Chi-Yao Weng
Orcid: 0000-0002-0619-1966
According to our database1,
Chi-Yao Weng
authored at least 67 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Hybrid coding table-based semi-reversible data hiding using least significant bits and encryption.
J. Supercomput., January, 2025
2024
Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment model.
EURASIP J. Image Video Process., December, 2024
Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity.
Signal Image Video Process., August, 2024
Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images.
Proceedings of the 2024 5th International Conference on Computing, 2024
2023
Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images.
Multim. Tools Appl., November, 2023
Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm.
Entropy, February, 2023
Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping.
Entropy, 2023
2022
J. Supercomput., 2022
High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption.
Soft Comput., 2022
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022
Multim. Tools Appl., 2022
J. Inf. Secur. Appl., 2022
2021
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021
2020
DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images.
Peer-to-Peer Netw. Appl., 2020
Proceedings of the ICFET 2020, 2020
Proceedings of the ICFET 2020, 2020
2019
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding.
Soft Comput., 2019
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
J. Supercomput., 2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018
Peer-to-Peer Netw. Appl., 2018
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018
Secure File Transfer Protocol for Named Data Networks Supporting Homomorphic Computations.
Proceedings of the New Trends in Computer Technologies and Applications, 2018
2017
Multim. Tools Appl., 2017
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
Multim. Tools Appl., 2017
J. Inf. Hiding Multim. Signal Process., 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017
Proceedings of the Genetic and Evolutionary Computing, 2017
2016
Steganographic access control in data hiding using run-length encoding and modulo-operations.
Secur. Commun. Networks, 2016
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Syst., 2016
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Syst., 2016
An efficient method for polyphonic audio-to-score alignment using onset detection and constant Q transform.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
2015
Secur. Commun. Networks, 2015
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Syst., 2015
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Syst., 2015
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Information and Communication Technology, 2015
Proceedings of the Genetic and Evolutionary Computing, 2015
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015
2014
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
2013
ACM Trans. Embed. Comput. Syst., 2013
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
KSII Trans. Internet Inf. Syst., 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
2011
A data hiding scheme using the varieties of pixel-value differencing in multimedia images.
J. Syst. Softw., 2011
IEEE J. Sel. Areas Commun., 2011
2010
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Vis. Commun. Image Represent., 2010
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
J. Syst. Softw., 2010
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations.
Fundam. Informaticae, 2010
2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007