PROCEEDINGS VOLUME 6579
DEFENSE AND SECURITY SYMPOSIUM | 9-13 APRIL 2007
Mobile Multimedia/Image Processing for Military and Security Applications 2007
Proceedings Volume 6579 is from: Logo
DEFENSE AND SECURITY SYMPOSIUM
9-13 April 2007
Orlando, Florida, United States
Front Matter
Proc. SPIE 6579, Front Matter: Volume 6579, 657901 (22 May 2007); doi: 10.1117/12.741638
Image/Video Compression
Proc. SPIE 6579, Recent advances in multiview distributed video coding, 657902 (2 May 2007); doi: 10.1117/12.719535
Proc. SPIE 6579, Memory-efficient contour-based region-of-interest coding of arbitrarily large images, 657903 (2 May 2007); doi: 10.1117/12.719881
Proc. SPIE 6579, Super-resolution-based enhancement for real-time ultra-low-bit-rate video coding, 657904 (2 May 2007); doi: 10.1117/12.720065
Proc. SPIE 6579, Signal compression via coordinate logic transforms, 657905 (2 May 2007); doi: 10.1117/12.720055
Network Issues
Proc. SPIE 6579, A prompt information retrieval system on handheld devices, 657907 (2 May 2007); doi: 10.1117/12.722266
Proc. SPIE 6579, Detecting and isolating malicious nodes in wireless ad hoc networks, 657909 (2 May 2007); doi: 10.1117/12.723953
Proc. SPIE 6579, Impact on routers performance to classify and condition real-time interactive multimedia traffic based on its PHB, 65790A (2 May 2007); doi: 10.1117/12.731297
Security of Media Objects
Proc. SPIE 6579, Switching theory-based steganographic system for JPEG images, 65790C (2 May 2007); doi: 10.1117/12.719014
Proc. SPIE 6579, New quantization matrices for JPEG steganography, 65790D (2 May 2007); doi: 10.1117/12.719450
Proc. SPIE 6579, Steganography anomaly detection using simple one-class classification, 65790E (2 May 2007); doi: 10.1117/12.717979
Proc. SPIE 6579, A mesh-based robust digital watermarking technique against geometric attacks, 65790F (2 May 2007); doi: 10.1117/12.722267
Data Hiding
Proc. SPIE 6579, Data hiding based on Fibonacci-Haar transform, 65790G (2 May 2007); doi: 10.1117/12.720173
Proc. SPIE 6579, A chaotic cipher Mmohocc and its security analysis, 65790H (2 May 2007); doi: 10.1117/12.717682
Identification Systems and Applications
Proc. SPIE 6579, Multi-level signature based biometric authentication using watermarking, 65790J (2 May 2007); doi: 10.1117/12.718673
Proc. SPIE 6579, The problems of using ROC curve as the sole criterion in positive biometrics identification, 65790K (2 May 2007); doi: 10.1117/12.719855
Proc. SPIE 6579, Secure access control to hidden data by biometric features, 65790M (2 May 2007); doi: 10.1117/12.720904
Proc. SPIE 6579, Log-polar-based framework for mobile vehicle tracking with road follower, 65790N (2 May 2007); doi: 10.1117/12.718767
Image/Video Processing and Retrieval
Proc. SPIE 6579, Human visual-system-based image enhancement, 65790O (2 May 2007); doi: 10.1117/12.719551
Proc. SPIE 6579, Wavelet library for constrained devices, 65790P (2 May 2007); doi: 10.1117/12.720713
Poster Session
Proc. SPIE 6579, A robust digital watermarking scheme by use of integral imaging technique, 65790S (2 May 2007); doi: 10.1117/12.718669
Proc. SPIE 6579, Secure OFDM-UWB communication based on phase hopping, 65790T (2 May 2007); doi: 10.1117/12.719160
Proc. SPIE 6579, Quantifying image similarity using measure of enhancement by entropy, 65790U (2 May 2007); doi: 10.1117/12.720087
Proc. SPIE 6579, Fourier phase domain steganography: phase bin encoding via interpolation, 65790W (2 May 2007); doi: 10.1117/12.719512
Proc. SPIE 6579, Exploiting sub-pixel edge detection methods with high-density sampling to provide .001 pixels rigid target localization, 65790X (2 May 2007); doi: 10.1117/12.739318
Back to Top