Rong-Jian Chen

According to our database1, Rong-Jian Chen authored at least 47 papers between 1992 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Anti-forensic steganography using multi-bit MER with flexible bit location.
Int. J. Ad Hoc Ubiquitous Comput., 2015

IP generator of Reed Solomon codecs.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Multi-bit watermarking in the data stream of JPEG2000 using minimum error embedding technique.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
Reconfigurable Galois Field multiplier.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte Transformation.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Data Hiding Using Flexible Multi-bit MER.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Design a potentiastat for glucose bio-sensing system in CMOS technology.
Proceedings of the 6th IEEE International Conference on Advanced Infocomm Technology, 2013

Design a current-mode Max/Min Circuit in CMOS technology.
Proceedings of the 6th IEEE International Conference on Advanced Infocomm Technology, 2013

Architecture design of reconfigurable reed-solomon error correction codec.
Proceedings of the 6th IEEE International Conference on Advanced Infocomm Technology, 2013

2012
An improved SVD-based watermarking technique for copyright protection.
Expert Syst. Appl., 2012

A blind reversible method for watermarking relational databases based on a time-stamping protocol.
Expert Syst. Appl., 2012

Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

2011
Mutual funds trading strategy based on particle swarm optimization.
Expert Syst. Appl., 2011

MTPSO algorithm for solving planar graph coloring problem.
Expert Syst. Appl., 2011

A novel intrusion detection system based on hierarchical clustering and support vector machines.
Expert Syst. Appl., 2011

An efficient phishing webpage detector.
Expert Syst. Appl., 2011

A fast RFID tag identification algorithm based on counter and stack.
Expert Syst. Appl., 2011

Architecture design of high-efficient and non-memory AES crypto-core for WPAN.
Concurr. Comput. Pract. Exp., 2011

Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Design a Portable Bio-Sensing System for Glucose Measurement.
Proceedings of the International Conference on Complex, 2011

Novel Multi-bit Watermarking Using Adaptive Embedding Algorithms with Minimum Error.
Proceedings of the International Conference on Complex, 2011

2010
A Novel Anti-collision Algorithm in RFID Systems for Identifying Passive Tags.
IEEE Trans. Ind. Informatics, 2010

Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata.
Signal Process. Image Commun., 2010

Performance evaluation of score level fusion in multimodal biometric systems.
Pattern Recognit., 2010

Novel Stream Cipher Using SCAN and Variable Ordered Recursive CA Substitutions and Its DSP+FPGA Implementation.
J. Networks, 2010

A novel visual secret sharing scheme for multiple secrets without pixel expansion.
Expert Syst. Appl., 2010

An efficient bi-objective personnel assignment algorithm based on a hybrid particle swarm optimization model.
Expert Syst. Appl., 2010

An efficient job-shop scheduling algorithm based on particle swarm optimization.
Expert Syst. Appl., 2010

Forecasting TAIFEX based on fuzzy time series and particle swarm optimization.
Expert Syst. Appl., 2010

Temperature prediction and TAIFEX forecasting based on fuzzy relationships and MTPSO techniques.
Expert Syst. Appl., 2010

Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Image copyright protection with forward error correction.
Expert Syst. Appl., 2009

An Improved Score Level Fusion in Multimodal Biometric Systems.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2007
Image security system using recursive cellular automata substitution.
Pattern Recognit., 2007

2006
Image Encryption and Decryption Using SCAN Methodology.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
Architecture design of the re-configurable 2-D von Neumann cellular automata for image encryption application.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Image encryption using progressive cellular automata substitution and SCAN.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
VLSI implementation of the universal 2-D CAT/ICAT system.
Proceedings of the 2004 11th IEEE International Conference on Electronics, 2004

2002
VLSI implementation of the universal one-dimensional CAT/ICAT.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2002, 2002

1996
Multiresolutional Image Representation and Coding Using Morphological Pyramids.
J. Inf. Sci. Eng., 1996

1995
Three-dimensional morphological pyramid and its application to color image sequence coding.
Signal Process., 1995

The application of OCOR neural network and its generalization algorithm for human face recognition.
Neural Parallel Sci. Comput., 1995

1994
A fully adaptive DCT based color image sequence coder.
Signal Process. Image Commun., 1994

1992
DCT color image sequence coding.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992


  Loading...