Chin-Chen Chang

Orcid: 0000-0002-7319-5780

Affiliations:
  • Feng Chia University, Department of Information Engineering and Computer Science, Taichung, Taiwan (since 2005)
  • Asia University, Department of Computer Science and Information Engineering, Taichung, Taiwan (former)
  • Chinese Medical University, Department of Biomedical Imaging and Radiological Science, Taichung, Taiwan (former)
  • National Chung Cheng University, Chiayi, Taiwan (1989 - 2005)
  • National Chung Hsing University, Institute of Applied Mathematics, Taichung, Taiwan (1983 - 1989)
  • National Chiao Tung University, Department of Computer Engineering, Hsinchu, Taiwan (PhD 1982)


According to our database1, Chin-Chen Chang authored at least 1,211 papers between 1980 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases.
Expert Syst. Appl., 2025

2024
WFormer: A Transformer-Based Soft Fusion Model for Robust Image Watermarking.
IEEE Trans. Emerg. Top. Comput. Intell., December, 2024

Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic.
IEEE Trans. Intell. Transp. Syst., November, 2024

Data hiding with thumbnail-preserving encryption for cloud medical images.
Multim. Tools Appl., November, 2024

Reversible data hiding in encrypted images with block-based bit-plane reallocation.
Multim. Tools Appl., November, 2024

Public auditing of log integrity for shared cloud storage systems via blockchain.
Wirel. Networks, October, 2024

Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation.
Vis. Comput., September, 2024

Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack.
Cryptogr., September, 2024

An Innovative Recompression Scheme for VQ Index Tables.
Future Internet, August, 2024

Joint learning of fuzzy embedded clustering and non-negative spectral clustering.
Multim. Tools Appl., July, 2024

Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction.
Future Internet, June, 2024

MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer.
Pattern Recognit., March, 2024

DSteganoM: Deep steganography for motion capture data.
Expert Syst. Appl., March, 2024

Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality.
Symmetry, February, 2024

Verifiable (<i>t, n</i>) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix.
J. Inf. Secur. Appl., February, 2024

Multi-view spatiotemporal learning for traffic forecasting.
Inf. Sci., February, 2024

An effective compressed image authentication scheme based on N-variant AMBTC.
Multim. Tools Appl., January, 2024

Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications.
Displays, January, 2024

Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field.
IEEE Trans. Multim., 2024

A new authentication scheme for dynamic charging system of electric vehicles in fog environment.
Secur. Priv., 2024

Secret image sharing with distinct covers based on improved Cycling-XOR.
J. Vis. Commun. Image Represent., 2024

A divide-and-conquer approach to privacy-preserving high-dimensional big data release.
J. Inf. Secur. Appl., 2024

CAISFormer: Channel-wise attention transformer for image steganography.
Neurocomputing, 2024

A Ranking Information Based Network for Facial Beauty Prediction.
IEICE Trans. Inf. Syst., 2024

An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering.
Future Internet, 2024

Metro Station functional clustering and dual-view recurrent graph convolutional network for metro passenger flow prediction.
Expert Syst. Appl., 2024

Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding.
Comput. Syst. Sci. Eng., 2024

Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling.
IEEE Access, 2024

2023
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack.
J. Vis. Commun. Image Represent., December, 2023

Crypto-space image steganography based on blind flipping.
J. Inf. Secur. Appl., December, 2023

RSG-Net: A Recurrent Similarity Network With Ghost Convolution for Wheelset Laser Stripe Image Inpainting.
IEEE Trans. Intell. Transp. Syst., November, 2023

Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023

The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration.
IEEE Trans. Circuits Syst. II Express Briefs, September, 2023

Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting.
IEEE Trans. Intell. Transp. Syst., August, 2023

The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification.
IEICE Trans. Inf. Syst., May, 2023

A Visual Question Answering Network Merging High- and Low-Level Semantic Information.
IEICE Trans. Inf. Syst., May, 2023

De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy.
IEEE Commun. Lett., January, 2023

ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN.
IEEE Trans. Instrum. Meas., 2023

Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2023

Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security.
IEEE Trans. Dependable Secur. Comput., 2023

Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack.
Symmetry, 2023

Image Covert Communication With Block Regulation.
IEEE Signal Process. Lett., 2023

A novel reversible data hiding scheme for VQ codebooks.
Secur. Priv., 2023

Overlapped (7, 4) hamming code for large-capacity and low-loss data hiding.
Multim. Tools Appl., 2023

Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0.
Int. J. Intell. Syst., 2023

A Steganography Based on Optimal Multi-Threshold Block Labeling.
Comput. Syst. Sci. Eng., 2023

High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification.
Comput. Syst. Sci. Eng., 2023

A Survey on Federated Learning Poisoning Attacks and Defenses.
CoRR, 2023

The 3rd International Workshop on Deep Learning for the Web of Things.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Hiding Information in a Well-Trained Vector Quantization Codebook.
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023

Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022

A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things.
IEICE Trans. Inf. Syst., December, 2022

Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data.
ACM Trans. Internet Techn., November, 2022

CSST-Net: an arbitrary image style transfer network of coverless steganography.
Vis. Comput., 2022

Adaptive Reversible Data Hiding With Contrast Enhancement Based on Multi-Histogram Modification.
IEEE Trans. Circuits Syst. Video Technol., 2022

Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸).
IEEE Trans. Circuits Syst. Video Technol., 2022

Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images.
Symmetry, 2022

Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA.
Symmetry, 2022

Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images.
Symmetry, 2022

Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022

Self-Supervised Learning Framework toward State-of-the-Art Iris Image Segmentation.
Sensors, 2022

Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy.
Sensors, 2022

Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization.
Remote. Sens., 2022

CAAN: Context-Aware attention network for visual question answering.
Pattern Recognit., 2022

A reversible and authenticable secret sharing scheme using dual images.
Multim. Tools Appl., 2022

Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding.
Multim. Tools Appl., 2022

Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows.
Knowl. Based Syst., 2022

A comprehensive framework of multiple semantics preservation in neural style transfer.
J. Vis. Commun. Image Represent., 2022

On the multi-level embedding of crypto-image reversible data hiding.
J. Vis. Commun. Image Represent., 2022

Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images.
J. Vis. Commun. Image Represent., 2022

High-capacity reversible data hiding in encrypted images based on adaptive block encoding.
J. Vis. Commun. Image Represent., 2022

Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022

Reversible data hiding in encrypted images using block-based adaptive MSBs prediction.
J. Inf. Secur. Appl., 2022

Learning stereo disparity with feature consistency and confidence.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering.
IEICE Trans. Inf. Syst., 2022

A two-stage detection method of copy-move forgery based on parallel feature fusion.
EURASIP J. Wirel. Commun. Netw., 2022

A blockchain-based secure storage scheme for medical information.
EURASIP J. Wirel. Commun. Netw., 2022

Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder.
EURASIP J. Wirel. Commun. Netw., 2022

SKDStream: a dynamic clustering algorithm on time-decaying data stream.
EURASIP J. Wirel. Commun. Netw., 2022

MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture.
EURASIP J. Wirel. Commun. Netw., 2022

ABOS: an attention-based one-stage framework for person search.
EURASIP J. Wirel. Commun. Netw., 2022

Pine pest detection using remote sensing satellite images combined with a multi-scale attention-UNet model.
Ecol. Informatics, 2022

A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning.
Connect. Sci., 2022

A consortium blockchain-based information management system for unmanned vehicle logistics.
Comput. Sci. Inf. Syst., 2022

Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images.
IEEE Access, 2022

DLWoT'22: 2nd International Workshop on Deep Learning for the Web of Things.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations.
Proceedings of the Social Robotics - 14th International Conference, 2022

Secret Message CDMA Multiplexing via QR Codes.
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022

2021
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases.
Symmetry, 2021

A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix.
Symmetry, 2021

Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility.
Symmetry, 2021

A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021

Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT.
Sensors, 2021

Using an Optimization Algorithm to Detect Hidden Waveforms of Signals.
Sensors, 2021

Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021

A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction.
Multim. Tools Appl., 2021

Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility.
Multim. Tools Appl., 2021

High capacity reversible data hiding in encrypted images based on prediction error and block classification.
Multim. Tools Appl., 2021

A hybrid-Sudoku based fragile watermarking scheme for image tampering detection.
Multim. Tools Appl., 2021

Separable reversible data hiding in encrypted images based on flexible preservation of the differences.
Multim. Tools Appl., 2021

Pixel-based fragile image watermarking based on absolute moment block truncation coding.
Multim. Tools Appl., 2021

Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation.
Multim. Tools Appl., 2021

Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021

An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021

RDMMFET: Representation of Dense Multimodality Fusion Encoder Based on Transformer.
Mob. Inf. Syst., 2021

Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform.
J. Vis. Commun. Image Represent., 2021

An anisotropic reference matrix for image steganography.
J. Vis. Commun. Image Represent., 2021

High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels.
J. Vis. Commun. Image Represent., 2021

Reversible data hiding based on three shadow images using rhombus magic matrix.
J. Vis. Commun. Image Represent., 2021

Adaptive data hiding scheme based on magic matrix of flexible dimension.
KSII Trans. Internet Inf. Syst., 2021

A Two-Layer Steganography for Mosaic Images.
KSII Trans. Internet Inf. Syst., 2021

Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism.
J. Inf. Secur. Appl., 2021

Reversible data hiding in encrypted images with block-based adaptive MSB encoding.
Inf. Sci., 2021

A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance.
Int. J. Embed. Syst., 2021

Turtle-shell data embedding method with high image fidelity.
Int. J. Embed. Syst., 2021

Post-quantum blockchain for secure communication in IoT-based smart home services.
Int. J. Embed. Syst., 2021

Predicting missing data for data integrity based on the linear regression model.
Int. J. Embed. Syst., 2021

A secure extended LBP data hiding scheme based on octagon-shaped shell.
Int. J. Embed. Syst., 2021

Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding.
Future Internet, 2021

A proactive secret sharing scheme based on Chinese remainder theorem.
Frontiers Comput. Sci., 2021

Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection.
Entropy, 2021

A novel image compression technology based on vector quantisation and linear regression prediction.
Connect. Sci., 2021

An EMD-based data hiding scheme for JPEG images.
Connect. Sci., 2021

High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding.
Connect. Sci., 2021

VQ-oriented data hiding based on adjustable error compensation strategy.
Connect. Sci., 2021

Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images.
IEEE Access, 2021

An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix.
IEEE Access, 2021

Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

A Reversible Database Watermark Scheme for Textual and Numerical Datasets.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images.
Proceedings of the 2021 International Conference on Fuzzy Theory and Its Applications, 2021

2020
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., 2020

On Reliability of Multiprocessor System Based on Star Graph.
IEEE Trans. Reliab., 2020

A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation.
Symmetry, 2020

The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020

A Secure IoT-Based Authentication System in Cloud Computing Environment.
Sensors, 2020

An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu.
Sensors, 2020

A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.
Sensors, 2020

Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.
Secur. Commun. Networks, 2020

Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem.
Secur. Commun. Networks, 2020

Secure and anonymous authentication scheme for the Internet of Things with pairing.
Pervasive Mob. Comput., 2020

An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation.
Multim. Tools Appl., 2020

Adaptive reversible data hiding scheme for AMBTC compressed images.
Multim. Tools Appl., 2020

A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix.
Multim. Tools Appl., 2020

An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC.
Multim. Tools Appl., 2020

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images.
KSII Trans. Internet Inf. Syst., 2020

An efficient general data hiding scheme based on image interpolation.
J. Inf. Secur. Appl., 2020

Packet Watermarking With ECG Biological Feature.
Int. J. Netw. Secur., 2020

StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020

One-Code-Pass User Authentication Based on QR Code and Secret Sharing.
Int. J. Netw. Secur., 2020

Sharing a Secret Image in the Cloud Using Two Shadows.
Int. J. Netw. Secur., 2020

Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell.
Int. J. Netw. Secur., 2020

Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem.
Int. J. Netw. Secur., 2020

A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding.
Int. J. Netw. Secur., 2020

Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding.
Int. J. Comput. Sci. Eng., 2020

Greedy algorithm for image quality optimisation based on turtle-shell steganography.
Int. J. Comput. Sci. Eng., 2020

A novel high capacity turtle shell-based data hiding with location table free.
Int. J. Comput. Sci. Eng., 2020

The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix.
Int. J. Comput. Sci. Eng., 2020

Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption.
Int. J. Comput. Sci. Eng., 2020

Reversibly hiding data using dual images scheme based on EMD data hiding method.
Int. J. Comput. Sci. Eng., 2020

An improved Sudoku-based data hiding scheme using greedy method.
Int. J. Comput. Sci. Eng., 2020

Secure high capacity tetris-based scheme for data hiding.
IET Image Process., 2020

Information hiding in motion data of virtual characters.
Expert Syst. Appl., 2020

Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020

Privacy-preserving high-dimensional data publishing for classification.
Comput. Secur., 2020

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020

Tracking area list allocation scheme based on overlapping community algorithm.
Comput. Networks, 2020

A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-Many Map.
IEEE Access, 2020

ABMC-DH: An Adaptive Bit-Plane Data Hiding Method Based on Matrix Coding.
IEEE Access, 2020

A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity.
IEEE Access, 2020

A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service.
IEEE Access, 2020

Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020

Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images.
IEEE Access, 2020

A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images.
IEEE Access, 2020

The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-Speaking Patients With Post-Stroke Dysarthria.
IEEE Access, 2020

Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction.
IEEE Access, 2020

Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code.
IEEE Access, 2020

High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique.
IEEE Access, 2020

Efficient QR Code Secret Embedding Mechanism Based on Hamming Code.
IEEE Access, 2020

Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images.
IEEE Access, 2020

A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix.
IEEE Access, 2020

A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix.
IEEE Access, 2020

Multi-Layer Mini-Sudoku Based High-Capacity Data Hiding Method.
IEEE Access, 2020

Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding.
IEEE Access, 2020

Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-Based Partition.
IEEE Access, 2020

An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

2019
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks.
Wirel. Pers. Commun., 2019

Optimization and Implementation of Wavelet-based Algorithms for Detecting High-voltage Spindles in Neuron Signals.
ACM Trans. Embed. Comput. Syst., 2019

An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography.
Symmetry, 2019

An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019

An Improved Integer Transform Combining with an Irregular Block Partition.
Symmetry, 2019

High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images.
Symmetry, 2019

Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud.
Symmetry, 2019

Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code.
Symmetry, 2019

Using Two Meaningful Shadows to Share Secret Messages with Reversibility.
Symmetry, 2019

Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization.
Symmetry, 2019

Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction.
Symmetry, 2019

A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity.
Symmetry, 2019

An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.
Signal Process. Image Commun., 2019

Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019

An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.
Secur. Commun. Networks, 2019

Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.
Secur. Commun. Networks, 2019

A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem.
Secur. Commun. Networks, 2019

Extended squared magic matrix for embedding secret information with large payload.
Multim. Tools Appl., 2019

A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients.
Multim. Tools Appl., 2019

A Turtle Shell based RDH scheme with two-dimensional histogram shifting.
Multim. Tools Appl., 2019

Data embedding scheme based on multi-matrix structure of turtle shell to avoid human eye perception.
Multim. Tools Appl., 2019

Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction.
Multim. Tools Appl., 2019

Efficient QR code authentication mechanism based on Sudoku.
Multim. Tools Appl., 2019

High-payload secret hiding mechanism for QR codes.
Multim. Tools Appl., 2019

Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map.
Multim. Tools Appl., 2019

A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images.
J. Vis. Commun. Image Represent., 2019

High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement.
J. Vis. Commun. Image Represent., 2019

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019

A real-time dual-image-based reversible data hiding scheme using turtle shells.
J. Real Time Image Process., 2019

Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019

A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019

Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding.
J. Inf. Hiding Multim. Signal Process., 2019

Efficient secret sharing scheme with cheater identification based on QR code.
KSII Trans. Internet Inf. Syst., 2019

Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019

Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019

A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing.
Int. J. Netw. Secur., 2019

Secure High Capacity Data Hiding Scheme based on Reference Matrix.
Int. J. Netw. Secur., 2019

Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing.
IET Image Process., 2019

Enhanced secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2019

Privacy preserving weighted similarity search scheme for encrypted data.
IET Inf. Secur., 2019

Tracking areas planning based on spectral clustering in small cell networks.
IET Commun., 2019

Blockchain based searchable encryption for electronic health record sharing.
Future Gener. Comput. Syst., 2019

HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features.
IEEE Access, 2019

Hybrid Scheme of Image's Regional Colorization Using Mask R-CNN and Poisson Editing.
IEEE Access, 2019

Improved K-Pass Pixel Value Ordering Based Data Hiding.
IEEE Access, 2019

Steganalysis of AMR Speech Based on Multiple Classifiers Combination.
IEEE Access, 2019

Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System.
IEEE Access, 2019

Image Neural Style Transfer With Preserving the Salient Regions.
IEEE Access, 2019

Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering.
IEEE Access, 2019

A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares.
IEEE Access, 2019

A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload.
IEEE Access, 2019

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data.
IEEE Access, 2019

TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix.
IEEE Access, 2019

Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network.
Proceedings of the 2019 International Electronics Communication Conference, 2019

A copy detection algorithm for game character concept design based on pose features.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Security Issues in Ultralightweight RFID Authentication Protocols.
Wirel. Pers. Commun., 2018

Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Data Hiding Based on a Two-Layer Turtle Shell Matrix.
Symmetry, 2018

A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices.
Symmetry, 2018

Efficient Information Hiding Based on Theory of Numbers.
Symmetry, 2018

Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018

An Efficient Object Detection Algorithm Based on Compressed Networks.
Symmetry, 2018

An Effective Authentication Scheme Using DCT for Mobile Devices.
Symmetry, 2018

Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Process., 2018

Perceptual hashing for color images based on hybrid extraction of structural features.
Signal Process., 2018

High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift.
Secur. Commun. Networks, 2018

A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization.
Secur. Commun. Networks, 2018

Efficient access control system based on aesthetic QR code.
Pers. Ubiquitous Comput., 2018

Untraceable biometric-based three-party authenticated key exchange for dynamic systems.
Peer-to-Peer Netw. Appl., 2018

A per-cent-level determination of the nucleon axial coupling from quantum chromodynamics.
Nat., 2018

Reversible data hiding for VQ indices using hierarchical state codebook mapping.
Multim. Tools Appl., 2018

Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems".
Multim. Tools Appl., 2018

Effective reversible image steganography based on rhombus prediction and local complexity.
Multim. Tools Appl., 2018

A biometric-based authenticated key agreement scheme for session initiation protocol in ip-based multimedia networks.
Multim. Tools Appl., 2018

A turtle shell-based visual secret sharing scheme with reversibility and authentication.
Multim. Tools Appl., 2018

A selective encryption scheme of CABAC based on video context in high efficiency video coding.
Multim. Tools Appl., 2018

Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method.
Multim. Tools Appl., 2018

Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2018

Sudoku-based secret sharing approach with cheater prevention using QR code.
Multim. Tools Appl., 2018

A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator.
Multim. Tools Appl., 2018

High-Capacity Reversible Data Hiding Method for JPEG Images.
J. Softw., 2018

Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real Time Image Process., 2018

Distortion Free Progressive BTC based Secret Image Sharing.
J. Netw. Intell., 2018

StegTab: Steganography in Guitar Tablatures.
J. Inf. Hiding Multim. Signal Process., 2018

No-Reference Image Blur Assessment Based on SIFT and DCT.
J. Inf. Hiding Multim. Signal Process., 2018

Computer-Aided Annotation for Video Tampering Dataset of Forensic Research.
J. Inf. Hiding Multim. Signal Process., 2018

Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness.
J. Comput. Sci. Technol., 2018

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction.
KSII Trans. Internet Inf. Syst., 2018

Generalized PVO-K Embedding Technique for Reversible Data Hiding.
Int. J. Netw. Secur., 2018

A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2018

An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes.
Int. J. Netw. Secur., 2018

Framework for practical and receipt-free remote voting.
IET Inf. Secur., 2018

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018

A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning.
IEEE Multim., 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018

Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018

Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients.
Displays, 2018

An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018

A novel method of speech information hiding based on 3D-Magic Matrix.
CoRR, 2018

An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining.
Comput. J., 2018

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
IEEE Access, 2018

Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier.
IEEE Access, 2018

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018

New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval.
IEEE Access, 2018

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Parameter Selection for Denoising Algorithms Using NR-IQA with CNN.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Framework of Robust Video Watermarking Based on Statistical Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017

Notes on "Secure authentication scheme for IoT and cloud servers".
Pervasive Mob. Comput., 2017

Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multim. Tools Appl., 2017

A semantic compression scheme for digital images based on vector quantization and data hiding.
Multim. Tools Appl., 2017

Data hiding based on extended turtle shell matrix construction method.
Multim. Tools Appl., 2017

A one-card-pass user authentication scheme using image morphing.
Multim. Tools Appl., 2017

Secure multi-group data hiding based on gemd map.
Multim. Tools Appl., 2017

A difference expansion based reversible information hiding scheme with high stego image visual quality.
Multim. Tools Appl., 2017

Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
Mob. Inf. Syst., 2017

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System.
J. Inf. Hiding Multim. Signal Process., 2017

Vessel Detection in Chicken Chorioallantoic Membrane Image.
J. Inf. Hiding Multim. Signal Process., 2017

An Efficient Steganography Scheme Based on Edge Detection for High Payload.
J. Inf. Hiding Multim. Signal Process., 2017

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches.
J. Comput. Sci. Technol., 2017

An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification.
KSII Trans. Internet Inf. Syst., 2017

A unified score propagation model for web spam demotion algorithm.
Inf. Retr. J., 2017

A Novel Micropayment Scheme with Variable Denomination.
Int. J. Netw. Secur., 2017

Turbo Unequal Error Protection Codes with Multiple Protection Levels.
Int. J. Netw. Secur., 2017

A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
Int. J. Netw. Secur., 2017

Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization.
Int. J. Netw. Secur., 2017

An Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017

Secure CAS-based authentication scheme for mobile pay-TV systems.
Int. J. Commun. Syst., 2017

Smart card-based password authenticated key agreement protocol using chaotic maps.
Int. J. Commun. Syst., 2017

Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE Multim., 2017

Feature bundling in decision tree algorithm.
Intell. Data Anal., 2017

Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Commun. Lett., 2017

A high payload steganographic algorithm based on edge detection.
Displays, 2017

Reversible data hiding in encrypted images using reformed JPEG compression.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

A reversible data hiding scheme for image interpolation based on reference matrix.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

Extended Exploiting-Modification-Direction Data Hiding with High Capacity.
Proceedings of the International Conference on Video and Image Processing, 2017

A Digital Gift Certificate Scheme with Conditional Anonymity.
Proceedings of the 2017 International Conference on Management Engineering, 2017

VQ Compression Enhancer with Huffman Coding.
Proceedings of the Genetic and Evolutionary Computing, 2017

Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation.
Wirel. Pers. Commun., 2016

A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.
IEEE Trans. Cybern., 2016

High capacity reversible data hiding scheme for encrypted images.
Signal Process. Image Commun., 2016

A secure authentication scheme with provable correctness for pay-TV systems.
Secur. Commun. Networks, 2016

Progressive secret image sharing scheme using meaningful shadows.
Secur. Commun. Networks, 2016

Robust off-line e-cash scheme with recoverability and anonymity revocation.
Secur. Commun. Networks, 2016

Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016

A highly efficient and secure electronic cash system based on secure sharing in cloud environment.
Secur. Commun. Networks, 2016

High capacity data hiding for binary image based on block classification.
Multim. Tools Appl., 2016

Reversible data hiding scheme based on histogram shifting of n-bit planes.
Multim. Tools Appl., 2016

Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2016

A new distortion-free data embedding scheme for high-dynamic range images.
Multim. Tools Appl., 2016

Very efficient variable-length codes for the lossless compression of VQ indices.
Multim. Tools Appl., 2016

An aesthetic QR code solution based on error correction mechanism.
J. Syst. Softw., 2016

An Image Steganography Scheme Using 3D-Sudoku.
J. Inf. Hiding Multim. Signal Process., 2016

Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis.
J. Inf. Hiding Multim. Signal Process., 2016

Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images.
J. Inf. Hiding Multim. Signal Process., 2016

An Image Compression Method Based on Block Truncation Coding and Linear Regression.
J. Inf. Hiding Multim. Signal Process., 2016

Image Authentication and Self-Recovery Scheme Based on The Rehashing Model.
J. Inf. Hiding Multim. Signal Process., 2016

A Robust Image Copy Detection Method Based On Feature Extraction Algorithm.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization.
J. Inf. Hiding Multim. Signal Process., 2016

An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing.
J. Inf. Hiding Multim. Signal Process., 2016

A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks.
J. Inf. Hiding Multim. Signal Process., 2016

A Survey of Fragile Watermarking-based Image Authentication Techniques.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images.
J. Inf. Hiding Multim. Signal Process., 2016

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electr. Comput. Eng., 2016

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images.
KSII Trans. Internet Inf. Syst., 2016

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model.
KSII Trans. Internet Inf. Syst., 2016

A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization.
KSII Trans. Internet Inf. Syst., 2016

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
KSII Trans. Internet Inf. Syst., 2016

A magic cube based information hiding scheme of large payload.
J. Inf. Secur. Appl., 2016

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
Int. J. Netw. Secur., 2016

Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
Int. J. Netw. Secur., 2016

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
Int. J. Netw. Secur., 2016

Security Analysis on Secure Untraceable Off-line Electronic Cash System.
Int. J. Netw. Secur., 2016

Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
Int. J. Netw. Secur., 2016

An Integratable Verifiable Secret Sharing Mechanism.
Int. J. Netw. Secur., 2016

A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
Int. J. Netw. Secur., 2016

Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability.
Int. J. Netw. Secur., 2016

A Strong RSA-based and Certificateless-based Signature Scheme.
Int. J. Netw. Secur., 2016

An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards.
Int. J. Netw. Secur., 2016

Efficient Pixel Prediction Algorithm for Reversible Data Hiding.
Int. J. Netw. Secur., 2016

A High Payload Steganographic Scheme for Compressed Images with Hamming Code.
Int. J. Netw. Secur., 2016

A practical lottery using oblivious transfer.
Int. J. Commun. Syst., 2016

A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards.
Int. J. Commun. Syst., 2016

A novel data-hiding and compression scheme based on block classification of SMVQ indices.
Digit. Signal Process., 2016

An improved least-significant-bit substitution method using the modulo three strategy.
Displays, 2016

A New Card Authentication Scheme Based on Image Watermarking and Encryption.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Reversible data hiding exploiting high-correlation regulation for high-quality images.
Secur. Commun. Networks, 2015

Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Secur. Commun. Networks, 2015

A dependable storage service system in cloud environment.
Secur. Commun. Networks, 2015

A provably secure smart card-based authenticated group key exchange protocol.
Secur. Commun. Networks, 2015

The credit card visual authentication scheme based on GF(28) field.
Multim. Tools Appl., 2015

An adaptive reversible steganographic scheme based on the just noticeable distortion.
Multim. Tools Appl., 2015

Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
Multim. Tools Appl., 2015

An image-based key agreement protocol using the morphing technique.
Multim. Tools Appl., 2015

A grouped-scalable secret image sharing scheme.
Multim. Tools Appl., 2015

Scanned binary image watermarking based on additive model and sampling.
Multim. Tools Appl., 2015

A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
Mob. Inf. Syst., 2015

A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm.
J. Vis. Commun. Image Represent., 2015

AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Vis. Commun. Image Represent., 2015

Quadri-directional searching algorithm for secret image sharing using meaningful shadows.
J. Vis. Commun. Image Represent., 2015

Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems.
J. Inf. Hiding Multim. Signal Process., 2015

A novel information hiding scheme based on line segments.
J. Inf. Hiding Multim. Signal Process., 2015

Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy.
J. Inf. Hiding Multim. Signal Process., 2015

An Outlier Detection Method for Feature Point Matching Problem.
J. Inf. Hiding Multim. Signal Process., 2015

Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication.
J. Inf. Hiding Multim. Signal Process., 2015

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method.
J. Inf. Hiding Multim. Signal Process., 2015

Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images.
J. Inf. Hiding Multim. Signal Process., 2015

An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map.
J. Inf. Hiding Multim. Signal Process., 2015

A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme.
J. Inf. Hiding Multim. Signal Process., 2015

A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
J. Inf. Hiding Multim. Signal Process., 2015

Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification.
J. Inf. Hiding Multim. Signal Process., 2015

A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability.
J. Inf. Hiding Multim. Signal Process., 2015

Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction.
J. Inf. Hiding Multim. Signal Process., 2015

A Secure and Efficient Scheme for Digital Gift Certificates.
J. Inf. Hiding Multim. Signal Process., 2015

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management.
J. Inf. Hiding Multim. Signal Process., 2015

Compressing Vector Quantization Index Table Using Side Match State Codebook.
J. Inf. Hiding Multim. Signal Process., 2015

Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems.
J. Inf. Hiding Multim. Signal Process., 2015

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
KSII Trans. Internet Inf. Syst., 2015

Reversible data hiding with oriented and minimized distortions using cascading trellis coding.
Inf. Sci., 2015

A reversible compression code hiding using SOC and SMVQ indices.
Inf. Sci., 2015

A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
Int. J. Netw. Secur., 2015

Group Authentication and Group Key Distribution for Ad Hoc Networks.
Int. J. Netw. Secur., 2015

A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties.
Int. J. Netw. Secur., 2015

Ciphertext-Auditable Identity-Based Encryption.
Int. J. Netw. Secur., 2015

Adjustment Hiding Method Based on Exploiting Modification Direction.
Int. J. Netw. Secur., 2015

A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET.
Int. J. Netw. Secur., 2015

A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
Int. J. Netw. Secur., 2015

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
Int. J. Netw. Secur., 2015

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Commun. Syst., 2015

Second-order steganographic method based on adaptive reference matrix.
IET Image Process., 2015

Multi-round dynamic swap optimisation for table-based steganography.
IET Image Process., 2015

Novel and practical scheme based on secret sharing for laptop data protection.
IET Inf. Secur., 2015

Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015

A reversible data hiding scheme based on the Sudoku technique.
Displays, 2015

A Proxy User Authentication Protocol Using Source-Based Image Morphing.
Comput. J., 2015

Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Reversible data hiding for VQ indices using XOR operator and SOC codes.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Secure Electronic Coupons.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A New Ultralightweight RFID Protocol for Low-Cost Tags: R <sup>2</sup> AP.
Wirel. Pers. Commun., 2014

A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting.
IEEE Trans. Image Process., 2014

A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing.
Signal Process. Image Commun., 2014

Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding.
Smart Comput. Rev., 2014

Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.
Signal Process., 2014

Simulatable and secure certificate-based threshold signature without pairings.
Secur. Commun. Networks, 2014

Verifiable secret sharing based on the Chinese remainder theorem.
Secur. Commun. Networks, 2014

High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting.
Multim. Tools Appl., 2014

A DNA-based data hiding technique with low modification rates.
Multim. Tools Appl., 2014

A novel (n, t, n) secret image sharing scheme without a trusted third party.
Multim. Tools Appl., 2014

Reversible data embedding for indices based on histogram analysis.
J. Vis. Commun. Image Represent., 2014

A high capacity data hiding scheme for binary images based on block patterns.
J. Syst. Softw., 2014

Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation.
J. Inf. Hiding Multim. Signal Process., 2014

A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files.
J. Inf. Hiding Multim. Signal Process., 2014

A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images.
J. Inf. Hiding Multim. Signal Process., 2014

(k, n)-Image Reversible Data Hiding.
J. Inf. Hiding Multim. Signal Process., 2014

Watermarking Marbled Image Based on Linear Enhancement Hologram.
J. Inf. Hiding Multim. Signal Process., 2014

A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem.
J. Inf. Hiding Multim. Signal Process., 2014

A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem.
J. Inf. Hiding Multim. Signal Process., 2014

A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution.
J. Inf. Hiding Multim. Signal Process., 2014

Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks.
J. Inf. Hiding Multim. Signal Process., 2014

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques.
J. Inf. Hiding Multim. Signal Process., 2014

A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature.
J. Inf. Hiding Multim. Signal Process., 2014

Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.
KSII Trans. Internet Inf. Syst., 2014

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images.
KSII Trans. Internet Inf. Syst., 2014

A Fast and Secure Scheme for Data Outsourcing in the Cloud.
KSII Trans. Internet Inf. Syst., 2014

Image Watermarking Scheme Based on Scale-Invariant Feature Transform.
KSII Trans. Internet Inf. Syst., 2014

Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees.
KSII Trans. Internet Inf. Syst., 2014

A Reversible Data Hiding Scheme for SMVQ Indices.
Informatica, 2014

A Simple Password Authentication Scheme Based on Geometric Hashing Function.
Int. J. Netw. Secur., 2014

An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation.
Int. J. Netw. Secur., 2014

A Reversible Steganography Suitable for Embedding Small Amounts of Data.
Int. J. Netw. Secur., 2014

An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
Int. J. Netw. Secur., 2014

Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System.
Int. J. Netw. Secur., 2014

Generalized Secret Sharing with Linear Hierarchical Secrets.
Int. J. Netw. Secur., 2014

Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity.
Int. J. Netw. Secur., 2014

An authenticated group key distribution mechanism using theory of numbers.
Int. J. Commun. Syst., 2014

An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
Int. J. Commun. Syst., 2014

An authentication and key agreement protocol for satellite communications.
Int. J. Commun. Syst., 2014

The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2014

A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy.
Fundam. Informaticae, 2014

A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment.
Comput. J., 2014

Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Virtual Primary Key for Reversible Watermarking Textual Relational Databases.
Proceedings of the Intelligent Systems and Applications, 2014

Applying Histogram Modification to Embed Secret Message in AMBTC.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication.
Wirel. Pers. Commun., 2013

A Novel Electronic English Auction System With a Secure On-Shelf Mechanism.
IEEE Trans. Inf. Forensics Secur., 2013

An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism.
IEEE Trans. Circuits Syst. Video Technol., 2013

Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism.
Signal Process., 2013

Adaptive self-recovery for tampered images based on VQ indexing and inpainting.
Signal Process., 2013

Analyzing and removing SureSign watermark.
Signal Process., 2013

Authenticated RFID security mechanism based on chaotic maps.
Secur. Commun. Networks, 2013

A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Secur. Commun. Networks, 2013

Lossless Information Hiding in the VQ Index Table.
J. Softw., 2013

A high-performance reversible data-hiding scheme for LZW codes.
J. Syst. Softw., 2013

A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies.
J. Syst. Softw., 2013

An Efficient Smart Card Based Authentication Scheme Using Image Encryption.
J. Inf. Sci. Eng., 2013

Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement.
J. Inf. Hiding Multim. Signal Process., 2013

Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications.
J. Inf. Hiding Multim. Signal Process., 2013

A Construction for Secret Sharing Scheme with General Access Structure.
J. Inf. Hiding Multim. Signal Process., 2013

An Indicator Elimination Method for Side-match Vector Quantization.
J. Inf. Hiding Multim. Signal Process., 2013

Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
Image Vis. Comput., 2013

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability.
KSII Trans. Internet Inf. Syst., 2013

A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy.
KSII Trans. Internet Inf. Syst., 2013

An Image Encryption Scheme Based on Concatenated Torus Automorphisms.
KSII Trans. Internet Inf. Syst., 2013

Provably secure three party encrypted key exchange scheme with explicit authentication.
Inf. Sci., 2013

An Efficient Oblivious Transfer Protocol Using Residue Number System.
Int. J. Netw. Secur., 2013

Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
Int. J. Netw. Secur., 2013

An Anonymous Multi-Receiver Encryption Based on RSA.
Int. J. Netw. Secur., 2013

A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
Int. J. Netw. Secur., 2013

A Smart Card-based Authentication Scheme Using User Identify Cryptography.
Int. J. Netw. Secur., 2013

A fault-tolerant group key agreement protocol exploiting dynamic setting.
Int. J. Commun. Syst., 2013

Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digit. Signal Process., 2013

Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725].
Digit. Signal Process., 2013

Robust image hashing using non-uniform sampling in discrete Fourier domain.
Digit. Signal Process., 2013

Chaotic maps-based password-authenticated key agreement using smart cards.
Commun. Nonlinear Sci. Numer. Simul., 2013

A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A high payload data embedding scheme using dual stego-images with reversibility.
Proceedings of the 9th International Conference on Information, 2013

2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wirel. Pers. Commun., 2012

A Secure Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Ind. Electron., 2012

A novel multi-group exploiting modification direction method based on switch map.
Signal Process., 2012

Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.
Signal Process., 2012

An adaptive prediction-error expansion oriented reversible information hiding scheme.
Pattern Recognit. Lett., 2012

A multi-threshold secret image sharing scheme based on MSP.
Pattern Recognit. Lett., 2012

A hierarchical threshold secret image sharing.
Pattern Recognit. Lett., 2012

Guest Editors' Introduction: Special Section on ISIP 2011.
J. Multim., 2012

A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor.
J. Inf. Hiding Multim. Signal Process., 2012

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy.
J. Digit. Inf. Manag., 2012

Optimizing least-significant-bit substitution using cat swarm optimization strategy.
Inf. Sci., 2012

Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity.
Inf. Sci., 2012

A fast VQ codebook search with initialization and search order.
Inf. Sci., 2012

Reversible Data Hiding Scheme Based on Image Inpainting.
Fundam. Informaticae, 2012

Nucleus and cytoplast contour detector from a cervical smear image.
Expert Syst. Appl., 2012

Graph structure analysis based on complex network.
Digit. Signal Process., 2012

Efficient illumination compensation techniques for text images.
Digit. Signal Process., 2012

An Efficient and Flexible Mobile Payment Protocol.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Protecting the content integrity of digital imagery with fidelity preservation.
ACM Trans. Multim. Comput. Commun. Appl., 2011

A reversible data hiding scheme for VQ indices using locally adaptive coding.
J. Vis. Commun. Image Represent., 2011

Guest Editorial.
J. Softw., 2011

A Prediction-Based Adaptive Reversible Data Embedding Scheme.
J. Softw., 2011

A novel image watermarking in redistributed invariant wavelet domain.
J. Syst. Softw., 2011

A secure fragile watermarking scheme based on chaos-and-hamming code.
J. Syst. Softw., 2011

Guest Editorial.
J. Networks, 2011

A Simple Image Encoding Method with Data Lossless Information Hiding.
J. Networks, 2011

A Hierarchical Fragile Watermarking with VQ Index Recovery.
J. Multim., 2011

A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
J. Multim., 2011

Sharing a Secret Image in Binary Images with Verification.
J. Inf. Hiding Multim. Signal Process., 2011

Guest Editorial.
J. Comput., 2011

An adaptable threshold detector.
Inf. Sci., 2011

Meaningful secret sharing technique with authentication and remedy abilities.
Inf. Sci., 2011

Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images.
Int. J. Pattern Recognit. Artif. Intell., 2011

Cheating resistance and reversibility-oriented secret sharing mechanism.
IET Inf. Secur., 2011

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.
IEICE Trans. Inf. Syst., 2011

Reversible Steganography for BTC-compressed Images.
Fundam. Informaticae, 2011

A steganographic scheme by fully exploiting modification directions.
Expert Syst. Appl., 2011

A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images.
Digit. Signal Process., 2011

Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Comput. J., 2011

Image Data Hiding Schemes Based on Graph Coloring.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

General Threshold Signature Based on the Chinese Remainder Theorem.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs.
Wirel. Pers. Commun., 2010

An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks.
IEEE Trans. Wirel. Commun., 2010

Intelligent systems for future generation communications.
J. Supercomput., 2010

High capacity SMVQ-based hiding scheme using adaptive index.
Signal Process., 2010

Guest Editorial.
J. Softw., 2010

Guest Editorial.
J. Softw., 2010

Guest Editorial.
J. Softw., 2010

An encoding method for both image compression and data lossless information hiding.
J. Syst. Softw., 2010

Using quad smoothness to efficiently control capacity-distortion of reversible data hiding.
J. Syst. Softw., 2010

Guest Editorial.
J. Networks, 2010

Guest Editorial.
J. Networks, 2010

Guest Editorial.
J. Networks, 2010

The Design of E-Traveler's Check with Efficiency and Mutual Authentication.
J. Networks, 2010

Guest Editorial.
J. Multim., 2010

Hiding Secret Data in an Image Using Codeword Imitation.
J. Inf. Process. Syst., 2010

A Novel Information Concealing Method Based on Exploiting Modification Direction.
J. Inf. Hiding Multim. Signal Process., 2010

A Survey of VQ Codebook Generation.
J. Inf. Hiding Multim. Signal Process., 2010

A Grayscale Image Steganography Based upon Discrete Cosine Transformation.
J. Digit. Inf. Manag., 2010

Guest Editorial.
J. Comput., 2010

Guest Editorial.
J. Comput., 2010

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
J. Commun., 2010

A novel self-tuning feedback controller for active queue management supporting TCP flows.
Inf. Sci., 2010

A high payload frequency-based reversible image hiding method.
Inf. Sci., 2010

A reversible data hiding scheme using complementary embedding strategy.
Inf. Sci., 2010

A data-hiding scheme based on one-way hash function.
Int. J. Multim. Intell. Secur., 2010

An Improved Biometrics-based User Authentication Scheme without Concurrency System.
Int. J. Intell. Inf. Process., 2010

An efficient e-mail protocol providing perfect forward secrecy for mobile devices.
Int. J. Commun. Syst., 2010

Digital rights management for multimedia content over 3G mobile networks.
Expert Syst. Appl., 2010

High payload steganography mechanism using hybrid edge detector.
Expert Syst. Appl., 2010

An efficient and reliable E-DRM scheme for mobile environments.
Expert Syst. Appl., 2010

Data hiding based on the similarity between neighboring pixels with reversibility.
Digit. Signal Process., 2010

Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digit. Signal Process., 2010

An efficient and fair buyer-seller fingerprinting scheme for large scale networks.
Comput. Secur., 2010

A Robust Public Watermarking Scheme Based on DWT.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A reversible and multiple-layer embedding strategy with high capacity.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A technique of embedding digital data in an image compression code reversibly.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A Large Payload EMD Embedding Scheme with High Stego-image Quality.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Self-verifying visual secret sharing using error diffusion and interpolation techniques.
IEEE Trans. Inf. Forensics Secur., 2009

Reversible Data Hiding Based on Histogram Modification of Pixel Differences.
IEEE Trans. Circuits Syst. Video Technol., 2009

Dual Digital Watermarking for Internet Media Based on Hybrid Strategies.
IEEE Trans. Circuits Syst. Video Technol., 2009

A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Technol., 2009

Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2^m).
IEEE Trans. Computers, 2009

A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding.
Soft Comput., 2009

Distortion-free secret image sharing mechanism using modulus operator.
Pattern Recognit., 2009

Sharing a verifiable secret image using two shadows.
Pattern Recognit., 2009

A lossless data embedding technique by joint neighboring coding.
Pattern Recognit., 2009

Authors reply 'Sharing secrets in stego images with authentication'.
Pattern Recognit., 2009

Reversible information hiding for VQ indices based on locally adaptive coding.
J. Vis. Commun. Image Represent., 2009

Editorial.
J. Softw., 2009

Lossless Compression Schemes of Vector Quantization Indices Using State Codebook.
J. Softw., 2009

An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
J. Syst. Softw., 2009

A reversible information hiding scheme using left-right and up-down chinese character representation.
J. Syst. Softw., 2009

A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy.
J. Syst. Softw., 2009

Search-order coding method with indicator-elimination property.
J. Syst. Softw., 2009

Editorial.
J. Networks, 2009

Robust t-out-of-n oblivious transfer mechanism based on CRT.
J. Netw. Comput. Appl., 2009

Editorial.
J. Multim., 2009

An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique.
J. Digit. Inf. Manag., 2009

Editorial.
J. Comput., 2009

Editorial.
J. Comput., 2009

A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009

Preserving robustness and removability for digital watermarks using subsampling and difference correlation.
Inf. Sci., 2009

A novel key management scheme for dynamic multicast communications.
Int. J. Commun. Syst., 2009

Non-iterative privacy preservation for online lotteries.
IET Inf. Secur., 2009

Concurrent error detection and correction in dual basis multiplier over GF(2<sup>m</sup>).
IET Circuits Devices Syst., 2009

A Secure Multicast Framework in Large and High-Mobility Network Groups.
IEICE Trans. Commun., 2009

NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Informaticae, 2009

An Information-Hiding Scheme Based on Quantization-Based Embedding Technique.
Fundam. Informaticae, 2009

An Image Authentication Based on Discrete Fourier Transform.
Fundam. Informaticae, 2009

Preventing Cheating in Computational Visual Cryptography.
Fundam. Informaticae, 2009

A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes.
Fundam. Informaticae, 2009

Roaming across wireless local area networks using SIM-based authentication protocol.
Comput. Stand. Interfaces, 2009

Design of electronic t-out-of-n lotteries on the Internet.
Comput. Stand. Interfaces, 2009

On the security of a copyright protection scheme based on visual cryptography.
Comput. Stand. Interfaces, 2009

An efficient proxy raffle protocol with anonymity-preserving.
Comput. Stand. Interfaces, 2009

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Comput. Secur., 2009

Enhanced authentication scheme with anonymity for roaming service in global mobility networks.
Comput. Commun., 2009

An on-line electronic check system with mutual authentication.
Comput. Electr. Eng., 2009

Data Hiding in Images by Hybrid LSB Substitution.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Information Hiding in Dual Images with Reversibility.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Embedding Secret Messages Using Modified Huffman Coding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A reversible data hiding scheme based on dual steganographic images.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Embedding secret messages based on chaotic map and Huffman coding.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A New Intelligent Authorization Agent Model in Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Self-Reference Watermarking Scheme Based on Wet Paper Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A High Embedding Efficiency Steganography Scheme for Wet Paper Codes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Resistant Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wirel. Pers. Commun., 2008

Preserving data integrity in mobile <i>ad hoc</i> networks with variant Diffie-Hellman protocol.
Secur. Commun. Networks, 2008

Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognit., 2008

A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity.
Pattern Recognit., 2008

Lossless data hiding for color images based on block truncation coding.
Pattern Recognit., 2008

Sharing secrets in stego images with authentication.
Pattern Recognit., 2008

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognit., 2008

Editorial.
J. Softw., 2008

An embedding technique based upon block prediction.
J. Syst. Softw., 2008

Adaptive watermark mechanism for rightful ownership protection.
J. Syst. Softw., 2008

Reversible Data Embedding for Color Images.
J. Digit. Inf. Manag., 2008

New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol., 2008

Editorial.
J. Comput., 2008

Editorial.
J. Commun., 2008

Editorial.
J. Commun., 2008

An extended difference expansion algorithm for reversible watermarking.
Image Vis. Comput., 2008

Lossless nibbled data embedding scheme based on difference expansion.
Image Vis. Comput., 2008

An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vis. Comput., 2008

Joint coding and embedding techniques for multimedia images.
Inf. Sci., 2008

A novel secret image sharing scheme in color images using small shadow images.
Inf. Sci., 2008

Reversible data-embedding scheme using differences between original and predicted pixel values.
IET Inf. Secur., 2008

Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Comput. Digit. Tech., 2008

Reversible Steganographic Method with High Payload for JPEG Images.
IEICE Trans. Inf. Syst., 2008

LSB-Based Steganography Using Reflected Gray Code.
IEICE Trans. Inf. Syst., 2008

A Color Image Authentication Method Using Partitioned Palette and Morphological Operations.
IEICE Trans. Inf. Syst., 2008

A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Informaticae, 2008

A Large Payload Data Embedding Technique for Color Images.
Fundam. Informaticae, 2008

Three-Phase Lossless Data Hiding Method for the VQ Index Table.
Fundam. Informaticae, 2008

Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies.
Fundam. Informaticae, 2008

High Capacity Data Hiding for Grayscale Images.
Fundam. Informaticae, 2008

Isolated items discarding strategy for discovering high utility itemsets.
Data Knowl. Eng., 2008

Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008

A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Assigning Keys in a Hierarchy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Effective Demosaicking and Zooming Algorithm for CFA Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Image Authentication Scheme for Halftone Images Based upon Error Diffusion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A New Probabilistic Visual Secret Sharing Scheme for Color Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Security design for three-party encrypted key exchange protocol using smart cards.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Using nearest covering codes to embed secret information in grayscale images.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Lossless Data Hiding Based on Histogram Modification for Image Authentication.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Improved EMD Embedding Scheme Based on Secret Image Difference.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Hiding Information Employing Reduplicating Embedding.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Reversibly sharing and hiding secret using expansion strategy.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

2007
Adaptive Data Hiding Scheme for Palette Images.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wirel. Pers. Commun., 2007

Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook.
IEEE Trans. Image Process., 2007

Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes.
IEEE Trans. Inf. Forensics Secur., 2007

An efficient image authentication method based on Hamming code.
Pattern Recognit., 2007

Lossless recovery of a VQ index table with embedded secret data.
J. Vis. Commun. Image Represent., 2007

Novel image copy detection with rotating tolerance.
J. Syst. Softw., 2007

TFRP: An efficient microaggregation algorithm for statistical disclosure control.
J. Syst. Softw., 2007

Secure communications for cluster-based ad hoc networks using node identities.
J. Netw. Comput. Appl., 2007

Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots.
J. Netw. Comput. Appl., 2007

Combined association rules for dealing with missing values.
J. Inf. Sci., 2007

Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci., 2007

Reversible hiding in DCT-based compressed images.
Inf. Sci., 2007

Reversible steganographic method using SMVQ approach based on declustering.
Inf. Sci., 2007

Color image retrieval technique based on color features and image bitmap.
Inf. Process. Manag., 2007

A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, 2007

Anonymous authentication scheme for wireless communications.
Int. J. Mob. Commun., 2007

An RSA-based (t, n) threshold proxy signature scheme with freewill identities.
Int. J. Inf. Comput. Secur., 2007

Scalable and systolic Montgomery multiplier over GF(2<sup>m</sup>) generated by trinomials.
IET Circuits Devices Syst., 2007

Hiding Secret Information Using Adaptive Side-Match VQ.
IEICE Trans. Inf. Syst., 2007

Reversible Data Hiding in the VQ-Compressed Domain.
IEICE Trans. Inf. Syst., 2007

Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels.
IEEE Commun. Lett., 2007

An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Informaticae, 2007

A Novel Image Hiding Scheme Based on VQ and Hamming Distance.
Fundam. Informaticae, 2007

VQ Codebook Searching Algorithm Based on Correlation Property.
Fundam. Informaticae, 2007

Secret Image Hiding and Sharing Based on the (t, n)-Threshold.
Fundam. Informaticae, 2007

Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality.
Fundam. Informaticae, 2007

Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Informaticae, 2007

A new steganographic method for color and grayscale image hiding.
Comput. Vis. Image Underst., 2007

Security enhancement of an IC-card-based remote login mechanism.
Comput. Networks, 2007

MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining.
Adv. Eng. Informatics, 2007

Improved JPEG Scheme Based on Adaptive Block Encoding.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Paper Currency Verification with Support Vector Machines.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ.
Proceedings of the Advances in Multimedia Information Processing, 2007

Two-Phase Algorithms for a Novel Utility-Frequent Mining Model.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Conference Key Distribution Scheme Using Interpolating Polynomials.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Density-Based Image Vector Quantization Using a Genetic Algorithm.
Proceedings of the Advances in Multimedia Modeling, 2007

A Color Image Hiding Scheme Based on SMVQ and Modulo Operator.
Proceedings of the Advances in Multimedia Modeling, 2007

Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Reversible Data Embedding Technique for Palette Images Using De-clustering.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Reversible Quantization-Index Modulation Using Neighboring Correlation.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A High Payload VQ Steganographic Method for Binary Images.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A New Image Compression Scheme Based on Locally Adaptive Coding.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

An Improvement on Authenticated Key Agreement Scheme.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

An e-mail signature protocol for anti-spam work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Secret Image Sharing Using Quadratic Residues.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Improvements of EMD Embedding for Large Payloads.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Secret Sharing and Information Hiding by Shadow Images.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Reversible Data Embedding for Vector Quantization Indices.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

High Payload Data Embedding with Hybrid Strategy.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Semi-blind Watermarking Based on Discrete Wavelet Transform.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Significance-Preserving Codebook Using Generic Algorithm.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Digital Watermarking Scheme Based on Singular Value Decomposition.
Proceedings of the Combinatorics, 2007

A New (t, n)-Threshold Scheme Based on Difference Equations.
Proceedings of the Combinatorics, 2007

Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

An Efficient Fragile Watermarking for Web Pages Tamper-Proof.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wirel. Commun. Mob. Comput., 2006

Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.
IEEE Trans. Inf. Forensics Secur., 2006

A Reversible Data Hiding Scheme Based on Side Match Vector Quantization.
IEEE Trans. Circuits Syst. Video Technol., 2006

Removing blocking effects using an artificial neural network.
Signal Process., 2006

Fast codebook search algorithms based on tree-structured vector quantization.
Pattern Recognit. Lett., 2006

A watermarking-based image ownership and tampering authentication scheme.
Pattern Recognit. Lett., 2006

Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels.
Pattern Recognit., 2006

Error resilient locally adaptive data compression.
J. Syst. Softw., 2006

A difference expansion oriented data hiding scheme for restoring the original host images.
J. Syst. Softw., 2006

Reversible index-domain information hiding scheme based on side-match vector quantization.
J. Syst. Softw., 2006

A new edge detection approach based on image context analysis.
Image Vis. Comput., 2006

A novel efficient (<i>t</i>, <i>n</i>) threshold proxy signature scheme.
Inf. Sci., 2006

New image steganographic methods using run-length approach.
Inf. Sci., 2006

An image coding scheme using SMVQ and support vector machines.
Neurocomputing, 2006

An Access Control System with Time-constraint Using Support Vector Machines.
Int. J. Netw. Secur., 2006

A secure and efficient authentication scheme for mobile users.
Int. J. Mob. Commun., 2006

A Robust Content-Based Copy Detection Scheme.
Fundam. Informaticae, 2006

A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization.
Fundam. Informaticae, 2006

An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression.
Fundam. Informaticae, 2006

Perfect Hashing Schemes for Mining Traversal Patterns.
Fundam. Informaticae, 2006

Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images.
Fundam. Informaticae, 2006

A Novel Index Coding Scheme for Vector Quantization.
Fundam. Informaticae, 2006

Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing.
Fundam. Informaticae, 2006

An anonymous voting mechanism based on the key exchange protocol.
Comput. Secur., 2006

A parallel residue-to-binary conversion algorithm without trial division.
Comput. Electr. Eng., 2006

A division algorithm for residue numbers.
Appl. Math. Comput., 2006

A Novel Key Agreement Scheme in a Multiple Server Environment.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A novel data hiding scheme for keeping high stego-image quality.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006

Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A DCT-based Recoverable Image Authentication.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

An Untraceable Forward-Secure Blind Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A Cryptanalysis on a Generalized Threshold Cryptosystem.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An Improvement of the Design of Integrating Subliminal Channel with Access Control.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A Scheme for (t, n)-Threshold Secret Image Sharing.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

Novel Steganographic Schemes Based on Row-Major Mapping Relation.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

An Image Hiding Scheme Based on Du's Disk Allocation Method.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Improved SMVQ Scheme with Edge-Directed Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Progressive Image Transmission Using Significant Features and Linear Regression Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Reusability on Learning Object Repository.
Proceedings of the Advances in Web Based Learning, 2006

A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Multipurpose Wavelet-Based Image Watermarking.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Wavelet-Based Progressive Digital Image Transmission Scheme.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An ImageWatermarking Scheme Using Pattern Coding Technique.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An Untraceable Electronic Cash System Using Fair Blind Signatures.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A New Scheme for the Electronic Coin.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A Secret Image Sharing Scheme Based on Vector Quantization Mechanism.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Enhanced Anonymous Auction Protocols with Freewheeling Bids.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
An efficient authentication protocol for mobile satellite communication systems.
ACM SIGOPS Oper. Syst. Rev., 2005

SVD-based digital image watermarking scheme.
Pattern Recognit. Lett., 2005

Hiding secret data in images via predictive coding.
Pattern Recognit., 2005

A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization.
Image Vis. Comput., 2005

An image zooming technique based on vector quantization approximation.
Image Vis. Comput., 2005

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization.
Informatica (Slovenia), 2005

Hiding Data in Halftone Images.
Informatica, 2005

Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, 2005

Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, 2005

A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
Int. J. High Perform. Comput. Netw., 2005

A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization.
IEICE Trans. Inf. Syst., 2005

Data Compressor for VQ Index Tables.
Fundam. Informaticae, 2005

A New Density-Based Scheme for Clustering Based on Genetic Algorithm.
Fundam. Informaticae, 2005

An Inverse Halftoning Technique Using Modified Look-Up Tables.
Fundam. Informaticae, 2005

An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy.
Fundam. Informaticae, 2005

The General Pay-Word: A Micro-payment Scheme Based on <i>n</i>-dimension One-way Hash Chain.
Des. Codes Cryptogr., 2005

Sharing visual multi-secrets using circle shares.
Comput. Stand. Interfaces, 2005

Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Comput. Stand. Interfaces, 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005

An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005

A novel digital image watermarking scheme based on the vector quantization technique.
Comput. Secur., 2005

Efficient authentication protocols of GSM.
Comput. Commun., 2005

Perfect Hashing Schemes for Mining Association Rules.
Comput. J., 2005

A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Comput. Artif. Intell., 2005

An iterative modular multiplication algorithm in RNS.
Appl. Math. Comput., 2005

A time-stamping protocol for digital watermarking.
Appl. Math. Comput., 2005

A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli.
Appl. Math. Comput., 2005

Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005

Authentication schemes with no verification table.
Appl. Math. Comput., 2005

A scheme for threshold multi-secret sharing.
Appl. Math. Comput., 2005

Secret Hiding Using Side Match Vector Quantization.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

FA-Tree - A Dynamic Indexing Structure for Spatial Data.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

An Efficient Algorithm for Incremental Mining of Association Rules.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005

Image Retrieval Using Spatial Color and Edge Detection.
Proceedings of the Advances in Multimedia Information Processing, 2005

A Reversible Information Hiding Scheme Based on Vector Quantization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Method for Searching Similar Images Using Quality Index Measurement.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Improving Image Quality for JPEG Compression.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Hiding Data in Binary Images.
Proceedings of the Information Security Practice and Experience, 2005

An Algorithm for Mining Association Rules with Weighted Minimum Supports.
Proceedings of the Artificial Intelligence Applications and Innovations - IFIP TC12 WG12.5, 2005

A Search Scheme Resulting in Mixing Compressed Text Files.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Image Refining Method Using Digital Watermark via Vector Quantization.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Sharing a Secret Two-Tone Image in Two Gray-Level Images.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Improvement on Strong-Password Authentication Protocols.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

A Novel Conference Key Distribution System with Re-keying Protocol.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

An efficient deniable authentication protocol.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Time-bounded Based Password Authentication Scheme.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Image Copy Detection with Rotating Tolerance.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Fast Algorithm for Mining Share-Frequent Itemsets.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

A Parallel Modular Exponentiation Scheme for Transformed Exponents.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap.
Proceedings of the Information Retrieval Technology, 2005

An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Authenticated Encryption Schemes with Message Linkage for Threshold Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A New Design for Efficient t-out-n Oblivious Transfer Scheme.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A DCT-Domain System for Hiding Fractal Compressed Images.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Content-Based Retrieval Concept.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Wirel. Pers. Commun., 2004

A progressive secret reveal system based on SPIHT image transmission.
Signal Process. Image Commun., 2004

A color image watermarking scheme based on color quantization.
Signal Process., 2004

A secure one-time password authentication scheme with low-computation for mobile communications.
ACM SIGOPS Oper. Syst. Rev., 2004

Remarks on fingerprint-based remote user authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2004

A convertible group signature scheme.
ACM SIGOPS Oper. Syst. Rev., 2004

An improvement of delegated multisignature scheme with document decomposition.
ACM SIGOPS Oper. Syst. Rev., 2004

A secure one-time password authentication scheme using smart cards without limiting login times.
ACM SIGOPS Oper. Syst. Rev., 2004

An improvement on a deniable authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

A secure and efficient strong-password authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

Novel full-search schemes for speeding up image coding using vector quantization.
Real Time Imaging, 2004

A steganographic method for digital images using side match.
Pattern Recognit. Lett., 2004

Information hiding based on search-order coding for VQ indices.
Pattern Recognit. Lett., 2004

A new design of efficient partially blind signature scheme.
J. Syst. Softw., 2004

A new scheme to protect confidential images.
J. Interconnect. Networks, 2004

An Efficient Graph-Based Method for Parallel Mining Problems.
J. Inf. Knowl. Manag., 2004

Retrieving digital images from a JPEG compressed image database.
Image Vis. Comput., 2004

A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004

Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction.
Informatica (Slovenia), 2004

High Capacity Data Hiding in JPEG-Compressed Images.
Informatica, 2004

VQ-Based Image Watermarking Using Anti-Gray Coding.
Informatica, 2004

Similar Image Retrieval Based on Wavelet Transformation.
Int. J. Wavelets Multiresolution Inf. Process., 2004

An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique.
Int. J. Pattern Recognit. Artif. Intell., 2004

A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math., 2004

Signing a digital signature without using one-way hash functions and message redundancy schemes.
IEEE Commun. Lett., 2004

Scenery Image Segmentation Using Support Vector Machines.
Fundam. Informaticae, 2004

Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Informaticae, 2004

An Adaptive Steganographic Scheme for Color Images.
Fundam. Informaticae, 2004

A New Repeating Color Watermarking Scheme Based on Human Visual Model.
EURASIP J. Adv. Signal Process., 2004

A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
Comput. Stand. Interfaces, 2004

A novel three-party encrypted key exchange protocol.
Comput. Stand. Interfaces, 2004

A fair and secure mobile agent environment based on blind signature and proxy host.
Comput. Secur., 2004

A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes.
Comput. J., 2004

An Adaptive Steganography for Index-Based Images Using Codeword Grouping.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Detection and Restoration of a Tampered Medical Image.
Proceedings of the Medical Imaging and Augmented Reality: Second International Workshop, 2004

A Signature Scheme with (t, n) Shared Verification and Message Recovery.
Proceedings of the iiWAS'2004, 2004

The Security Flaw of an Untraceable Signature Scheme.
Proceedings of the Fourth International Conference on Electronic Business, 2004

A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

A Chinese Remainder Theorem Oriented Information Hiding Scheme.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

Progressive Image Transmission Using Singular Value Decomposition.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004

A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004

A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

A New FP-Tree Algorithm for Mining Frequent Itemsets.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Supervising Secret-Key Agreements in a Level-Based Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Using IC Cards to Remotely Login Passwords without Verification Tables.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Secret Sharing with Access Structures in a Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Bandwidth Efficiency of an Image Compression Method for Information Hiding.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Yet Another Attack on a QR-based Password Authentication System.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Spatial Video Retrieval Based on the Piecewise Method.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Steganography Using JPEG-Compressed Images.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

A Novel Information Hiding Scheme Based on BTC.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
Vis. Comput., 2003

A self-encryption mechanism for authentication of roaming and teleconference services.
IEEE Trans. Wirel. Commun., 2003

Using set partitioning in hierarchical trees to authenticate digital images.
Signal Process. Image Commun., 2003

Error prevention and resilience of VQ encoded images.
Signal Process., 2003

A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes.
Real Time Imaging, 2003

Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy.
Pattern Recognit., 2003

An efficient protocol for anonymous multicast and reception.
Inf. Process. Lett., 2003

Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards.
Informatica, 2003

A Watermarking Scheme Based on Principal Component Analysis Technique.
Informatica, 2003

Edge Detection Using Block Truncation Coding.
Int. J. Pattern Recognit. Artif. Intell., 2003

Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Informaticae, 2003

A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Informaticae, 2003

An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Informaticae, 2003

An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Informaticae, 2003

A New Channel for Image Hiding Based on Interpolating polynomials.
Fundam. Informaticae, 2003

A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Gener. Comput. Syst., 2003

Security enhancement for anonymous secure e-voting over a network.
Comput. Stand. Interfaces, 2003

The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Comput. Stand. Interfaces, 2003

A flexible date-attachment scheme on e-cash.
Comput. Secur., 2003

Efficient anonymous auction protocols with freewheeling bids.
Comput. Secur., 2003

Construction of Symmetrical Reversible Variable Length Codes Using Backtracking.
Comput. J., 2003

Parallel computational algorithms for generalized Chinese remainder theorem.
Comput. Electr. Eng., 2003

An Efficient Block-based Scheme for Progressively Transmitting Lossless Images.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003

A Method for Sending Confidential Messages to a Group without Trusted Parties.
Proceedings of the Parallel and Distributed Processing and Applications, 2003

An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Robust and Recoverable Tamper Proofing Technique for Image Authentication.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

Signature Schemes Based on Two Hard Problems Simultaneously.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Lossless Image Compression Based on Two-Way Smaller Difference.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Huffman Tree Decomposition and Its Coding Applications.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
An ElGamal-Like Cryptosystem for Enciphering Large Messages.
IEEE Trans. Knowl. Data Eng., 2002

An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images.
Real Time Imaging, 2002

A fast pixel mapping algorithm using principal component analysis.
Pattern Recognit. Lett., 2002

Cryptanalysis of an encryption scheme for binary images.
Pattern Recognit. Lett., 2002

An image intellectual property protection scheme for gray-level images using visual secret sharing strategy.
Pattern Recognit. Lett., 2002

Detection and restoration of tampered JPEG compressed images.
J. Syst. Softw., 2002

Sharing multiple secrets in digital images.
J. Syst. Softw., 2002

A steganographic method based upon JPEG and quantization table modification.
Inf. Sci., 2002

An improvement of a technique for color quantization using reduction of color space dimensionality.
Informatica (Slovenia), 2002

Recognition of Image Authenticity Using Significant DCT Coefficients Quantization.
Informatica (Slovenia), 2002

A Feature-Oriented Copyright Owner Proving Technique for Still Images.
Int. J. Softw. Eng. Knowl. Eng., 2002

Both Color and Gray Scale Secret Images Hiding in a Color Image.
Int. J. Pattern Recognit. Artif. Intell., 2002

A Fast and Secure Image Hiding Scheme Based on LSB Substitution.
Int. J. Pattern Recognit. Artif. Intell., 2002

A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels.
Int. J. Pattern Recognit. Artif. Intell., 2002

Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding.
Int. J. Comput. Process. Orient. Lang., 2002

A New Micro-Payment System Using General Payword Chain.
Electron. Commer. Res., 2002

A Dynamic Color Palette for Color Images Coding.
Proceedings of the Advances in Multimedia Information Processing, 2002

A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density.
Proceedings of the Advances in Multimedia Information Processing, 2002

A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications.
Proceedings of the Advances in Multimedia Information Processing, 2002

An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding.
Proceedings of the 6th Joint Conference on Information Science, 2002

An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002

An Association Rule Mining Method for Spatial Database.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

An Inverse Halftoning Technique using Genetic Algorithm.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

A Compact Patricia Trie for a Large Set of Keys.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

Cryptanalysis of the WD Public-Key Cryptosystem.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

Sharing a Secret Gray Image in Multiple Images.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

A Hybrid Method for Estimating the Euclidean Distance between Two Vectors.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

An Image Copyright Protection Scheme Based on Torus Automorphism.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

Key Exchange Protocols for Multiparty Communication Services.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2001
Image matching using run-length feature.
Pattern Recognit. Lett., 2001

Spatial Similarity Retrieval in Video Databases.
J. Vis. Commun. Image Represent., 2001

A new encryption algorithm for image cryptosystems.
J. Syst. Softw., 2001

A New Two-Path Search Algorithm for Block Motion Estimation of Video Data.
J. Inf. Sci. Eng., 2001

New method of secret image sharing based upon vector quantization.
J. Electronic Imaging, 2001

A Novel Progressive Image Transmission Technique for Chinese Calligraphy.
Int. J. Comput. Process. Orient. Lang., 2001

Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance.
Int. J. Comput. Process. Orient. Lang., 2001

Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001

A Generalized Secret Image Sharing and Recovery Scheme.
Proceedings of the Advances in Multimedia Information Processing, 2001

A Novel Scheme for Securing Image Steganography.
Proceedings of the Advances in Multimedia Information Processing, 2001

A Color Image Retrieval Method Based on Local Histogram.
Proceedings of the Advances in Multimedia Information Processing, 2001

Image Retrieval Based on Tolerable Difference of Direction.
Proceedings of the 15th International Conference on Information Networking, 2001

Cryptanalysis of the Improved User Efficient Blind Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
Proceedings of the Information and Communications Security, Third International Conference, 2001

A Progressive Image Transmission Scheme Based on Block Truncation Coding.
Proceedings of the Human Society and the Internet, 2001

Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure.
Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001

2000
An efficient computation of Euclidean distances using approximated look-up table.
IEEE Trans. Circuits Syst. Video Technol., 2000

A new lossless compression scheme based on Huffman coding scheme for image compression.
Signal Process. Image Commun., 2000

Breadth-first search oriented symbolic picture representation for spatial match retrieval.
J. Syst. Softw., 2000

Digital watermarking of images using neural networks.
J. Electronic Imaging, 2000

A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000

A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia), 2000

A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme.
Informatica (Slovenia), 2000

A Compact Sparse Matrix Representation Using Random Hash Functions.
Data Knowl. Eng., 2000

A threshold decryption scheme without session keys.
Comput. Electr. Eng., 2000

An Improved Prediction Method for Quadtree Image Coding.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000

A Method for Protecting Digital Images from Being Copied Illegally.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000

A Perspective on the Development of Digital Libraries in Taiwan.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000

An efficient accessing technique of Chinese characters using Boshiamy Chinese input system.
Proceedings of the Fifth International Workshop on Information Retrieval with Asian Languages, 2000, Hong Kong, China, September 30, 2000

Computing watermarks from images using quadtrees.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

A New Scheme for Sharing Secret Color Images in Computer Network.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

A Proof of Copyright Ownership Using Moment-Preserving.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

Detecting Dealer Cheating in Secret Sharing Systems.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
A watermarking technique based on one-way hash functions.
IEEE Trans. Consumer Electron., 1999

Reconstruction of lost blocks using codeword estimation.
IEEE Trans. Consumer Electron., 1999

Variable rate vector quantization scheme based on quadtree segmentation.
IEEE Trans. Consumer Electron., 1999

Low complexity index-compressed vector quantization for image compression.
IEEE Trans. Consumer Electron., 1999

A concept of designing cheater identification methods for secret sharing.
J. Syst. Softw., 1999

Partition search filter and its performance analysis.
J. Syst. Softw., 1999

(t, n) Threshold Digital Signature With Traceability Property.
J. Inf. Sci. Eng., 1999

An Improved Threshold Scheme Based on Modular ARithmetic.
J. Inf. Sci. Eng., 1999

A fast modular multiplication algorithm for calculating the product AB modulo N.
Inf. Process. Lett., 1999

Conference key distribution schemes for portable communication systems.
Comput. Commun., 1999

Tree Structured Vector Quantization with Dynamic Path Search.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
A virtual image cryptosystem based upon vector quantization.
IEEE Trans. Image Process., 1998

A predictive image coding scheme using a smaller codebook.
Signal Process. Image Commun., 1998

An adaptive exponentiation method.
J. Syst. Softw., 1998

A spatial match retrieval mechanism for symbolic pictures.
J. Syst. Softw., 1998

Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search.
J. Electronic Imaging, 1998

Sharing Secret Omages using Shadow Codebooks.
Inf. Sci., 1998

A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures.
Data Knowl. Eng., 1998

Threshold signature schemes with traceable signers in group communications.
Comput. Commun., 1998

Using RSA with low exponent in a public network.
Comput. Commun., 1998

Authenticity of public keys in asymmetric cryptosystems.
Comput. Commun., 1998

An on-line secret sharing scheme for multi-secrets.
Comput. Commun., 1998

A Scheme for Obtaining a Message from the Digital Multisignature.
Proceedings of the Public Key Cryptography, 1998

An Efficient Data Structure for Storing Similar Binary Images.
Proceedings of the 5th International Conference of Foundations of Data Organization (FODO'98), 1998

1997
Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval.
IEEE Trans. Knowl. Data Eng., 1997

A new image coding algorithm using variable-rate side-match finite-state vector quantization.
IEEE Trans. Image Process., 1997

Diagonal axes method (DAM): a fast search algorithm for vector quantization.
IEEE Trans. Circuits Syst. Video Technol., 1997

A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Comput., 1997

A secure voting system on a public network.
Networks, 1997

An Improved VQ Codebook Search Algorithm Using Principal Component Analysis.
J. Vis. Commun. Image Represent., 1997

Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval.
J. Inf. Sci. Eng., 1997

A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997

Authenticated Encryption Schemes with Linkage Between Message Blocks.
Inf. Process. Lett., 1997

A Simple Approach for Generating RSA Keys.
Inf. Process. Lett., 1997

Spatial match retrieval based on direction signatures using multiple key hashing scheme.
Int. J. Intell. Syst., 1997

A Cost Optimal Search Technique for the Knapsack Problem.
Int. J. High Speed Comput., 1997

Parallel computation of the multi-exponentiation for cryptosystems.
Int. J. Comput. Math., 1997

Proper interval graphs and the guard problem.
Discret. Math., 1997

A Digital Signature Scheme Based upon the Theory of Quadratic residues.
Cryptologia, 1997

Three ID-based information security functions.
Comput. Commun., 1997

1996
A spatial data representation: an adaptive 2D-H string.
Pattern Recognit. Lett., 1996

Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval.
J. Syst. Softw., 1996

An Improvement to Ziegler's Sparse Matrix Compression Algorithm.
J. Syst. Softw., 1996

On Key Changeable ID-Based Digital Signature Scheme.
J. Inf. Sci. Eng., 1996

Cryptanalysis of the Secret Exponent of the RSA Scheme.
J. Inf. Sci. Eng., 1996

A Fast Search Algorithm for Vector Quantization.
J. Inf. Sci. Eng., 1996

Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries.
Inf. Sci., 1996

Integrating Authentication in Public Key Distribution System.
Inf. Process. Lett., 1996

Autenticated Encryption Schemes with Message Linkage.
Inf. Process. Lett., 1996

A Spatial Filter for Similarity Retrieval.
Int. J. Pattern Recognit. Artif. Intell., 1996

Two 2D search filters and their performance analyses.
Int. J. Comput. Math., 1996

Optimal Linear Hashing Files for Orthogonal Range Retrieval.
Proceedings of the COMPSAC '96, 1996

Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996

A Temporal Join Mechanism Based on Trie-Ranking Data Structure.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996

A group-oriented (t, n) undeniable signature scheme without trusted center.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

A dynamic secret sharing scheme with cheater detection.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
New Public-Key Cipher System Based Upon the Diophantine Equations.
IEEE Trans. Computers, 1995

A near pattern-matching scheme based upon principal component analysis.
Pattern Recognit. Lett., 1995

An exact match retrieval scheme based upon principal component analysis.
Pattern Recognit. Lett., 1995

Relative coordinates oriented symbolic string for spatial relationship retrieval.
Pattern Recognit., 1995

Parallel Computation of the Modular Cascade Exponentiation.
Parallel Algorithms Appl., 1995

Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries.
J. Inf. Sci. Eng., 1995

Shortest Weighted Length Addition Chains.
J. Inf. Sci. Eng., 1995

A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm.
J. Inf. Sci. Eng., 1995

Dynamic Pictorial Databases Design for Similarity Retrieval.
Inf. Sci., 1995

Arithmetic operations on encrypted data.
Int. J. Comput. Math., 1995

A cryptographic implementation for dynamic access control in a user hierarchy.
Comput. Secur., 1995

Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995

Remote scheme for password authentication based on theory of quadratic residues.
Comput. Commun., 1995

Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Proceedings of the Cryptography: Policy and Algorithms, 1995

Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons.
Proceedings of the Combinatorics and Computer Science, 1995

1994
Application of geometric hashing to iconic database retrieval.
Pattern Recognit. Lett., 1994

New concepts for multiple stack systems: Born and reborn.
J. Syst. Softw., 1994

A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem.
J. Inf. Sci. Eng., 1994

Controlling Access in Tree Hierarchies.
Inf. Sci., 1994

Optimal Multiple Key Hashing Files for Orthogonal Range Queries.
Inf. Sci., 1994

A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis.
Int. J. Pattern Recognit. Artif. Intell., 1994

Authentication and protection of public keys.
Comput. Secur., 1994

Access control with binary keys.
Comput. Secur., 1994

A scheme to determine the relationship between two users in a hierarchy.
Comput. Secur., 1994

Method for constructing a group-oriented cipher system.
Comput. Commun., 1994

Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem.
Comput. Commun., 1994

1993
An object-oriented similarity retrieval algorithm for iconic image databases.
Pattern Recognit. Lett., 1993

A hashing-oriented nearest neighbor searching scheme.
Pattern Recognit. Lett., 1993

A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers.
IEEE J. Sel. Areas Commun., 1993

Algebraic operations on encryped relational databases.
Inf. Syst., 1993

Optimal MMI file systems for orthogonal range retrieval.
Inf. Syst., 1993

Controlling the Access Requests in an Information Protection System.
Inf. Process. Manag., 1993

Master Keys for an M <sup> 3 </sup> Cryptoscheme.
Cryptologia, 1993

A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files.
BIT, 1993

A Refinement of a Compression-Oriented Addressing Scheme.
BIT, 1993

Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval.
Proceedings of the Advances in Spatial Databases, 1993

Similarity Retrieval on Pictorial Databases Based upon Module Operation.
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA), 1993

1992
A Chinese Character Retrieval Scheme Using Shuang Pinyin.
J. Inf. Sci. Eng., 1992

Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci., 1992

A conference key broadcasting system using sealed locks.
Inf. Syst., 1992

Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst., 1992

On GDM allocation for partial range queries.
Inf. Syst., 1992

Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manag., 1992

A fast algorithm to retrieve symbolic pictures.
Int. J. Comput. Math., 1992

A Record-Oriented Cryptosystem for Database Sharing (Short Note).
Comput. J., 1992

Greedy File - a New Data Organisation Concept for Partial Match Retrieval.
Comput. J., 1992

Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files.
Comput. J., 1992

Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems.
Comput. J., 1992

A Solution to Generalized Group Oriented Cryptography.
Proceedings of the IT Security: The Need for International Cooperation, 1992

De-Clustering Image Databases.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992

The Design of a Conference Key Distribution System.
Proceedings of the Advances in Cryptology, 1992

1991
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw. Pract. Exp., 1991

Retrieval of similar pictures on pictorial databases.
Pattern Recognit., 1991

A shape recognition scheme based on relative distances of feature points from the centroid.
Pattern Recognit., 1991

Spatial Match Retrieval of Symbolic Pictures.
J. Inf. Sci. Eng., 1991

A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets.
J. Inf. Sci. Eng., 1991

A note on allocating k-ary multiple key hashing files among multiple disks.
Inf. Sci., 1991

Password authentication using Newton's interpolating polynomials.
Inf. Syst., 1991

On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks.
Inf. Syst., 1991

A password authentication scheme based on discrete logarithms.
Int. J. Comput. Math., 1991

A dynamic key-lock-pair access control scheme.
Comput. Secur., 1991

On the Design of a Machine-Independent Perfect Hashing Scheme.
Comput. J., 1991

1990
A Dynamic Access Control Mechanism in Information Protection Systems.
J. Inf. Sci. Eng., 1990

A New Password Authentication Scheme.
J. Inf. Sci. Eng., 1990

A Reciprocal Confluence Tree Unit and Its Applications.
BIT, 1990

1989
Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989

1988
An Ordered Minimal Perfect Hashing Scheme with Single Parameter.
Inf. Process. Lett., 1988

A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files.
Comput. J., 1988

Application of Principal Component Analysis to Multi-Disk Concurrent Accessing.
BIT, 1988

Orthogonal Range Retrieval Using Bucket Address Hashing.
Proceedings of the Statistical and Scientific Database Management, 1988

1987
Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval.
J. Inf. Sci. Eng., 1987

Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System.
J. Inf. Sci. Eng., 1987

Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems.
Comput. J., 1987

An Information Protection Scheme Based Upon Number Theory.
Comput. J., 1987

Performance of Two-Disk Partition Data Allocations.
BIT, 1987

1986
A scheme for constructing ordered minimal perfect hashing functions.
Inf. Sci., 1986

Letter-oriented reciprocal hashing scheme.
Inf. Sci., 1986

A Letter-Oriented Minimal Perfect Hashing Scheme.
Comput. J., 1986

On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems.
BIT, 1986

The Idea of De-Clustering and its Applications.
Proceedings of the VLDB'86 Twelfth International Conference on Very Large Data Bases, 1986

On the Design of Ordered Minimal Perfect Hashing Functions.
Proceedings of the Second International Conference on Data Engineering, 1986

1985
On the Complexity of File Allocation Problem.
Proceedings of the Foundations of Data Organization, 1985

Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems.
Proceedings of the Foundations of Data Organization, 1985

On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems.
Proceedings of the Foundations of Data Organization, 1985

Database Research and Development in Taiwan.
Proceedings of the Foundations of Data Organization, 1985

The Study of a Letter Oriented Minimal Perfect Hashing Scheme.
Proceedings of the Foundations of Data Organization, 1985

1984
Performance Analyses of Cartesian Product Files and Random Files.
IEEE Trans. Software Eng., 1984

Optimal information retrieval when queries are not random.
Inf. Sci., 1984

An ordered minimal perfect hashing scheme based upon Euler's theorem.
Inf. Sci., 1984

1983
The hierarchical ordering in multiattribute files.
Inf. Sci., 1983

1982
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries.
IEEE Trans. Software Eng., 1982

1980
Some Properties of Cartesian Product Files.
Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980


  Loading...