Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 2 /: Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 2. (2018)
- Record Type:
- Book
- Title:
- Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 2 /: Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 2. (2018)
- Main Title:
- Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 2
- Further Information:
- Note: Jeng-Shyang Pan, Akinori Ito, Pei-wei Tsai, Lakhmi C. Jain, editors.
- Editors:
- Pan, Jeng-Shyang
Ito, Akinori
Tsai, Pei-Wei
Jain, L. C - Other Names:
- International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 14th
- Contents:
- Intro; Preface; Conference Organization; Conference Founders; Honorary Chairs; Advisory Committee; General Chairs; Program Chairs; Invited Session Chairs; Publication Chairs; Electronic Media Chairs; Finance Chair; Program Committee Members; Contents; Health Informatics, Intelligent Data Hiding, and Deep Learning for Information Hiding; An Improved High-Capacity ECG Steganography with Smart Offset Coefficients; Abstract; 1 Introduction; 2 Related Work; 3 Proposed Method; 3.1 Bit Embedding; 3.2 Bit Extraction; 3.3 Alterative High-Perceived Quality Approach; 4 Experimental Results; 5 Conclusion 4 Experimental Results and Comparisons5 Conclusions; References; An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function; Abstract; 1 Introduction; 2 A Steganography Algorithm Based on PBVD; 3 Analysis and Discussion of Algorithm Examples; 4 Experiments and Analysis; 4.1 Algorithm Embedded Capacity; 4.2 Secret Digital Image Quality; 5 Conclusion; Acknowledgements; References; Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log; Abstract; 1 Introduction 2 Attack Pattern Mining Algorithm Based on Fuzzy Clustering2.1 Generating Security Log Sequence Set; 2.2 Frequent Sequence Mining from Sequence Set; 3 Experiment and Analysis; 3.1 Experiment Result; 3.2 Result Analysis; 4 Conclusion; Acknowledgements; References; Recent Advances in Information Hiding and Signal Processing for Audio and Speech Signals; AnIntro; Preface; Conference Organization; Conference Founders; Honorary Chairs; Advisory Committee; General Chairs; Program Chairs; Invited Session Chairs; Publication Chairs; Electronic Media Chairs; Finance Chair; Program Committee Members; Contents; Health Informatics, Intelligent Data Hiding, and Deep Learning for Information Hiding; An Improved High-Capacity ECG Steganography with Smart Offset Coefficients; Abstract; 1 Introduction; 2 Related Work; 3 Proposed Method; 3.1 Bit Embedding; 3.2 Bit Extraction; 3.3 Alterative High-Perceived Quality Approach; 4 Experimental Results; 5 Conclusion 4 Experimental Results and Comparisons5 Conclusions; References; An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function; Abstract; 1 Introduction; 2 A Steganography Algorithm Based on PBVD; 3 Analysis and Discussion of Algorithm Examples; 4 Experiments and Analysis; 4.1 Algorithm Embedded Capacity; 4.2 Secret Digital Image Quality; 5 Conclusion; Acknowledgements; References; Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log; Abstract; 1 Introduction 2 Attack Pattern Mining Algorithm Based on Fuzzy Clustering2.1 Generating Security Log Sequence Set; 2.2 Frequent Sequence Mining from Sequence Set; 3 Experiment and Analysis; 3.1 Experiment Result; 3.2 Result Analysis; 4 Conclusion; Acknowledgements; References; Recent Advances in Information Hiding and Signal Processing for Audio and Speech Signals; An Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting and Watermarking; Abstract; 1 Introduction; 2 An Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting 3 Manipulation Detection Accuracy Evaluations4 Simulation of Noise and Reverberation; 5 Conclusion; Acknowledgments; References; Digital Audio Watermarking Method Based on Singular Spectrum Analysis with Automatic Parameter Estimation Using a Convolutional Neural Network; 1 Introduction; 2 Previously Proposed Framework; 2.1 Embedding Process and Extraction Process; 2.2 Differential Evolution; 3 Proposed Framework; 3.1 CNN-Based Parameter Estimation; 3.2 Extraction Process; 4 Evaluations; 4.1 Parameter Estimation Accuracy; 4.2 Robustness Evaluation; 4.3 Sound Quality Evaluation; 5 Discussion … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Engineering
COMPUTERS / Security / General
Multimedia systems -- Congresses
Image processing -- Congresses
Signal processing -- Congresses
Computer networks -- Security measures -- Congresses
Big data -- Security measures -- Congresses
Computers -- Intelligence (AI) & Semantics
Technology & Engineering -- Electronics -- General
Computers -- Interactive & Multimedia
Artificial intelligence
Imaging systems & technology
Graphical & digital media applications
Artificial intelligence
Multimedia systems
Electronic books - Languages:
- English
- ISBNs:
- 9783030037482
3030037487 - Related ISBNs:
- 9783030037475
- Notes:
- Note: Online resource; title from PDF file page (EBSCO, viewed November 14, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.360577
- Ingest File:
- 01_324.xml