Chin-Chen Chang
Orcid: 0000-0002-7319-5780Affiliations:
- Feng Chia University, Department of Information Engineering and Computer Science, Taichung, Taiwan (since 2005)
- Asia University, Department of Computer Science and Information Engineering, Taichung, Taiwan (former)
- Chinese Medical University, Department of Biomedical Imaging and Radiological Science, Taichung, Taiwan (former)
- National Chung Cheng University, Chiayi, Taiwan (1989 - 2005)
- National Chung Hsing University, Institute of Applied Mathematics, Taichung, Taiwan (1983 - 1989)
- National Chiao Tung University, Department of Computer Engineering, Hsinchu, Taiwan (PhD 1982)
According to our database1,
Chin-Chen Chang
authored at least 1,211 papers
between 1980 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2025
Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases.
Expert Syst. Appl., 2025
2024
IEEE Trans. Emerg. Top. Comput. Intell., December, 2024
Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic.
IEEE Trans. Intell. Transp. Syst., November, 2024
Multim. Tools Appl., November, 2024
Multim. Tools Appl., November, 2024
Wirel. Networks, October, 2024
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation.
Vis. Comput., September, 2024
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack.
Cryptogr., September, 2024
Future Internet, August, 2024
Multim. Tools Appl., July, 2024
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction.
Future Internet, June, 2024
MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer.
Pattern Recognit., March, 2024
Expert Syst. Appl., March, 2024
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality.
Symmetry, February, 2024
Verifiable (<i>t, n</i>) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix.
J. Inf. Secur. Appl., February, 2024
Inf. Sci., February, 2024
Multim. Tools Appl., January, 2024
Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications.
Displays, January, 2024
Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field.
IEEE Trans. Multim., 2024
A new authentication scheme for dynamic charging system of electric vehicles in fog environment.
Secur. Priv., 2024
J. Vis. Commun. Image Represent., 2024
A divide-and-conquer approach to privacy-preserving high-dimensional big data release.
J. Inf. Secur. Appl., 2024
Neurocomputing, 2024
IEICE Trans. Inf. Syst., 2024
Future Internet, 2024
Metro Station functional clustering and dual-view recurrent graph convolutional network for metro passenger flow prediction.
Expert Syst. Appl., 2024
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding.
Comput. Syst. Sci. Eng., 2024
IEEE Access, 2024
2023
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack.
J. Vis. Commun. Image Represent., December, 2023
J. Inf. Secur. Appl., December, 2023
RSG-Net: A Recurrent Similarity Network With Ghost Convolution for Wheelset Laser Stripe Image Inpainting.
IEEE Trans. Intell. Transp. Syst., November, 2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023
The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration.
IEEE Trans. Circuits Syst. II Express Briefs, September, 2023
IEEE Trans. Intell. Transp. Syst., August, 2023
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification.
IEICE Trans. Inf. Syst., May, 2023
A Visual Question Answering Network Merging High- and Low-Level Semantic Information.
IEICE Trans. Inf. Syst., May, 2023
De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy.
IEEE Commun. Lett., January, 2023
IEEE Trans. Instrum. Meas., 2023
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2023
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security.
IEEE Trans. Dependable Secur. Comput., 2023
Symmetry, 2023
Multim. Tools Appl., 2023
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0.
Int. J. Intell. Syst., 2023
Comput. Syst. Sci. Eng., 2023
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification.
Comput. Syst. Sci. Eng., 2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
2022
Int. J. Intell. Syst., December, 2022
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things.
IEICE Trans. Inf. Syst., December, 2022
ACM Trans. Internet Techn., November, 2022
Vis. Comput., 2022
Adaptive Reversible Data Hiding With Contrast Enhancement Based on Multi-Histogram Modification.
IEEE Trans. Circuits Syst. Video Technol., 2022
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸).
IEEE Trans. Circuits Syst. Video Technol., 2022
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images.
Symmetry, 2022
Symmetry, 2022
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images.
Symmetry, 2022
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022
Sensors, 2022
Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy.
Sensors, 2022
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization.
Remote. Sens., 2022
Pattern Recognit., 2022
Multim. Tools Appl., 2022
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding.
Multim. Tools Appl., 2022
Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows.
Knowl. Based Syst., 2022
A comprehensive framework of multiple semantics preservation in neural style transfer.
J. Vis. Commun. Image Represent., 2022
J. Vis. Commun. Image Represent., 2022
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images.
J. Vis. Commun. Image Represent., 2022
High-capacity reversible data hiding in encrypted images based on adaptive block encoding.
J. Vis. Commun. Image Represent., 2022
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction.
J. Inf. Secur. Appl., 2022
Int. J. Ad Hoc Ubiquitous Comput., 2022
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering.
IEICE Trans. Inf. Syst., 2022
EURASIP J. Wirel. Commun. Netw., 2022
EURASIP J. Wirel. Commun. Netw., 2022
Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder.
EURASIP J. Wirel. Commun. Netw., 2022
EURASIP J. Wirel. Commun. Netw., 2022
MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture.
EURASIP J. Wirel. Commun. Netw., 2022
EURASIP J. Wirel. Commun. Netw., 2022
Pine pest detection using remote sensing satellite images combined with a multi-scale attention-UNet model.
Ecol. Informatics, 2022
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning.
Connect. Sci., 2022
A consortium blockchain-based information management system for unmanned vehicle logistics.
Comput. Sci. Inf. Syst., 2022
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images.
IEEE Access, 2022
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations.
Proceedings of the Social Robotics - 14th International Conference, 2022
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022
2021
Symmetry, 2021
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix.
Symmetry, 2021
Symmetry, 2021
A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021
Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT.
Sensors, 2021
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021
A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction.
Multim. Tools Appl., 2021
Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility.
Multim. Tools Appl., 2021
High capacity reversible data hiding in encrypted images based on prediction error and block classification.
Multim. Tools Appl., 2021
Multim. Tools Appl., 2021
Separable reversible data hiding in encrypted images based on flexible preservation of the differences.
Multim. Tools Appl., 2021
Pixel-based fragile image watermarking based on absolute moment block truncation coding.
Multim. Tools Appl., 2021
Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation.
Multim. Tools Appl., 2021
Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021
An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021
Mob. Inf. Syst., 2021
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform.
J. Vis. Commun. Image Represent., 2021
J. Vis. Commun. Image Represent., 2021
High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels.
J. Vis. Commun. Image Represent., 2021
J. Vis. Commun. Image Represent., 2021
KSII Trans. Internet Inf. Syst., 2021
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism.
J. Inf. Secur. Appl., 2021
Inf. Sci., 2021
A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance.
Int. J. Embed. Syst., 2021
Int. J. Embed. Syst., 2021
Int. J. Embed. Syst., 2021
Int. J. Embed. Syst., 2021
Int. J. Embed. Syst., 2021
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding.
Future Internet, 2021
Frontiers Comput. Sci., 2021
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection.
Entropy, 2021
A novel image compression technology based on vector quantisation and linear regression prediction.
Connect. Sci., 2021
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding.
Connect. Sci., 2021
Connect. Sci., 2021
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images.
IEEE Access, 2021
An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix.
IEEE Access, 2021
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images.
Proceedings of the 2021 International Conference on Fuzzy Theory and Its Applications, 2021
2020
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Reliab., 2020
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation.
Symmetry, 2020
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020
Sensors, 2020
Sensors, 2020
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
Pervasive Mob. Comput., 2020
An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation.
Multim. Tools Appl., 2020
Multim. Tools Appl., 2020
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix.
Multim. Tools Appl., 2020
An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC.
Multim. Tools Appl., 2020
KSII Trans. Internet Inf. Syst., 2020
J. Inf. Secur. Appl., 2020
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem.
Int. J. Netw. Secur., 2020
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding.
Int. J. Netw. Secur., 2020
Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding.
Int. J. Comput. Sci. Eng., 2020
Int. J. Comput. Sci. Eng., 2020
Int. J. Comput. Sci. Eng., 2020
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix.
Int. J. Comput. Sci. Eng., 2020
Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption.
Int. J. Comput. Sci. Eng., 2020
Int. J. Comput. Sci. Eng., 2020
Int. J. Comput. Sci. Eng., 2020
Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020
Comput. Secur., 2020
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020
Comput. Networks, 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service.
IEEE Access, 2020
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images.
IEEE Access, 2020
IEEE Access, 2020
The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-Speaking Patients With Post-Stroke Dysarthria.
IEEE Access, 2020
Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction.
IEEE Access, 2020
IEEE Access, 2020
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique.
IEEE Access, 2020
IEEE Access, 2020
Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding.
IEEE Access, 2020
Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-Based Partition.
IEEE Access, 2020
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020
2019
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks.
Wirel. Pers. Commun., 2019
Optimization and Implementation of Wavelet-based Algorithms for Detecting High-voltage Spindles in Neuron Signals.
ACM Trans. Embed. Comput. Syst., 2019
An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography.
Symmetry, 2019
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019
Symmetry, 2019
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images.
Symmetry, 2019
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud.
Symmetry, 2019
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code.
Symmetry, 2019
Symmetry, 2019
Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization.
Symmetry, 2019
Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction.
Symmetry, 2019
Symmetry, 2019
Signal Process. Image Commun., 2019
Soft Comput., 2019
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Multim. Tools Appl., 2019
A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
Data embedding scheme based on multi-matrix structure of turtle shell to avoid human eye perception.
Multim. Tools Appl., 2019
Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map.
Multim. Tools Appl., 2019
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images.
J. Vis. Commun. Image Represent., 2019
High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement.
J. Vis. Commun. Image Represent., 2019
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019
J. Real Time Image Process., 2019
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019
A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019
J. Inf. Hiding Multim. Signal Process., 2019
KSII Trans. Internet Inf. Syst., 2019
Inf. Sci., 2019
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing.
Int. J. Netw. Secur., 2019
Int. J. Netw. Secur., 2019
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing.
IET Image Process., 2019
IET Inf. Secur., 2019
IET Inf. Secur., 2019
IET Commun., 2019
Future Gener. Comput. Syst., 2019
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix.
IEEE Access, 2019
Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network.
Proceedings of the 2019 International Electronics Communication Conference, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Wirel. Pers. Commun., 2018
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018
Symmetry, 2018
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Process., 2018
Perceptual hashing for color images based on hybrid extraction of structural features.
Signal Process., 2018
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift.
Secur. Commun. Networks, 2018
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization.
Secur. Commun. Networks, 2018
Pers. Ubiquitous Comput., 2018
Untraceable biometric-based three-party authenticated key exchange for dynamic systems.
Peer-to-Peer Netw. Appl., 2018
A per-cent-level determination of the nucleon axial coupling from quantum chromodynamics.
Nat., 2018
Multim. Tools Appl., 2018
Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems".
Multim. Tools Appl., 2018
Effective reversible image steganography based on rhombus prediction and local complexity.
Multim. Tools Appl., 2018
A biometric-based authenticated key agreement scheme for session initiation protocol in ip-based multimedia networks.
Multim. Tools Appl., 2018
A turtle shell-based visual secret sharing scheme with reversibility and authentication.
Multim. Tools Appl., 2018
A selective encryption scheme of CABAC based on video context in high efficiency video coding.
Multim. Tools Appl., 2018
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method.
Multim. Tools Appl., 2018
Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator.
Multim. Tools Appl., 2018
J. Real Time Image Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness.
J. Comput. Sci. Technol., 2018
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction.
KSII Trans. Internet Inf. Syst., 2018
Int. J. Netw. Secur., 2018
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2018
Int. J. Netw. Secur., 2018
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018
A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning.
IEEE Multim., 2018
IEEE Commun. Lett., 2018
Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018
Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients.
Displays, 2018
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining.
Comput. J., 2018
IEEE Access, 2018
Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier.
IEEE Access, 2018
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
IEEE Trans. Serv. Comput., 2017
Soft Comput., 2017
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017
Pervasive Mob. Comput., 2017
Multim. Tools Appl., 2017
A semantic compression scheme for digital images based on vector quantization and data hiding.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
A difference expansion based reversible information hiding scheme with high stego image visual quality.
Multim. Tools Appl., 2017
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
Mob. Inf. Syst., 2017
J. Sensors, 2017
J. Inf. Hiding Multim. Signal Process., 2017
J. Inf. Hiding Multim. Signal Process., 2017
J. Inf. Hiding Multim. Signal Process., 2017
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches.
J. Comput. Sci. Technol., 2017
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification.
KSII Trans. Internet Inf. Syst., 2017
Inf. Retr. J., 2017
Int. J. Netw. Secur., 2017
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
Int. J. Netw. Secur., 2017
Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization.
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
IEEE Commun. Lett., 2017
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
Proceedings of the International Conference on Video and Image Processing, 2017
Proceedings of the 2017 International Conference on Management Engineering, 2017
Proceedings of the Genetic and Evolutionary Computing, 2017
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation.
Wirel. Pers. Commun., 2016
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2016
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2016
Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.
IEEE Trans. Cybern., 2016
Signal Process. Image Commun., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016
A highly efficient and secure electronic cash system based on secure sharing in cloud environment.
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
J. Syst. Softw., 2016
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images.
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks.
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images.
J. Inf. Hiding Multim. Signal Process., 2016
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electr. Comput. Eng., 2016
A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images.
KSII Trans. Internet Inf. Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization.
KSII Trans. Internet Inf. Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
J. Inf. Secur. Appl., 2016
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability.
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards.
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards.
Int. J. Commun. Syst., 2016
A novel data-hiding and compression scheme based on block classification of SMVQ indices.
Digit. Signal Process., 2016
An improved least-significant-bit substitution method using the modulo three strategy.
Displays, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2015
Reversible data hiding exploiting high-correlation regulation for high-quality images.
Secur. Commun. Networks, 2015
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Multim. Tools Appl., 2015
An adaptive reversible steganographic scheme based on the just noticeable distortion.
Multim. Tools Appl., 2015
Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Mob. Inf. Syst., 2015
A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm.
J. Vis. Commun. Image Represent., 2015
J. Vis. Commun. Image Represent., 2015
Quadri-directional searching algorithm for secret image sharing using meaningful shadows.
J. Vis. Commun. Image Represent., 2015
J. Sensors, 2015
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification.
J. Inf. Hiding Multim. Signal Process., 2015
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability.
J. Inf. Hiding Multim. Signal Process., 2015
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems.
J. Inf. Hiding Multim. Signal Process., 2015
KSII Trans. Internet Inf. Syst., 2015
Reversible data hiding with oriented and minimized distortions using cascading trellis coding.
Inf. Sci., 2015
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties.
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
Int. J. Netw. Secur., 2015
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
Int. J. Netw. Secur., 2015
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Commun. Syst., 2015
IET Image Process., 2015
IET Image Process., 2015
IET Inf. Secur., 2015
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015
Comput. J., 2015
Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015
A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images.
Proceedings of the Image and Graphics - 8th International Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Wirel. Pers. Commun., 2014
IEEE Trans. Image Process., 2014
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing.
Signal Process. Image Commun., 2014
Smart Comput. Rev., 2014
Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.
Signal Process., 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting.
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
J. Vis. Commun. Image Represent., 2014
J. Syst. Softw., 2014
J. Inf. Hiding Multim. Signal Process., 2014
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files.
J. Inf. Hiding Multim. Signal Process., 2014
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images.
J. Inf. Hiding Multim. Signal Process., 2014
J. Inf. Hiding Multim. Signal Process., 2014
J. Inf. Hiding Multim. Signal Process., 2014
J. Inf. Hiding Multim. Signal Process., 2014
A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution.
J. Inf. Hiding Multim. Signal Process., 2014
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks.
J. Inf. Hiding Multim. Signal Process., 2014
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques.
J. Inf. Hiding Multim. Signal Process., 2014
J. Inf. Hiding Multim. Signal Process., 2014
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System.
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity.
Int. J. Netw. Secur., 2014
Int. J. Commun. Syst., 2014
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
Int. J. Commun. Syst., 2014
Int. J. Commun. Syst., 2014
The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2014
Fundam. Informaticae, 2014
Comput. J., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
Proceedings of the Recent Advances in Information Hiding and Applications, 2013
Proceedings of the Recent Advances in Information Hiding and Applications, 2013
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication.
Wirel. Pers. Commun., 2013
IEEE Trans. Inf. Forensics Secur., 2013
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism.
IEEE Trans. Circuits Syst. Video Technol., 2013
Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism.
Signal Process., 2013
Signal Process., 2013
Secur. Commun. Networks, 2013
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Secur. Commun. Networks, 2013
J. Syst. Softw., 2013
J. Syst. Softw., 2013
J. Inf. Sci. Eng., 2013
J. Inf. Hiding Multim. Signal Process., 2013
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications.
J. Inf. Hiding Multim. Signal Process., 2013
J. Inf. Hiding Multim. Signal Process., 2013
J. Inf. Hiding Multim. Signal Process., 2013
Image Vis. Comput., 2013
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability.
KSII Trans. Internet Inf. Syst., 2013
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy.
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
Provably secure three party encrypted key exchange scheme with explicit authentication.
Inf. Sci., 2013
Int. J. Netw. Secur., 2013
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
Int. J. Netw. Secur., 2013
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
Int. J. Netw. Secur., 2013
Int. J. Netw. Secur., 2013
Int. J. Commun. Syst., 2013
Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digit. Signal Process., 2013
Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725].
Digit. Signal Process., 2013
Digit. Signal Process., 2013
Commun. Nonlinear Sci. Numer. Simul., 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the 9th International Conference on Information, 2013
2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wirel. Pers. Commun., 2012
IEEE Trans. Ind. Electron., 2012
Signal Process., 2012
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.
Signal Process., 2012
An adaptive prediction-error expansion oriented reversible information hiding scheme.
Pattern Recognit. Lett., 2012
Pattern Recognit. Lett., 2012
J. Inf. Hiding Multim. Signal Process., 2012
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy.
J. Digit. Inf. Manag., 2012
Inf. Sci., 2012
Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity.
Inf. Sci., 2012
Expert Syst. Appl., 2012
Digit. Signal Process., 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
ACM Trans. Multim. Comput. Commun. Appl., 2011
J. Vis. Commun. Image Represent., 2011
J. Syst. Softw., 2011
J. Syst. Softw., 2011
J. Networks, 2011
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
J. Multim., 2011
J. Inf. Hiding Multim. Signal Process., 2011
Inf. Sci., 2011
Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images.
Int. J. Pattern Recognit. Artif. Intell., 2011
IET Inf. Secur., 2011
IEICE Trans. Inf. Syst., 2011
Expert Syst. Appl., 2011
A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images.
Digit. Signal Process., 2011
Comput. J., 2011
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
Wirel. Pers. Commun., 2010
An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks.
IEEE Trans. Wirel. Commun., 2010
J. Syst. Softw., 2010
Using quad smoothness to efficiently control capacity-distortion of reversible data hiding.
J. Syst. Softw., 2010
J. Networks, 2010
J. Inf. Process. Syst., 2010
J. Inf. Hiding Multim. Signal Process., 2010
A Grayscale Image Steganography Based upon Discrete Cosine Transformation.
J. Digit. Inf. Manag., 2010
J. Commun., 2010
A novel self-tuning feedback controller for active queue management supporting TCP flows.
Inf. Sci., 2010
Inf. Sci., 2010
Int. J. Multim. Intell. Secur., 2010
Int. J. Intell. Inf. Process., 2010
Int. J. Commun. Syst., 2010
Expert Syst. Appl., 2010
Expert Syst. Appl., 2010
Expert Syst. Appl., 2010
Digit. Signal Process., 2010
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digit. Signal Process., 2010
Comput. Secur., 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
2009
Self-verifying visual secret sharing using error diffusion and interpolation techniques.
IEEE Trans. Inf. Forensics Secur., 2009
IEEE Trans. Circuits Syst. Video Technol., 2009
IEEE Trans. Circuits Syst. Video Technol., 2009
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Technol., 2009
Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2^m).
IEEE Trans. Computers, 2009
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding.
Soft Comput., 2009
Pattern Recognit., 2009
Pattern Recognit., 2009
Pattern Recognit., 2009
J. Vis. Commun. Image Represent., 2009
Editorial.
J. Softw., 2009
J. Softw., 2009
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
J. Syst. Softw., 2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
J. Syst. Softw., 2009
A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy.
J. Syst. Softw., 2009
J. Syst. Softw., 2009
J. Netw. Comput. Appl., 2009
An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique.
J. Digit. Inf. Manag., 2009
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009
Preserving robustness and removability for digital watermarks using subsampling and difference correlation.
Inf. Sci., 2009
Int. J. Commun. Syst., 2009
Concurrent error detection and correction in dual basis multiplier over GF(2<sup>m</sup>).
IET Circuits Devices Syst., 2009
IEICE Trans. Commun., 2009
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Informaticae, 2009
Fundam. Informaticae, 2009
Fundam. Informaticae, 2009
Fundam. Informaticae, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Comput. Secur., 2009
Enhanced authentication scheme with anonymity for roaming service in global mobility networks.
Comput. Commun., 2009
Comput. Electr. Eng., 2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wirel. Pers. Commun., 2008
Preserving data integrity in mobile <i>ad hoc</i> networks with variant Diffie-Hellman protocol.
Secur. Commun. Networks, 2008
Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognit., 2008
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity.
Pattern Recognit., 2008
Pattern Recognit., 2008
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognit., 2008
J. Syst. Softw., 2008
Reversible Data Embedding for Color Images.
J. Digit. Inf. Manag., 2008
J. Comput. Sci. Technol., 2008
Image Vis. Comput., 2008
Image Vis. Comput., 2008
An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vis. Comput., 2008
Inf. Sci., 2008
Reversible data-embedding scheme using differences between original and predicted pixel values.
IET Inf. Secur., 2008
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Comput. Digit. Tech., 2008
IEICE Trans. Inf. Syst., 2008
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations.
IEICE Trans. Inf. Syst., 2008
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Informaticae, 2008
Fundam. Informaticae, 2008
Fundam. Informaticae, 2008
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies.
Fundam. Informaticae, 2008
Data Knowl. Eng., 2008
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008
2007
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007
A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wirel. Pers. Commun., 2007
IEEE Trans. Image Process., 2007
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes.
IEEE Trans. Inf. Forensics Secur., 2007
Pattern Recognit., 2007
J. Vis. Commun. Image Represent., 2007
J. Syst. Softw., 2007
J. Netw. Comput. Appl., 2007
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots.
J. Netw. Comput. Appl., 2007
Inf. Sci., 2007
Inf. Sci., 2007
Inf. Process. Manag., 2007
Informatica, 2007
Int. J. Mob. Commun., 2007
Int. J. Inf. Comput. Secur., 2007
Scalable and systolic Montgomery multiplier over GF(2<sup>m</sup>) generated by trinomials.
IET Circuits Devices Syst., 2007
IEICE Trans. Inf. Syst., 2007
IEEE Commun. Lett., 2007
Fundam. Informaticae, 2007
Fundam. Informaticae, 2007
Fundam. Informaticae, 2007
Fundam. Informaticae, 2007
Fundam. Informaticae, 2007
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Informaticae, 2007
Comput. Vis. Image Underst., 2007
Comput. Networks, 2007
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining.
Adv. Eng. Informatics, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ.
Proceedings of the Advances in Multimedia Information Processing, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Proceedings of the Combinatorics, 2007
Proceedings of the Combinatorics, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wirel. Commun. Mob. Comput., 2006
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.
IEEE Trans. Inf. Forensics Secur., 2006
IEEE Trans. Circuits Syst. Video Technol., 2006
Pattern Recognit. Lett., 2006
Pattern Recognit. Lett., 2006
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels.
Pattern Recognit., 2006
A difference expansion oriented data hiding scheme for restoring the original host images.
J. Syst. Softw., 2006
Reversible index-domain information hiding scheme based on side-match vector quantization.
J. Syst. Softw., 2006
Image Vis. Comput., 2006
Inf. Sci., 2006
Int. J. Netw. Secur., 2006
Int. J. Mob. Commun., 2006
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization.
Fundam. Informaticae, 2006
An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression.
Fundam. Informaticae, 2006
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images.
Fundam. Informaticae, 2006
Fundam. Informaticae, 2006
Comput. Secur., 2006
Comput. Electr. Eng., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
An Untraceable Forward-Secure Blind Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
A Cryptanalysis on a Generalized Threshold Cryptosystem.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
An Improvement of the Design of Integrating Subliminal Channel with Access Control.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
A Scheme for (t, n)-Threshold Secret Image Sharing.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Progressive Image Transmission Using Significant Features and Linear Regression Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Advances in Web Based Learning, 2006
A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
ACM SIGOPS Oper. Syst. Rev., 2005
A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization.
Image Vis. Comput., 2005
Image Vis. Comput., 2005
A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization.
Informatica (Slovenia), 2005
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, 2005
Informatica, 2005
A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
Int. J. High Perform. Comput. Netw., 2005
IEICE Trans. Inf. Syst., 2005
Fundam. Informaticae, 2005
Fundam. Informaticae, 2005
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy.
Fundam. Informaticae, 2005
The General Pay-Word: A Micro-payment Scheme Based on <i>n</i>-dimension One-way Hash Chain.
Des. Codes Cryptogr., 2005
Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Comput. Stand. Interfaces, 2005
An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005
A novel digital image watermarking scheme based on the vector quantization technique.
Comput. Secur., 2005
Comput. Artif. Intell., 2005
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli.
Appl. Math. Comput., 2005
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Artificial Intelligence Applications and Innovations - IFIP TC12 WG12.5, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Embedded Software and Systems, Second International Conference, 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005
Proceedings of the Information Retrieval Technology, 2005
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
2004
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Wirel. Pers. Commun., 2004
Signal Process. Image Commun., 2004
A secure one-time password authentication scheme with low-computation for mobile communications.
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
A secure one-time password authentication scheme using smart cards without limiting login times.
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
Real Time Imaging, 2004
Pattern Recognit. Lett., 2004
Pattern Recognit. Lett., 2004
J. Inf. Knowl. Manag., 2004
Image Vis. Comput., 2004
A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004
Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction.
Informatica (Slovenia), 2004
Int. J. Wavelets Multiresolution Inf. Process., 2004
An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique.
Int. J. Pattern Recognit. Artif. Intell., 2004
Int. J. Comput. Math., 2004
Signing a digital signature without using one-way hash functions and message redundancy schemes.
IEEE Commun. Lett., 2004
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Informaticae, 2004
EURASIP J. Adv. Signal Process., 2004
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
Comput. Stand. Interfaces, 2004
Comput. Secur., 2004
A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes.
Comput. J., 2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the Medical Imaging and Augmented Reality: Second International Workshop, 2004
A Signature Scheme with (t, n) Shared Verification and Message Recovery.
Proceedings of the iiWAS'2004, 2004
The Security Flaw of an Untraceable Signature Scheme.
Proceedings of the Fourth International Conference on Electronic Business, 2004
A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004
A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
Vis. Comput., 2003
A self-encryption mechanism for authentication of roaming and teleconference services.
IEEE Trans. Wirel. Commun., 2003
Signal Process. Image Commun., 2003
A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes.
Real Time Imaging, 2003
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy.
Pattern Recognit., 2003
Inf. Process. Lett., 2003
Informatica, 2003
Informatica, 2003
Int. J. Pattern Recognit. Artif. Intell., 2003
Fundam. Informaticae, 2003
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Informaticae, 2003
An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Informaticae, 2003
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Informaticae, 2003
Fundam. Informaticae, 2003
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Gener. Comput. Syst., 2003
Comput. Stand. Interfaces, 2003
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Comput. Stand. Interfaces, 2003
Comput. J., 2003
Comput. Electr. Eng., 2003
An Efficient Block-based Scheme for Progressively Transmitting Lossless Images.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003
Proceedings of the Parallel and Distributed Processing and Applications, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
Real Time Imaging, 2002
Pattern Recognit. Lett., 2002
Pattern Recognit. Lett., 2002
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy.
Pattern Recognit. Lett., 2002
Inf. Sci., 2002
An improvement of a technique for color quantization using reduction of color space dimensionality.
Informatica (Slovenia), 2002
Recognition of Image Authenticity Using Significant DCT Coefficients Quantization.
Informatica (Slovenia), 2002
Int. J. Softw. Eng. Knowl. Eng., 2002
Int. J. Pattern Recognit. Artif. Intell., 2002
Int. J. Pattern Recognit. Artif. Intell., 2002
A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels.
Int. J. Pattern Recognit. Artif. Intell., 2002
Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding.
Int. J. Comput. Process. Orient. Lang., 2002
Proceedings of the Advances in Multimedia Information Processing, 2002
Proceedings of the Advances in Multimedia Information Processing, 2002
A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications.
Proceedings of the Advances in Multimedia Information Processing, 2002
An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding.
Proceedings of the 6th Joint Conference on Information Science, 2002
An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002
An Association Rule Mining Method for Spatial Database.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002
An Inverse Halftoning Technique using Genetic Algorithm.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002
A Compact Patricia Trie for a Large Set of Keys.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002
2001
J. Vis. Commun. Image Represent., 2001
J. Inf. Sci. Eng., 2001
J. Electronic Imaging, 2001
Int. J. Comput. Process. Orient. Lang., 2001
Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance.
Int. J. Comput. Process. Orient. Lang., 2001
Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001
Proceedings of the Advances in Multimedia Information Processing, 2001
Proceedings of the Advances in Multimedia Information Processing, 2001
Proceedings of the Advances in Multimedia Information Processing, 2001
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Human Society and the Internet, 2001
Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure.
Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001
2000
IEEE Trans. Circuits Syst. Video Technol., 2000
A new lossless compression scheme based on Huffman coding scheme for image compression.
Signal Process. Image Commun., 2000
Breadth-first search oriented symbolic picture representation for spatial match retrieval.
J. Syst. Softw., 2000
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000
A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia), 2000
A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme.
Informatica (Slovenia), 2000
Data Knowl. Eng., 2000
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000
An efficient accessing technique of Chinese characters using Boshiamy Chinese input system.
Proceedings of the Fifth International Workshop on Information Retrieval with Asian Languages, 2000, Hong Kong, China, September 30, 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1999
IEEE Trans. Consumer Electron., 1999
IEEE Trans. Consumer Electron., 1999
IEEE Trans. Consumer Electron., 1999
IEEE Trans. Consumer Electron., 1999
J. Syst. Softw., 1999
J. Inf. Sci. Eng., 1999
Inf. Process. Lett., 1999
Comput. Commun., 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
IEEE Trans. Image Process., 1998
Signal Process. Image Commun., 1998
Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search.
J. Electronic Imaging, 1998
Data Knowl. Eng., 1998
Comput. Commun., 1998
Proceedings of the Public Key Cryptography, 1998
An Efficient Data Structure for Storing Similar Binary Images.
Proceedings of the 5th International Conference of Foundations of Data Organization (FODO'98), 1998
1997
IEEE Trans. Knowl. Data Eng., 1997
A new image coding algorithm using variable-rate side-match finite-state vector quantization.
IEEE Trans. Image Process., 1997
IEEE Trans. Circuits Syst. Video Technol., 1997
J. Vis. Commun. Image Represent., 1997
J. Inf. Sci. Eng., 1997
Inf. Process. Lett., 1997
Spatial match retrieval based on direction signatures using multiple key hashing scheme.
Int. J. Intell. Syst., 1997
Int. J. High Speed Comput., 1997
Int. J. Comput. Math., 1997
Cryptologia, 1997
1996
Pattern Recognit. Lett., 1996
Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval.
J. Syst. Softw., 1996
J. Syst. Softw., 1996
Inf. Sci., 1996
Inf. Process. Lett., 1996
Int. J. Pattern Recognit. Artif. Intell., 1996
Proceedings of the COMPSAC '96, 1996
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996
A Temporal Join Mechanism Based on Trie-Ranking Data Structure.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
IEEE Trans. Computers, 1995
Pattern Recognit. Lett., 1995
Pattern Recognit. Lett., 1995
Pattern Recognit., 1995
Parallel Algorithms Appl., 1995
J. Inf. Sci. Eng., 1995
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm.
J. Inf. Sci. Eng., 1995
Comput. Secur., 1995
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995
Comput. Commun., 1995
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Combinatorics and Computer Science, 1995
1994
Pattern Recognit. Lett., 1994
A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem.
J. Inf. Sci. Eng., 1994
Int. J. Pattern Recognit. Artif. Intell., 1994
Comput. Secur., 1994
Comput. Commun., 1994
1993
Pattern Recognit. Lett., 1993
IEEE J. Sel. Areas Commun., 1993
Inf. Process. Manag., 1993
BIT, 1993
Proceedings of the Advances in Spatial Databases, 1993
Similarity Retrieval on Pictorial Databases Based upon Module Operation.
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA), 1993
1992
Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci., 1992
Inf. Syst., 1992
Inf. Process. Manag., 1992
Greedy File - a New Data Organisation Concept for Partial Match Retrieval.
Comput. J., 1992
Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files.
Comput. J., 1992
Comput. J., 1992
A Solution to Generalized Group Oriented Cryptography.
Proceedings of the IT Security: The Need for International Cooperation, 1992
De-Clustering Image Databases.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Softw. Pract. Exp., 1991
A shape recognition scheme based on relative distances of feature points from the centroid.
Pattern Recognit., 1991
J. Inf. Sci. Eng., 1991
Inf. Sci., 1991
On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks.
Inf. Syst., 1991
Int. J. Comput. Math., 1991
1990
J. Inf. Sci. Eng., 1990
1989
Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989
1988
Inf. Process. Lett., 1988
A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files.
Comput. J., 1988
BIT, 1988
Proceedings of the Statistical and Scientific Database Management, 1988
1987
J. Inf. Sci. Eng., 1987
Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System.
J. Inf. Sci. Eng., 1987
Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems.
Comput. J., 1987
1986
BIT, 1986
Proceedings of the VLDB'86 Twelfth International Conference on Very Large Data Bases, 1986
Proceedings of the Second International Conference on Data Engineering, 1986
1985
On the Complexity of File Allocation Problem.
Proceedings of the Foundations of Data Organization, 1985
Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems.
Proceedings of the Foundations of Data Organization, 1985
On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems.
Proceedings of the Foundations of Data Organization, 1985
Database Research and Development in Taiwan.
Proceedings of the Foundations of Data Organization, 1985
The Study of a Letter Oriented Minimal Perfect Hashing Scheme.
Proceedings of the Foundations of Data Organization, 1985
1984
IEEE Trans. Software Eng., 1984
Inf. Sci., 1984
1983
1982
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries.
IEEE Trans. Software Eng., 1982
1980
Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980