default search action
ISBAST 2013: Chengdu, Sichuan, China
- International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China. IEEE 2013
Session 1A
- Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu:
A Blog Clustering Approach Based on Queried Keywords. 1-9 - Nan-Han Lu, Chung-Ming Kuo, Hueisch-Jy Ding:
Automatic ROI Segmentation in B-Mode Ultrasound Image for Liver Fibrosis Classification. 10-13 - Jianhua Kang, Fangyi She, Weidong Zhang, Jie Ping:
Application of Network Analyzer Based on the Automatic Control of LabVIEW in Radio and Television Test. 14-19 - Muzzamil Noor, Haider Abbas:
Anticipating Dormant Functionality in Malware: A Semantics Based Approach. 20-23
Session 1B
- Rong-Jian Chen, Yu-Cha Chen, Jui-Lin Lai, Shi-Jinn Horng:
Data Hiding Using Flexible Multi-bit MER. 24-31 - Chyouhwa Chen, Po-Chung Tung, Wei-Chung Teng:
Exploiting Unsupervised Learning in Publish Subscribe System Design. 32-39 - Zeeshan-ul-hassan Usmani, Sarah Irum, Hassan Afzal, S. Mahmud:
How to Build an Automated Fingerprint Identification System. 40-47 - Zeeshan-ul-hassan Usmani, Sarah Irum, Hassan Afzal, S. Mahmud:
Plug-n-Play AFIS Development for Criminal and Civil Applications. 48-55
Session 2A
- Jiann-Shu Lee, Fei-Hsiang Huang, Hsiao-Chen Kuo:
A New Image Watermarking Scheme Using Non-dominated Sorting Genetic Algorithm II. 56-61 - Ping-Chin Wang, Chow-Sing Lin:
Enhanced Backward Error Concealment for H.264/AVC Videos on Error-Prone Networks. 62-66 - Chi-Chou Kao:
E-Health Design of EEG Signal Classification for Epilepsy Diagnosis. 67-71 - Ding-Horng Chen, Yi-Chen Chang, Pai-Jun Huang, Chia-Hung Wei:
The Correlation Analysis between Breast Density and Cancer Risk Factor in Breast MRI Images. 72-76
Session 2B
- Tz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung:
A Geocasting Forwarding Scheme for Mobile Nodes in VANETs. 77-81 - Wu-Chuan Yang, Shyh-Yih Wang, Shu-Ling Liu:
Efficient Implementation of Block Cipher in JCA. 82-84 - Ing-Chau Chang, Hung-Ta Tai, Dung-Lin Hsieh, Feng-Han Yeh, Siao-Hui Chang:
Design and Implementation of the Travelling Time- and Energy-Efficient Android GPS Navigation App with the VANET-Based A* Route Planning Algorithm. 85-92 - Zong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin:
Interactive Multimedia Technology in Case-Based Medical E-Learning. 93-96
Session 3A
- Jia-Ning Luo, Ming-Hour Yang, Ming-Chien Yang:
An Anonymous Car Rental System Based on NFC. - Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao:
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement. 105-110 - Johannes K. Chiang, Eric Yen, Yu-Long Lin:
On Interoperation of Hybrid Cloud. 111-115 - Johannes K. Chiang, Eric H.-W. Yen, Yen-Hua Chen:
Authentication, Authorization and File Synchronization in Hybrid Cloud: On Case of Google Docs, Hadoop and Linux Local Hosts. 116-123
Session 3B
- Qi Xie, Mengjie Bao, Na Dong, Bin Hu, Duncan S. Wong:
Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks. - Abdul Haseeb Ahmed, Hafiz Malik:
Security of Biometrics Using Multimodal Approach. - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
New Identity-Based Sequential Aggregate Signature Scheme from RSA. - Martin Henzl, Petr Hanácek:
Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding.
Session 4A
- Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao:
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards. - Po-Chun Chang, Kuo-Liang Chung, Wei-Ning Yang, Yong-Huai Huang:
Bitrate-Saving Intra Coding for Depth Video Compression in H.264/MVC Based on D-NOSE Models. - Yanling Chen, E. Heimark, Danilo Gligoroski:
Personal Threshold in a Small Scale Text-Dependent Speaker Recognition. 162-170 - Chi-Kao Chang, Min-Yuan Fang, I-Chang Jou, Nai-Chung Yang, Chung-Ming Kuo:
Subsampling Based Computation-Aware Motion Estimation. 171-175 - Shinfeng D. Lin, Jia-Jen Lin, Chin-Yao Chung:
Sleepy Eye's Recognition for Drowsiness Detection. 176-179
Session 4B
- Junbo Zhang, Jian-Syuan Wong, Yi Pan, Tianrui Li:
H2T: A Simple Hadoop-to-Twister Translator for Cloud Computing. 180-186 - Wei-Ting Liao, Wen-Yen Lin, Wen-Cheng Cheng, Kin Fong Lei, Ming-Yih Lee:
Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers. 187-192 - F. Alsaade, M. Zahrani, Turki Ali Alghamdi:
Score-Level Fusion in Biometric Verification. 193-197
Session 5A
- Jui-Lin Lai, Kuo-Hung Liao, Yi-Te Lai, Rong-Jian Chen:
Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte Transformation. 198-202 - Chun-Rong Su, Jiann-Jone Chen, Kai-Lin Chang:
Content-Based Image Retrieval on Reconfigurable Peer-to-Peer Networks. 203-211 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:
A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones. 212-216 - Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Xuehu Yan, Xiamu Niu:
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. 217-223
Session 5B
- Hanzhou Wu, Hongxia Wang:
Multibit Color-Mapping Steganography Using Depth-First Search. 224-229 - Lu Leng, Andrew Beng Jin Teoh, Ming Li, Muhammad Khurram Khan:
Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code. 230-234 - Chih-Hua Tai, Jen-Wei Huang, Meng-Hao Chung:
Privacy Preserving Frequent Pattern Mining on Multi-cloud Environment. 235-240 - Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan:
Core-Point Detection on Camera-Based Fingerprint Image. 241-246
Session 6A
- Saru Kumari, Fahad Bin Muhaya, Muhammad Khurram Khan, R. Kumar:
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme". 247-250 - Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Hsien-Hsin Chou, Xian Wang, Minyi Guo:
Adaptive Non-Local Means for Image Denoising using Turbulent PSO with No-Reference Measures. 251-258 - Ching-Nung Yang, Jia-Bin Lai:
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing. 259-266
Session 6B
- Jyhjong Lin, Shin-Jer Yang:
An Architecture and Application of Cloud-Based Customer Knowledge Management Information Systems. 267-272 - Shin-Jer Yang, Pei-Ci Lai, Jyhjong Lin:
Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services. 273-279 - M. Anwar Hossain, Sk. Md. Mizanur Rahman:
Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design. 280-285 - Shaohua Wan, Hua Yang:
Comparison among Methods of Ensemble Learning. 286-290 - Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan, Yasser M. Alginahi:
Authentication and Tamper Detection of Digital Holy Quran Images. 291-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.