networking and security - willkommen — verbundzentrale … · 2011-03-14 · improving...
TRANSCRIPT
2010 International Conference on
Multimedia Information
Networking and Security
(MINES 2010)
Nanjing, China
4-6 November 2010
Editors:
Xi Chen Stefanos Gritzalis
Shiguo Lian
IEEE IEEE Catalog Number: CFP1096H-PRT
ISBN: 978-1-4244-8626-7
2010 International Conference
on Multimedia Information
Networking and Security
MINES 2010
Table of Contents
Greetings from the General Chairs. xix
Greetings from the Technical Programming Committee
Chairs xxi
Organizing Committee xxiii
Reviewers xxix
Track I: Multimedia Computing and Intelligence
Optical Image and SAR Image Matching Based on Scattered Edge Feature 1
Hui Cheng
TBM: A High-Effective Monitoring Algorithm to the Quality of IPTV
Transmission 5
Zhigang Sun, Ziwen Zhang, Dong Wang, and Hua ZhangThe Color Components' Exchanging on Different Color Spaces for Image
Segmentation of Hematocyte 10
Hang Dai and Xi Li
Application Research of Voice Control in Reading Assistive Device for Visually
Impaired Persons 14
Zeng Fanfeng
Trajectory Based Sign Language Video Retrieval Using Revised String Edit
Distance 17
Shilin Zhang and Bo ZhangA New Rate Adaptive Control Algorithm for JPEG2000 23
Qi-hu Li, Yan-yan Zhang, Guo-qiang Ren, Qin-zhang Wu, and Wen-jun Han
Coordinated Multi-sensors Coverage Based on Parallelism Selection Genetic
Algorithm 28
Bin Wu and Hailin Feng
Iterative Algorithm of Fixed Points for Nonexpansive Mappings by Metric
Projections 32
Yuanheng Wang andZongsheng Sheng
V
Fast Texture Segmentation Based on Semi-local Region Descriptor and Active
Contour Driven by the Bhattacharyya Distance 35
Shanqing Zhang, Weibin Xin, and Guixu Zhang
A Multiple Description Coding Approach for Overlay Multipath Video
Streaming Based on QoE Evaluations 39
Majd Ghareeb and Cesar Viho
2PASCD: An Efficient 2-Pass Abrupt Scene Change Detection Algorithm 44
Aditya Vashistha, Rajarathnam Nallusamy, and Sanjoy Paul
A Style Transfer Algorithm of Caricature 49
Wenjuan Chen, Guoyu Sun, Haiyan Li, Qingjie Sun, and Minyong Shi
HKC: A Dictionary Training Algorithm for Sparse Representation 54
Jian Xu and Zhiguo Chang
Blind Source Separation of Audios Based on Bayesian Method 58
Jiayu An, Hut Wang, Bing Zhu, Juanjuan Cai, and Qin Zhang
A New Efficient Method of Computing MDCT in MP3 Audio Coding 63
Guixing Wu and En-hui Yang
Application of Improved Snake Model in Segmentation of Korean Pine Cone
Image 68
Su Jian-min and Wang Xiao-li
RD-Based Adaptive UEP for H.264 Video Transmission in Wireless Networks 72
Zenghua Zhao and Shubing Long
A Scalable Clustering Algorithm Based on Affinity Propagation and Normalized
Cut 77
Lei Huang, Jiabin Wang, and Xing He
An Edge-Adaptive Interpolation Algorithm for Super-Resolution Reconstruction 81
Xiao-feng Wang and He-lei Ling
Event Element Identify of Internet Context 85
Fu Chen
Hierarchical Access Control for Scalable Video Coding 89
Gui Zhang and Chun Yuan
Track II: Information Networking and Communication
Simulation and Analysis of Optimized OLSR 97
Li Zhiyuan and Hu Jinhong
Modeling the Critical Transmitting Range for Connectivity in Wireless Sensor
Networks 101
Yanhuai Qu, Jianan Fang, and Shuai ZhangA Dynamic Multi-relay Cooperation Node Selection Algorithm 106
Qin Qin, Zeng Zhimin, Zhang Tiankui, and Zhang Congqing
vi
Error-Bounded Data Compression Using Data, Temporal and Spatial
Correlations in Wireless Sensor Networks 111
Meng-Han Li, Chih-Chung Lin, Chi-Cheng Chuang, and Ray-I Chang
The Forwarding Indices of Enhanced Hypercube Networks 116
Changqing Liu and Hongmei Liu
Performance Evaluation of SigComp in MANETs 119
Yanling Wu, Yuncheng Liu, and Ming Li
Fragment Maintenance in Distributed Storage Systems 123
Xiaoyuan Yang and Shuaishuai Zhu
Research and Realization of IPv4 Virtual Service Based on the ForCES
Framework 127
Hua Wang, Bin Zhuge, and Weiming Wang
USMI: An Ultra-Node Selection Mechanism with Incentive in P2P Network 131
Huo Ying and Chen Zhigang
Equilibrium Network with Core-Periphery Architecture of Local Information
Flow 141
Xinjie Zhao, Hongwei Gao, Wenwen Li, Nana Sun, Una Sun, and Dandan Dong
Research and Implementation on QoS Routing Algorithm to Meet Multimedia
Applications 145
Huqi'ng Wang and Zhixin Sun
Packet Forwarding Based on Cooperative Game and Auction Theoryin Wireless Ad Hoc Network 149
Bo-qing Yang and Hao Sun
Modeling and Simulation of Link-16 System in Network Simulator 2 154
Zhao-xiong He andXing Liu
Improving Data Transmission Reliability with Network Coding in Wireless
Sensor Network 159
Jing Hao, Hailin Feng, and Guangxue Wu
Internet Traffic Identification Using Community Detecting Algorithm 164
Jun Cai and Shun-Zheng Yu
HTTP Proxy Server Based on Real-Time Link 169
Guang-feiDu, Zhi-hong Zhang, andXiao-ying Wu
A Novel Fixed Contention Window Backoff Algorithm for IEEE 802.11 WLAN 174
Chun Shi, Xianhua Dai, Qi Zhou, and Jianyao Nie
Vector-Based Low-Delay Forwarding Protocol for Underwater Wireless Sensor
Networks 178
Chang Su, Xiaoming Liu, and Fengju Shang
A Future Network Architecture for Resource Sharing and Service Diversity 182
Rui Li, Jianya Chen, Yunjie Liu, and Tao Huang
vii
Analyzing and Improving the Simulation Algorithm of IEEE 802.11DCF Error
Frame Model in QualNet Simulator 187
Lei Lei, Qing Zhu, Jinhua Zhou, and Weiling Cai
Management Innovation of Promoting the Development of Private Enterprise
in Hebei Province is Technology Roadmap 192
HongMei Zhang
How Can Peers Assist Each Other in Large-Scale P2P-VoD Systems 198
Yubao Zhang, Hui Wang, Pei Li, Zhihong Jiang, and Chao Gao
Mobile Awareness Based Hybrid MAC Protocol for Tactical Data Link
Networks 203
Jiqiang Tang and Youguang ZhangThe Placement Scheme for Static Nodes in a Circular WSN Area Based on
the Analysis of Density and Energy 208
Jiechao WangThe Empirical Analysis on the Information Technology Risk Control Evaluation
System in the Commercial Bank Based on URSIT Frame 213
Mingxing Li and Tongjian Zhang
Track III: Service Science and Intelligence
Analysis of Externality Based on Internet 217
Lin Zhongyan
Design and Implement of the Electric and Electronic Virtual Experiment
System 221
Shoucheng Ding, Wenhui Li, Jianhai Li, and Wanqiang Lu
A Novel Model Supporting Customization Sharing in SaaS Applications 225
Lanju Kong, Qingzhong Li, and Xuxu Zheng
Web-Service-Based Design for Rural Industry by the Local e-Government 230
Hongyan Wang, Quanyin Zhu, Jianchun Shen, and Suqun Cao
Web Services Security Policy 236
Yongsheng Zhang, Cuicui Sun, Yang Jing, and Wang Ying
A Modeling Approach on Self-Adaptive Composite Services 240
Liang Ge and Bin Zhang
IMS Management & Monitoring with eTOM Framework and Composite Web
Service 245
B. Raouyane, M. Errais, M. Bellafkih, and Mohamed Ramdani
The Adaptive Method for Closely Communicating Community Detection Based
on Ant Colony Clustering 250
Yan Liu, Lian Liu, and Junyong Luo
Automatic Term Extraction in Cryptology Based on Extension of Central String 255
Chen Shichao and Yu Bin
Optimizing Queries with Expensive Video Predicates Based on Estimation
of Attribute Cardinality 259
Lisheng Yu, Jianmei Zhang, and Shan Wang
viii
Customer Adoption of Internet Banking: An Integration of TAM with Trust,
Perceived Risk, and Quality 264
Hong-Lei Song
The Worm Propagation Model with Pulse Quarantine Strategy 269
Yu Yao, Hao Guo, Fu-xiang Gao, and Ge Yu
An Improved DTC Algorithm for Reducing Torque Ripples of PMSM Based
on Cloud Model and SVM 274
Li Ningzhou, Wei Xiaojuan, and Feng Xiaoyun
Research on Operational Strategies of B-to-C Websites Based on Experiential
Marketing 278
Tong Li and Liping Chen
Geospatial Information Security Web Service Based on Agent 283
Jing Sun, Jin Liu, Zhengquan Xu, and Zhe Wu
Improved Authentication Scheme Using Facial Recognition Scheme Based
on RFID Tag 287
Dae-Hee Seo, Jang-Mi Baek, Mi-Yeon Yoon, Jung-Wook Choi, Dong-Sub Cho,
and Yunjeong Jo
A Dynamic Data Storage Architecture for SaaS 292
Wu Shengqi, Zhang Shidong, and Kong Lanju
Apply ARX Program to Improve the Precision of the Digital Control System
of Antiaircraft Guns 297
Wang Hao-yu, Gu Xue-wen, Li Yun, Tan Zhong, and Zhu Jian-ye
Empirical Research of Mobile Reading Consumers' Behavior Intention 301
Ma Ling and Ding Lin
Improved SOM Algorithm-HDSOM Applied in Text Clustering 306
Ai-xiang Sun
Research on Software Cascading Failures 310
Wenhui Lan, Kuanjiu Zhou, Jinjin Feng, and Zongzheng Chi
Factors Affecting Privacy Disclosure on Social Network Sites: An Integrated
Model 315
Xuefeng Li and Xi Chen
Web Service Based Enterprise Mobile Information System 320
Jingjing Tao and Xi Chen
An Initial Review of Cloud Computing Services Research Development 324
Wei Zhao
Research on Vehicle Routing Problem of Cold Chain Logistics 329
Wang Ying and Chen Xi
Track IV: Multimedia Information Security
Obligation Constraints in Access Control 335
Zongda Wu, Jianfeng Lu, and Chenglang Lu
Detecting Composite JPEG Images in Transform Domain 340
Ergong Zheng, Xijian Ping, and Tao Zhang
ix
Social Networks Based Fingerprint Code: SNBFC and Its Pirates Tracing
Algorithm to Majority Attack 345
Conghuan Ye, Hefei Ling, Fuhao Zou, and Zhengding Lu
Type Redefinition Plagiarism Detection of Token-Based Comparison 351
Lifang Han, Baojiang Cui, Ru Zhang, Zhongxian Li, Jianxin Wang, and Yongle Hao
Novel Hybrid Blind Digital Image Watermarking in Cepstrum and DCT Domain 356
Piotr Lenarczyk and Zbigniew Piotrowski
A Case Study of Software Security Test Based on Defects Threat Tree
Modeling 362
Song Huang, ZhanWei Hui, Liang Wang, andXiaoMing Liu
A RSC Invariant Watermarking Scheme Utilizing Image Normalization
for Synchronization 366
Wu Jianzhen and Li Hongqin
Visual Tracking Model Based on Feature-Imagination and Its Application 370
Xiaoxiao Xu, Zhiling Wang, and Zonghai Chen
A Xen-Based Secure Virtual Disk Access-Control Method 375
Fagui Liu, Hao Zhang, and Haiyan Zhou
Blind Tampering Identification by Incorporating EFR and Calibration 379
Kaiwei Cai, Xiaolong Li, Bin Yang, and Xiaoqing Lu
N-Day Average Volume Based Time-Series Analysis for Passenger Flow
of Metro 384
Hai-yan Zhu
An Improved BPCS Steganography Based on Dynamic Threshold 388
Peipei Shi and Zhaohui Li
Drift Correction Modulation Scheme for Digital Audio Watermarking 392
Zbigniew Piotrowski
Track V: Communication and Network Security
Risk Evaluation of Network Security Based on NLPCA-RBF Neural Network 398
Jingxue Ran and Bo Xiao
An ID-Based Proxy Multi-signcryption Scheme from Pairings 403
Weiping Zuo
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers .- 406
Chang N. Zhang, Q/'an Yu, and Xiao Wei Liu
Certificateless Ring Signature Scheme from Anonymous Subsets 413
Huaqun Wang
A New Authentication Protocol for Roaming in Wireless Mesh Networks Based
on Three-Party Key Agreement 418
Peng Xiao, Jingsha He, and Yingfang Fu
A Provably Secure Parallel Certificatelesss Ring Signcryption Scheme 423
Lijun Zhu, Futai Zhang, and Songqin Miao
X
Fully Secure Anonymous Identity-Based Encryption under Simple
Assumptions 428
Yanli Ren, Shuozhong Wang, Xinpeng Zhang, and Zhenxing Qian
Research on Context and Trust-Based Grid Service Authorization Model 433
Houren Xiong and Bin ZhangAn Approach to Analyze Covert Channel Based on Finite State Machine 438
Xiong Liu, Jian-guo Hao, and Yi-qi Dai
Formal Analysis and Improvement of Two-Factor Authenticated Key Exchange
Protocol 443
Ying Liu, Fushan Wei, and Chuangui Ma
Research and Analysis about Attack and Guard for QQ 448
Hongru Wei, Pei Xiaoqiang, Li Yaoyao, and Huang JingheResearch on Detector Generating Algorithm Based on Artificial Immune 452
Zhen Liu, Su Xu, and Jun Li
Public Key Cryptosystems from the Multiplicative Learning with Errors 456
Gu Chunsheng
Vertex-Fault-Tolerant Cycles Embedding on Enhanced Hypercube 460
Liu Yingying, Liu Hongmei, and Zhang Yanjuan
A New Hierarchical Key AuthData Management Scheme for Trusted Platform 463
Weiping Peng, Yajian Zhou, Cong Wang, Yixian Yang, and Yuan Ping
Research on XML-Based Key Management Service for Identity-Based
Cryptography 468
Tieming Chen, Jie Jiang, Bo Chen, and Wei Li
Data Exchange between Multilevel Security Management System Based Ice 473
Luo Yang and Zheng Chang-xing
A Secure Proxy Blind Signature Scheme Based on DLP 477
Binayak Kar, Pritam Prava Sahoo, and Ashok Kumar Das
Proactive Vulnerability Finding via Information Flow Tracking 481
Zhi Liu, Xiaosong Zhang, andXiongda Li
Variable Length Character N-Gram Approach for Online Writeprint
Identification 486
Jianwen Sun, Zongkai Yang, Pei Wang, and Sanya Liu
Research on Decision of Cyber Security Investment Based on EvolutionaryGame Model 491
Rong Pan and Changxin Xu
Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy
Transmission 496
Guiyi Wei, Xueli Wang, and Yuxin Mao
Extensive Design for Attack's Recognition and Resistance of Survivable
Network 501
Xu Hui, Zhu Yanqiong, and Zhou Jianmei
RBAC Permission Consistency Static Analysis Framework 506
Tao Wang, Wei-hua Li, and Zun Liu
xi
Security Analysis of Projected C*- Scheme 511
Feng Yuan, Yupu Hu, and Yan Wang
A Secure Confidential Document Model and Its Application 516
Shi-yuan Zheng and Jun Liu
Certificateless Two Party Key Agreement Protocol 520
Liu Wenhao, Xu Chunxiang, and Xu Jian
Certificate-Based Perfect Concurrent Signatures 526
Zhenjie Huang and Jianneng Chen
LT Codes with a New Degree Distribution 531
Liang Li and Jiaxiang Zhao
Concept Alignment in Attribute Based Access Control 536
Tianyang Zhou, Qingxian Wang, and Changzheng Xu
Password Protected Credentials 541
Yanjiang Yang and Feng Bao
RBAC Constraints Specification and Enforcement in Extended XACML 546
Nurmamat Helil and Kaysar Rahman
Fault Diagnosis Analysis in Large-Scale Computing Environments 551
Yan Xue and Xuefang Zhu
The Probability of Trojan Attacks on Multi-level Security Strategy Based
Network 555
Tao Yin, Lansheng Han, Chun Wan, Xiao Qu, and Yuan Li
Simulation and Analysis of LDoS Attacks 560
Jing Zhang, Bo Liu, Huaping Hu, and Lin Chen
Co-dimension 1 Bifurcations of the Delayed Internet TCP-RED Model 565
Pei Lijun, Zhang Li, and Wang Ruimin
A Security Assessment Model for E-Commerce Based on Entropy Weight
Coefficient Method 570
Bai Tao and Du GuanghuiDetection of Packet Length Based Network Steganography 574
Anand S. Nair, Arijit Sur, and Sukumar Nandi
A Novel Method of Outliers within Data Streams Based on Clustering EvolvingModel for Detecting Intrusion Attacks of Unknown Type 579
Gang Xiong and Minxia Zhang
A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy
and Security 584
Jian Shen, Dongmin Choi, Sangman Moh, and llyong Chung
Application and Research on Active Protection for Campus Network Based
on Multi-cores UTM 589
HuaQun Liu and LiangBin Zheng
Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme 593
Songqin Miao, Futai Zhang, and Lei Zhang
Defeating TCG TOCTOU Attacks in Trusted HVM 598
Xiaolin Chang, Han Zhen, JiQiang Liu, Bin Xing, and Jogesh K. Muppala
xii
Fourth-Order Finite Difference Approach for Numerical Solution of Burgers
Equation 603
Mamatimin Umar, Nurmamat Helil, and Kaysar Rahman
Special Session 1: Applications and Security in Cultural HeritageEnvironments
Segmentation and Tagging of Oracle Inscriptions Based on Lucene
and Dictionary 608
Jin-yu Kai, Na Li, and Yong-ge Liu
Constructing Classification Model with MapReduce 611
Xiangxiang Chen, Kaigui Wu, and Changze Wu
A Secure Data Management Model for Cultural Organizations 616
Vasiliki Liagkou and Paul Spirakis
ICT for Human Development in South Pacific 621
Eduard Babulak
Special Session 2: Security, Privacy and Copyright in Multimedia Social
Network
Combination Algorithm of Active and Passive Security Protection for ImageBased on Arnold Transform 625
Li Jiang and Zhengquan Xu
Analysis on Wavelet Coefficient for Image Watermarking 630
Lei Hu and Fang Wan
Text's Source Trustworthiness Detection Based on Cognitive Hash 635
Donghui Hu, Juan Zhang, Xuegang Hu, Lian Wang, Wenjie Miao,
and Zhengfeng Hou
The Design of Combined Random Number Generator 640
Xiaohui Guan and Yaguan Qian
Authentication Protocols to Support Fast Handoff for 802.11s Mesh Networks 644
Yang Wei-dong, Liu Ji-zhao, Wang Ke, and Sun Li-Ming
Special Session 3: Watermarking and Steganography in Multimedia
Image Self-Embedding with Large-Area Restoration Capability 649
Zhenxing Qian and Tong Qiao
Histogram-Based Perceptual Image Hashing in the DWT Domain 653
Shijun Xiang
Bhattacharyya Distance for Blind Image Steganalysis 658
Ke Ke, Tao Zhao, and Ou Li
A New Encryption Method Using Turbo Code 662
Qian Mao, Chuan Qin, and Decun Dong
A Novel Semi-fragile Authentication Watermarking Scheme of Color JPEG
Image in Compressed Domain 666
Qunting Yang, Tiegang Gao, and Fan Li
xiii
Robust Software Watermarking Scheme Based on Obfuscated Interpretation 671
Ying Zeng, Fenlin Liu, Xiangyang Luo, and Chunfang Yang
Reversible Data Hiding of Subsampled Model for Edge-Information Prediction 676
Guorui Feng and Lingyan Fan
Steganalysis of Analysis-by-Synthesis Compressed Speech 681
Qi Ding and Xijian Ping
A Further Study on a PVD-Based Steganography 686
Liping Ji, Xiaolong Li, Bin Yang, and Zhihong Liu
Cryptographic Secrecy Analysis of Matrix Embedding 691
Jiufen Liu, Jiayong Chen, Weiming Zhang, and Tao Han
Special Session 4: Large-Scale Multimedia Search and MiningAssociation Rule Mining with Establishment of Frequent Item Set Vectors 696
Hai-yan Zhou and Qi Hut
A Relevance Feedback System for CBIR with Long-Term Learning 700
Lu Hui, Huang Xiang-Lin, Yang Li-Fang, and Liu Min
A Fast Biological Data Mining Algorithm Based on Embedded Frequent
Subtree 705
Zhong-xue Yang
The CMVAI-File: An Efficient Approximation-Based High-Dimensional Index
Structure 710
Lihong Ye and Yuan Hua
Special Session 5: Mobile Internet and Service Innovation
Research on E-commerce Capability Evaluation Model Based on DEA 714
Yingjin Lu, Xianglan Jiang, and Jiao Lu
Analyzes IPTV Security Threats under the Triple Play 720
Liu Tibin
Virtual Resource Organization and Virtual Network Embedding across MultipleDomains 725
So Lv, Zhenkai Wang, Tao Huang, Jianya Chen, and Yunjie Liu
Municipal Solid Waste Recycle Management Information Platform Based
on Internet of Things Technology 729
Chen Tao and Li Xiang
A General Review of Mobile E-Government in China 733
Chen Su and Ma Jing
Application Model of Mobile E-Government in Wuhan Urban Circle 738
Chen Su and Zhou Pei
The Impact of KIBS on Divisions of Manufacturing Corporations: The Cases
of Japan 742
She Shuo and Akio Nagahira
xiv
Comparative Study on E-Govemment from the Perspective of Local
Government between China and the U.S 746
Zeng Yuhang
Special Session 6: Trusted Software in Information Networking
A Comprehensive Monitor Model for Self-Healing Systems 751
Dong Xikun, Wang Huiqiang, and Lv Hongwu
An Approach of Inconsistency Verification of Use Case in XML and the Model
of Verification Tool 757
Ning Jin and Jing YangResearch of Agile Software Development Based on Formal Methods 762
Anfan Zuo, Jing Yang, and Xiaowen Chen
Administrative Domain: Security Enhancement for Virtual TPM 767
Xin Jin, Li-na Wang, Rong-wei Yu, Peng Kou, and Cheng-lin Shen
The Impacts of Some Distrustable Factors on Software Quality 772
Jizhou Zhan, Xianzhong Zhou, and Jiabao Zhao
Special Session 7: Wireless Network Security
On the Security of Some Self-Healing Key Distribution Schemes 777
Huaqun WangThe Application of Trust Model in WLAN 781
Guo-Zi Sun, Jie Wei, Dan-Wei Chen, and Wei-Ming Geng
A Secure Clustering Scheme Protocol for MANET 785
Li Wang and Fei Gao
Continuum-State Communication Network Reliability Model 790
Yu Jiang, Aiqun Hu, and Yubo Song
Mobile Office Security Technology for WLAN 795
Yu Jiang, Guoqin Li, and Aiqun Hu
Study on Application of TNC Technology in Mobile Office 799
Guoqin Li, Yu Jiang, and Aiqun Hu
Implicit Security Authentication Scheme in Wireless Sensor Networks 804
Haiguang Chen, XinHua Chen, and Junyu Niu
A Promising Pairwise Key Establishment Scheme for Wireless Sensor
Networks in Hostile Environments 809
Wenqi Yu
A GSM/UMTS Selective Jamming System 813
Song Yubo, Zhou Kan, Yao Bingxin, and Chen Xi
A Partial Zero-Forcing Precoding Method for Downlink Multi-user MIMO
Channel 816
Bingxin Yao and Yubo Song
XV
Workshop 1: Second International Workshop on Network SteganographyIWNS2010
Encryption Scheme Based on Invertible Watermarking
Jinwei Wang, Yufeng Shi, and Shiguo Lian
Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless
Sensor Networks
David Martins and Herve Guyennet
Stream Control Transmission Protocol Steganography
Wojciech Frajzzek, Wojciech Mazurczyk, and Krzysztof Szczypiorski
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
Krzysztof Szczypiorski and Wojciech Mazurczyk
A Steganography Method for AAC Audio Based on Escape Sequences
Yujie Wang, Li Guo, Yifang Wei, and Cuiping Wang
Retransmission Steganography Applied
Wojciech Mazurczyk, Milosz Smolarczyk, and Krzysztof Szczypiorski
Workshop 2: Service-Oriented Architecture and Services Computing -
SOASC2010
Identity-Based Authentication in Cloud Storage Sharing
Lishan Kang and Xuejie Zhang
Amalgamation of Ontologies via a Statistical Approach
Peng Liu, Gonghua Xu, Chuang Xu, Xiaoxuan Wang, and Xiaoying Wang
Similarity Matching Algorithm of Multiple Granularities Time-Series Data
Wenning Hao, Enlai Zhao, Hongjun Zhang, Gang Chen, and Shuining Zhao
Application of Bloom Filter in Grid Information Service
Xueming Li, Lijuan Peng, and Chunlin Zhang
Workshop 3: Secure Multimedia Communication and Services - SECMCS
2010
Multimedia Content Tracing Scheme Based on Tardos' Fingerprint Codes
Hongyuan Li, Guangjie Liu, Junwen Wang, Yuewei Dai, and Zhiquan Wang
Some Results on the Degenerate Criterion of Cryptographic Functions
over Finite Fields
Jihong Teng, Xiaoying Huang, and Weiming Zhang
Efficient Matrix Embedding Based on Random Linear Codes
Jiayong Chen, Yuefei Zhu, Yong Shen, and Weiming Zhang
Image Encryption Algorithm Based on DNA Sequences for the Big Image
Shihua Zhou, Qiang Zhang, andXiaopeng Wei
Image Copy-Move Forgery Detection Based on SURF
Xu Bo, Wang Junwen, Liu Guangjie, and Dai Yuewei
A Covert Channel Detection Algorithm Based on TCP Markov Model
Jiangtao Zhai, Guangjie Liu, and Yuewei Dai
xvi
Color Filter Array Synthesis in Digital Image via Dictionary Re-demosaicing 898
Sun Guangling, Shen Zhoubiao, and Chen YuejunSecure Image Delivery Scheme Using Poisson Editing 902
Chuan Qin, Jia-Hong Li, Wei-Bin Lee, andXinpeng Zhang
Image Forgery Forensics Based on Manual Blurred Edge Detection 907
Junwen Wang, Guangjie Liu, Bo Xu, Hongyuan Li, Yuewei Dai, and Zhiquan Wang
A Content Providing System with Privacy Protection 912
Shuhui Hou and Tetsutaro Uehara
An Efficient Signcryption Schemes Based on Bilinear Maps 918
Jianhong Zhang andXiuna Su
Image Splicing Detection Using Color Edge Inconsistency 923
Zhen Fang, Shuozhong Wang, andXinpeng Zhang
How Unstable Can Be a Heterogeneous Multimedia Network
under Adversarial Attacks That Change Dynamically Link Slowdowns? 927
Dimitrios Koukopoulos
Workshop 4: Multimedia Contents Analysis and Applications - MCAA 2010
Vector and Scalar Edge Extraction from Multi-spectral High Spatial Resolution
Remotely Sensed Imagery (MHSRRSI) in Weighted Color Space 932
Liu Jianhua and Mao Zhengyuan
Struts+Spring+Hibernate Integrated Framework and Its Use in Log Accounting
and Analyzing System 936
Xiafei Hao and Hongxi Tang
Design and Research of Network Video Teaching System 940
Li Qingsheng, Yang Yuxing, and Wang Jipeng
Study of Fire Recognition System Based on Dmpster-Shafer Evidence Theory 945
Jianjun Liao, Xiaotai Niu, Qiuping Guo, and Xiaoning Li
Researches on the Applications of Mass Short Messages in Hospital
Information System 949
Xiao-fan Zhao and Shun-yi Hu
A Novel Steganalysis Scheme of Digital Video 952
Su Yu, Hui-Xiang Xu, Zhi-Hong Yang, and Zhi-Chao Li
Research on the Development of Knowledge Node-based Multimedia
Courseware 957
Tian Xiping and Wang Yali
Research and Design on the Data Model Based on Archaeology GIS 961
Zhao Hong-dan and Wu Qin-xia
The Application of the Technique of 2D Fragments Stitching Based on Outline
Feature in Rejoining Oracle Bones 964
Yong-Ge Liu, Tian-Lin Wang, and Ji-Peng Wang
Function Design of Multimedia Monitoring System Based on Wireless Network 969
Li Min and Zhao Xiaofan
xvii