Guest Editorial: Multimedia Social Network Security and Applications Zhiyong ZhangKim-Kwang Raymond Choo Guest Editorial 01 December 2016 Pages: 3163 - 3168
User spread influence measurement in microblog Kechen ZhuangHaibo ShenHong Zhang OriginalPaper 04 August 2016 Pages: 3169 - 3185
Deceptive review detection using labeled and unlabeled data Jitendra Kumar RoutSmriti SinghSambit Bakshi OriginalPaper 19 August 2016 Pages: 3187 - 3211
Authorship verification applied to detection of compromised accounts on online social networks Sylvio Barbon JrRodrigo Augusto IgawaBruno Bogaz Zarpelão OriginalPaper 05 September 2016 Pages: 3213 - 3233
A selective encryption scheme for protecting H.264/AVC video in multimedia social network Fei PengXiao-qing GongXing-ming Sun OriginalPaper 11 July 2016 Pages: 3235 - 3253
A service recovery method based on trust evaluation in mobile social network Danmei NiuLanlan RuiXuesong Qiu OriginalPaper 27 September 2016 Pages: 3255 - 3277
A formalized delegation model for multimedia social networks Yulei WangJie YangWeining Feng OriginalPaper 16 July 2016 Pages: 3279 - 3291
A security carving approach for AVI video based on frame size and index Yitao YangZheng XuGuozi Sun OriginalPaper 07 July 2016 Pages: 3293 - 3312
Forensic taxonomy of android productivity apps Abdullah AzfarKim-Kwang Raymond ChooLin Liu OriginalPaper 13 July 2016 Pages: 3313 - 3341
Blind audio watermarking algorithm based on DCT, linear regression and standard deviation Mahdi JeyhoonMohammad AsgariSeyedeh Zahra Jalilzadeh OriginalPaper 22 October 2016 Pages: 3343 - 3359
Multiple predictors hiding scheme using asymmetric histograms Tzu-Chuen LuChang-Mu ChenYing-Hsuan Huang OriginalPaper 26 September 2016 Pages: 3361 - 3382
Building a mobile movie recommendation service by user rating and APP usage with linked data on Hadoop Meng-Yen HsiehWen-Kuang ChouKuan-Ching Li OriginalPaper 19 August 2016 Pages: 3383 - 3401
A robust color image watermarking using local invariant significant bitplane histogram Niu Pan-PanWang Xiang-YangYang Hong-Ying OriginalPaper 19 September 2016 Pages: 3403 - 3433
De-identifying facial images using singular value decomposition and projections P. ChriskosO. ZoidiI. Pitas OriginalPaper 05 November 2016 Pages: 3435 - 3468
(Two-Dimensional)2 whitening reconstruction for newborn recognition Rishav SinghHari Om OriginalPaper 13 August 2016 Pages: 3471 - 3483
Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding Seyyed Hossein SoleymaniAmir Hossein Taherinia OriginalPaper 18 July 2016 Pages: 3485 - 3503
Iterative quadtree decomposition based automatic selection of the seed point for ultrasound breast tumor images Huaiyu FanJunshan MaZhihan Lv OriginalPaper 22 July 2016 Pages: 3505 - 3517
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices Muhammad SajjadKhan MuhammadIrfan Mehmood OriginalPaper 16 August 2016 Pages: 3519 - 3536
Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations Mohammad A. AlsmiratYaser JararwehBrij B. Gupta OriginalPaper 01 September 2016 Pages: 3537 - 3555
Hybrid NSCT domain multiple watermarking for medical images Siddharth SinghVivek Singh RathoreRajiv Singh OriginalPaper 15 September 2016 Pages: 3557 - 3575
A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling Soumitra RoyArup Kumar Pal OriginalPaper 02 September 2016 Pages: 3577 - 3616
Region-based hybrid medical image watermarking for secure telemedicine applications PriyankaSushila Maheshkar OriginalPaper 14 September 2016 Pages: 3617 - 3647
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection Yi ZhangXiangyang LuoFenlin Liu OriginalPaper 16 September 2016 Pages: 3649 - 3668
A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications Falgun N. ThakkarVinay Kumar Srivastava OriginalPaper 04 October 2016 Pages: 3669 - 3697
A light weight and secure video conferencing scheme utilizing public network Toshanlal Meenpal OriginalPaper 03 October 2016 Pages: 3699 - 3714
Data hiding using pseudo magic squares for embedding high payload in digital images J. Jennifer Ranjani OriginalPaper 30 September 2016 Pages: 3715 - 3729
Digital watermark extraction in wavelet domain using hidden Markov model Marzieh AminiM. Omair AhmadM. N. S. Swamy OriginalPaper 29 September 2016 Pages: 3731 - 3749
An efficient approach for face recognition in uncontrolled environment Amrit Kumar AgrawalYogendra Narain Singh OriginalPaper 09 November 2016 Pages: 3751 - 3760
Data hiding in AMBTC images using quantization level modification and perturbation technique Wien HongTung Shou ChenYuanbo Ma OriginalPaper 08 October 2016 Pages: 3761 - 3782
Robust covert communication using high capacity watermarking Gaurav Bhatnagar OriginalPaper 29 September 2016 Pages: 3783 - 3807
Statistical textural feature and deformable model based brain tumor segmentation and volume estimation Shoaib Amin BandayAjaz Hussain Mir OriginalPaper 06 October 2016 Pages: 3809 - 3828
Unified entropy-based sorting for reversible data hiding Jiajia XuWeiming ZhangNenghai Yu OriginalPaper 14 October 2016 Pages: 3829 - 3850
XOR based continuous-tone multi secret sharing for store-and-forward telemedicine Shivendra ShivaniB. RajithaSuneeta Agarwal OriginalPaper 07 October 2016 Pages: 3851 - 3870
A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform Priyanka SinghBalasubramanian RamanPartha Pratim Roy OriginalPaper 09 November 2016 Pages: 3871 - 3897
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification Zhaoxia YinAndrew AbelBin Luo OriginalPaper 19 October 2016 Pages: 3899 - 3920
Dual domain robust watermarking scheme using random DFRFT and least significant bit technique Deepak SharmaRajiv SaxenaNarendra Singh OriginalPaper 18 November 2016 Pages: 3921 - 3942
A New Reversible and high capacity data hiding technique for E-healthcare applications Shabir A. ParahFarhana AhadG. M. Bhat OriginalPaper 01 December 2016 Pages: 3943 - 3975
Active authentication with reinforcement learning based on ambient radio signals Jinliang LiuLiang XiaoYifeng Zhao OriginalPaper 26 October 2015 Pages: 3979 - 3998
Discriminant component analysis for privacy protection and visualization of big data Sun-Yuan Kung OriginalPaper 19 October 2015 Pages: 3999 - 4034
Ant colony learning method for joint MCS and resource block allocation in LTE Femtocell downlink for multimedia applications with QoS guarantees Xin ChenLongfei LiXudong Xiang OriginalPaper 31 October 2015 Pages: 4035 - 4054
Spectral-temporal receptive fields and MFCC balanced feature extraction for robust speaker recognition Jia-Ching WangChien-Yao WangPao-Chi Chang OriginalPaper 17 February 2016 Pages: 4055 - 4068
Analysis of interaction trace maps for active authentication on smart devices Jamil AhmadMuhammad SajjadSung Wook Baik OriginalPaper 15 April 2016 Pages: 4069 - 4087
3D object retrieval based on Spatial+LDA model Weizhi NieXixi LiYuting Su OriginalPaper 08 August 2015 Pages: 4091 - 4104
Kinship verification in multi-linear coherent spaces Xiaojing ChenLe AnWeimin Wu OriginalPaper 19 October 2015 Pages: 4105 - 4122
Multilingual corpus construction based on printed and handwritten character separation Yuping LinYonghong SongKai He OriginalPaper 24 October 2015 Pages: 4123 - 4139
Fabric defect inspection using prior knowledge guided least squares regression Junjie CaoJie ZhangXiuping Liu OriginalPaper 17 November 2015 Pages: 4141 - 4157
Class specific centralized dictionary learning for face recognition Bao-Di LiuLiangke GuiYan-Jiang Wang OriginalPaper 23 December 2015 Pages: 4159 - 4177