Volume 3, Number 2
1.

Tsung-Han Tsai and Chung-Yuan Lin
Visual Hand Gesture Segmentation Using Three-Phase Model Tracking Technique for Real-Time Gesture Interpretation System
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 122-134, April 2012.

2.

Khaled Loukhaoukha
On The Security of Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 135-141, April 2012.

3.

Ching-Yu Yang, Chih-Hung Lin, and Wu-Chih Hu
Reversible Data Hiding for High-Quality Images Based on Integer Wavelet Transform
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 142-150, April 2012.

4.

Stelios Krinidis, Michail Krinidis, and Vassilios Chatzis
An Unsupervised Image Clustering Method Based on EEMD Image Histogram
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 151-163, April 2012.

5.

Xinshan Zhu and Yanming Chen
Performance Analysis of Dither Modulation against Composite Attacks
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 164-175, April 2012.

6.

Bao Rong Chang, Chien-Feng Huang, Hsiu-Fen Tsai, and Zih-Yao Lin
Rapid Access Control on Ubuntu Cloud Computing with Facial Recognition and Fingerprint Identification
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 176-190, April 2012.

7.

Constantinos Patsakis
Number Theoretic SETUPs for RSA Like Factoring Based Algorithms
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 191-204, April 2012.

8.

Valery Korzhik, Guillermo Morales-Luna and Ksenia Nebaeva
The Capacity of a Stegosystem for the Noisy Attack Channel
Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 205-211, April 2012.