIH-MSP.2007.352","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.352","url":null,"abstract":"This paper presents a new secret text hiding technique, where the secret text is embedded into the low frequency sub-band of the saturation component of a color image via redundant discrete wavelet transform (RDWT), while the intensity and hue components are preserved with direct saturation adjustment. The secret text can be extracted from the watermarked image based on independent component analysis (ICA) without the existences of the original cover image. Experimental results demonstrate that our scheme successfully makes the secret text invisible and provides sufficient robustness to against the most prominent attacks.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of LDPC Codes over GF(q) to DFH Communication System","authors":"Bai Yu-Jie, Luo Wei-Xiong, Han Li","doi":"10.1109/IIH-MSP.2007.340","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.340","url":null,"abstract":"This paper presents the design and performance of a LDPC-DFH technique. We apply the low-density parity-check codes over GF(q) to differential frequency hopping (DFH) communications system. Homogeneity and randomness of its frequency hopping sequences are analyzed. The structure and decode algorithm of LDPC-DFH system are proposed. Simulation results show LDPC-DFH system outperforms conventional DFH system and Turbo- DFH system.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Luo, Zhenfei Zhao, Jian-Ping Huang, Zhe-ming Lu
{"title":"Halftone Image Watermarking Based on the Binary Pseudo-Wavelet Transform","authors":"Hao Luo, Zhenfei Zhao, Jian-Ping Huang, Zhe-ming Lu","doi":"10.1109/IIH-MSP.2007.424","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.424","url":null,"abstract":"With halftone images widely used in books, magazines, printer outputs, and fax documents, it is desirable to embed data in halftone images for copyright protection, content authentication and tamper detection. This paper proposes a novel watermarking method for error diffused halftone images based on the binary pseudo-wavelet transform. We employ the binary pseudo-wavelet coefficients' distribution properties to embed data by modifying some highest frequency coefficients. Then the modified coefficients are inverse transformed into the spatial domain and meanwhile the watermarked image is obtained. Watermark extraction is the inverse process of watermark embedding. Experimental results show that this method is robust to attacks such as human marking and cropping, furthermore it achieves a good tradeoff between the high data capacity and the slight visual distortion.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liu Tian-hua, Zhu Hong-feng, Zhou Chuan-sheng, Chang Gui-ran
{"title":"Design and Simulation of VHDL based ARP Cache","authors":"Liu Tian-hua, Zhu Hong-feng, Zhou Chuan-sheng, Chang Gui-ran","doi":"10.1109/IIHMSP.2007.4457727","DOIUrl":"https://doi.org/10.1109/IIHMSP.2007.4457727","url":null,"abstract":"In order to working together with ARP module in TCP/IP stack and making sure the high speed of ARP module, in this paper, with hardware language VHDL we re-code the cache portion of ARP protocol. According to the functional requirements of ARP cache by system, we re-code it in Xilinx ISE7.ll intergration environment, and in the meantime we did the simulation test in ModelSim. The simulation test results indicate that the re-designed ARP cache drops down a lot of cost both in space and time. The success of re-design of ARP cache with VHDL, will improve a lot of ARP working efficiency and as results to improve the whole system working speed of TCP/IP stack.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera","authors":"Mariko Irisawa, Yuki Ashino, K. Fujita, R. Sasaki","doi":"10.1109/IIH-MSP.2007.383","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.383","url":null,"abstract":"The digital forensics used in the corporate world primarily in relation to litigation involving computer- related evidence such as civil matters, breach of contract, breach of confidence, and so on, has recently been gaining a great deal of attention. In order to support the digital forensics in a stand-alone environment, we proposed a system named \"Dig-Force (Digital Forensic System with Chaining Signature for Evidence)\" that uses a USB device with a smart card function and a hysteresis signature based on digital signature technology. In the present paper, we discuss an application suitable for our system, and pro-pose a practical use such as surgical procedures where misconduct and mistakes are not permissible. In such a scene, not only data from a keyboard but also data from a camera are required. We also report on a program for the Dig-Force system that uses a function suitable for a camera application. Moreover, we show the result of an experiment that applies this program. The result shows the system is useful for keyboard as well as camera applications.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}