Share Email Print
cover

PROCEEDINGS VOLUME 6579

Mobile Multimedia/Image Processing for Military and Security Applications 2007
For the purchase of this volume in printed format, please visit Proceedings.com

Volume Details

Volume Number: 6579
Date Published: 2 May 2007

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 6579
Author(s): Proceedings of SPIE
Recent advances in multiview distributed video coding
Author(s): Frederic Dufaux; Mourad Ouaret; Touradj Ebrahimi
Show Abstract
Memory-efficient contour-based region-of-interest coding of arbitrarily large images
Author(s): Nabil G. Sadaka; Glen P. Abousleman; Lina J. Karam
Show Abstract
Super-resolution-based enhancement for real-time ultra-low-bit-rate video coding
Author(s): Wei-Jung Chien; Glen P. Abousleman; Lina J. Karam
Show Abstract
Signal compression via coordinate logic transforms
Author(s): Ethan E. Danahy; Karen A. Panetta; Sos S. Agaian
Show Abstract
A prompt information retrieval system on handheld devices
Author(s): Yo-Ping Huang; Wei Yen; Shi-Hung Lin
Show Abstract
Detecting and isolating malicious nodes in wireless ad hoc networks
Author(s): Fanzhi Li; Sabah Jassim
Show Abstract
Impact on routers performance to classify and condition real-time interactive multimedia traffic based on its PHB
Author(s): Salim Alsharif; Mazen Al-Khatib; Ye Tung
Show Abstract
Switching theory-based steganographic system for JPEG images
Author(s): Ravindranath C. Cherukuri; Sos S. Agaian
Show Abstract
New quantization matrices for JPEG steganography
Author(s): Yesna O. Yildiz; Karen Panetta; Sos Agaian
Show Abstract
Steganography anomaly detection using simple one-class classification
Author(s): Benjamin M. Rodriguez; Gilbert L. Peterson; Sos S. Agaian
Show Abstract
A mesh-based robust digital watermarking technique against geometric attacks
Author(s): Yo-Ping Huang; Wei Yen; Yu-Wei Chen
Show Abstract
Data hiding based on Fibonacci-Haar transform
Author(s): F. Battisti; K. Egiazarian; M. Carli; A. Neri
Show Abstract
A chaotic cipher Mmohocc and its security analysis
Author(s): Xiaowen Zhang; Li Shu; Ke Tang
Show Abstract
Multi-level signature based biometric authentication using watermarking
Author(s): Emanuele Maiorana; Patrizio Campisi; Alessandro Neri
Show Abstract
The problems of using ROC curve as the sole criterion in positive biometrics identification
Author(s): Yingzi Du; Chein-I Chang
Show Abstract
Secure access control to hidden data by biometric features
Author(s): M. Cancellaro; M. Carli; K. Egiazarian; A. Neri
Show Abstract
Log-polar-based framework for mobile vehicle tracking with road follower
Author(s): Pavlo B. Melnyk; Richard A. Messner
Show Abstract
Human visual-system-based image enhancement
Author(s): Eric J. Wharton; Karen A. Panetta; Sos S. Agaian
Show Abstract
Wavelet library for constrained devices
Author(s): Johan Hendrik Ehlers; Sabah A. Jassim
Show Abstract
A robust digital watermarking scheme by use of integral imaging technique
Author(s): Dong-Choon Hwang; Hee-Ju Lee; Dong-Hak Shin; Eun-Soo Kim
Show Abstract
Secure OFDM-UWB communication based on phase hopping
Author(s): Alessandro Neri; Daniele Blasi; Patrizio Campisi
Show Abstract
Quantifying image similarity using measure of enhancement by entropy
Author(s): Eric A. Silva; Karen Panetta; Sos S. Agaian
Show Abstract
Fourier phase domain steganography: phase bin encoding via interpolation
Author(s): Edward Rivas
Show Abstract
Exploiting sub-pixel edge detection methods with high-density sampling to provide .001 pixels rigid target localization
Author(s): Jeffrey F. Gray
Show Abstract

© SPIE. Terms of Use
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray