Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterJanuary 2008
Histogram-based undetectable fidelity image in steganography as MSB controller
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 566–569https://doi.org/10.1145/1352793.1352913The LSB substitution and LSB matching method are to embed the secret data into the least-significant-bits of the pixel values in a cover image. However, the flexible operations were not offered in the past studies. In order to enhance the operations, we ...
- research-articleJanuary 2008
Fast backoff counter reduction algorithm to enhance the binary negative-exponential backoff algorithm in heterogeneous condition
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 448–451https://doi.org/10.1145/1352793.1352886BNEB has better collision resolution performance than the conventional DCF with BEB when BNEB stations only contend with themselves. BNEB stations use larger contention window size than DCF stations when they attempt first transmission of a frame or ...
- research-articleJanuary 2008
Energy efficiency measurement for multimedia audio decoding on embedded systems
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 404–408https://doi.org/10.1145/1352793.1352877Handheld devices with embedded systems are massively used in modern times due to their characteristics of portability and convenience. In addition to the basic general functions, video and audio capabilities are also indispensable to embedded systems. ...
- research-articleJanuary 2008
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 390–395https://doi.org/10.1145/1352793.1352875A new exploiting modification direction embedding method (also called the EMD embedding for short) was proposed by Zhang et al. to show that their proposed method has high embedding capacity and high stego-image quality as well because at most one cover ...
- research-articleJanuary 2008
Developments and trends on video coding: is there a xVC virus?
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 384–389https://doi.org/10.1145/1352793.1352874Video coding is a key technology behind the deployment of many devices, and services largely used nowadays around the world. After the first major developments in the 90s, recent years have seen the emergence of new needs, technologies and standards in ...
- research-articleJanuary 2008
Data-aided algorithm based frequency synchronizer for DVB-S2
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 354–358https://doi.org/10.1145/1352793.1352867This paper presents an efficient frequency synchronizer for digital video broadcasting --- second generation (DVB-S2). Analyzing the robust algorithm among data-aided approaches, we find that the Luise & Reggiannini (L&R) algorithm is the most suitable ...
- research-articleJanuary 2008
Hierarchical watermarking technique of distortion control mechanism
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 339–346https://doi.org/10.1145/1352793.1352864This paper proposed an effective information hiding scheme. The proposed scheme calculates the confidential information from a medium and embeds the information into the medium to generate the stego medium for medium integrity protection. When necessary,...
- research-articleJanuary 2008
Using nearest covering codes to embed secret information in grayscale images
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 315–320https://doi.org/10.1145/1352793.1352860A good visual quality of stego images is an important property of information hiding systems. This can be achieved by reducing the number of steganographic modifications during the secret data embedding phase. For concerning applications of mobile ...
- research-articleJanuary 2008
An optimal multimedia object allocation solution in transcoding-enabled wide-area storage systems
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 301–309https://doi.org/10.1145/1352793.1352857Together with the information explosion era comes the problem of high energy consumption in data centers. Among the various components of a data center, storage is one of the biggest energy consumers. Many efforts have been put on reducing energy ...
- research-articleJanuary 2008
A data allocation scheme for multiple wireless broadcast channels
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 256–262https://doi.org/10.1145/1352793.1352848Broadcast in the wireless environment has drawn much attention because it is capable of sending data to clients regardless of the number of clients. Most previous researches have aimed at obtaining an independent data item in a minimum time. However, ...
- research-articleJanuary 2008
DFT-based decision directed channel estimation algorithm for OFDM systems
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 186–190https://doi.org/10.1145/1352793.1352832An enhanced discrete Fourier transform (DFT)-based channel estimation for OFDM system is proposed. Conventional DFT-based channel estimations improve the performance by suppressing time domain noise. However, the disadvantage is that the effect of noise ...
- research-articleJanuary 2008
Integer frequency offset detection methods for OFDM-based WLAN systems
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 180–185https://doi.org/10.1145/1352793.1352831Recently, a frequency offset estimation method for orthogonal frequency division multiplexing (OFDM) has been proposed by Ren et al. (REA) [9]. The method can estimate an frequency offset for any training symbol structure. In the REA method, however, ...
- research-articleJanuary 2008
A proportional differentiated QoS scheduling algorithm in OFDMA systems
ICUIMC '08: Proceedings of the 2nd international conference on Ubiquitous information management and communicationPages 175–179https://doi.org/10.1145/1352793.1352830Orthogonal Frequency Division Multiple Access (OFDMA) is considered as a key multiple access method in next generation mobile system. Tremendous research have been carried out in this field, especially focusing on various scheduling algorithm for users' ...