Share Email Print
cover

Proceedings of SPIE Volume 8755

Mobile Multimedia/Image Processing, Security, and Applications 2013
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 8755
Date Published: 6 June 2013
Softcover: 31 papers (328) pages
ISBN: 9780819495464

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 8755
Author(s): Proceedings of SPIE
Image encryption in the wavelet domain
Author(s): Long Bao; Yicong Zhou; C. L. Philip Chen
Show Abstract
Biometric feature embedding using robust steganography technique
Author(s): Rasber D. Rashid; Harin Sellahewa; Sabah A. Jassim
Show Abstract
Performance assessments of Android-powered military applications operating on tactical handheld devices
Author(s): Brian A. Weiss; Lisa Fronczek; Emile Morse; Zeid Kootbally; Craig Schlenoff
Show Abstract
No-reference quality assessment of H.264/AVC encoded video based on natural scene features
Author(s): Kongfeng Zhu; Vijayan Asari; Dietmar Saupe
Show Abstract
Adjunctive numerical relation codes in multimedia signal covers
Author(s): James C. Collins; Sos S. Agaian
Show Abstract
Mean field game theoretic approach for security in mobile ad-hoc networks
Author(s): Yanwei Wang; Helen Tang; F. Richard Yu; Minyi Huang
Show Abstract
Efficient high-capacity steganography technique
Author(s): Alan Anwer Abdulla; Sabah A. Jassim; Harin Sellahewa
Show Abstract
A novel method of testing image randomness with applications to image shuffling and encryption
Author(s): Yue Wu; Sos Agaian; Joseph P. Noonan
Show Abstract
Location-assured, multifactor authentication on smartphones via LTE communication
Author(s): Torben Kuseler; Ihsan A. Lami; Hisham Al-Assam
Show Abstract
Security enhancement for mobile ad hoc networks routing with OLSRv2
Author(s): Zhexiong Wei; Helen Tang; F. Richard Yu; Maoyu Wang
Show Abstract
Progress in multi-channel image fusion for face image matching
Author(s): Stephen DelMarco
Show Abstract
Face detection at a distance with AdaBoost filtering and color-shape information
Author(s): Seokwon Yeom; Dong-Su Lee
Show Abstract
Feature quality-based multimodal unconstrained eye recognition
Author(s): Zhi Zhou; Eliza Y. Du; Yong Lin; N. Luke Thomas; Craig Belcher; Edward J. Delp
Show Abstract
High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers
Author(s): James C. Collins; Sos S. Agaian
Show Abstract
Sub-word based Arabic handwriting analysis for writer identification
Author(s): Makki Maliki; Naseer Al-Jawad; Sabah Jassim
Show Abstract
ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks
Author(s): Debasmit Banerjee; Bo Dong; Subir Biswas
Show Abstract
Social network forensics: using commercial software in a university forensics lab environment
Author(s): Pavel Halkin; Knut Kröger; Reiner Creutzburg
Show Abstract
Gait recognition using spatio-temporal silhouette-based features
Author(s): Azhin Sabir; Naseer Al-jawad; Sabah Jassim
Show Abstract
A new feature selection method for OCT retinal data analysis
Author(s): Madhushri Banerjee; Sumit Chakravarty; Huiling Da
Show Abstract
Security solution against denial of service attacks in BESIP system
Author(s): Filip Rezac; Miroslav Voznak; Jakub Safarik; Pavol Partila; Karel Tomala
Show Abstract
IP telephony based danger alert communication system and its implementation
Author(s): Filip Rezac; Jakub Safarik; Miroslav Voznak; Karel Tomala; Pavol Partila
Show Abstract
Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems
Author(s): Ron Knobler; Peter Scheffel; Scott Jackson; Kris Gaj; Jens Peter Kaps
Show Abstract
Solving data-at-rest for the storage and retrieval of files in ad hoc networks
Author(s): Ron Knobler; Peter Scheffel; Jonathan Williams; Kris Gaj; Jens-Peter Kaps
Show Abstract
Automatic analysis of attack data from distributed honeypot network
Author(s): Jakub Safarik; MIroslav Voznak; Filip Rezac; Pavol Partila; Karel Tomala
Show Abstract
Passive radiation detection using optically active CMOS sensors
Author(s): Luke Dosiek; Patrick D. Schalk
Show Abstract
Three dimensional alpha weighted quadratic filter based image color contrast enhancement
Author(s): Chen Gao; Karen Panetta; Sos Agaian
Show Abstract
Mobile object retrieval in server-based image databases
Author(s): D. Manger; F. Pagel; H. Widak
Show Abstract
Novel infrared and thermal image enhancement algorithms
Author(s): Sos Agaian; Mehdi Roopaei
Show Abstract
Iterative local color normalization using fuzzy image clustering
Author(s): Clara Mosquera-Lopez; Sos Agaian
Show Abstract
A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations
Author(s): Knut Kröger; Reiner Creutzburg
Show Abstract
Super resolution based face recognition: do we need training image set?
Author(s): Nadia Al-Hassan; Harin Sellahewa; Sabah A. Jassim
Show Abstract
BossPro: a biometrics-based obfuscation scheme for software protection
Author(s): Torben Kuseler; Ihsan A. Lami; Hisham Al-Assam
Show Abstract

© SPIE. Terms of Use
Back to Top