Chih-Hung Lin

Orcid: 0000-0001-7887-331X

According to our database1, Chih-Hung Lin authored at least 66 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cognitive processes during virtual reality learning: A study of brain wave.
Educ. Inf. Technol., November, 2023

2021
Video inpainting using object motion rate and color variance in spatiotemporal domain.
J. Intell. Fuzzy Syst., 2021

An Association Rule Analysis of Acupressure Effect on Sleep Quality.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2019
Evaluation of venous pathology of the lower extremities with triggered angiography non-contrast-enhanced magnetic resonance imaging.
BMC Medical Imaging, 2019

Object-Based Rate Adjustment for HEVC Transrating.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

2018
Design of a Low-Complexity Real-Time Arrhythmia Detection System.
J. Signal Process. Syst., 2018

On the design of a two-decoding-option image secret sharing scheme.
Multim. Tools Appl., 2018

Efficient dynamic malware analysis using virtual time control mechanics.
Comput. Secur., 2018

2017
WO3 nanoparticle with MEMS technology improve the sensing response by HWCVD system.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

2016
On the difficulty of aligning VSS random grids.
Signal Process. Image Commun., 2016

Video Inpainting in Spatial-Temporal Domain Based on Adaptive Background and Color Variance.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Design of a flexible PPG signal processing wireless device.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

2015
Non-iterative and spatial domain focus map estimation based on intentional re-blur from a single image (NasBirSi).
J. Vis. Commun. Image Represent., 2015

Friendly progressive random-grid-based visual secret sharing with adaptive contrast.
J. Vis. Commun. Image Represent., 2015

Visual multiple-secret sharing for flexible general access structure by random grids.
Displays, 2015

Code Coverage Measurement for Android Dynamic Analysis Tools.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Efficient spear-phishing threat detection using hypervisor monitor.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
High-Precision Real-Time Premature Ventricular Contraction (PVC) Detection System Based on Wavelet Transform.
J. Signal Process. Syst., 2014

Multi-factor cheating prevention in visual secret sharing by hybrid codebooks.
J. Vis. Commun. Image Represent., 2014

Distortionless visual multi-secret sharing based on random grid.
Inf. Sci., 2014

The learning benefits of using eye trackers to enhance the geospatial abilities of elementary school students.
Br. J. Educ. Technol., 2014

Person Identification between Different Online Social Networks.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

2013
A batch image encryption scheme based on chaining random grids.
Sci. Iran., 2013

Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern.
Displays, 2013

Cross-lagged relationships between problematic Internet use and lifestyle changes.
Comput. Hum. Behav., 2013

Encryption in High Dynamic Range Images for RGBE Format.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Vision Assisted Active Safety System for Vehicles on the Highway.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Tailor-Made Encryption Scheme for High-Dynamic Range Images.
Proceedings of the Genetic and Evolutionary Computing, 2013

Robust Watermarking for Multiple Images and Users Based on Visual Cryptography.
Proceedings of the Genetic and Evolutionary Computing, 2013

Dynamic range optimization by flexible local contrast enhancement using luminance map.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
A Factor-Graph-Based TOA Location Estimator.
IEEE Trans. Wirel. Commun., 2012

Reversible Data Hiding for High-Quality Images Based on Integer Wavelet Transform.
J. Inf. Hiding Multim. Signal Process., 2012

A collaborative model for controlling the green supply network in the motorcycle industry.
Adv. Eng. Informatics, 2012

A low-complexity bio-medical signal receiver for wireless body area network.
Proceedings of the International SoC Design Conference, 2012

Lossless Data Hiding Based on Smart Boundary Adjustment.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

An Efficient Algorithm for Protecting and Authenticating Medical Image.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Efficient and effective NIDS for cloud virtualization environment.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Reversible Data Hiding By Adaptive IWT-coefficient Adjustment.
J. Inf. Hiding Multim. Signal Process., 2011

Multipurpose Watermarking Based on Blind Vector Quantization (BVQ).
J. Inf. Hiding Multim. Signal Process., 2011

Prediction-Based Lossless Data Hiding by Adaptive Coefficient-Bias Algorithm.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

AOS: An optimized sandbox method used in behavior-based malware detection.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing.
Proceedings of the Convergence and Hybrid Information Technology, 2011

2010
Iterative QR Decomposition Architecture Using the Modified Gram-Schmidt Algorithm for MIMO Systems.
IEEE Trans. Circuits Syst. I Regul. Pap., 2010

Reversible Data Hiding by Coefficient-bias Algorithm.
J. Inf. Hiding Multim. Signal Process., 2010

Low-power design of variable block-size LDPC decoder using nanometer technology.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Reversible Watermarking by Coefficient Adjustment Method.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A (2, 3) Threshold Secret Sharing Scheme Using Sudoku.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Authentication and Protection for Medical Image.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2009
Holography: A Hardware Virtualization Tool for Malware Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Iterative QR Decomposition Architecture using the Modified Gram-Schmidt Algorithm.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Multipurpose Watermarking Method Based on Blind Vector Quantization.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Palette Partition Based Data Hiding for Color Images.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Collaborative knowledge semantic graph image search.
Proceedings of the 17th International Conference on World Wide Web, 2008

Towards Adaptive Covert Communication System.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Multipurpose Image Authentication Method based on Vector Quantization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Multi-Purpose Image Watermarking Method Based on Wavelet Transform.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Using Semantic Graphs for Image Search.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling.
IEICE Trans. Inf. Syst., 2007

Signal-Statistics-Based Look-Up-Table Spacing for Power Amplifier Linearization.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

2006
Joint Polynomial and Look-Up-Table Predistortion Power Amplifier Linearization.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

A Novel OoS-aware Routing for ad hoc Networks.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

2003
Applying projection and B-spline to image authentication and remedy.
IEEE Trans. Consumer Electron., 2003

1996
A relaxed primal-dual path-following algorithm for linear programming.
Ann. Oper. Res., 1996


  Loading...