2025
Crypto-space reversible data hiding for 3D mesh models with k-Degree neighbor diffusion.
J. Inf. Secur. Appl., 2025
Reversible Data Hiding in Encrypted JPEG Images With Polynomial Secret Sharing for IoT Security.
IEEE Internet Things J., 2025
An IoT-Based Electronic Health Protection Mechanism With AMBTC Compressed Images.
IEEE Internet Things J., 2025
Smart contract-based public integrity auditing for cloud storage against malicious auditors.
Future Gener. Comput. Syst., 2025
Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases.
Expert Syst. Appl., 2025
Crypto-space steganography for 3D mesh models with greedy selection and shortest expansion.
Displays, 2025
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage.
Comput. Secur., 2025
2024
Secure Data Sharing for Consortium Blockchain-Enabled Vehicular Social Networks.
IEEE Trans. Veh. Technol., December, 2024
WFormer: A Transformer-Based Soft Fusion Model for Robust Image Watermarking.
IEEE Trans. Emerg. Top. Comput. Intell., December, 2024
Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic.
IEEE Trans. Intell. Transp. Syst., November, 2024
Data hiding with thumbnail-preserving encryption for cloud medical images.
Multim. Tools Appl., November, 2024
Reversible data hiding in encrypted images with block-based bit-plane reallocation.
Multim. Tools Appl., November, 2024
Public auditing of log integrity for shared cloud storage systems via blockchain.
Wirel. Networks, October, 2024
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation.
Vis. Comput., September, 2024
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack.
Cryptogr., September, 2024
An Innovative Recompression Scheme for VQ Index Tables.
Future Internet, August, 2024
Joint learning of fuzzy embedded clustering and non-negative spectral clustering.
Multim. Tools Appl., July, 2024
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction.
Future Internet, June, 2024
MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer.
Pattern Recognit., March, 2024
DSteganoM: Deep steganography for motion capture data.
Expert Syst. Appl., March, 2024
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality.
Symmetry, February, 2024
Verifiable (<i>t, n</i>) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix.
J. Inf. Secur. Appl., February, 2024
Multi-view spatiotemporal learning for traffic forecasting.
Inf. Sci., February, 2024
An effective compressed image authentication scheme based on N-variant AMBTC.
Multim. Tools Appl., January, 2024
Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications.
Displays, January, 2024
Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field.
IEEE Trans. Multim., 2024
A new authentication scheme for dynamic charging system of electric vehicles in fog environment.
Secur. Priv., 2024
Secret image sharing with distinct covers based on improved Cycling-XOR.
J. Vis. Commun. Image Represent., 2024
A divide-and-conquer approach to privacy-preserving high-dimensional big data release.
J. Inf. Secur. Appl., 2024
CAISFormer: Channel-wise attention transformer for image steganography.
Neurocomputing, 2024
A Ranking Information Based Network for Facial Beauty Prediction.
IEICE Trans. Inf. Syst., 2024
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering.
Future Internet, 2024
Metro Station functional clustering and dual-view recurrent graph convolutional network for metro passenger flow prediction.
Expert Syst. Appl., 2024
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding.
Comput. Syst. Sci. Eng., 2024
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling.
IEEE Access, 2024
2023
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack.
J. Vis. Commun. Image Represent., December, 2023
Crypto-space image steganography based on blind flipping.
J. Inf. Secur. Appl., December, 2023
RSG-Net: A Recurrent Similarity Network With Ghost Convolution for Wheelset Laser Stripe Image Inpainting.
IEEE Trans. Intell. Transp. Syst., November, 2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023
The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration.
IEEE Trans. Circuits Syst. II Express Briefs, September, 2023
Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting.
IEEE Trans. Intell. Transp. Syst., August, 2023
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification.
IEICE Trans. Inf. Syst., May, 2023
A Visual Question Answering Network Merging High- and Low-Level Semantic Information.
IEICE Trans. Inf. Syst., May, 2023
De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy.
IEEE Commun. Lett., January, 2023
ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN.
IEEE Trans. Instrum. Meas., 2023
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2023
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security.
IEEE Trans. Dependable Secur. Comput., 2023
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack.
Symmetry, 2023
Image Covert Communication With Block Regulation.
IEEE Signal Process. Lett., 2023
A novel reversible data hiding scheme for VQ codebooks.
Secur. Priv., 2023
Overlapped (7, 4) hamming code for large-capacity and low-loss data hiding.
Multim. Tools Appl., 2023
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0.
Int. J. Intell. Syst., 2023
A Steganography Based on Optimal Multi-Threshold Block Labeling.
Comput. Syst. Sci. Eng., 2023
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification.
Comput. Syst. Sci. Eng., 2023
A Survey on Federated Learning Poisoning Attacks and Defenses.
CoRR, 2023
The 3rd International Workshop on Deep Learning for the Web of Things.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Hiding Information in a Well-Trained Vector Quantization Codebook.
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things.
IEICE Trans. Inf. Syst., December, 2022
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data.
ACM Trans. Internet Techn., November, 2022
CSST-Net: an arbitrary image style transfer network of coverless steganography.
Vis. Comput., 2022
Adaptive Reversible Data Hiding With Contrast Enhancement Based on Multi-Histogram Modification.
IEEE Trans. Circuits Syst. Video Technol., 2022
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸).
IEEE Trans. Circuits Syst. Video Technol., 2022
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images.
Symmetry, 2022
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA.
Symmetry, 2022
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images.
Symmetry, 2022
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022
Self-Supervised Learning Framework toward State-of-the-Art Iris Image Segmentation.
Sensors, 2022
Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy.
Sensors, 2022
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization.
Remote. Sens., 2022
CAAN: Context-Aware attention network for visual question answering.
Pattern Recognit., 2022
A reversible and authenticable secret sharing scheme using dual images.
Multim. Tools Appl., 2022
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding.
Multim. Tools Appl., 2022
Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows.
Knowl. Based Syst., 2022
A comprehensive framework of multiple semantics preservation in neural style transfer.
J. Vis. Commun. Image Represent., 2022
On the multi-level embedding of crypto-image reversible data hiding.
J. Vis. Commun. Image Represent., 2022
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images.
J. Vis. Commun. Image Represent., 2022
High-capacity reversible data hiding in encrypted images based on adaptive block encoding.
J. Vis. Commun. Image Represent., 2022
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction.
J. Inf. Secur. Appl., 2022
Learning stereo disparity with feature consistency and confidence.
Int. J. Ad Hoc Ubiquitous Comput., 2022
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering.
IEICE Trans. Inf. Syst., 2022
A two-stage detection method of copy-move forgery based on parallel feature fusion.
EURASIP J. Wirel. Commun. Netw., 2022
A blockchain-based secure storage scheme for medical information.
EURASIP J. Wirel. Commun. Netw., 2022
Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder.
EURASIP J. Wirel. Commun. Netw., 2022
SKDStream: a dynamic clustering algorithm on time-decaying data stream.
EURASIP J. Wirel. Commun. Netw., 2022
MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture.
EURASIP J. Wirel. Commun. Netw., 2022
ABOS: an attention-based one-stage framework for person search.
EURASIP J. Wirel. Commun. Netw., 2022
Pine pest detection using remote sensing satellite images combined with a multi-scale attention-UNet model.
Ecol. Informatics, 2022
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning.
Connect. Sci., 2022
A consortium blockchain-based information management system for unmanned vehicle logistics.
Comput. Sci. Inf. Syst., 2022
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images.
IEEE Access, 2022
DLWoT'22: 2nd International Workshop on Deep Learning for the Web of Things.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations.
Proceedings of the Social Robotics - 14th International Conference, 2022
Secret Message CDMA Multiplexing via QR Codes.
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022
2021
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases.
Symmetry, 2021
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix.
Symmetry, 2021
Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility.
Symmetry, 2021
A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021
Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT.
Sensors, 2021
Using an Optimization Algorithm to Detect Hidden Waveforms of Signals.
Sensors, 2021
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021
A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction.
Multim. Tools Appl., 2021
Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility.
Multim. Tools Appl., 2021
High capacity reversible data hiding in encrypted images based on prediction error and block classification.
Multim. Tools Appl., 2021
A hybrid-Sudoku based fragile watermarking scheme for image tampering detection.
Multim. Tools Appl., 2021
Separable reversible data hiding in encrypted images based on flexible preservation of the differences.
Multim. Tools Appl., 2021
Pixel-based fragile image watermarking based on absolute moment block truncation coding.
Multim. Tools Appl., 2021
Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation.
Multim. Tools Appl., 2021
Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021
An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021
RDMMFET: Representation of Dense Multimodality Fusion Encoder Based on Transformer.
Mob. Inf. Syst., 2021
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform.
J. Vis. Commun. Image Represent., 2021
An anisotropic reference matrix for image steganography.
J. Vis. Commun. Image Represent., 2021
High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels.
J. Vis. Commun. Image Represent., 2021
Reversible data hiding based on three shadow images using rhombus magic matrix.
J. Vis. Commun. Image Represent., 2021
Adaptive data hiding scheme based on magic matrix of flexible dimension.
KSII Trans. Internet Inf. Syst., 2021
A Two-Layer Steganography for Mosaic Images.
KSII Trans. Internet Inf. Syst., 2021
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism.
J. Inf. Secur. Appl., 2021
Reversible data hiding in encrypted images with block-based adaptive MSB encoding.
Inf. Sci., 2021
A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance.
Int. J. Embed. Syst., 2021
Turtle-shell data embedding method with high image fidelity.
Int. J. Embed. Syst., 2021
Post-quantum blockchain for secure communication in IoT-based smart home services.
Int. J. Embed. Syst., 2021
Predicting missing data for data integrity based on the linear regression model.
Int. J. Embed. Syst., 2021
A secure extended LBP data hiding scheme based on octagon-shaped shell.
Int. J. Embed. Syst., 2021
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding.
Future Internet, 2021
A proactive secret sharing scheme based on Chinese remainder theorem.
Frontiers Comput. Sci., 2021
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection.
Entropy, 2021
A novel image compression technology based on vector quantisation and linear regression prediction.
Connect. Sci., 2021
An EMD-based data hiding scheme for JPEG images.
Connect. Sci., 2021
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding.
Connect. Sci., 2021
VQ-oriented data hiding based on adjustable error compensation strategy.
Connect. Sci., 2021
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images.
IEEE Access, 2021
An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix.
IEEE Access, 2021
Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
A Reversible Database Watermark Scheme for Textual and Numerical Datasets.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images.
Proceedings of the 2021 International Conference on Fuzzy Theory and Its Applications, 2021
2020
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., 2020
On Reliability of Multiprocessor System Based on Star Graph.
IEEE Trans. Reliab., 2020
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation.
Symmetry, 2020
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020
A Secure IoT-Based Authentication System in Cloud Computing Environment.
Sensors, 2020
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu.
Sensors, 2020
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.
Sensors, 2020
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.
Secur. Commun. Networks, 2020
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem.
Secur. Commun. Networks, 2020
Secure and anonymous authentication scheme for the Internet of Things with pairing.
Pervasive Mob. Comput., 2020
An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation.
Multim. Tools Appl., 2020
Adaptive reversible data hiding scheme for AMBTC compressed images.
Multim. Tools Appl., 2020
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix.
Multim. Tools Appl., 2020
An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC.
Multim. Tools Appl., 2020
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images.
KSII Trans. Internet Inf. Syst., 2020
An efficient general data hiding scheme based on image interpolation.
J. Inf. Secur. Appl., 2020
Packet Watermarking With ECG Biological Feature.
Int. J. Netw. Secur., 2020
StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020
One-Code-Pass User Authentication Based on QR Code and Secret Sharing.
Int. J. Netw. Secur., 2020
Sharing a Secret Image in the Cloud Using Two Shadows.
Int. J. Netw. Secur., 2020
Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell.
Int. J. Netw. Secur., 2020
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem.
Int. J. Netw. Secur., 2020
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding.
Int. J. Netw. Secur., 2020
Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding.
Int. J. Comput. Sci. Eng., 2020
Greedy algorithm for image quality optimisation based on turtle-shell steganography.
Int. J. Comput. Sci. Eng., 2020
A novel high capacity turtle shell-based data hiding with location table free.
Int. J. Comput. Sci. Eng., 2020
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix.
Int. J. Comput. Sci. Eng., 2020
Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption.
Int. J. Comput. Sci. Eng., 2020
Reversibly hiding data using dual images scheme based on EMD data hiding method.
Int. J. Comput. Sci. Eng., 2020
An improved Sudoku-based data hiding scheme using greedy method.
Int. J. Comput. Sci. Eng., 2020
Secure high capacity tetris-based scheme for data hiding.
IET Image Process., 2020
Information hiding in motion data of virtual characters.
Expert Syst. Appl., 2020
Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020
Privacy-preserving high-dimensional data publishing for classification.
Comput. Secur., 2020
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020
Tracking area list allocation scheme based on overlapping community algorithm.
Comput. Networks, 2020
A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-Many Map.
IEEE Access, 2020
ABMC-DH: An Adaptive Bit-Plane Data Hiding Method Based on Matrix Coding.
IEEE Access, 2020
A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity.
IEEE Access, 2020
A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service.
IEEE Access, 2020
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images.
IEEE Access, 2020
A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images.
IEEE Access, 2020
The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-Speaking Patients With Post-Stroke Dysarthria.
IEEE Access, 2020
Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction.
IEEE Access, 2020
Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code.
IEEE Access, 2020
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique.
IEEE Access, 2020
Efficient QR Code Secret Embedding Mechanism Based on Hamming Code.
IEEE Access, 2020
Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images.
IEEE Access, 2020
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix.
IEEE Access, 2020
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix.
IEEE Access, 2020
Multi-Layer Mini-Sudoku Based High-Capacity Data Hiding Method.
IEEE Access, 2020
Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding.
IEEE Access, 2020
Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-Based Partition.
IEEE Access, 2020
An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020
2019
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks.
Wirel. Pers. Commun., 2019
Optimization and Implementation of Wavelet-based Algorithms for Detecting High-voltage Spindles in Neuron Signals.
ACM Trans. Embed. Comput. Syst., 2019
An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography.
Symmetry, 2019
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019
An Improved Integer Transform Combining with an Irregular Block Partition.
Symmetry, 2019
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images.
Symmetry, 2019
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud.
Symmetry, 2019
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code.
Symmetry, 2019
Using Two Meaningful Shadows to Share Secret Messages with Reversibility.
Symmetry, 2019
Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization.
Symmetry, 2019
Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction.
Symmetry, 2019
A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity.
Symmetry, 2019
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.
Signal Process. Image Commun., 2019
Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.
Secur. Commun. Networks, 2019
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.
Secur. Commun. Networks, 2019
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem.
Secur. Commun. Networks, 2019
Extended squared magic matrix for embedding secret information with large payload.
Multim. Tools Appl., 2019
A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients.
Multim. Tools Appl., 2019
A Turtle Shell based RDH scheme with two-dimensional histogram shifting.
Multim. Tools Appl., 2019
Data embedding scheme based on multi-matrix structure of turtle shell to avoid human eye perception.
Multim. Tools Appl., 2019
Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction.
Multim. Tools Appl., 2019
Efficient QR code authentication mechanism based on Sudoku.
Multim. Tools Appl., 2019
High-payload secret hiding mechanism for QR codes.
Multim. Tools Appl., 2019
Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map.
Multim. Tools Appl., 2019
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images.
J. Vis. Commun. Image Represent., 2019
High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement.
J. Vis. Commun. Image Represent., 2019
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019
A real-time dual-image-based reversible data hiding scheme using turtle shells.
J. Real Time Image Process., 2019
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019
A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019
Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding.
J. Inf. Hiding Multim. Signal Process., 2019
Efficient secret sharing scheme with cheater identification based on QR code.
KSII Trans. Internet Inf. Syst., 2019
Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing.
Int. J. Netw. Secur., 2019
Secure High Capacity Data Hiding Scheme based on Reference Matrix.
Int. J. Netw. Secur., 2019
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing.
IET Image Process., 2019
Enhanced secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2019
Privacy preserving weighted similarity search scheme for encrypted data.
IET Inf. Secur., 2019
Tracking areas planning based on spectral clustering in small cell networks.
IET Commun., 2019
Blockchain based searchable encryption for electronic health record sharing.
Future Gener. Comput. Syst., 2019
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features.
IEEE Access, 2019
Hybrid Scheme of Image's Regional Colorization Using Mask R-CNN and Poisson Editing.
IEEE Access, 2019
Improved K-Pass Pixel Value Ordering Based Data Hiding.
IEEE Access, 2019
Steganalysis of AMR Speech Based on Multiple Classifiers Combination.
IEEE Access, 2019
Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System.
IEEE Access, 2019
Image Neural Style Transfer With Preserving the Salient Regions.
IEEE Access, 2019
Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering.
IEEE Access, 2019
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares.
IEEE Access, 2019
A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload.
IEEE Access, 2019
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data.
IEEE Access, 2019
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix.
IEEE Access, 2019
Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network.
Proceedings of the 2019 International Electronics Communication Conference, 2019
A copy detection algorithm for game character concept design based on pose features.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Security Issues in Ultralightweight RFID Authentication Protocols.
Wirel. Pers. Commun., 2018
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018
Data Hiding Based on a Two-Layer Turtle Shell Matrix.
Symmetry, 2018
A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices.
Symmetry, 2018
Efficient Information Hiding Based on Theory of Numbers.
Symmetry, 2018
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018
An Efficient Object Detection Algorithm Based on Compressed Networks.
Symmetry, 2018
An Effective Authentication Scheme Using DCT for Mobile Devices.
Symmetry, 2018
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Process., 2018
Perceptual hashing for color images based on hybrid extraction of structural features.
Signal Process., 2018
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift.
Secur. Commun. Networks, 2018
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization.
Secur. Commun. Networks, 2018
Efficient access control system based on aesthetic QR code.
Pers. Ubiquitous Comput., 2018
Untraceable biometric-based three-party authenticated key exchange for dynamic systems.
Peer-to-Peer Netw. Appl., 2018
A per-cent-level determination of the nucleon axial coupling from quantum chromodynamics.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Nat., 2018
Reversible data hiding for VQ indices using hierarchical state codebook mapping.
Multim. Tools Appl., 2018
Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems".
Multim. Tools Appl., 2018
Effective reversible image steganography based on rhombus prediction and local complexity.
Multim. Tools Appl., 2018
A biometric-based authenticated key agreement scheme for session initiation protocol in ip-based multimedia networks.
Multim. Tools Appl., 2018
A turtle shell-based visual secret sharing scheme with reversibility and authentication.
Multim. Tools Appl., 2018
A selective encryption scheme of CABAC based on video context in high efficiency video coding.
Multim. Tools Appl., 2018
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method.
Multim. Tools Appl., 2018
Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2018
Sudoku-based secret sharing approach with cheater prevention using QR code.
Multim. Tools Appl., 2018
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator.
Multim. Tools Appl., 2018
High-Capacity Reversible Data Hiding Method for JPEG Images.
J. Softw., 2018
Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real Time Image Process., 2018
Distortion Free Progressive BTC based Secret Image Sharing.
J. Netw. Intell., 2018
StegTab: Steganography in Guitar Tablatures.
J. Inf. Hiding Multim. Signal Process., 2018
No-Reference Image Blur Assessment Based on SIFT and DCT.
J. Inf. Hiding Multim. Signal Process., 2018
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research.
J. Inf. Hiding Multim. Signal Process., 2018
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness.
J. Comput. Sci. Technol., 2018
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction.
KSII Trans. Internet Inf. Syst., 2018
Generalized PVO-K Embedding Technique for Reversible Data Hiding.
Int. J. Netw. Secur., 2018
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2018
An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes.
Int. J. Netw. Secur., 2018
Framework for practical and receipt-free remote voting.
IET Inf. Secur., 2018
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018
A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning.
IEEE Multim., 2018
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018
Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018
Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients.
Displays, 2018
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018
A novel method of speech information hiding based on 3D-Magic Matrix.
CoRR, 2018
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining.
Comput. J., 2018
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
IEEE Access, 2018
Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier.
IEEE Access, 2018
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval.
IEEE Access, 2018
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Parameter Selection for Denoising Algorithms Using NR-IQA with CNN.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Novel Framework of Robust Video Watermarking Based on Statistical Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017
Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017
Notes on "Secure authentication scheme for IoT and cloud servers".
Pervasive Mob. Comput., 2017
Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multim. Tools Appl., 2017
A semantic compression scheme for digital images based on vector quantization and data hiding.
Multim. Tools Appl., 2017
Data hiding based on extended turtle shell matrix construction method.
Multim. Tools Appl., 2017
A one-card-pass user authentication scheme using image morphing.
Multim. Tools Appl., 2017
Secure multi-group data hiding based on gemd map.
Multim. Tools Appl., 2017
A difference expansion based reversible information hiding scheme with high stego image visual quality.
Multim. Tools Appl., 2017
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
Mob. Inf. Syst., 2017
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017
ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System.
J. Inf. Hiding Multim. Signal Process., 2017
Vessel Detection in Chicken Chorioallantoic Membrane Image.
J. Inf. Hiding Multim. Signal Process., 2017
An Efficient Steganography Scheme Based on Edge Detection for High Payload.
J. Inf. Hiding Multim. Signal Process., 2017
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches.
J. Comput. Sci. Technol., 2017
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification.
KSII Trans. Internet Inf. Syst., 2017
A unified score propagation model for web spam demotion algorithm.
Inf. Retr. J., 2017
A Novel Micropayment Scheme with Variable Denomination.
Int. J. Netw. Secur., 2017
Turbo Unequal Error Protection Codes with Multiple Protection Levels.
Int. J. Netw. Secur., 2017
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
Int. J. Netw. Secur., 2017
Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization.
Int. J. Netw. Secur., 2017
An Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017
Secure CAS-based authentication scheme for mobile pay-TV systems.
Int. J. Commun. Syst., 2017
Smart card-based password authenticated key agreement protocol using chaotic maps.
Int. J. Commun. Syst., 2017
Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE Multim., 2017
Feature bundling in decision tree algorithm.
Intell. Data Anal., 2017
Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Commun. Lett., 2017
A high payload steganographic algorithm based on edge detection.
Displays, 2017
Reversible data hiding in encrypted images using reformed JPEG compression.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
A reversible data hiding scheme for image interpolation based on reference matrix.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
Extended Exploiting-Modification-Direction Data Hiding with High Capacity.
Proceedings of the International Conference on Video and Image Processing, 2017
A Digital Gift Certificate Scheme with Conditional Anonymity.
Proceedings of the 2017 International Conference on Management Engineering, 2017
VQ Compression Enhancer with Huffman Coding.
Proceedings of the Genetic and Evolutionary Computing, 2017
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation.
Wirel. Pers. Commun., 2016
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2016
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2016
Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.
IEEE Trans. Cybern., 2016
High capacity reversible data hiding scheme for encrypted images.
Signal Process. Image Commun., 2016
A secure authentication scheme with provable correctness for pay-TV systems.
Secur. Commun. Networks, 2016
Progressive secret image sharing scheme using meaningful shadows.
Secur. Commun. Networks, 2016
Robust off-line e-cash scheme with recoverability and anonymity revocation.
Secur. Commun. Networks, 2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016
A highly efficient and secure electronic cash system based on secure sharing in cloud environment.
Secur. Commun. Networks, 2016
High capacity data hiding for binary image based on block classification.
Multim. Tools Appl., 2016
Reversible data hiding scheme based on histogram shifting of n-bit planes.
Multim. Tools Appl., 2016
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2016
A new distortion-free data embedding scheme for high-dynamic range images.
Multim. Tools Appl., 2016
Very efficient variable-length codes for the lossless compression of VQ indices.
Multim. Tools Appl., 2016
An aesthetic QR code solution based on error correction mechanism.
J. Syst. Softw., 2016
An Image Steganography Scheme Using 3D-Sudoku.
J. Inf. Hiding Multim. Signal Process., 2016
Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis.
J. Inf. Hiding Multim. Signal Process., 2016
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images.
J. Inf. Hiding Multim. Signal Process., 2016
An Image Compression Method Based on Block Truncation Coding and Linear Regression.
J. Inf. Hiding Multim. Signal Process., 2016
Image Authentication and Self-Recovery Scheme Based on The Rehashing Model.
J. Inf. Hiding Multim. Signal Process., 2016
A Robust Image Copy Detection Method Based On Feature Extraction Algorithm.
J. Inf. Hiding Multim. Signal Process., 2016
A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization.
J. Inf. Hiding Multim. Signal Process., 2016
An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images.
J. Inf. Hiding Multim. Signal Process., 2016
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing.
J. Inf. Hiding Multim. Signal Process., 2016
A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks.
J. Inf. Hiding Multim. Signal Process., 2016
A Survey of Fragile Watermarking-based Image Authentication Techniques.
J. Inf. Hiding Multim. Signal Process., 2016
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images.
J. Inf. Hiding Multim. Signal Process., 2016
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electr. Comput. Eng., 2016
A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images.
KSII Trans. Internet Inf. Syst., 2016
Text Steganography Based on Ci-poetry Generation Using Markov Chain Model.
KSII Trans. Internet Inf. Syst., 2016
A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization.
KSII Trans. Internet Inf. Syst., 2016
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
KSII Trans. Internet Inf. Syst., 2016
A magic cube based information hiding scheme of large payload.
J. Inf. Secur. Appl., 2016
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
Int. J. Netw. Secur., 2016
Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
Int. J. Netw. Secur., 2016
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
Int. J. Netw. Secur., 2016
Security Analysis on Secure Untraceable Off-line Electronic Cash System.
Int. J. Netw. Secur., 2016
Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
Int. J. Netw. Secur., 2016
An Integratable Verifiable Secret Sharing Mechanism.
Int. J. Netw. Secur., 2016
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
Int. J. Netw. Secur., 2016
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability.
Int. J. Netw. Secur., 2016
A Strong RSA-based and Certificateless-based Signature Scheme.
Int. J. Netw. Secur., 2016
An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards.
Int. J. Netw. Secur., 2016
Efficient Pixel Prediction Algorithm for Reversible Data Hiding.
Int. J. Netw. Secur., 2016
A High Payload Steganographic Scheme for Compressed Images with Hamming Code.
Int. J. Netw. Secur., 2016
A practical lottery using oblivious transfer.
Int. J. Commun. Syst., 2016
A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards.
Int. J. Commun. Syst., 2016
A novel data-hiding and compression scheme based on block classification of SMVQ indices.
Digit. Signal Process., 2016
An improved least-significant-bit substitution method using the modulo three strategy.
Displays, 2016
A New Card Authentication Scheme Based on Image Watermarking and Encryption.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2015
Reversible data hiding exploiting high-correlation regulation for high-quality images.
Secur. Commun. Networks, 2015
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Secur. Commun. Networks, 2015
A dependable storage service system in cloud environment.
Secur. Commun. Networks, 2015
A provably secure smart card-based authenticated group key exchange protocol.
Secur. Commun. Networks, 2015
The credit card visual authentication scheme based on GF(28) field.
Multim. Tools Appl., 2015
An adaptive reversible steganographic scheme based on the just noticeable distortion.
Multim. Tools Appl., 2015
Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
Multim. Tools Appl., 2015
An image-based key agreement protocol using the morphing technique.
Multim. Tools Appl., 2015
A grouped-scalable secret image sharing scheme.
Multim. Tools Appl., 2015
Scanned binary image watermarking based on additive model and sampling.
Multim. Tools Appl., 2015
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
Mob. Inf. Syst., 2015
A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm.
J. Vis. Commun. Image Represent., 2015
AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Vis. Commun. Image Represent., 2015
Quadri-directional searching algorithm for secret image sharing using meaningful shadows.
J. Vis. Commun. Image Represent., 2015
Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems.
J. Inf. Hiding Multim. Signal Process., 2015
A novel information hiding scheme based on line segments.
J. Inf. Hiding Multim. Signal Process., 2015
Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy.
J. Inf. Hiding Multim. Signal Process., 2015
An Outlier Detection Method for Feature Point Matching Problem.
J. Inf. Hiding Multim. Signal Process., 2015
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication.
J. Inf. Hiding Multim. Signal Process., 2015
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method.
J. Inf. Hiding Multim. Signal Process., 2015
Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images.
J. Inf. Hiding Multim. Signal Process., 2015
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map.
J. Inf. Hiding Multim. Signal Process., 2015
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme.
J. Inf. Hiding Multim. Signal Process., 2015
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
J. Inf. Hiding Multim. Signal Process., 2015
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification.
J. Inf. Hiding Multim. Signal Process., 2015
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability.
J. Inf. Hiding Multim. Signal Process., 2015
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction.
J. Inf. Hiding Multim. Signal Process., 2015
A Secure and Efficient Scheme for Digital Gift Certificates.
J. Inf. Hiding Multim. Signal Process., 2015
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management.
J. Inf. Hiding Multim. Signal Process., 2015
Compressing Vector Quantization Index Table Using Side Match State Codebook.
J. Inf. Hiding Multim. Signal Process., 2015
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems.
J. Inf. Hiding Multim. Signal Process., 2015
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
KSII Trans. Internet Inf. Syst., 2015
Reversible data hiding with oriented and minimized distortions using cascading trellis coding.
Inf. Sci., 2015
A reversible compression code hiding using SOC and SMVQ indices.
Inf. Sci., 2015
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
Int. J. Netw. Secur., 2015
Group Authentication and Group Key Distribution for Ad Hoc Networks.
Int. J. Netw. Secur., 2015
A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties.
Int. J. Netw. Secur., 2015
Ciphertext-Auditable Identity-Based Encryption.
Int. J. Netw. Secur., 2015
Adjustment Hiding Method Based on Exploiting Modification Direction.
Int. J. Netw. Secur., 2015
A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET.
Int. J. Netw. Secur., 2015
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
Int. J. Netw. Secur., 2015
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
Int. J. Netw. Secur., 2015
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Commun. Syst., 2015
Second-order steganographic method based on adaptive reference matrix.
IET Image Process., 2015
Multi-round dynamic swap optimisation for table-based steganography.
IET Image Process., 2015
Novel and practical scheme based on secret sharing for laptop data protection.
IET Inf. Secur., 2015
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015
A reversible data hiding scheme based on the Sudoku technique.
Displays, 2015
A Proxy User Authentication Protocol Using Source-Based Image Morphing.
Comput. J., 2015
Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Reversible data hiding for VQ indices using XOR operator and SOC codes.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015
A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images.
Proceedings of the Image and Graphics - 8th International Conference, 2015
Secure Electronic Coupons.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
A New Ultralightweight RFID Protocol for Low-Cost Tags: R <sup>2</sup> AP.
Wirel. Pers. Commun., 2014
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting.
IEEE Trans. Image Process., 2014
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing.
Signal Process. Image Commun., 2014
Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding.
Smart Comput. Rev., 2014
Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.
Signal Process., 2014
Simulatable and secure certificate-based threshold signature without pairings.
Secur. Commun. Networks, 2014
Verifiable secret sharing based on the Chinese remainder theorem.
Secur. Commun. Networks, 2014
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting.
Multim. Tools Appl., 2014
A DNA-based data hiding technique with low modification rates.
Multim. Tools Appl., 2014
A novel (n, t, n) secret image sharing scheme without a trusted third party.
Multim. Tools Appl., 2014
Reversible data embedding for indices based on histogram analysis.
J. Vis. Commun. Image Represent., 2014
A high capacity data hiding scheme for binary images based on block patterns.
J. Syst. Softw., 2014
Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation.
J. Inf. Hiding Multim. Signal Process., 2014
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files.
J. Inf. Hiding Multim. Signal Process., 2014
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images.
J. Inf. Hiding Multim. Signal Process., 2014
(k, n)-Image Reversible Data Hiding.
J. Inf. Hiding Multim. Signal Process., 2014
Watermarking Marbled Image Based on Linear Enhancement Hologram.
J. Inf. Hiding Multim. Signal Process., 2014
A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem.
J. Inf. Hiding Multim. Signal Process., 2014
A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem.
J. Inf. Hiding Multim. Signal Process., 2014
A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution.
J. Inf. Hiding Multim. Signal Process., 2014
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks.
J. Inf. Hiding Multim. Signal Process., 2014
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques.
J. Inf. Hiding Multim. Signal Process., 2014
A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature.
J. Inf. Hiding Multim. Signal Process., 2014
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.
KSII Trans. Internet Inf. Syst., 2014
A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images.
KSII Trans. Internet Inf. Syst., 2014
A Fast and Secure Scheme for Data Outsourcing in the Cloud.
KSII Trans. Internet Inf. Syst., 2014
Image Watermarking Scheme Based on Scale-Invariant Feature Transform.
KSII Trans. Internet Inf. Syst., 2014
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees.
KSII Trans. Internet Inf. Syst., 2014
A Reversible Data Hiding Scheme for SMVQ Indices.
Informatica, 2014
A Simple Password Authentication Scheme Based on Geometric Hashing Function.
Int. J. Netw. Secur., 2014
An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation.
Int. J. Netw. Secur., 2014
A Reversible Steganography Suitable for Embedding Small Amounts of Data.
Int. J. Netw. Secur., 2014
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
Int. J. Netw. Secur., 2014
Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System.
Int. J. Netw. Secur., 2014
Generalized Secret Sharing with Linear Hierarchical Secrets.
Int. J. Netw. Secur., 2014
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity.
Int. J. Netw. Secur., 2014
An authenticated group key distribution mechanism using theory of numbers.
Int. J. Commun. Syst., 2014
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
Int. J. Commun. Syst., 2014
An authentication and key agreement protocol for satellite communications.
Int. J. Commun. Syst., 2014
The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2014
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy.
Fundam. Informaticae, 2014
A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment.
Comput. J., 2014
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
A Virtual Primary Key for Reversible Watermarking Textual Relational Databases.
Proceedings of the Intelligent Systems and Applications, 2014
Applying Histogram Modification to Embed Secret Message in AMBTC.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013
Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication.
Wirel. Pers. Commun., 2013
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism.
IEEE Trans. Inf. Forensics Secur., 2013
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism.
IEEE Trans. Circuits Syst. Video Technol., 2013
Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism.
Signal Process., 2013
Adaptive self-recovery for tampered images based on VQ indexing and inpainting.
Signal Process., 2013
Analyzing and removing SureSign watermark.
Signal Process., 2013
Authenticated RFID security mechanism based on chaotic maps.
Secur. Commun. Networks, 2013
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Secur. Commun. Networks, 2013
Lossless Information Hiding in the VQ Index Table.
J. Softw., 2013
A high-performance reversible data-hiding scheme for LZW codes.
J. Syst. Softw., 2013
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies.
J. Syst. Softw., 2013
An Efficient Smart Card Based Authentication Scheme Using Image Encryption.
J. Inf. Sci. Eng., 2013
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement.
J. Inf. Hiding Multim. Signal Process., 2013
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications.
J. Inf. Hiding Multim. Signal Process., 2013
A Construction for Secret Sharing Scheme with General Access Structure.
J. Inf. Hiding Multim. Signal Process., 2013
An Indicator Elimination Method for Side-match Vector Quantization.
J. Inf. Hiding Multim. Signal Process., 2013
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
Image Vis. Comput., 2013
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability.
KSII Trans. Internet Inf. Syst., 2013
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy.
KSII Trans. Internet Inf. Syst., 2013
An Image Encryption Scheme Based on Concatenated Torus Automorphisms.
KSII Trans. Internet Inf. Syst., 2013
Provably secure three party encrypted key exchange scheme with explicit authentication.
Inf. Sci., 2013
An Efficient Oblivious Transfer Protocol Using Residue Number System.
Int. J. Netw. Secur., 2013
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
Int. J. Netw. Secur., 2013
An Anonymous Multi-Receiver Encryption Based on RSA.
Int. J. Netw. Secur., 2013
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
Int. J. Netw. Secur., 2013
A Smart Card-based Authentication Scheme Using User Identify Cryptography.
Int. J. Netw. Secur., 2013
A fault-tolerant group key agreement protocol exploiting dynamic setting.
Int. J. Commun. Syst., 2013
Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digit. Signal Process., 2013
Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725].
Digit. Signal Process., 2013
Robust image hashing using non-uniform sampling in discrete Fourier domain.
Digit. Signal Process., 2013
Chaotic maps-based password-authenticated key agreement using smart cards.
Commun. Nonlinear Sci. Numer. Simul., 2013
A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
A high payload data embedding scheme using dual stego-images with reversibility.
Proceedings of the 9th International Conference on Information, 2013
2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wirel. Pers. Commun., 2012
A Secure Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Ind. Electron., 2012
A novel multi-group exploiting modification direction method based on switch map.
Signal Process., 2012
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.
Signal Process., 2012
An adaptive prediction-error expansion oriented reversible information hiding scheme.
Pattern Recognit. Lett., 2012
A multi-threshold secret image sharing scheme based on MSP.
Pattern Recognit. Lett., 2012
A hierarchical threshold secret image sharing.
Pattern Recognit. Lett., 2012
Guest Editors' Introduction: Special Section on ISIP 2011.
J. Multim., 2012
A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor.
J. Inf. Hiding Multim. Signal Process., 2012
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy.
J. Digit. Inf. Manag., 2012
Optimizing least-significant-bit substitution using cat swarm optimization strategy.
Inf. Sci., 2012
Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity.
Inf. Sci., 2012
A fast VQ codebook search with initialization and search order.
Inf. Sci., 2012
Reversible Data Hiding Scheme Based on Image Inpainting.
Fundam. Informaticae, 2012
Nucleus and cytoplast contour detector from a cervical smear image.
Expert Syst. Appl., 2012
Graph structure analysis based on complex network.
Digit. Signal Process., 2012
Efficient illumination compensation techniques for text images.
Digit. Signal Process., 2012
An Efficient and Flexible Mobile Payment Protocol.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Protecting the content integrity of digital imagery with fidelity preservation.
ACM Trans. Multim. Comput. Commun. Appl., 2011
A reversible data hiding scheme for VQ indices using locally adaptive coding.
J. Vis. Commun. Image Represent., 2011
A Prediction-Based Adaptive Reversible Data Embedding Scheme.
J. Softw., 2011
A novel image watermarking in redistributed invariant wavelet domain.
J. Syst. Softw., 2011
A secure fragile watermarking scheme based on chaos-and-hamming code.
J. Syst. Softw., 2011
A Simple Image Encoding Method with Data Lossless Information Hiding.
J. Networks, 2011
A Hierarchical Fragile Watermarking with VQ Index Recovery.
J. Multim., 2011
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
J. Multim., 2011
Sharing a Secret Image in Binary Images with Verification.
J. Inf. Hiding Multim. Signal Process., 2011
An adaptable threshold detector.
Inf. Sci., 2011
Meaningful secret sharing technique with authentication and remedy abilities.
Inf. Sci., 2011
Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images.
Int. J. Pattern Recognit. Artif. Intell., 2011
Cheating resistance and reversibility-oriented secret sharing mechanism.
IET Inf. Secur., 2011
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.
IEICE Trans. Inf. Syst., 2011
Reversible Steganography for BTC-compressed Images.
Fundam. Informaticae, 2011
A steganographic scheme by fully exploiting modification directions.
Expert Syst. Appl., 2011
A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images.
Digit. Signal Process., 2011
Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Comput. J., 2011
Image Data Hiding Schemes Based on Graph Coloring.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
General Threshold Signature Based on the Chinese Remainder Theorem.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs.
Wirel. Pers. Commun., 2010
An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks.
IEEE Trans. Wirel. Commun., 2010
Intelligent systems for future generation communications.
J. Supercomput., 2010
High capacity SMVQ-based hiding scheme using adaptive index.
Signal Process., 2010
An encoding method for both image compression and data lossless information hiding.
J. Syst. Softw., 2010
Using quad smoothness to efficiently control capacity-distortion of reversible data hiding.
J. Syst. Softw., 2010
The Design of E-Traveler's Check with Efficiency and Mutual Authentication.
J. Networks, 2010
Hiding Secret Data in an Image Using Codeword Imitation.
J. Inf. Process. Syst., 2010
A Novel Information Concealing Method Based on Exploiting Modification Direction.
J. Inf. Hiding Multim. Signal Process., 2010
A Survey of VQ Codebook Generation.
J. Inf. Hiding Multim. Signal Process., 2010
A Grayscale Image Steganography Based upon Discrete Cosine Transformation.
J. Digit. Inf. Manag., 2010
A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
J. Commun., 2010
A novel self-tuning feedback controller for active queue management supporting TCP flows.
Inf. Sci., 2010
A high payload frequency-based reversible image hiding method.
Inf. Sci., 2010
A reversible data hiding scheme using complementary embedding strategy.
Inf. Sci., 2010
A data-hiding scheme based on one-way hash function.
Int. J. Multim. Intell. Secur., 2010
An Improved Biometrics-based User Authentication Scheme without Concurrency System.
Int. J. Intell. Inf. Process., 2010
An efficient e-mail protocol providing perfect forward secrecy for mobile devices.
Int. J. Commun. Syst., 2010
Digital rights management for multimedia content over 3G mobile networks.
Expert Syst. Appl., 2010
High payload steganography mechanism using hybrid edge detector.
Expert Syst. Appl., 2010
An efficient and reliable E-DRM scheme for mobile environments.
Expert Syst. Appl., 2010
Data hiding based on the similarity between neighboring pixels with reversibility.
Digit. Signal Process., 2010
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digit. Signal Process., 2010
An efficient and fair buyer-seller fingerprinting scheme for large scale networks.
Comput. Secur., 2010
A Robust Public Watermarking Scheme Based on DWT.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
A reversible and multiple-layer embedding strategy with high capacity.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
A technique of embedding digital data in an image compression code reversibly.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
A Large Payload EMD Embedding Scheme with High Stego-image Quality.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
2009
Self-verifying visual secret sharing using error diffusion and interpolation techniques.
IEEE Trans. Inf. Forensics Secur., 2009
Reversible Data Hiding Based on Histogram Modification of Pixel Differences.
IEEE Trans. Circuits Syst. Video Technol., 2009
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies.
IEEE Trans. Circuits Syst. Video Technol., 2009
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Technol., 2009
Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2^m).
IEEE Trans. Computers, 2009
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding.
Soft Comput., 2009
Distortion-free secret image sharing mechanism using modulus operator.
Pattern Recognit., 2009
Sharing a verifiable secret image using two shadows.
Pattern Recognit., 2009
A lossless data embedding technique by joint neighboring coding.
Pattern Recognit., 2009
Authors reply 'Sharing secrets in stego images with authentication'.
Pattern Recognit., 2009
Reversible information hiding for VQ indices based on locally adaptive coding.
J. Vis. Commun. Image Represent., 2009
Lossless Compression Schemes of Vector Quantization Indices Using State Codebook.
J. Softw., 2009
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
J. Syst. Softw., 2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
J. Syst. Softw., 2009
A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy.
J. Syst. Softw., 2009
Search-order coding method with indicator-elimination property.
J. Syst. Softw., 2009
Robust t-out-of-n oblivious transfer mechanism based on CRT.
J. Netw. Comput. Appl., 2009
An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique.
J. Digit. Inf. Manag., 2009
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009
Preserving robustness and removability for digital watermarks using subsampling and difference correlation.
Inf. Sci., 2009
A novel key management scheme for dynamic multicast communications.
Int. J. Commun. Syst., 2009
Non-iterative privacy preservation for online lotteries.
IET Inf. Secur., 2009
Concurrent error detection and correction in dual basis multiplier over GF(2<sup>m</sup>).
IET Circuits Devices Syst., 2009
A Secure Multicast Framework in Large and High-Mobility Network Groups.
IEICE Trans. Commun., 2009
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Informaticae, 2009
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique.
Fundam. Informaticae, 2009
An Image Authentication Based on Discrete Fourier Transform.
Fundam. Informaticae, 2009
Preventing Cheating in Computational Visual Cryptography.
Fundam. Informaticae, 2009
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes.
Fundam. Informaticae, 2009
Roaming across wireless local area networks using SIM-based authentication protocol.
Comput. Stand. Interfaces, 2009
Design of electronic t-out-of-n lotteries on the Internet.
Comput. Stand. Interfaces, 2009
On the security of a copyright protection scheme based on visual cryptography.
Comput. Stand. Interfaces, 2009
An efficient proxy raffle protocol with anonymity-preserving.
Comput. Stand. Interfaces, 2009
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Comput. Secur., 2009
Enhanced authentication scheme with anonymity for roaming service in global mobility networks.
Comput. Commun., 2009
An on-line electronic check system with mutual authentication.
Comput. Electr. Eng., 2009
Data Hiding in Images by Hybrid LSB Substitution.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Information Hiding in Dual Images with Reversibility.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Embedding Secret Messages Using Modified Huffman Coding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A reversible data hiding scheme based on dual steganographic images.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
Embedding secret messages based on chaotic map and Huffman coding.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
A New Intelligent Authorization Agent Model in Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
A Self-Reference Watermarking Scheme Based on Wet Paper Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
A High Embedding Efficiency Steganography Scheme for Wet Paper Codes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A Resistant Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wirel. Pers. Commun., 2008
Preserving data integrity in mobile <i>ad hoc</i> networks with variant Diffie-Hellman protocol.
Secur. Commun. Networks, 2008
Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognit., 2008
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity.
Pattern Recognit., 2008
Lossless data hiding for color images based on block truncation coding.
Pattern Recognit., 2008
Sharing secrets in stego images with authentication.
Pattern Recognit., 2008
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognit., 2008
An embedding technique based upon block prediction.
J. Syst. Softw., 2008
Adaptive watermark mechanism for rightful ownership protection.
J. Syst. Softw., 2008
Reversible Data Embedding for Color Images.
J. Digit. Inf. Manag., 2008
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol., 2008
An extended difference expansion algorithm for reversible watermarking.
Image Vis. Comput., 2008
Lossless nibbled data embedding scheme based on difference expansion.
Image Vis. Comput., 2008
An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vis. Comput., 2008
Joint coding and embedding techniques for multimedia images.
Inf. Sci., 2008
A novel secret image sharing scheme in color images using small shadow images.
Inf. Sci., 2008
Reversible data-embedding scheme using differences between original and predicted pixel values.
IET Inf. Secur., 2008
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Comput. Digit. Tech., 2008
Reversible Steganographic Method with High Payload for JPEG Images.
IEICE Trans. Inf. Syst., 2008
LSB-Based Steganography Using Reflected Gray Code.
IEICE Trans. Inf. Syst., 2008
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations.
IEICE Trans. Inf. Syst., 2008
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Informaticae, 2008
A Large Payload Data Embedding Technique for Color Images.
Fundam. Informaticae, 2008
Three-Phase Lossless Data Hiding Method for the VQ Index Table.
Fundam. Informaticae, 2008
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies.
Fundam. Informaticae, 2008
High Capacity Data Hiding for Grayscale Images.
Fundam. Informaticae, 2008
Isolated items discarding strategy for discovering high utility itemsets.
Data Knowl. Eng., 2008
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Assigning Keys in a Hierarchy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An Effective Demosaicking and Zooming Algorithm for CFA Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An Image Authentication Scheme for Halftone Images Based upon Error Diffusion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A New Probabilistic Visual Secret Sharing Scheme for Color Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Security design for three-party encrypted key exchange protocol using smart cards.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Using nearest covering codes to embed secret information in grayscale images.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Lossless Data Hiding Based on Histogram Modification for Image Authentication.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
An Improved EMD Embedding Scheme Based on Secret Image Difference.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Hiding Information Employing Reduplicating Embedding.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Reversibly sharing and hiding secret using expansion strategy.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008
2007
Adaptive Data Hiding Scheme for Palette Images.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007
A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wirel. Pers. Commun., 2007
Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook.
IEEE Trans. Image Process., 2007
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes.
IEEE Trans. Inf. Forensics Secur., 2007
An efficient image authentication method based on Hamming code.
Pattern Recognit., 2007
Lossless recovery of a VQ index table with embedded secret data.
J. Vis. Commun. Image Represent., 2007
Novel image copy detection with rotating tolerance.
J. Syst. Softw., 2007
TFRP: An efficient microaggregation algorithm for statistical disclosure control.
J. Syst. Softw., 2007
Secure communications for cluster-based ad hoc networks using node identities.
J. Netw. Comput. Appl., 2007
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots.
J. Netw. Comput. Appl., 2007
Combined association rules for dealing with missing values.
J. Inf. Sci., 2007
Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci., 2007
Reversible hiding in DCT-based compressed images.
Inf. Sci., 2007
Reversible steganographic method using SMVQ approach based on declustering.
Inf. Sci., 2007
Color image retrieval technique based on color features and image bitmap.
Inf. Process. Manag., 2007
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, 2007
Anonymous authentication scheme for wireless communications.
Int. J. Mob. Commun., 2007
An RSA-based (t, n) threshold proxy signature scheme with freewill identities.
Int. J. Inf. Comput. Secur., 2007
Scalable and systolic Montgomery multiplier over GF(2<sup>m</sup>) generated by trinomials.
IET Circuits Devices Syst., 2007
Hiding Secret Information Using Adaptive Side-Match VQ.
IEICE Trans. Inf. Syst., 2007
Reversible Data Hiding in the VQ-Compressed Domain.
IEICE Trans. Inf. Syst., 2007
Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels.
IEEE Commun. Lett., 2007
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Informaticae, 2007
A Novel Image Hiding Scheme Based on VQ and Hamming Distance.
Fundam. Informaticae, 2007
VQ Codebook Searching Algorithm Based on Correlation Property.
Fundam. Informaticae, 2007
Secret Image Hiding and Sharing Based on the (t, n)-Threshold.
Fundam. Informaticae, 2007
Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality.
Fundam. Informaticae, 2007
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Informaticae, 2007
A new steganographic method for color and grayscale image hiding.
Comput. Vis. Image Underst., 2007
Security enhancement of an IC-card-based remote login mechanism.
Comput. Networks, 2007
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining.
Adv. Eng. Informatics, 2007
Improved JPEG Scheme Based on Adaptive Block Encoding.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Paper Currency Verification with Support Vector Machines.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ.
Proceedings of the Advances in Multimedia Information Processing, 2007
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
A Conference Key Distribution Scheme Using Interpolating Polynomials.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Density-Based Image Vector Quantization Using a Genetic Algorithm.
Proceedings of the Advances in Multimedia Modeling, 2007
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator.
Proceedings of the Advances in Multimedia Modeling, 2007
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Reversible Data Embedding Technique for Palette Images Using De-clustering.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Reversible Quantization-Index Modulation Using Neighboring Correlation.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
A High Payload VQ Steganographic Method for Binary Images.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
A New Image Compression Scheme Based on Locally Adaptive Coding.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
An Improvement on Authenticated Key Agreement Scheme.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
An e-mail signature protocol for anti-spam work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Secret Image Sharing Using Quadratic Residues.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Improvements of EMD Embedding for Large Payloads.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Secret Sharing and Information Hiding by Shadow Images.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Reversible Data Embedding for Vector Quantization Indices.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
High Payload Data Embedding with Hybrid Strategy.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A Semi-blind Watermarking Based on Discrete Wavelet Transform.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Significance-Preserving Codebook Using Generic Algorithm.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
A Digital Watermarking Scheme Based on Singular Value Decomposition.
Proceedings of the Combinatorics, 2007
A New (t, n)-Threshold Scheme Based on Difference Equations.
Proceedings of the Combinatorics, 2007
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
An Efficient Fragile Watermarking for Web Pages Tamper-Proof.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wirel. Commun. Mob. Comput., 2006
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.
IEEE Trans. Inf. Forensics Secur., 2006
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization.
IEEE Trans. Circuits Syst. Video Technol., 2006
Removing blocking effects using an artificial neural network.
Signal Process., 2006
Fast codebook search algorithms based on tree-structured vector quantization.
Pattern Recognit. Lett., 2006
A watermarking-based image ownership and tampering authentication scheme.
Pattern Recognit. Lett., 2006
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels.
Pattern Recognit., 2006
Error resilient locally adaptive data compression.
J. Syst. Softw., 2006
A difference expansion oriented data hiding scheme for restoring the original host images.
J. Syst. Softw., 2006
Reversible index-domain information hiding scheme based on side-match vector quantization.
J. Syst. Softw., 2006
A new edge detection approach based on image context analysis.
Image Vis. Comput., 2006
A novel efficient (<i>t</i>, <i>n</i>) threshold proxy signature scheme.
Inf. Sci., 2006
New image steganographic methods using run-length approach.
Inf. Sci., 2006
An image coding scheme using SMVQ and support vector machines.
Neurocomputing, 2006
An Access Control System with Time-constraint Using Support Vector Machines.
Int. J. Netw. Secur., 2006
A secure and efficient authentication scheme for mobile users.
Int. J. Mob. Commun., 2006
A Robust Content-Based Copy Detection Scheme.
Fundam. Informaticae, 2006
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization.
Fundam. Informaticae, 2006
An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression.
Fundam. Informaticae, 2006
Perfect Hashing Schemes for Mining Traversal Patterns.
Fundam. Informaticae, 2006
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images.
Fundam. Informaticae, 2006
A Novel Index Coding Scheme for Vector Quantization.
Fundam. Informaticae, 2006
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing.
Fundam. Informaticae, 2006
An anonymous voting mechanism based on the key exchange protocol.
Comput. Secur., 2006
A parallel residue-to-binary conversion algorithm without trial division.
Comput. Electr. Eng., 2006
A division algorithm for residue numbers.
Appl. Math. Comput., 2006
A Novel Key Agreement Scheme in a Multiple Server Environment.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
A novel data hiding scheme for keeping high stego-image quality.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006
Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
A DCT-based Recoverable Image Authentication.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
An Untraceable Forward-Secure Blind Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
A Cryptanalysis on a Generalized Threshold Cryptosystem.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
An Improvement of the Design of Integrating Subliminal Channel with Access Control.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
A Scheme for (t, n)-Threshold Secret Image Sharing.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Novel Steganographic Schemes Based on Row-Major Mapping Relation.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
An Image Hiding Scheme Based on Du's Disk Allocation Method.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Improved SMVQ Scheme with Edge-Directed Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Progressive Image Transmission Using Significant Features and Linear Regression Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Reusability on Learning Object Repository.
Proceedings of the Advances in Web Based Learning, 2006
A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
A Multipurpose Wavelet-Based Image Watermarking.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
A Wavelet-Based Progressive Digital Image Transmission Scheme.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
An ImageWatermarking Scheme Using Pattern Coding Technique.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
An Untraceable Electronic Cash System Using Fair Blind Signatures.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
A New Scheme for the Electronic Coin.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
A Secret Image Sharing Scheme Based on Vector Quantization Mechanism.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Enhanced Anonymous Auction Protocols with Freewheeling Bids.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
An efficient authentication protocol for mobile satellite communication systems.
ACM SIGOPS Oper. Syst. Rev., 2005
SVD-based digital image watermarking scheme.
Pattern Recognit. Lett., 2005
Hiding secret data in images via predictive coding.
Pattern Recognit., 2005
A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization.
Image Vis. Comput., 2005
An image zooming technique based on vector quantization approximation.
Image Vis. Comput., 2005
A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization.
Informatica (Slovenia), 2005
Hiding Data in Halftone Images.
Informatica, 2005
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, 2005
Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, 2005
A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
Int. J. High Perform. Comput. Netw., 2005
A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization.
IEICE Trans. Inf. Syst., 2005
Data Compressor for VQ Index Tables.
Fundam. Informaticae, 2005
A New Density-Based Scheme for Clustering Based on Genetic Algorithm.
Fundam. Informaticae, 2005
An Inverse Halftoning Technique Using Modified Look-Up Tables.
Fundam. Informaticae, 2005
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy.
Fundam. Informaticae, 2005
The General Pay-Word: A Micro-payment Scheme Based on <i>n</i>-dimension One-way Hash Chain.
Des. Codes Cryptogr., 2005
Sharing visual multi-secrets using circle shares.
Comput. Stand. Interfaces, 2005
Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Comput. Stand. Interfaces, 2005
An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005
A novel digital image watermarking scheme based on the vector quantization technique.
Comput. Secur., 2005
Efficient authentication protocols of GSM.
Comput. Commun., 2005
Perfect Hashing Schemes for Mining Association Rules.
Comput. J., 2005
A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Comput. Artif. Intell., 2005
An iterative modular multiplication algorithm in RNS.
Appl. Math. Comput., 2005
A time-stamping protocol for digital watermarking.
Appl. Math. Comput., 2005
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli.
Appl. Math. Comput., 2005
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005
Authentication schemes with no verification table.
Appl. Math. Comput., 2005
A scheme for threshold multi-secret sharing.
Appl. Math. Comput., 2005
Secret Hiding Using Side Match Vector Quantization.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
FA-Tree - A Dynamic Indexing Structure for Spatial Data.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
An Efficient Algorithm for Incremental Mining of Association Rules.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005
Image Retrieval Using Spatial Color and Edge Detection.
Proceedings of the Advances in Multimedia Information Processing, 2005
A Reversible Information Hiding Scheme Based on Vector Quantization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Method for Searching Similar Images Using Quality Index Measurement.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Improving Image Quality for JPEG Compression.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Hiding Data in Binary Images.
Proceedings of the Information Security Practice and Experience, 2005
An Algorithm for Mining Association Rules with Weighted Minimum Supports.
Proceedings of the Artificial Intelligence Applications and Innovations - IFIP TC12 WG12.5, 2005
A Search Scheme Resulting in Mixing Compressed Text Files.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
An Image Refining Method Using Digital Watermark via Vector Quantization.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Sharing a Secret Two-Tone Image in Two Gray-Level Images.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
An Improvement on Strong-Password Authentication Protocols.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005
A Novel Conference Key Distribution System with Re-keying Protocol.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
An efficient deniable authentication protocol.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Time-bounded Based Password Authentication Scheme.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Image Copy Detection with Rotating Tolerance.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
A Fast Algorithm for Mining Share-Frequent Itemsets.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005
A Parallel Modular Exponentiation Scheme for Transformed Exponents.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005
A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap.
Proceedings of the Information Retrieval Technology, 2005
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
A New Design for Efficient t-out-n Oblivious Transfer Scheme.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
A DCT-Domain System for Hiding Fractal Compressed Images.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
Content-Based Retrieval Concept.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
2004
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Wirel. Pers. Commun., 2004
A progressive secret reveal system based on SPIHT image transmission.
Signal Process. Image Commun., 2004
A color image watermarking scheme based on color quantization.
Signal Process., 2004
A secure one-time password authentication scheme with low-computation for mobile communications.
ACM SIGOPS Oper. Syst. Rev., 2004
Remarks on fingerprint-based remote user authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2004
A convertible group signature scheme.
ACM SIGOPS Oper. Syst. Rev., 2004
An improvement of delegated multisignature scheme with document decomposition.
ACM SIGOPS Oper. Syst. Rev., 2004
A secure one-time password authentication scheme using smart cards without limiting login times.
ACM SIGOPS Oper. Syst. Rev., 2004
An improvement on a deniable authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2004
A secure and efficient strong-password authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2004
Novel full-search schemes for speeding up image coding using vector quantization.
Real Time Imaging, 2004
A steganographic method for digital images using side match.
Pattern Recognit. Lett., 2004
Information hiding based on search-order coding for VQ indices.
Pattern Recognit. Lett., 2004
A new design of efficient partially blind signature scheme.
J. Syst. Softw., 2004
A new scheme to protect confidential images.
J. Interconnect. Networks, 2004
An Efficient Graph-Based Method for Parallel Mining Problems.
J. Inf. Knowl. Manag., 2004
Retrieving digital images from a JPEG compressed image database.
Image Vis. Comput., 2004
A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004
Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction.
Informatica (Slovenia), 2004
High Capacity Data Hiding in JPEG-Compressed Images.
Informatica, 2004
VQ-Based Image Watermarking Using Anti-Gray Coding.
Informatica, 2004
Similar Image Retrieval Based on Wavelet Transformation.
Int. J. Wavelets Multiresolution Inf. Process., 2004
An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique.
Int. J. Pattern Recognit. Artif. Intell., 2004
A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math., 2004
Signing a digital signature without using one-way hash functions and message redundancy schemes.
IEEE Commun. Lett., 2004
Scenery Image Segmentation Using Support Vector Machines.
Fundam. Informaticae, 2004
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Informaticae, 2004
An Adaptive Steganographic Scheme for Color Images.
Fundam. Informaticae, 2004
A New Repeating Color Watermarking Scheme Based on Human Visual Model.
EURASIP J. Adv. Signal Process., 2004
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
Comput. Stand. Interfaces, 2004
A novel three-party encrypted key exchange protocol.
Comput. Stand. Interfaces, 2004
A fair and secure mobile agent environment based on blind signature and proxy host.
Comput. Secur., 2004
A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes.
Comput. J., 2004
An Adaptive Steganography for Index-Based Images Using Codeword Grouping.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Detection and Restoration of a Tampered Medical Image.
Proceedings of the Medical Imaging and Augmented Reality: Second International Workshop, 2004
A Signature Scheme with (t, n) Shared Verification and Message Recovery.
Proceedings of the iiWAS'2004, 2004
The Security Flaw of an Untraceable Signature Scheme.
Proceedings of the Fourth International Conference on Electronic Business, 2004
A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
A Chinese Remainder Theorem Oriented Information Hiding Scheme.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
Progressive Image Transmission Using Singular Value Decomposition.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004
A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
A New FP-Tree Algorithm for Mining Frequent Itemsets.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Supervising Secret-Key Agreements in a Level-Based Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Using IC Cards to Remotely Login Passwords without Verification Tables.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Secret Sharing with Access Structures in a Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Bandwidth Efficiency of an Image Compression Method for Information Hiding.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Yet Another Attack on a QR-based Password Authentication System.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Spatial Video Retrieval Based on the Piecewise Method.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Steganography Using JPEG-Compressed Images.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
A Novel Information Hiding Scheme Based on BTC.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
Vis. Comput., 2003
A self-encryption mechanism for authentication of roaming and teleconference services.
IEEE Trans. Wirel. Commun., 2003
Using set partitioning in hierarchical trees to authenticate digital images.
Signal Process. Image Commun., 2003
Error prevention and resilience of VQ encoded images.
Signal Process., 2003
A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes.
Real Time Imaging, 2003
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy.
Pattern Recognit., 2003
An efficient protocol for anonymous multicast and reception.
Inf. Process. Lett., 2003
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards.
Informatica, 2003
A Watermarking Scheme Based on Principal Component Analysis Technique.
Informatica, 2003
Edge Detection Using Block Truncation Coding.
Int. J. Pattern Recognit. Artif. Intell., 2003
Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Informaticae, 2003
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Informaticae, 2003
An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Informaticae, 2003
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Informaticae, 2003
A New Channel for Image Hiding Based on Interpolating polynomials.
Fundam. Informaticae, 2003
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Gener. Comput. Syst., 2003
Security enhancement for anonymous secure e-voting over a network.
Comput. Stand. Interfaces, 2003
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Comput. Stand. Interfaces, 2003
A flexible date-attachment scheme on e-cash.
Comput. Secur., 2003
Efficient anonymous auction protocols with freewheeling bids.
Comput. Secur., 2003
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking.
Comput. J., 2003
Parallel computational algorithms for generalized Chinese remainder theorem.
Comput. Electr. Eng., 2003
An Efficient Block-based Scheme for Progressively Transmitting Lossless Images.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003
A Method for Sending Confidential Messages to a Group without Trusted Parties.
Proceedings of the Parallel and Distributed Processing and Applications, 2003
An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
Proceedings of the Information and Communications Security, 5th International Conference, 2003
A Robust and Recoverable Tamper Proofing Technique for Image Authentication.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003
Signature Schemes Based on Two Hard Problems Simultaneously.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Lossless Image Compression Based on Two-Way Smaller Difference.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Huffman Tree Decomposition and Its Coding Applications.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
2002
An ElGamal-Like Cryptosystem for Enciphering Large Messages.
IEEE Trans. Knowl. Data Eng., 2002
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images.
Real Time Imaging, 2002
A fast pixel mapping algorithm using principal component analysis.
Pattern Recognit. Lett., 2002
Cryptanalysis of an encryption scheme for binary images.
Pattern Recognit. Lett., 2002
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy.
Pattern Recognit. Lett., 2002
Detection and restoration of tampered JPEG compressed images.
J. Syst. Softw., 2002
Sharing multiple secrets in digital images.
J. Syst. Softw., 2002
A steganographic method based upon JPEG and quantization table modification.
Inf. Sci., 2002
An improvement of a technique for color quantization using reduction of color space dimensionality.
Informatica (Slovenia), 2002
Recognition of Image Authenticity Using Significant DCT Coefficients Quantization.
Informatica (Slovenia), 2002
A Feature-Oriented Copyright Owner Proving Technique for Still Images.
Int. J. Softw. Eng. Knowl. Eng., 2002
Both Color and Gray Scale Secret Images Hiding in a Color Image.
Int. J. Pattern Recognit. Artif. Intell., 2002
A Fast and Secure Image Hiding Scheme Based on LSB Substitution.
Int. J. Pattern Recognit. Artif. Intell., 2002
A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels.
Int. J. Pattern Recognit. Artif. Intell., 2002
Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding.
Int. J. Comput. Process. Orient. Lang., 2002
A New Micro-Payment System Using General Payword Chain.
Electron. Commer. Res., 2002
A Dynamic Color Palette for Color Images Coding.
Proceedings of the Advances in Multimedia Information Processing, 2002
A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density.
Proceedings of the Advances in Multimedia Information Processing, 2002
A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications.
Proceedings of the Advances in Multimedia Information Processing, 2002
An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding.
Proceedings of the 6th Joint Conference on Information Science, 2002
An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002
An Association Rule Mining Method for Spatial Database.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002
An Inverse Halftoning Technique using Genetic Algorithm.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002
A Compact Patricia Trie for a Large Set of Keys.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002
Cryptanalysis of the WD Public-Key Cryptosystem.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
Sharing a Secret Gray Image in Multiple Images.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
A Hybrid Method for Estimating the Euclidean Distance between Two Vectors.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
An Image Copyright Protection Scheme Based on Torus Automorphism.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
Key Exchange Protocols for Multiparty Communication Services.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
2001
Image matching using run-length feature.
Pattern Recognit. Lett., 2001
Spatial Similarity Retrieval in Video Databases.
J. Vis. Commun. Image Represent., 2001
A new encryption algorithm for image cryptosystems.
J. Syst. Softw., 2001
A New Two-Path Search Algorithm for Block Motion Estimation of Video Data.
J. Inf. Sci. Eng., 2001
New method of secret image sharing based upon vector quantization.
J. Electronic Imaging, 2001
A Novel Progressive Image Transmission Technique for Chinese Calligraphy.
Int. J. Comput. Process. Orient. Lang., 2001
Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance.
Int. J. Comput. Process. Orient. Lang., 2001
Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001
A Generalized Secret Image Sharing and Recovery Scheme.
Proceedings of the Advances in Multimedia Information Processing, 2001
A Novel Scheme for Securing Image Steganography.
Proceedings of the Advances in Multimedia Information Processing, 2001
A Color Image Retrieval Method Based on Local Histogram.
Proceedings of the Advances in Multimedia Information Processing, 2001
Image Retrieval Based on Tolerable Difference of Direction.
Proceedings of the 15th International Conference on Information Networking, 2001
Cryptanalysis of the Improved User Efficient Blind Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
Proceedings of the Information and Communications Security, Third International Conference, 2001
A Progressive Image Transmission Scheme Based on Block Truncation Coding.
Proceedings of the Human Society and the Internet, 2001
Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure.
Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001
2000
An efficient computation of Euclidean distances using approximated look-up table.
IEEE Trans. Circuits Syst. Video Technol., 2000
A new lossless compression scheme based on Huffman coding scheme for image compression.
Signal Process. Image Commun., 2000
Breadth-first search oriented symbolic picture representation for spatial match retrieval.
J. Syst. Softw., 2000
Digital watermarking of images using neural networks.
J. Electronic Imaging, 2000
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000
A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia), 2000
A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme.
Informatica (Slovenia), 2000
A Compact Sparse Matrix Representation Using Random Hash Functions.
Data Knowl. Eng., 2000
A threshold decryption scheme without session keys.
Comput. Electr. Eng., 2000
An Improved Prediction Method for Quadtree Image Coding.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000
A Method for Protecting Digital Images from Being Copied Illegally.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000
A Perspective on the Development of Digital Libraries in Taiwan.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000
An efficient accessing technique of Chinese characters using Boshiamy Chinese input system.
Proceedings of the Fifth International Workshop on Information Retrieval with Asian Languages, 2000, Hong Kong, China, September 30, 2000
Computing watermarks from images using quadtrees.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000
A New Scheme for Sharing Secret Color Images in Computer Network.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000
Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
A Proof of Copyright Ownership Using Moment-Preserving.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
Detecting Dealer Cheating in Secret Sharing Systems.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1999
A watermarking technique based on one-way hash functions.
IEEE Trans. Consumer Electron., 1999
Reconstruction of lost blocks using codeword estimation.
IEEE Trans. Consumer Electron., 1999
Variable rate vector quantization scheme based on quadtree segmentation.
IEEE Trans. Consumer Electron., 1999
Low complexity index-compressed vector quantization for image compression.
IEEE Trans. Consumer Electron., 1999
A concept of designing cheater identification methods for secret sharing.
J. Syst. Softw., 1999
Partition search filter and its performance analysis.
J. Syst. Softw., 1999
(t, n) Threshold Digital Signature With Traceability Property.
J. Inf. Sci. Eng., 1999
An Improved Threshold Scheme Based on Modular ARithmetic.
J. Inf. Sci. Eng., 1999
A fast modular multiplication algorithm for calculating the product AB modulo N.
Inf. Process. Lett., 1999
Conference key distribution schemes for portable communication systems.
Comput. Commun., 1999
Tree Structured Vector Quantization with Dynamic Path Search.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
A virtual image cryptosystem based upon vector quantization.
IEEE Trans. Image Process., 1998
A predictive image coding scheme using a smaller codebook.
Signal Process. Image Commun., 1998
An adaptive exponentiation method.
J. Syst. Softw., 1998
A spatial match retrieval mechanism for symbolic pictures.
J. Syst. Softw., 1998
Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search.
J. Electronic Imaging, 1998
Sharing Secret Omages using Shadow Codebooks.
Inf. Sci., 1998
A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures.
Data Knowl. Eng., 1998
Threshold signature schemes with traceable signers in group communications.
Comput. Commun., 1998
Using RSA with low exponent in a public network.
Comput. Commun., 1998
Authenticity of public keys in asymmetric cryptosystems.
Comput. Commun., 1998
An on-line secret sharing scheme for multi-secrets.
Comput. Commun., 1998
A Scheme for Obtaining a Message from the Digital Multisignature.
Proceedings of the Public Key Cryptography, 1998
An Efficient Data Structure for Storing Similar Binary Images.
Proceedings of the 5th International Conference of Foundations of Data Organization (FODO'98), 1998
1997
Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval.
IEEE Trans. Knowl. Data Eng., 1997
A new image coding algorithm using variable-rate side-match finite-state vector quantization.
IEEE Trans. Image Process., 1997
Diagonal axes method (DAM): a fast search algorithm for vector quantization.
IEEE Trans. Circuits Syst. Video Technol., 1997
A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Comput., 1997
A secure voting system on a public network.
Networks, 1997
An Improved VQ Codebook Search Algorithm Using Principal Component Analysis.
J. Vis. Commun. Image Represent., 1997
Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval.
J. Inf. Sci. Eng., 1997
A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997
Authenticated Encryption Schemes with Linkage Between Message Blocks.
Inf. Process. Lett., 1997
A Simple Approach for Generating RSA Keys.
Inf. Process. Lett., 1997
Spatial match retrieval based on direction signatures using multiple key hashing scheme.
Int. J. Intell. Syst., 1997
A Cost Optimal Search Technique for the Knapsack Problem.
Int. J. High Speed Comput., 1997
Parallel computation of the multi-exponentiation for cryptosystems.
Int. J. Comput. Math., 1997
Proper interval graphs and the guard problem.
Discret. Math., 1997
A Digital Signature Scheme Based upon the Theory of Quadratic residues.
Cryptologia, 1997
Three ID-based information security functions.
Comput. Commun., 1997
1996
A spatial data representation: an adaptive 2D-H string.
Pattern Recognit. Lett., 1996
Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval.
J. Syst. Softw., 1996
An Improvement to Ziegler's Sparse Matrix Compression Algorithm.
J. Syst. Softw., 1996
On Key Changeable ID-Based Digital Signature Scheme.
J. Inf. Sci. Eng., 1996
Cryptanalysis of the Secret Exponent of the RSA Scheme.
J. Inf. Sci. Eng., 1996
A Fast Search Algorithm for Vector Quantization.
J. Inf. Sci. Eng., 1996
Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries.
Inf. Sci., 1996
Integrating Authentication in Public Key Distribution System.
Inf. Process. Lett., 1996
Autenticated Encryption Schemes with Message Linkage.
Inf. Process. Lett., 1996
A Spatial Filter for Similarity Retrieval.
Int. J. Pattern Recognit. Artif. Intell., 1996
Two 2D search filters and their performance analyses.
Int. J. Comput. Math., 1996
Optimal Linear Hashing Files for Orthogonal Range Retrieval.
Proceedings of the COMPSAC '96, 1996
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996
A Temporal Join Mechanism Based on Trie-Ranking Data Structure.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996
A group-oriented (t, n) undeniable signature scheme without trusted center.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
A dynamic secret sharing scheme with cheater detection.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
New Public-Key Cipher System Based Upon the Diophantine Equations.
IEEE Trans. Computers, 1995
A near pattern-matching scheme based upon principal component analysis.
Pattern Recognit. Lett., 1995
An exact match retrieval scheme based upon principal component analysis.
Pattern Recognit. Lett., 1995
Relative coordinates oriented symbolic string for spatial relationship retrieval.
Pattern Recognit., 1995
Parallel Computation of the Modular Cascade Exponentiation.
Parallel Algorithms Appl., 1995
Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries.
J. Inf. Sci. Eng., 1995
Shortest Weighted Length Addition Chains.
J. Inf. Sci. Eng., 1995
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm.
J. Inf. Sci. Eng., 1995
Dynamic Pictorial Databases Design for Similarity Retrieval.
Inf. Sci., 1995
Arithmetic operations on encrypted data.
Int. J. Comput. Math., 1995
A cryptographic implementation for dynamic access control in a user hierarchy.
Comput. Secur., 1995
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995
Remote scheme for password authentication based on theory of quadratic residues.
Comput. Commun., 1995
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Proceedings of the Cryptography: Policy and Algorithms, 1995
Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons.
Proceedings of the Combinatorics and Computer Science, 1995
1994
Application of geometric hashing to iconic database retrieval.
Pattern Recognit. Lett., 1994
New concepts for multiple stack systems: Born and reborn.
J. Syst. Softw., 1994
A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem.
J. Inf. Sci. Eng., 1994
Controlling Access in Tree Hierarchies.
Inf. Sci., 1994
Optimal Multiple Key Hashing Files for Orthogonal Range Queries.
Inf. Sci., 1994
A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis.
Int. J. Pattern Recognit. Artif. Intell., 1994
Authentication and protection of public keys.
Comput. Secur., 1994
Access control with binary keys.
Comput. Secur., 1994
A scheme to determine the relationship between two users in a hierarchy.
Comput. Secur., 1994
Method for constructing a group-oriented cipher system.
Comput. Commun., 1994
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem.
Comput. Commun., 1994
1993
An object-oriented similarity retrieval algorithm for iconic image databases.
Pattern Recognit. Lett., 1993
A hashing-oriented nearest neighbor searching scheme.
Pattern Recognit. Lett., 1993
A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers.
IEEE J. Sel. Areas Commun., 1993
Algebraic operations on encryped relational databases.
Inf. Syst., 1993
Optimal MMI file systems for orthogonal range retrieval.
Inf. Syst., 1993
Controlling the Access Requests in an Information Protection System.
Inf. Process. Manag., 1993
Master Keys for an M <sup> 3 </sup> Cryptoscheme.
Cryptologia, 1993
A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files.
BIT, 1993
A Refinement of a Compression-Oriented Addressing Scheme.
BIT, 1993
Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval.
Proceedings of the Advances in Spatial Databases, 1993
Similarity Retrieval on Pictorial Databases Based upon Module Operation.
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA), 1993
1992
A Chinese Character Retrieval Scheme Using Shuang Pinyin.
J. Inf. Sci. Eng., 1992
Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci., 1992
A conference key broadcasting system using sealed locks.
Inf. Syst., 1992
Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst., 1992
On GDM allocation for partial range queries.
Inf. Syst., 1992
Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manag., 1992
A fast algorithm to retrieve symbolic pictures.
Int. J. Comput. Math., 1992
A Record-Oriented Cryptosystem for Database Sharing (Short Note).
Comput. J., 1992
Greedy File - a New Data Organisation Concept for Partial Match Retrieval.
Comput. J., 1992
Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files.
Comput. J., 1992
Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems.
Comput. J., 1992
A Solution to Generalized Group Oriented Cryptography.
Proceedings of the IT Security: The Need for International Cooperation, 1992
De-Clustering Image Databases.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992
The Design of a Conference Key Distribution System.
Proceedings of the Advances in Cryptology, 1992
1991
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw. Pract. Exp., 1991
Retrieval of similar pictures on pictorial databases.
Pattern Recognit., 1991
A shape recognition scheme based on relative distances of feature points from the centroid.
Pattern Recognit., 1991
Spatial Match Retrieval of Symbolic Pictures.
J. Inf. Sci. Eng., 1991
A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets.
J. Inf. Sci. Eng., 1991
A note on allocating k-ary multiple key hashing files among multiple disks.
Inf. Sci., 1991
Password authentication using Newton's interpolating polynomials.
Inf. Syst., 1991
On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks.
Inf. Syst., 1991
A password authentication scheme based on discrete logarithms.
Int. J. Comput. Math., 1991
A dynamic key-lock-pair access control scheme.
Comput. Secur., 1991
On the Design of a Machine-Independent Perfect Hashing Scheme.
Comput. J., 1991
1990
A Dynamic Access Control Mechanism in Information Protection Systems.
J. Inf. Sci. Eng., 1990
A New Password Authentication Scheme.
J. Inf. Sci. Eng., 1990
A Reciprocal Confluence Tree Unit and Its Applications.
BIT, 1990
1989
Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989
1988
An Ordered Minimal Perfect Hashing Scheme with Single Parameter.
Inf. Process. Lett., 1988
A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files.
Comput. J., 1988
Application of Principal Component Analysis to Multi-Disk Concurrent Accessing.
BIT, 1988
Orthogonal Range Retrieval Using Bucket Address Hashing.
Proceedings of the Statistical and Scientific Database Management, 1988
1987
Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval.
J. Inf. Sci. Eng., 1987
Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System.
J. Inf. Sci. Eng., 1987
Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems.
Comput. J., 1987
An Information Protection Scheme Based Upon Number Theory.
Comput. J., 1987
Performance of Two-Disk Partition Data Allocations.
BIT, 1987
1986
A scheme for constructing ordered minimal perfect hashing functions.
Inf. Sci., 1986
Letter-oriented reciprocal hashing scheme.
Inf. Sci., 1986
A Letter-Oriented Minimal Perfect Hashing Scheme.
Comput. J., 1986
On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems.
BIT, 1986
The Idea of De-Clustering and its Applications.
Proceedings of the VLDB'86 Twelfth International Conference on Very Large Data Bases, 1986
On the Design of Ordered Minimal Perfect Hashing Functions.
Proceedings of the Second International Conference on Data Engineering, 1986
1985
On the Complexity of File Allocation Problem.
Proceedings of the Foundations of Data Organization, 1985
Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems.
Proceedings of the Foundations of Data Organization, 1985
On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems.
Proceedings of the Foundations of Data Organization, 1985
Database Research and Development in Taiwan.
Proceedings of the Foundations of Data Organization, 1985
The Study of a Letter Oriented Minimal Perfect Hashing Scheme.
Proceedings of the Foundations of Data Organization, 1985
1984
Performance Analyses of Cartesian Product Files and Random Files.
IEEE Trans. Software Eng., 1984
Optimal information retrieval when queries are not random.
Inf. Sci., 1984
An ordered minimal perfect hashing scheme based upon Euler's theorem.
Inf. Sci., 1984
1983
The hierarchical ordering in multiattribute files.
Inf. Sci., 1983
1982
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries.
IEEE Trans. Software Eng., 1982
1980
Some Properties of Cartesian Product Files.
Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980