Jeng-Shyang Pan

According to our database1, Jeng-Shyang Pan authored at least 391 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Special issue HAIS 2014: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems.
Neurocomputing, 2019

2018
An energy-aware routing protocol for wireless sensor network based on genetic algorithm.
Telecommunication Systems, 2018

Pairwise IPVO-based reversible data hiding.
Multimedia Tools Appl., 2018

Parameters with Adaptive Learning Mechanism (PALM) for the enhancement of Differential Evolution.
Knowl.-Based Syst., 2018

QUasi-Affine TRansformation Evolution with External ARchive (QUATRE-EAR): An enhanced structure for Differential Evolution.
Knowl.-Based Syst., 2018

A Compact Co-Evolutionary Algorithm for sensor ontology meta-matching.
Knowl. Inf. Syst., 2018

Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol.
J. Inf. Sci. Eng., 2018

Parallel bat algorithm for optimizing makespan in job shop scheduling problems.
J. Intelligent Manufacturing, 2018

Load balancing for mitigating hotspot problem in wireless sensor network based on enhanced diversity pollen.
J. Information Telecommunication, 2018

Finite-time boundedness of Markovain jump nonlinear systems with incomplete information.
Int. J. Systems Science, 2018

Efficient digit-serial modular multiplication algorithm on FPGA.
IET Circuits, Devices & Systems, 2018

Efficiently updating the discovered high average-utility itemsets with transaction insertion.
Eng. Appl. of AI, 2018

Training samples-optimizing based dictionary learning algorithm for MR sparse superresolution reconstruction.
Biomed. Signal Proc. and Control, 2018

2017
An Energy Balancing Strategy Based on Hilbert Curve and Genetic Algorithm for Wireless Sensor Networks.
Wireless Communications and Mobile Computing, 2017

Monkey King Evolution: an enhanced ebb-tide-fish algorithm for global optimization and its application in vehicle navigation under wireless sensor network environment.
Telecommunication Systems, 2017

Superimposed Sparse Parameter Classifiers for Face Recognition.
IEEE Trans. Cybernetics, 2017

A genetic-based effective approach to path-planning of autonomous underwater glider with upstream-current avoidance in variable oceans.
Soft Comput., 2017

Development of a Three-Dimensional Multimode Visual Immersive System With Applications in Telepresence.
IEEE Systems Journal, 2017

Reversible data hiding based on the local smoothness estimator and optional embedding strategy in four prediction modes.
Multimedia Tools Appl., 2017

Online and offline based load balance algorithm in cloud computing.
Knowl.-Based Syst., 2017

A segment-based approach for large-scale ontology matching.
Knowl. Inf. Syst., 2017

Optimal PPVO-based reversible data hiding.
J. Visual Communication and Image Representation, 2017

Optimal path planning for motion robots based on bees pollen optimization algorithm.
J. Information Telecommunication, 2017

Low-latency digit-serial dual basis multiplier for lightweight cryptosystems.
IET Information Security, 2017

Efficiently mining of skyline frequent-utility patterns.
Intell. Data Anal., 2017

State estimation for discrete-time Markov jump linear systems with time-correlated and mode-dependent measurement noise.
Automatica, 2017

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017

A Matrix-Based Implementation of DE Algorithm: The Compensation and Deficiency.
Proceedings of the Advances in Artificial Intelligence: From Theory to Practice, 2017

Research on Temperature Rising Prediction of Distribution Transformer by Artificial Neural Networks.
Proceedings of the Genetic and Evolutionary Computing, 2017

Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017

Digital Certificate Based Security Payment for QR Code Applications.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Comments on Yu et al's Shared Data Integrity Verification Protocol.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

A Hybrid BPSO-GA Algorithm for 0-1 Knapsack Problems.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

The Optimal Reactive Power Compensation of Feeders by Using Fuzzy Method.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

QUATRE Algorithm with Sort Strategy for Global Optimization in Comparison with DE and PSO Variants.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Day and Night Image Stitching and Rendering.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

The QUasi-Affine TRansformation Evolution (QUATRE) Algorithm: An Overview.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Relay Node Selection Strategy for Wireless Sensor Network.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Nearest Neighbor Search Techniques Applied in the Nearest Feature Line Classifier.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

2016
Cognitive Wireless Networks Using the CSS Technology.
Lecture Notes in Electrical Engineering 384, Springer, ISBN: 978-3-319-31094-7, 2016

A new meta-heuristic ebb-tide-fish-inspired algorithm for traffic navigation.
Telecommunication Systems, 2016

Reversible watermarking based on two embedding Schemes.
Multimedia Tools Appl., 2016

Novel image authentication scheme with fine image quality for BTC-based compressed images.
Multimedia Tools Appl., 2016

QUasi-Affine TRansformation Evolutionary (QUATRE) algorithm: A cooperative swarm based algorithm for global optimization.
Knowl.-Based Syst., 2016

Monkey King Evolution: A new memetic evolutionary algorithm and its application in vehicle fuel consumption optimization.
Knowl.-Based Syst., 2016

Integer transform based reversible watermarking incorporating block selection.
J. Visual Communication and Image Representation, 2016

Reversible data hiding based on flexible block-partition and adaptive block-modification strategy.
J. Visual Communication and Image Representation, 2016

Development of a Wearable Motor-Imagery-Based Brain-Computer Interface.
J. Medical Systems, 2016

Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding.
Inf. Sci., 2016

Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format.
IET Image Processing, 2016

Association rule hiding based on evolutionary multi-objective optimization.
Intell. Data Anal., 2016

Preface.
Appl. Intell., 2016

Novel Non-Contact Control System for Medical Healthcare of Disabled Patients.
IEEE Access, 2016

A Competitive QUasi-Affine TRansformation Evolutionary (C-QUATRE) Algorithm for global optimization.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

QUasi-Affine TRansformation Evolution (QUATRE) Algorithm: A New Simple and Accurate Structure for Global Optimization.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

The Research of Chinese License Plates Recognition Based on CNN and Length_Feature.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

A Comprehensive Evaluation Model for Traffic Rule.
Proceedings of the Genetic and Evolutionary Computing, 2016

On the Security of a Certificateless Searchable Public Key Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2016

Hierarchical PSO Clustering on MapReduce for Scalable Privacy Preservation in Big Data.
Proceedings of the Genetic and Evolutionary Computing, 2016

A Fully-Automated Zebra Animal Identification Approach Based on SIFT Features.
Proceedings of the Genetic and Evolutionary Computing, 2016

Alzheimer's Disease Diagnosis Based on Moth Flame Optimization.
Proceedings of the Genetic and Evolutionary Computing, 2016

Breast Cancer Diagnosis Approach Based on Meta-Heuristic Optimization Algorithm Inspired by the Bubble-Net Hunting Strategy of Whales.
Proceedings of the Genetic and Evolutionary Computing, 2016

Compact Particle Swarm Optimization for Optimal Location of Base Station in Wireless Sensor Network.
Proceedings of the Genetic and Evolutionary Computing, 2016

Handwritten Arabic Manuscript Image Binarization Using Sine Cosine Optimization Algorithm.
Proceedings of the Genetic and Evolutionary Computing, 2016

Tooth Segmentation from Cone Beam Computed Tomography Images Using the Identified Root Canal and Harmonic Fields.
Proceedings of the Intelligent Data Analysis and Applications, 2016

Utilizing Cat Swarm Optimization in Allocating the Sink Node in the Wireless Sensor Network Environment.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

Low Space Complexity Multiplier for Even-Type Gaussian Normal Basis over GF(2m).
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

Time Competition Flooding in High-Density Wireless Sensor Network.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

A Compact Flower Pollination Algorithm Optimization.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

QUasi-affine TRansformation Evolutionary (QUATRE) algorithm: A parameter-reduced differential evolution algorithm for optimization problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

A Behavioral Action Sequences Process Design.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016

A Hybrid Krill-ANFIS Model for Wind Speed Forecasting.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016

Detection and Recognition of Speed Limit Sign from Video.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Bees and Pollens with Communication Strategy for Optimization.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Dynamic Diversity Population Based Flower Pollination Algorithm for Multimodal Optimization.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

BRBA: A Blocking-Based Association Rule Hiding Method.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Metaheuristics for the deployment of 5G.
IEEE Wireless Commun., 2015

Novel Noncontact Dry Electrode With Adaptive Mechanical Design for Measuring EEG in a Hairy Site.
IEEE Trans. Instrumentation and Measurement, 2015

Neighborhood Feature Line Segment for Image Classification.
IEEE Trans. Circuits Syst. Video Techn., 2015

Adaptive reversible data hiding based on a local smoothness estimator.
Multimedia Tools Appl., 2015

Dual watermarking algorithm based on the Fractional Fourier Transform.
Multimedia Tools Appl., 2015

Image steganography based on subsampling and compressive sensing.
Multimedia Tools Appl., 2015

Metaheuristics for the deployment problem of WSN: A review.
Microprocessors and Microsystems - Embedded Hardware Design, 2015

A Balanced Power Consumption Algorithm Based on Enhanced Parallel Cat Swarm Optimization for Wireless Sensor Network.
IJDSN, 2015

Subquadratic space complexity Gaussian normal basis multipliers over GF(2m) based on Dickson-Karatsuba decomposition.
IET Circuits, Devices & Systems, 2015

Hide Association Rules with Fewer Side Effects.
IEICE Transactions, 2015

Manage the Tradeoff in Data Sanitization.
IEICE Transactions, 2015

Design of novel non-contact multimedia controller for disability by using visual stimulus.
Computer Methods and Programs in Biomedicine, 2015

An Improved A* Algorithm for Traffic Navigation in Real-Time Environment.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Deceleration Convergence Strategy for Evolved Bat Algorithm.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Vision Based Front and Rear Vehicle Collision Warning System.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

An Improved JPS Algorithm in Symmetric Graph.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Diversity Enhanced Optimization Based on Communication Strategy Particles and Pollens.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Efficient subquadratic parallel multiplier based on modified SPB of GF(2m).
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Bilinear Feature Line Analysis for Face Recognition.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Fuzzy Extended Feature Line Classifier for Image Classification.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Swarm-Based Sanitization Approach for Hiding Confidential Itemsets.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Evolved Bat Algorithm with Increase-Wave Strategy.
Proceedings of the Genetic and Evolutionary Computing, 2015

Improving the Searching Capacity of Evolved Bat Algorithm by the Periodic Signal.
Proceedings of the Genetic and Evolutionary Computing, 2015

A Novel Load Balance Algorithm for Cloud Computing.
Proceedings of the Genetic and Evolutionary Computing, 2015

An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2015

Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015

A Sanitization Approach of Privacy Preserving Utility Mining.
Proceedings of the Genetic and Evolutionary Computing, 2015

Image Segmentation Using KFTBES.
Proceedings of the Genetic and Evolutionary Computing, 2015

Applications of Cloud Model in Digital Watermarking.
Proceedings of the Intelligent Data Analysis and Applications, 2015

Research on Heuristic Based Load Balancing Algorithms in Cloud Computing.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A Power Consumption Balancing Algorithm Based on Evolved Bat Algorithm for Wireless Sensor Network.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A Dual Watermarking Scheme by Using Compressive Sensing and Subsampling.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A Unified Framework of Single Image Haze Removal under Different Weather Conditions.
Proceedings of the Intelligent Data Analysis and Applications, 2015

2014
A Novel Approach on Behavior of Sleepy Lizards Based on K-Nearest Neighbor Algorithm.
Proceedings of the Social Networks: A Framework of Computational Intelligence, 2014

A Collaborative Computing Framework of Cloud Network and WBSN Applied to Fall Detection and 3-D Motion Reconstruction.
IEEE J. Biomedical and Health Informatics, 2014

Low-Complexity Digit-Serial and Scalable SPB/GPB Multipliers Over Large Binary Extension Fields Using (b, 2)-Way Karatsuba Decomposition.
IEEE Trans. on Circuits and Systems, 2014

Low-Latency Digit-Serial Systolic Double Basis Multiplier over $\mbi GF{(2^m})$ Using Subquadratic Toeplitz Matrix-Vector Product Approach.
IEEE Trans. Computers, 2014

Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes.
IEEE Systems Journal, 2014

Interactive Artificial Bee Colony Supported Passive Continuous Authentication System.
IEEE Systems Journal, 2014

Reversible watermarking based on multiple prediction modes and adaptive watermark embedding.
Multimedia Tools Appl., 2014

Multi-strategy ensemble artificial bee colony algorithm.
Inf. Sci., 2014

No-Reference Quality Metric of Blocking Artifacts Based on Color Discontinuity Analysis.
IEICE Transactions, 2014

Bio-inspired Evolutionary Computing with Context-Awareness and Collective-Effect.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2014

Privacy Preserving Association Rule Mining Using Binary Encoded NSGA-II.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2014

Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Watermarked Multiple Description Scalar Quantization Coding Framework.
Proceedings of the Modern Advances in Applied Intelligence, 2014

A Framework to Evolutionary Path Planning for Autonomous Underwater Glider.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Driving Behavior Analysis of Multiple Information Fusion Based on SVM.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Feature Curve Metric for Image Classification.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Towards SQL Injection Attacks Detection Mechanism Using Parse Tree.
Proceedings of the Genetic and Evolutionary Computing, 2014

No-Reference Image Quality Assessment in Spatial Domain.
Proceedings of the Genetic and Evolutionary Computing, 2014

Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing.
Proceedings of the Genetic and Evolutionary Computing, 2014

A Simple and Accurate Global Optimizer for Continuous Spaces Optimization.
Proceedings of the Genetic and Evolutionary Computing, 2014

Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoost.
Proceedings of the Genetic and Evolutionary Computing, 2014

A Guidable Bat Algorithm Based on Doppler Effect to Improve Solving Efficiency for Optimization Problems.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2014

Completely hide sensitive association rules using EMO by deleting transactions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Use EMO to protect sensitive knowledge in association rule mining by adding items.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Towards Time-Bound Hierarchical Key Management in Cloud Computing.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Reversible Watermarking Based on Position Determination and Three-Pixel Block Difference.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

Feature Line-Based Local Discriminant Analysis for Image Feature Extraction.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

Hybrid Bat Algorithm with Artificial Bee Colony.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

Compact Bat Algorithm.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

An Echo-Aided Bat Algorithm to Construct Topology of Spanning Tree in Wireless Sensor Networks.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Use EMO to protect sensitive knowledge in association rule mining by removing items.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

An improved k-subset algorithm for load balance problems in Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

Incrementally Updating High-Utility Itemsets with Transaction Insertion.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

Association Rule Hiding Based on Evolutionary Multi-Objective Optimization by Removing Items.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Information Forensics and Security, 2013

Fuzzy Forecasting Based on Two-Factors Second-Order Fuzzy-Trend Logical Relationship Groups and Particle Swarm Optimization Techniques.
IEEE Trans. Cybernetics, 2013

Low-Latency Digit-Serial and Digit-Parallel Systolic Multipliers for Large Binary Extension Fields.
IEEE Trans. on Circuits and Systems, 2013

A new non-exact Aho-Corasick framework for ECG classification.
SIGARCH Computer Architecture News, 2013

A Transmission Power Optimization with a Minimum Node Degree for Energy-Efficient Wireless Sensor Networks with Full-Reachability.
Sensors, 2013

Face recognition based on fusion of multi-resolution Gabor features.
Neural Computing and Applications, 2013

The evolutionary random interval fingerprint for a more secure wireless communication.
Mobile Information Systems, 2013

A new fitness estimation strategy for particle swarm optimization.
Inf. Sci., 2013

Diversity enhanced particle swarm optimization with neighborhood search.
Inf. Sci., 2013

From the idea of "sparse representation" to a representation-based transformation method for feature extraction.
Neurocomputing, 2013

An Echo-Aided Bat Algorithm to Support Measurable Movement for Optimization Efficiency.
Proceedings of the IEEE International Conference on Systems, 2013

Digit-Serial GNB Multiplier Based on TMVP Approach over GF(2m).
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

A Novel Feature Extraction Algorithm Based on Joint Learning.
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

Fast Image Blending and Deghosting for Panoramic Video.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Feature Extraction Based on Nearest Feature Line and Compressive Sensing.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Novel Up-Sampling Based Watermarking Multiple Description Coding Frame.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Novel Brain-Computer Interface Controller Scheme for Multimedia Control.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Detection of Region Duplication Forgery in Images under Affine Transforms.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A New Moment Based Image Quality Metric.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Data Hiding Based on Subsampling and Compressive Sensing.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Hierarchical Gradient Diffusion Algorithm for Wireless Sensor Networks.
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013

Design of a monocular simultaneous localisation and mapping system with ORB feature.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

Two classifiers based on nearest feature plane for recognition.
Proceedings of the IEEE International Conference on Image Processing, 2013

Quantification-Based Ant Colony System for TSP.
Proceedings of the Genetic and Evolutionary Computing, 2013

Directional Discriminant Analysis for Image Feature Extraction.
Proceedings of the Genetic and Evolutionary Computing, 2013

Hybrid Digit-Serial Multiplier for Shifted Polynomial Basis of GF(2 m ).
Proceedings of the Genetic and Evolutionary Computing, 2013

Nearest Feature Line and Extended Nearest Feature Line with Half Face.
Proceedings of the Genetic and Evolutionary Computing, 2013

Adaptively Nearest Feature Point Classifier for Face Recognition.
Proceedings of the Innovations in Bio-inspired Computing and Applications, 2013

An Energy-Aware Routing Protocol Using Cat Swarm Optimization for Wireless Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Similarity-based evolution control for fitness estimation in particle swarm optimization.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments, 2013

2012
Special issue: Swarm intelligence and its applications.
Inf. Sci., 2012

Geometrically invariant image watermarking using Polar Harmonic Transforms.
Inf. Sci., 2012

Novel Watermarked MDC System Based on SFQ Algorithm.
IEICE Transactions, 2012

Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition.
Future Generation Comp. Syst., 2012

Enhanced parallel cat swarm optimization based on the Taguchi method.
Expert Syst. Appl., 2012

Adaptive Weighted Nearest Feature Space Analysis and Its Application to Feature Extraction.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2012

Discriminant Analysis Based on Nearest Feature Line.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

A New Statistical-based Algorithm for ECG Identification.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Novel FRFT Watermarking Algorithm Based on the Gray Relational Analysis.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Application of Belief Learning Model Based Socio-rational Secret Sharing Scheme on Cloud Storage.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Dominant Points Based Hand Finger Counting for Recognition under Skin Color Extraction in Hand Gesture Control System.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Image Restoration for Linear Local Motion-Blur Based on Cepstrum.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Nearest Feature Line Discriminant Analysis in DFRCT Domain for Image Feature Extraction.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

A Genetic Algorithm with Elite Mutation to Optimize Cruise Area of Mobile Sinks in Hierarchical Wireless Sensor Networks.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

Directional Discriminant Analysis Based on Nearest Feature Line.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Implementation of Indoor Positioning Using Signal Strength from Infrastructures.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

A Research on Behavior of Sleepy Lizards Based on KNN Algorithm.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Generalized playfield segmentation of sport videos using color features.
Pattern Recognition Letters, 2011

The Structure Optimization of Main Beam for Bridge Crane Based on An Improved PSO.
JCP, 2011

An improved vector particle swarm optimization for constrained optimization problems.
Inf. Sci., 2011

Tabu search based multi-watermarks embedding algorithm with multiple description coding.
Inf. Sci., 2011

Kernel Self-optimized Locality Preserving Discriminant Analysis for feature extraction and recognition.
Neurocomputing, 2011

Compatible Stereo Video Coding with Adaptive Prediction Structure.
IEICE Transactions, 2011

High Capacity Watermark Embedding Based on Invariant Regions of Visual Saliency.
IEICE Transactions, 2011

A New Robust Watermarking Scheme Based on Shuffled Frog Leaping Algorithm.
Intelligent Automation & Soft Computing, 2011

A new scheme of ant colony system algorithm to discovery optimal solution with flip-flop search.
Proceedings of the IEEE International Conference on Systems, 2011

A Parallel Hybrid Evolutionary Particle Filter for Nonlinear State Estimation.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

PSO with Constraint-Preserving Mechanism for Mixed-Variable Optimization Problems.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

Indoor Water-Dispensing Robot with Two-Stage Localization.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

Wavelet-Based Entropy for Digital Audio Watermarking.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Reduce Identical Event Transmission Algorithm for Wireless Sensor Networks.
Proceedings of the Third International Conference on Intelligent Human Computer Interaction (IHCI 2011), 2011

Symmetry Auto-detection Based on Contour and Corner Models.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Biometric Electrocardiogram Card for Access Control System.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Evolutionary Interval Fingerprint for Wireless Network.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

New Anti-phishing Method with Two Types of Passwords in OpenID System.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Overview of Algorithms for Swarm Intelligence.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2011

Neighborhood Discriminant Nearest Feature Line Analysis for Face Recognition.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

Solving Constrained Optimization Problems by an Improved Particle Swarm Optimization.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

An optimization of adaptive transmission with guarantee connection degree for wireless sensor networks.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Biometric driven initiative system for passive continuous authentication.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Distributed Multiple Description Coding - Principles, Algorithms and Systems.
Springer, ISBN: 978-1-447-12247-0, 2011

2010
Guest Editorial.
JNW, 2010

Error-Resilient Triple-Watermarking with Multiple Description Coding.
JNW, 2010

Rotation invariant watermark embedding based on scale-adapted characteristic regions.
Inf. Sci., 2010

Automation Power Energy Management Strategy for Mobile Telecom Industry.
IEICE Transactions, 2010

Fast k-nearest neighbor search algorithm based on pyramid structure of wavelet transform and its application to texture classification.
Digital Signal Processing, 2010

Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Directional two-dimensional principal component analysis for face recognition.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A scaffolding M-learning framework with IMS based IPTV PVR service.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Dimensionality reduction based on nonparametric discriminant analysis with kernels for feature extraction and recognition.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

The open source IPTV service development environment: IPTV service execution environment.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

High capacity watermark embedding based on local invariant features.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Reversible Watermarking Based on Invariant Relation of Three Pixels.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Geometrically Invariant Image Watermarking Using Scale-Invariant Feature Transform and K-Means Clustering.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

A Novel Embedded Coding Algorithm Based on the Reconstructed DCT Coefficients.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

GOP-Flexible Distributed Multiview Video Coding with Adaptive Side Information.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Audio Watermarking with HOS-Based Cepstrum Feature.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

An Effective Image Enhancement Method for Electronic Portal Images.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

An Extensible Particles Swarm Optimization for Energy-Effective Cluster Management of Underwater Sensor Networks.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

A new approach based on XMPP and OSGi technology to home automation on Web.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

Two-dimensional Exponential Discriminant Analysis and its Application to Face Recognition.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

Power Reduction of Wireless Sensor Networks Using Ant Colony Optimization.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Innovations in Digital Watermarking Techniques
Studies in Computational Intelligence 232, Springer, ISBN: 978-3-642-03186-1, 2009

Weighted Fuzzy Interpolative Reasoning Based on Weighted Increment Transformation and Weighted Ratio Transformation Techniques.
IEEE Trans. Fuzzy Systems, 2009

Guest editorial: bio-inspired information hiding.
Soft Comput., 2009

The optimized copyright protection system with genetic watermarking.
Soft Comput., 2009

Face recognition using Gabor-based complete Kernel Fisher Discriminant analysis with fractional power polynomial models.
Neural Computing and Applications, 2009

Kernel optimization-based discriminant analysis for face recognition.
Neural Computing and Applications, 2009

Forecasting enrollments using automatic clustering techniques and fuzzy logical relationships.
Expert Syst. Appl., 2009

Lossless data hiding based on prediction-error adjustment.
Science in China Series F: Information Sciences, 2009

Research and Implementation of Service-oriented Architecture Supporting Locationbased Services on Sensor Networks.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone Images.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

An Improved Particle Swarm Optimization with Feasibility-Based Rules for Constrained Optimization Problems.
Proceedings of the Next-Generation Applied Intelligence, 2009

The triple-watermarking algorithm with multiple description coding over lossy communication networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

RBF Neural Network Based on Fuzzy Evolution Kalman Filtering and Application in Mine Safety Monitoring.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Particle Swarm Optimization with Feasibility-Based Rules for Mixed-Variable Optimization Problems.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Image Segmentation Based on GC-CV.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A New Vector Particle Swarm Optimization for Constrained Optimization Problems.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

The Application and Study of Graph Cut in Motion Segmentation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs.
IEEE Signal Process. Lett., 2008

Information Hiding and Multimedia Signal Processing.
JDIM, 2008

Discriminant Parallel Feature Fusion Based on Maximum Margin Criterion for Pattern Classification.
JDIM, 2008

Kernel class-wise locality preserving projection.
Inf. Sci., 2008

A new measure of index assignment in dynamic channels.
Inf. Sci., 2008

Adaptive quasiconformal kernel discriminant analysis.
Neurocomputing, 2008

Improved search strategies and extensions to k-medoids-based clustering algorithms.
IJBIDM, 2008

MR-MIL: Manifold Ranking Based Multiple-Instance Learning for Automatic Image Annotation.
IEICE Transactions, 2008

Self Embedding Watermarking Scheme Using Halftone Image.
IEICE Transactions, 2008

A Subsampling-Based Digital Image Watermarking Scheme Resistant to Permutation Attack.
IEICE Transactions, 2008

Video Watermarking by Space-Time Interest Points.
IEICE Transactions, 2008

An efficient hybrid distributed video coding.
IEICE Electronic Express, 2008

Scale-Space Feature Based Image Watermarking in Contourlet Domain.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Novel Image Annotation Scheme Based on Neural Network.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Lossless and Lossy Image Secret Sharing for Data Transmission.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Reversible Watermarking Based on the Invariant Sum Value.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHT.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A GA-Based Image Halftoning Technique.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Robust Audio Watermarking Algorithm Based on DCT and Vector Quantization.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Robust Image Watermarking Using Mean Quantization in DTCWT Domain.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Multiple Description Image Coding Based on DSC and Pixel Interleaving.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Face Recognition Algorithm Decreasing the Effect of Illumination.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Halftone Image Data Hiding with Reference to Original Multitone Image.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Information Hiding Scheme for the MDC-OFDM Wireless Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Double-Domains-Based Covert Communication Scheme for a RS-Code-Based Multiple Description Image Coding System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

MRS-MIL: Minimum reference set based multiple instance learning for automatic image annotation.
Proceedings of the International Conference on Image Processing, 2008

Reversible watermarking based on PMO of triplets.
Proceedings of the International Conference on Image Processing, 2008

A Double Domain Based Robust Digital Image Watermarking Scheme.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2008

Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Reversible Watermarking Techniques.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

Tabu Search Based Multi-Watermarking over Lossy Networks.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

An Introduction to Intelligent Multimedia Data Hiding.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

VQ-based watermarking scheme with genetic codebook partition.
J. Network and Computer Applications, 2007

Rotation-based Three Dimensional Shape Descriptor.
JDIM, 2007

Multiuser-based shadow watermark extraction system.
Inf. Sci., 2007

Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding.
Inf. Sci., 2007

Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images.
Informatica, Lith. Acad. Sci., 2007

Reversible watermarking resistant to cropping attack.
IET Information Security, 2007

Lossless Data Hiding Based on Companding Technique and Difference Expansion of Triplets.
IEICE Transactions, 2007

Visible Watermarking for Halftone Images.
IEICE Transactions, 2007

Attacking Phase Shift Keying Based Watermarking.
IEICE Transactions, 2007

Content Adaptive Visible Watermarking during Ordered Dithering.
IEICE Transactions, 2007

A More Robust Subsampling-Based Image Watermarking.
IEICE Transactions, 2007

Multiple Watermarking in Visual Cryptography.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Face Recognition from a Single Image per Person Using Common Subfaces Method.
Proceedings of the Advances in Neural Networks, 2007

Watermarking-Based Transparency Authentication in Visual Cryptography.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

Laplacian Discriminant Projection with Optimized Kernels for Supervised Feature Extraction and Classification.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

Generalized Discrete Fractional Hadamard Transformation and its Application on the Image Encryption.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Hiding Multiple Watermarks in Transparencies of Visual Cryptography.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Covert Communication Scheme for the DCT Based Image Multiple Description Coding System.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2D(PC)2 A for Face Recognition with One Training Image per Person.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Reversible Data Hiding Base on Histogram Shift for 3D Vertex.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Optimized Copyright Protection Systems with Genetic-Based Robust Watermarking.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Information Protection and Recovery with Reversible Data Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Novel High-Capacity Reversiblewatermarking Scheme.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

A Novel Reversible Watermarking Based on an Integer Transform.
Proceedings of the International Conference on Image Processing, 2007

Locally Discriminant Projection with Kernels for Feature Extraction.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

A Criterion for Learning the Data-Dependent Kernel for Classification.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

2006
Intelligent Parallel Particle Swarm Optimization Algorithms.
Proceedings of the Parallel Evolutionary Computations, 2006

Robust observers for neutral jumping systems with uncertain information.
Inf. Sci., 2006

Adaptive Kernel Discriminant Analysis and its Applications on Pattern Recognition.
I. J. Information Acquisition, 2006

Index assignment for MDVQ over memoryless binary symmetric channel with packet erasure.
IEICE Electronic Express, 2006

Robust VQ-Based Digital Image Watermarking for Mobile Wireless Channel.
Proceedings of the IEEE International Conference on Systems, 2006

An Efficient Reformative Kernel Discriminant Analysis for Face Recognition.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006

Cat Swarm Optimization.
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A New 3D Shape Descriptor Based on Rotation.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Complete Kernel Fisher discriminant analysis of Gabor features with fractional power polynomial models for face recognition.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

Joint Halftoning and Visible Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Reversible Data Hiding for 3D Point Cloud Model.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

An Information Hiding Scheme for OFDM Wireless Networks.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Interlacing Domain Partition for Fractal Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Discriminant Feature Fusion Strategy for Supervised Learning.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Fire-Alarming Method Based on Video Processing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Robust VQ-Based Digital Image Watermarking for Noisy Channel.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Robust Image Watermarking Algorithm Based on Predictive Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Image Watermarking Robust to Print and Generation Copy.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An Improved Digital Watermarking Scheme in the Domain of Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
A Parallel Particle Swarm Optimization Algorithm with Communication Strategies.
J. Inf. Sci. Eng., 2005

Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking.
Proceedings of the 17th Conference on Computational Linguistics and Speech Processing, 2005

Speech Authentication by Semi-fragile Watermarking.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Reversible Watermarking Based on Improved Patchwork Algorithm and Symmetric Modulo Operation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Shadow Watermark Extraction System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Lossless Watermarking Technique for Halftone Images.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Improved Image Coding with Classified VQ and Side-Match VQ.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Print and Generation Copy Image Watermarking Based on Spread Spectrum Technique.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Shadow watermark embedding system.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Hiding watermark in watermark [image watermarking].
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Multipurpose image watermarking in DCT domain using subsampling.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Multiple description watermarking for lossy network.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
Genetic watermarking based on transform-domain techniques.
Pattern Recognition, 2004

Novel multi-centroid, multi-run sampling schemes for K-medoids-based algorithms.
KES Journal, 2004

Optimization of HMM by the Tabu Search Algorithm.
J. Inf. Sci. Eng., 2004

Ant colony system with communication strategies.
Inf. Sci., 2004

Vq-Based Gray Watermark Embedding Scheme With Genetic Index Assignment.
International Journal of Computational Intelligence and Applications, 2004

A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm.
IEICE Transactions, 2004

Constrained Ant Colony Optimization for Data Clustering.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004

VQ-Based Gray Watermark Hiding Scheme and Genetic Index Assignment.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Robust VQ-based digital watermarking for memoryless binary symmetric channel.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A VQ-based image-in-image data hiding scheme.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Design of hierarchical keys for a multi-user-based watermarking system.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Improved partial distance search for k nearest-neighbor classification.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Hadamard transform based equal-average equal-variance equal-norm nearest neighbor codeword search algorithm.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

2003
An efficient encoding algorithm for vector quantization based on subvector technique.
IEEE Trans. Image Processing, 2003

An Embedding Algorithm for Multiple Watermarks.
J. Inf. Sci. Eng., 2003

Parallel Ant Colony Systems.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

A Novel VQ-Based Watermarking Scheme with Genetic Codebook Partition.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

2002
A Multi-user Based Watermarking System with Two-Security-Level Keys.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A Multistage VQ Based Watermarking Technique with Fake Watermarks.
Proceedings of the Digital Watermarking, First International Workshop, 2002

An Efficient K -Medoids-Based Algorithm Using Previous Medoid Index, Triangular Inequality Elimination Criteria, and Partial Distance Search.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

2001
Vector quantization based on genetic simulated annealing.
Signal Processing, 2001

A Tabu Seach Based Maximum Descent Algorithm for VQ Codebook Design.
J. Inf. Sci. Eng., 2001

2000
Evolutionary Feature Selection for Texture Classification Using Multiwavelets.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2000), 2000

Image Coding Using SMVQ with Two-level Block Classifier.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000

A new inequality for VQ image coding.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

A fast image coding algorithm using variable-rate mean-match correlation vector quantization.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

VQ Image Coding Using Sub-Vector Techniques.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
A Training Approach for Efficient VQ Codeword Search.
J. Inf. Sci. Eng., 1999

Evaluation of fuzzy rule bases under delayed reinforcement.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

Non-redundant VQ channel coding using modified tabu search approach with simulated annealing.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

A novel channel distortion measure for vector quantization and a fuzzy model for codebook index assignment.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

1998
A new vector quantization image coding algorithm based on the extension of the bound for Minkowski metric.
Pattern Recognition, 1998

2-D Non-Separable Wavelet Bases for Texture Classification with Genetic Feature Selection.
Proceedings of IAPR Workshop on Machine Vision Applications, 1998

Comparison study on VQ codevector index assignment.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

1996
Fast clustering algorithms for vector quantization.
Pattern Recognition, 1996

VQ codevector index assignment using genetic algorithms for noisy channels.
Proceedings of the 4th International Conference on Spoken Language Processing, 1996

1995
Bound for minkowski metric based on LP distortion measure.
Proceedings of the Fourth European Conference on Speech Communication and Technology, 1995


  Loading...