Description |
1 online resource |
Series |
Smart innovation, systems and technologies, 2190-3018 ; volume 81 |
|
Smart innovation, systems, and technologies ; 81.
|
Contents |
Preface; Conference Organization; Contents; Multimedia Security and Its Applications; A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification; Abstract; 1 Introduction; 2 Related Works; 2.1 A 2D HM Reversible Data Hiding Based on a Difference-Pairs; 2.2 A 2D HM Reversible Data Hiding Based on Pairwise Prediction Error Expansion; 2.3 A 2D HM Reversible Data Hiding Based on PVO and Pairwise Prediction Error Expansion; 3 Comparison of the Experimental Results Based on 2D HM Reversible Data Hiding; 4 Conclusions; Acknowledgements; References |
|
Steganographic Image Hiding Schemes Based on Edge DetectionAbstract; 1 Introduction; 2 Data Hiding Schemes Based on Image Texture; 2.1 Irreversible Data Hiding Schemes; 2.2 Reversible Data Hiding Scheme; 3 Comparison and Analysis; 4 Conclusions; Acknowledgements; References; A New Data Hiding Strategy Based on Pixel-Value-Differencing Method; Abstract; 1 Introduction; 2 Literature Review; 2.1 Wu and Tsai's PVD Method; 2.2 Tseng and Leng's PVD Method; 3 The Proposed Method; 4 Theoretical Analysis; 5 Conclusions; Acknowledgements; References |
|
Data Hiding Scheme Based on Regular Octagon-Shaped ShellsAbstract; 1 Introduction; 2 Literature Review; 2.1 Zhang and Wang's EMD Scheme; 2.2 Chang et al.'s Turtle Shell-Based Scheme; 2.3 Kurup et al.'s Octagon-Shaped Shell-Based Scheme; 3 Proposed Method; 4 Experimental Results; 5 Conclusion; Acknowledgement; References; A Web Page Watermarking Method Using Hybrid Watermark Hiding Strategy; 1 Introduction; 2 Related Works; 2.1 Hamming Code; 2.2 HTML Quotation Mark Tags; 2.3 HTML Attribute Combinations; 2.4 Embedding Data Using Different Capitalization in HTML Tags |
|
2.5 Watermark Data Embedding Using Cartesian Product3 The Proposed Method; 3.1 Embedding in CSS Values; 3.2 Extracting Watermark Data; 4 Experiment Simulation; 5 Robustness Assessment; 6 Conclusion; References; Integrated Health Check Report Analysis and Tracking Platform; Abstract; 1 Introduction; 2 Related Works; 3 Integrated Health Check Report Analysis and Tracking Platform; 3.1 Front-End Functions; 3.2 Rear-End Functions; 4 Conclusion; Acknowledgements; References; A Study of the Multi-Organization Integrated Electronic Attendance System; Abstract; 1 Introduction; 2 Literature Review |
|
3 The Electronic Attendance System of Tainan Municipal Government4 Conclusions; Acknowledgements; References; A Content Analysis of Mobile Learning on Constructivism Theory; Abstract; 1 Introduction; 2 Search Strategies and Processes; 3 Results; Acknowledgments; References; An Independence Mechanism Design for the Software Defined Device; Abstract; 1 Introduction; 2 Relative Works; 3 Research Design; 4 Conclusion; Acknowledgments; References; An Ontology-Based Herb Therapy Recommendation for Respiration System; Abstract; 1 Introduction; 2 Related Work; 3 The Process and System Design |
Summary |
This volume includes papers presented at IIH-MSP 2017, the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, held on 12-15 August 2017 in Matsue, Shimane, Japan. The conference covered topics ranging from information hiding and security, and multimedia signal processing and networking, to bio-inspired multimedia technologies and systems. This volume focuses on subjects related to multimedia security and applications, wearable computing, Internet of Things (IoT) privacy and information security, biomedical system design and applications, emerging techniques and applications, soft computing and applications, applications of image encoding and rendering, and information hiding and its criteria. Updated with the latest research outcomes and findings, the papers presented appeal to researchers and students in the corresponding fields |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographical references and index |
Notes |
Vendor-supplied metadata |
Subject |
Multimedia systems -- Congresses
|
|
Image processing -- Congresses
|
|
Signal processing -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Digital watermarking -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Artificial intelligence.
|
|
Imaging systems & technology.
|
|
Graphical & digital media applications.
|
|
COMPUTERS -- General.
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
|
Digital watermarking
|
|
Image processing
|
|
Multimedia systems
|
|
Signal processing
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Pan, Jeng-Shyang, editor.
|
|
Tsai, Pei-Wei, editor
|
|
Watada, J. (Junzo), editor.
|
|
Jain, L. C., editor.
|
ISBN |
9783319638560 |
|
3319638564 |
|
3319638556 |
|
9783319638553 |
|
9783319638591 |
|
3319638599 |
|
3319638580 |
|
9783319638584 |
|