Cheng-Ta Huang
Orcid: 0000-0003-0397-8330
According to our database1,
Cheng-Ta Huang
authored at least 45 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment model.
EURASIP J. Image Video Process., December, 2024
Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity.
Signal Image Video Process., August, 2024
A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding Mechanisms.
Proceedings of the 2024 5th International Conference on Computing, 2024
The Study of More Susceptible to Fake News Makers with Influencing Factors in Social Media.
Proceedings of the 2024 5th International Conference on Computing, 2024
2023
Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images.
Multim. Tools Appl., November, 2023
Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping.
Entropy, 2023
2022
J. Supercomput., 2022
Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube.
IEEE Access, 2022
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2021
J. Supercomput., 2021
2020
Peer-to-Peer Netw. Appl., 2020
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation.
Inf. Sci., 2020
Proceedings of the ICFET 2020, 2020
2019
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks.
Multim. Tools Appl., 2019
J. Vis. Commun. Image Represent., 2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
J. Supercomput., 2018
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements.
J. Supercomput., 2018
Pers. Ubiquitous Comput., 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
2017
Int. J. Inf. Sec., 2017
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
2016
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences.
Multim. Tools Appl., 2016
Medical Image Anal., 2016
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016
2015
Evaluation and Comparison of Anatomical Landmark Detection Methods for Cephalometric X-Ray Images: A Grand Challenge.
IEEE Trans. Medical Imaging, 2015
Multim. Tools Appl., 2015
2014
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems.
Peer-to-Peer Netw. Appl., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
2013
Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
J. Supercomput., 2013
A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization.
J. Inf. Hiding Multim. Signal Process., 2013
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping.
Inf. Sci., 2013
SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters.
Int. J. Grid High Perform. Comput., 2013
Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
IEEE Syst. J., 2011
Reversible steganography based on side match and hit pattern for VQ-compressed images.
Inf. Sci., 2011
2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
2009
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008