Share Email Print
cover

PROCEEDINGS VOLUME 6982

Mobile Multimedia/Image Processing, Security, and Applications 2008
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 6982
Date Published: 21 May 2008
Softcover: 34 papers (376) pages
ISBN: 9780819471734

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 6982
Author(s): Proceedings of SPIE
Private synchronization technique for heterogeneous wireless network (WiFi and WiMAX)
Author(s): Ali Al-Sherbaz; Chris Adams; Sabah Jassim
Show Abstract
Credibility based secure route finding in wireless ad hoc networks
Author(s): Fanzhi Li; Ali Al-Sherbaz; Sabah Jassim; Chris Adams
Show Abstract
Implementation of an intrusion detection system based on wireless positioning
Author(s): David Akopian; Philip Chen; Maheedhar Gunturu; Phani K. Sagiraju
Show Abstract
RHINO: armoured plated networking with intelligent high speed wireless ad hoc capability
Author(s): Garik Markarian; Farid Singh
Show Abstract
Integrating RFID technique to design mobile handheld inventory management system
Author(s): Yo-Ping Huang; Wei Yen; Shih-Chung Chen
Show Abstract
IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol
Author(s): Chaorong Peng; Chang Wen Chen
Show Abstract
Performance study of MPLS and DS techniques to improve QoS routing for critical applications on IP networks
Author(s): Salim Alsharif; M. Mehdi Shahsavari
Show Abstract
Q-filter structures with applications in mobile communication systems
Author(s): Magdi A. Mohamed; Weimin Xiao
Show Abstract
Fractal steganography using artificially generated images
Author(s): Sos S. Agaian; Johanna M. Susmilch
Show Abstract
A spatial data hiding scheme based on generalized Fibonacci sequence
Author(s): E. Mammi; F. Battisti; M. Carli; A. Neri; K. Egiazarian
Show Abstract
Sum-SINR/sum-capacity optimal multisignature spread-spectrum steganography
Author(s): Lili Wei; Dimitris A. Pados; Stella N. Batalama; Michael J. Medley
Show Abstract
Secure information hiding algorithm using parametric slant-Hadamard transforms
Author(s): Jiong Xie; Sos Agaian; Joseph Noonan
Show Abstract
MPEG-4 AVC domain watermarking transparency
Author(s): S. Duta; M. Mitrea; F. Prêteux; M. Belhaj
Show Abstract
Scalable encryption using alpha rooting
Author(s): Eric J. Wharton; Karen A. Panetta; Sos S. Agaian
Show Abstract
P-recursive sequence and key-dependent multimedia scrambling
Author(s): Yicong Zhou; Karen Panetta; Sos Agaian
Show Abstract
General finite state machine reasoning method for digital forensics
Author(s): Long Chen; Guoyin Wang
Show Abstract
Perception measures for digital restoration of semi-transparent blotches
Author(s): Vittoria Bruni; Andrew J. Crawford; Anil Kokaram; Domenico Vitulano
Show Abstract
Can we ID from CCTV? Image quality in digital CCTV and face identification performance
Author(s): Hina U. Keval; M. Angela Sasse
Show Abstract
Fingerprint separation: an application of ICA
Author(s): Meenakshi Singh; Deepak Kumar Singh; Prem K. Kalra
Show Abstract
A special purpose knowledge-based face localization method
Author(s): Ahmad Hassanat; Sabah Jassim
Show Abstract
Face recognition using facial expression: a novel approach
Author(s): Deepak Kumar Singh; Priya Gupta; U. S. Tiwary
Show Abstract
Information distance based contrast invariant iris quality measure
Author(s): Craig Belcher; Yingzi Du
Show Abstract
Real-time video-based iris image processing
Author(s): Yingzi Du; Zhi Zhou
Show Abstract
Video based non-cooperative iris segmentation
Author(s): Yingzi Du; Emrah Arslanturk
Show Abstract
On-line signature authentication: user adaptive template protection and renewability
Author(s): Emanuele Maiorana; Patrizio Campisi; Alessandro Neri
Show Abstract
Classifier dependent feature preprocessing methods
Author(s): Benjamin M. Rodriguez; Gilbert L. Peterson
Show Abstract
Restoration of images damaged by semi-transparent water blotches using localized image enhancement
Author(s): Aaron Greenblatt; Sos Agaian; Karen Panetta
Show Abstract
Techniques for detection and classification of edges in color images
Author(s): Karen Panetta; Sadaf Qazi; Sos Agaian
Show Abstract
Logical subband decomposition based secured multimedia system
Author(s): Ravindranath C. Cherukuri; Sos S. Agaian
Show Abstract
Fast massive preventive security and information communication systems
Author(s): David Akopian; Philip Chen; Susheel Miryakar; Abhinav Kumar
Show Abstract
Bag separation algorithm
Author(s): Yesna O. Yildiz; Douglas Q. Abraham; Sos Agaian; Karen Panetta
Show Abstract
Latency-information theory and applications: Part I. On the discovery of the time dual for information theory
Author(s): Erlan H. Feria
Show Abstract
Latency-information theory and applications: Part II. On real-world knowledge aided radar
Author(s): Erlan H. Feria
Show Abstract
Latency-information theory and applications: Part III. On the discovery of the space dual of the laws of motion in physics
Author(s): Erlan H. Feria
Show Abstract

© SPIE. Terms of Use
Back to Top