PROCEEDINGS VOLUME 8755
SPIE DEFENSE, SECURITY, AND SENSING | 29 APRIL - 3 MAY 2013
Mobile Multimedia/Image Processing, Security, and Applications 2013
Proceedings Volume 8755 is from: Logo
SPIE DEFENSE, SECURITY, AND SENSING
29 April - 3 May 2013
Baltimore, Maryland, United States
Front Matter: Volume 8755
Proc. SPIE 8755, Front Matter: Volume 8755, 875501 (6 June 2013); doi: 10.1117/12.2032087
Best Paper Session
Proc. SPIE 8755, Image encryption in the wavelet domain, 875502 (28 May 2013); doi: 10.1117/12.2015725
Proc. SPIE 8755, Biometric feature embedding using robust steganography technique, 875503 (28 May 2013); doi: 10.1117/12.2018910
Proc. SPIE 8755, Performance assessments of Android-powered military applications operating on tactical handheld devices, 875504 (26 June 2013); doi: 10.1117/12.2014771
Proc. SPIE 8755, No-reference quality assessment of H.264/AVC encoded video based on natural scene features, 875505 (28 May 2013); doi: 10.1117/12.2015594
Proc. SPIE 8755, Adjunctive numerical relation codes in multimedia signal covers, 875506 (28 May 2013); doi: 10.1117/12.2018924
Proc. SPIE 8755, A novel method of testing image randomness with applications to image shuffling and encryption, 875507 (28 May 2013); doi: 10.1117/12.2018736
Proc. SPIE 8755, Efficient high-capacity steganography technique, 875508 (28 May 2013); doi: 10.1117/12.2018994
Proc. SPIE 8755, Mean field game theoretic approach for security in mobile ad-hoc networks, 875509 (28 May 2013); doi: 10.1117/12.2015281
Mobile Information Security
Proc. SPIE 8755, Location-assured, multifactor authentication on smartphones via LTE communication, 87550B (28 May 2013); doi: 10.1117/12.2018027
Proc. SPIE 8755, Security enhancement for mobile ad hoc networks routing with OLSRv2, 87550C (28 May 2013); doi: 10.1117/12.2015438
Mobile Biometric Authentication
Proc. SPIE 8755, A new feature selection method for OCT retinal data analysis, 87550G (28 May 2013); doi: 10.1117/12.2014393
Proc. SPIE 8755, Progress in multi-channel image fusion for face image matching, 87550H (28 May 2013); doi: 10.1117/12.2014281
Proc. SPIE 8755, Face detection at a distance with AdaBoost filtering and color-shape information, 87550I (28 May 2013); doi: 10.1117/12.2015350
Proc. SPIE 8755, Feature quality-based multimodal unconstrained eye recognition, 87550J (28 May 2013); doi: 10.1117/12.2018664
Multimedia Algorithms and Systems
Proc. SPIE 8755, High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers, 87550L (28 May 2013); doi: 10.1117/12.2015617
Proc. SPIE 8755, Sub-word based Arabic handwriting analysis for writer identification, 87550M (28 May 2013); doi: 10.1117/12.2017694
Proc. SPIE 8755, ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks, 87550N (28 May 2013); doi: 10.1117/12.2018062
Security, Trust, and Innovative Solutions
Proc. SPIE 8755, Super resolution based face recognition: do we need training image set?, 87550P (28 May 2013); doi: 10.1117/12.2027018
Proc. SPIE 8755, Social network forensics: using commercial software in a university forensics lab environment, 87550Q (28 May 2013); doi: 10.1117/12.2017908
Proc. SPIE 8755, Gait recognition using spatio-temporal silhouette-based features, 87550R (28 May 2013); doi: 10.1117/12.2017950
Proc. SPIE 8755, BossPro: a biometrics-based obfuscation scheme for software protection, 87550T (28 May 2013); doi: 10.1117/12.2030766
Poster Session
Proc. SPIE 8755, Security solution against denial of service attacks in BESIP system, 87550Y (28 May 2013); doi: 10.1117/12.2015379
Proc. SPIE 8755, IP telephony based danger alert communication system and its implementation, 87550Z (28 May 2013); doi: 10.1117/12.2015423
Proc. SPIE 8755, Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems, 875510 (28 May 2013); doi: 10.1117/12.2015434
Proc. SPIE 8755, Solving data-at-rest for the storage and retrieval of files in ad hoc networks, 875511 (28 May 2013); doi: 10.1117/12.2015443
Proc. SPIE 8755, Automatic analysis of attack data from distributed honeypot network, 875512 (28 May 2013); doi: 10.1117/12.2015514
Proc. SPIE 8755, Passive radiation detection using optically active CMOS sensors, 875513 (28 May 2013); doi: 10.1117/12.2015543
Proc. SPIE 8755, Three dimensional alpha weighted quadratic filter based image color contrast enhancement, 875514 (28 May 2013); doi: 10.1117/12.2015619
Proc. SPIE 8755, Mobile object retrieval in server-based image databases, 875515 (28 May 2013); doi: 10.1117/12.2015794
Proc. SPIE 8755, Novel infrared and thermal image enhancement algorithms, 875517 (28 May 2013); doi: 10.1117/12.2016040
Proc. SPIE 8755, Iterative local color normalization using fuzzy image clustering, 875518 (28 May 2013); doi: 10.1117/12.2016051
Proc. SPIE 8755, A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations, 875519 (28 May 2013); doi: 10.1117/12.2017906
Back to Top