Download - Computational intelligence ; Part 2
Yue Hao Jiming Liu Yuping Wang
Yiu-ming Cheung Hujun Yin
Licheng Jiao Jianfeng Ma
Yong-Chang Jiao (Eds.)
ComputationalIntelligenceand Security
International Conference, CIS 2005
Xi'an, China, December 15-19, 2005
Proceedings, Part II
4^ Springer
Table of Contents - Part II
Cryptography and Coding
A Fast Inversion Algorithm and Low-Complexity Architecture over
GF(2m)Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park,
JonginLim 1
An ID-Based Optimistic Fair Signature Exchange Protocol from PairingsChunxiang Gu, Yuefei Zhu, Yajuan Zhang 9
FMS Attack-Resistant WEP Implementation Is Still Broken
Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii 17
Design of a New Kind of Encryption Kernel Based on RSA AlgorithmPing Dong, Xiangdong Shi, Jiehui Yang 27
On the Security of Condorcet Electronic Voting Scheme
Yoon Cheol Lee, Hiroshi Doi 33
Special Distribution of the Shortest Linear Recurring Sequences in
Z/(p) Field
Qian Yin, Yunlun Luo, Ping Guo 43
Cryptanalysis of a Cellular Automata CryptosystemJingmei Liu, Xiangguo Cheng, Xinmei Wang 49
A New Conceptual Framework Within Information Privacy: Meta
PrivacyGeoff Skinner, Song Han, Elizabeth Chang 55
Error Oracle Attacks on Several Modes of OperationFengtong Wen, Wenling Wu, Qiaoyan Wen 62
Stability of the Linear Complexity of the Generalized Self-shrinkingSequences
Lihua Dong, Yong Zeng, Yupu Hu 68
On the Construction of Some Optimal Polynomial Codes
Yajing Li, Weihong Chen 74
XIV Table of Contents - Part II
Perceptual Hashing of Video Content Based on Differential Block
Similarity
Xuebing Zhou, Martin Schmucker, Christopher L. Brown 80
Cryptographic Protocols
Secure Software Smartcard Resilient to Capture
Seung Wook Jung, Christoph Ruland 86
Revised Fischlin's (Blind) Signature Schemes
Kewei Lv 96
Certificateless Threshold Signature Schemes
Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian 104
An Efficient Certificateless Signature Scheme
M. Choudary Gorantla, Ashutosh Saxena 110
ID-Based Restrictive Partially Blind SignaturesXiaofeng Chen, Fangguo Zhang, Shengli Liu 117
Batch Verification with DSA-Type Digital Signatures for Ubiquitous
ComputingSeungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho 125
On Anonymity of Group Signatures
Sujing Zhou, Dongdai Lin 131
The Running-Mode Analysis of Two-Party Optimistic Fair ExchangeProtocols
Yuqing Zhang, Zhiling Wang, Bo Yang 137
Password-Based Group Key Exchange Secure Against Insider GuessingAttacks
Jin Wook Byun, Dong Boon Lee, Jongin Lim 143
On the Security of Some Password-Based Key Agreement Schemes
Qiang Tang, Chris J. Mitchell 149
A New Group Rekeying Method in Secure Multicast
Yong Xu, Yuxiang Sun 155
Pairing-Based Provable Blind Signature Scheme Without Random
Oracles
Jian Liao, Yinghao Qi, Peiwei Huang, Mention Rong 161
Table of Contents - Part II XV
Efficient ID-Based Proxy Signature and Proxy Signcryption Form
Bilinear Pairings
Qin Wang, Zhenfu Cao 167
An Identity-Based Threshold Signcryption Scheme with Semantic
Security
Changgen Peng, Xiang Li 173
A Token-Based Single Sign-On Protocol
Li Hui, Shen Ting 180
Simple Threshold RSA Signature Scheme Based on Simple Secret
SharingShaohua Tang 186
Efficient Compilers for Authenticated Group Key Exchange
Qiang Tang, Chris J. Mitchell 192
Insider Impersonation-MIM Attack to Tripartite Key AgreementScheme and an Efficient Protocol for Multiple Keys
Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto 198
Intrusion Detection
An Immune System Inspired Approach of Collaborative Intrusion
Detection System Using Mobile Agents in Wireless Ad Hoc Networks
Ki- Won Yeom, Ji-Hyung Park 204
A New User-Habit Based Approach for Early Warning of Worms
Ping Wang, Binxing Fang, Xiaochun Yun 212
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM
Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon 220
Sampling Distance Analysis of Gigantic Data Mining for Intrusion
Detection Systems
Yong Zeng, Jianfeng Ma 228
Hardware-Software Hybrid Packet Processing for Intrusion Detection
SystemsSaraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan. . . 236
D-S Evidence Theory and Its Data Fusion Application in Intrusion
Detection
Junfeng Tian, Weidong Zhao, Ruizhong Du 244
XVI Table of Contents - Part II
A New Network Anomaly Detection Technique Based on Per-Flow and
Per-Service Statistics
Yuji Waizumi, Daisuke Kudo, Nei Koto, Yoshiaki Nemoto 252
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention
System and Its Implementation
SeongJe Cho, Hye-Young Chang, HongGeun Kim,
WoongChul Choi 260
A Statistical Model for Detecting Abnormality in Static-Priority
Scheduling Networks with Differentiated Services
Ming Li, Wei Zhao 267
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain
Vidyasagar Potdar, Chen Wu, Elizabeth Chang 273
Measuring the Histogram Feature Vector for Anomaly Network Traffic
WeiYan 279
Efficient Small Face Detection in Surveillance Images Using MajorColor Component and LDA Scheme
Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn 285
Fast Motion Detection Based on Accumulative Optical Flow and
Double Background Model
Jin Zheng, Bo Li, Bing Zhou, Wei Li 291
Reducing Worm Detection Time and False Alarm in Virus Throttling
Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi 297
Protection Against Format String Attacks by Binary RewritingJin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi,
Sang Jun Lee, Byung Ki Kim 303
Masquerade Detection System Based on Principal Component Analysisand Radial Basics Function
Zhanchun Li, Zhitang Li, Yao Li, Bin Liu 309
Anomaly Detection Method Based on HMMs Using System Call and
Call Stack Information
Cheng Zhang, Qinke Peng 315
Parallel Optimization Technology for Backbone Network Intrusion
Detection System
Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen 322
Table of Contents - Part II XVII
Attack Scenario Construction Based on Rule and Fuzzy ClusteringLinru Ma, Lin Yang, Jianxin Wang 328
A CBR Engine Adapting to IDS
Lingjuan Li, Wenyu Tang, Ruchuan Wang 334
Application of Fuzzy Logic for Distributed Intrusion Detection
Hee Suk Seo, Tat Ho Cho 340
Security Models and Architecture
Dynamic Access Control for Pervasive Grid Applications
Syed Naqvi, Michel Riguidel 348
On the Security of the Canetti-Krawczyk Model
Xinghua Li, Jianfeng Ma, SangJae Moon 356
A Novel Architecture for Detecting and Defending AgainstFlooding-Based DDoS Attacks
Yi Shi, Xinyu Yang 364
A Variant of Poly1305 MAC and Its Security Proof
Dayin Wang, Dongdai Lin, Wenling Wu 375
Covert Channel Identification Founded on Information Flow Analysis
Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li 381
Real-Time Risk Assessment with Network Sensors and Intrusion
Detection SystemsAndre Ames, Karin Sallhammar, Kjetil Haslum, T0nnes Brekne,Marie Elisabeth Gaup Moe, Svein Johan Knapskog 388
Design and Implementation of a Parallel Crypto Server
Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou 398
Survivability Computation of Networked Information SystemsXuegang Lin, Rongsheng Xu, Miaoliang Zhu 407
Assessment of Windows System Security Using Vulnerability
Relationship GraphYongzheng Zhang, Binxing Fang, Yue Chi, Xiaochun Yun 415
A New (t, n)-Threshold Multi-secret Sharing Scheme
HuiXian Li, ChunTian Cheng, LiaoJun Pang 421
XVIII Table of Contents - Part II
An Efficient Message Broadcast Authentication Scheme for Sensor
Networks
Sang-ho Park, Taekyoung Kwon 427
Digital Image Authentication Based on Error-Correction Codes
Fan Zhang, Xinhong Zhang, Zhiguo Chen 433
Design and Implementation of Efficient Cipher Engine for IEEE 802.1li
Compatible with IEEE 802.1 In and IEEE 802.lie
Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park,
Ohyoung Song 439
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme
Shanshan Duan, Zhenfu Cao, Yuan Zhou 445
Building Security Requirements Using State Transition Diagram at
Security Threat Location
Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi,
Sang Jun Lee, Byung Ki Kim 451
Study on Security iSCSI Based on SSH
Weiping Liu, Wandong Cai 457
A Scheduling Algorithm Based on a Trust Mechanism in Grid
Kenli Li, Yan He, Renfa Li, Tao Yang 463
Enhanced Security and Privacy Mechanism of RFID Service for
Pervasive Mobile Device
Byungil Lee, Howon Kim 469
Worm Propagation Modeling and Analysis on Network
Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma .... 476
An Extensible AAA Infrastructure for IPv6
Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu 482
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.Hi
Fan Zhang, Jianfeng Ma, SangJae Moon 488
A Noble Key Pre-distribution Scheme with LU Matrix for Secure
Wireless Sensor Networks
Chang Won Park, Sung Jin Choi, Hee Yong Youn 494
Table of Contents - Part II XIX
Security Management
A Virtual Bridge Certificate Authority Model
Haibo Tian, Xi Sun, Yumin Wang 500
Weak Signals in Information Security ManagementJorma Kajava, Reijo Savola, Rauno Varonen 508
PDTM: A Policy-Driven Trust Management Framework in Distributed
SystemsWu Liu, Haixin Duan, Jianping Wu, Xing Li 518
Methodology of Quantitative Risk Assessment for Information System
Security
Mengquan Lin, Qiangmin Wang, Jianhua Li 526
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret SharingScheme
Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie 532
Improvement on an Optimized Protocol for Mobile Network
Authentication and SecurityChinChen Chang, JungSan Lee 538
Neural Network Based Flow Forecast and Diagnosis
Qianmu Li, Manwu Xu, Hong Zhang, Fengyu Liu 542
Protecting Personal Data with Various Granularities: A Logic-BasedAccess Control Approach
Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai,Yoshinari Kanamori, Cherri M. Pancake 548
Enhancement of an Authenticated Multiple-Key Agreement Protocol
Without Using Conventional One-Way Function
Huifeng Huang, Chinchen Chang 554
Topology-Based Macroscopical Response and Control Technology for
Network Security Event
Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang 560
Watermarking and Information Hiding
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable
Codewords
Chinchen Chang, Chiachen Lin, Junbin Yeh 567
XX Table of Contents - Part II
Reversible Data Hiding for Image Based on Histogram Modification of
Wavelet Coefficients
Xiaoping Liang, Xiaoyun Wu, Jiwu Huang 573
An Image Steganography Using Pixel Characteristics
Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon...
581
Alternatives for Multimedia Messaging System SteganographyKonstantinos Papapanagiotou, Emmanouel Kellinis,Giannis F. Marias, Panagiotis Georgiadis 589
Error Concealment for Video Transmission Based on WatermarkingShuai Wan, Yilin Chang, Fuzheng Yang 597
Applying the AES and Its Extended Versions in a General Framework
for Hiding Information in Digital ImagesTran Minh Triet, Duong Anh Due 605
An Image Hiding Algorithm Based on Bit Plane
Bin Liu, Zhitang Li, Zhanchun Li 611
A Blind Audio Watermarking Algorithm Robust AgainstSynchronization Attack
Xiangyang Wang, Hong Zhao 617
Semi-fragile Watermarking Algorithm for Detection and Localization
of Temper Using Hybrid Watermarking Method in MPEG-2 Video
Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong 623
Public Watermarking Scheme Based on Multiresolution Representationand Double Hilbert Scanning
Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou,
Licong Chen 629
Performance Evaluation of Watermarking Techniques for Secure
Multimodal Biometric Systems
Daesung Moon, Taehae Kim, SeungHwan Jung, Yongwha Chung,Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim 635
An Improvement of Auto-correlation Based Video WatermarkingScheme Using Independent Component Analysis
Seong- Whan Kim, Hyun-Sung Sung 643
A Digital Watermarking Technique Based on Wavelet PackagesChen Xu, Weiqiang Zhang, Francis R. Austin 649
Table of Contents - Part II XXI
A Spectral Images Digital Watermarking AlgorithmLong Ma, Changjun Li, Shuni Song 655
Restoration in Secure Text Document Image Authentication UsingErasable Watermarks
Niladri B. Puhan, Anthony T.S. Ho 661
Web and Network Applications
The Study of RED Algorithm Used Multicast Router Based Buffer
Management
Won-Hyuck Choi, Doo-Hyun Kim, Kwnag-Jae Lee,
Jung-Sun Kim 669
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service
Selection
Lei Cao, Jian Cao, Minglu Li 679
MacroOS: A Pervasive Computing Platform Supporting Context
Awareness and Context ManagementXiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan 687
A Frame for Selecting Replicated Multicast Servers Using Genetic
Algorithm
Qin Liu, Chanle Wu 695
On a Novel Methodology for Estimating Available Bandwidth AlongNetwork Paths
Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu 703
A New AQM Algorithm for Enhancing Internet Capability AgainstUnresponsive Flows
Liyuan Zhao, Keqin Liu, Jun Zheng 711
Client Server Access: Wired vs. Wireless LEO Satellite-ATM
Connectivity; A (MS-Ro-BAC) ExperimentTerry C. House 719
An Algorithm for Automatic Inference of Referential Integrities DuringTranslation from Relational Database to XML Schema
Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik 725
A Fuzzy Integral Method to Merge Search Engine Results on Web
Shuning Cui, Boqin Feng 731
XXII Table of Contents - Part II
The Next Generation PARLAY X with QoS/QoESungjune Hong, Sunyoung Han 737
A Design of Platform for QoS-Guaranteed Multimedia Services
Provisioning on IP-Based Convergence Network
Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim 743
Introduction of Knowledge Management System for Technical Supportin Construction Industries
Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim 749
An Event Correlation Approach Based on the Combination of IHU and
Codebook
Qiuhua Zheng, Yuntao Qian 757
Image and Signal Processing
Face Recognition Based on Support Vector Machine Fusion and
Wavelet Transform
Bicheng Li, Hujun Yin 764
A Dynamic Face and Fingerprint Fusion System for IdentityAuthentication
Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li 772
Image Recognition for Security Verification Using Real-Time Joint
Transform Correlation with Scanning Technique
Kyu B. Doh, Jungho Ohn, Ting-C Poon 780
Binarized Revocable Biometrics in Face Recognition
Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling 788
Short Critical Area Computational Method Using Mathematical
Morphology
Junping Wang, Yue Hao 796
A Robust Lane Detection Approach Based on MAP Estimate and
Particle Swarm OptimizationYong Zhou, Xiaofeng Hu, Qingtai Ye 804
MFCC and SVM Based Recognition of Chinese Vowels
Fuhai Li, Jinwen Ma, Dezhi Huang 812
Table of Contents - Part II XXIII
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification
in the DCT Domain
Zhe-Ming Lu, Hui Pei, Hans Burkhardt 820
Removing of Metal Highlight Spots Based on Total Variation Inpaintingwith Multi-sources-flashing
Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang 826
Component-Based Online Learning for Face Detection and Verification
Kyoung-Mi Lee 832
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image
Compression
Wenbing Fan, Jing Chen, Jina Zhen 838
Modified EZW Coding for Stereo Residual
Han-Suh Koo, Chang-Sung Jeong 845
Optimal Prototype Filters for Near-Perfect-Reconstruction
Cosine-Modulated Filter Banks
Xuemei Xie, Guangming Shi, Xuyang Chen 851
Fast Motion Estimation Scheme for Real Time Multimedia Streamingwith H.264
Chan Lim, Hyun-Soo Kang, Tae- Yong Kim 857
Motion-Compensated 3D Wavelet Video Coding Based on Adaptive
Temporal Lifting Filter Implementation
Guiguang Ding, Qionghai Dai, Wenli Xu 863
Accurate Contouring Technique for Object Boundary Extraction in
Stereoscopic ImageriesShin Hyoung Kim, Jong Whan Jang, Seung Phil Lee,Jae Ho Choi 869
Robust Object Tracking Based on Uncertainty Factorization SubspaceConstraints Optical Flow
Yunshu Hou, Yanning Zhang, Rongchun Zhao 875
Bearings-Only Target Tracking Using Node Selection Based on an
Accelerated Ant Colony OptimizationBenlian Xu, Zhiquan Wang 881
Image Classification and Delineation of FragmentsWeixing Wang 887
XXIV Table of Contents - Part II
A Novel Wavelet Image Coding Based on Non-uniform Scalar
Quantization
Guoyuo Wang, Wentao Wang 893
A General Image Based Nematode Identification System Design
Bai- Tao Zhou, Won Nah, Kang- Woong Lee, Joong-Hwan Baek 899
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for
CDMA Systems
Ling Zhang, Xian-Da Zhang 905
New Electronic Digital Image Stabilization Algorithm in Wavelet
Transform Domain
Jung-Youp Suk, Gun-Woo Lee, Kuhn-Ii Lee 911
Line Segments and Dominate Points Detection Based on Hough
Transform
Z.W. Liao, S.X. Hu, T.Z. Huang 917
The Study of the Auto Color Image SegmentationMan Zhuang, Haifeng Du, Jinhua Zhang, Sun'an Wang 923
Regularized Image Restoration by Means of Fusion for Digital Auto
FocusingVivek Maik, Jeongho Shin, Joonki Paik 929
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature
Points Detection
Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye,
Yong-Deak Kim 935
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN
Estimation
Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu 941
SUSAN Window Based Cost Calculation for Fast Stereo Matching
Kyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong 947
An Efficient Adaptive De-blocking Algorithm
Zhiliang Xu, Shengli Xie, Youjun Xiang 953
Facial Features Location by Analytic Boosted Cascade Detector
Lei Wang, Beiji Zou, Jiaguang Sun 959
Table of Contents - Part II XXV
New Approach for Segmentation and Pattern Recognition of Jacquard
ImagesZhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo,
Jinxiang Dong
Nonstationarity of Network Traffic Within Multi-scale Burstiness
Constraint
Jinwu Wei, Jiangxing Wu
Principle of Image Encrypting Algorithm Based on Magic Cube
Transformation
Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan,
Guanjun Bao
A Study on Motion Prediction and Coding for In-Band Motion
Compensated Temporal Filtering
Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis
Entropy
Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert....
Applications
Incremental Fuzzy Decision Tree-Based Network Forensic System
Zaiqiang Liu, Dengguo Feng 995
Robust Reliable Control for a Class of Fuzzy Dynamic Systems with
Time-Varying Delay
Youqing Wang, Donghua Zhou 1003
Using Concept Taxonomies for Effective Tree Induction
Hong Yan Yi, B. de la Iglesia, V.J. Rayward-Smith 1011
A Similarity-Based Recommendation Filtering Algorithm for
Establishing Reputation-Based Trust in Peer-to-Peer Electronic
Communities
Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen ...1017
Automatic Classification of Korean Traditional Music Using Robust
Multi-feature Clustering
Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh 1025
A Private and Efficient Mobile Payment Protocol
Changjie Wang, Ho-fung Leung 1030
965
971
977
983
989
XXVI Table of Contents - Part II
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce
Tianjie Cao, Dongdai Lin, Rui Xue 1036
An Efficient Control Method for Elevator Group Control SystemUlvi Dagdelen, Aytekin Bagis, Dervis Karaboga 1042
Next Generation Military Communication Systems Architecture
Qijian Xu, Naitong Zhang, Jie Zhang, Yu Sun 1048
Early Warning for Network Worms
Antti Tikkanen, Teemupekka Virianen 1054
Skeleton Representation of Character Based on Multiscale ApproachXinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang,Yuan Yan Tang 1060
Channel Equalization Based on Two Weights Neural Network
Wenming Cao, Wanfang Chai, Shoujue Wang 1068
Assessment of Uncertainty in Mineral Prospectivity Prediction UsingInterval Neutrosophic Set
Pawalai Kraipeerapun, Chun Che Fung, Warick Brown 1074
Ring-Based Anonymous Fingerprinting Scheme
Qiang Lei, Zhengtao Jiang, Yumin Wang 1080
Scalable and Robust Fingerprinting Scheme Using Statistically Secure
Extension of Anti-collusion Code
Jae-Min Seol, Seong-Whan Kim 1086
Broadcast Encryption Using Identity-Based Public-Key CryptosystemLv Xixiang, Bo Yang 1092
Multimedia Digital Right Management Using Selective Scrambling for
Mobile Handset
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin,Sung-JeaKo 1098
Design and Implementation of Crypto Co-processor and Its Applicationto Security Systems
Ho Won Kim, Mun-Kyu Lee, Dong-Kyue Kim, Sang-Kyoon Chung,Kyoil Chung 1104
Continuous Speech Research Based on HyperSausage Neuron
Wenming Cao, Jianqing Li, Shoujue Wang 1110
Table of Contents - Part II XXVII
Variable-Rate Channel Coding for Space-Time Coded MIMO System
Changcai Han, Dongfeng Yuan 1116
A New Watermarking Method Based on DWT
Xiang-chu Feng, Yongdong Yang 1122
Efficient Point Rendering Method Using Sequential Level-of-Detail
Daniel Kang, Byeong-Seok Shin 1127
Construction of a Class of Compactly Supported Biorthogonal MultipleVector-Valued Wavelets
Tongqi Zhang, Qingjiang Chen 1134
Metabolic Visualization and Intelligent Shape Analysis of the
HippocampusYoo-Joo Choi, Jeong-Sik Kirn, Min-Jeong Kim, Soo-Mi Choi,
Myoung-~H.ee Kim 1140
Characteristic Classification and Correlation Analysis of Source-Level
Vulnerabilities in the Linux Kernel
Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee,
Young Ik Eom 1149
Author Index 1157