Ching-Nung Yang
Orcid: 0000-0002-3881-7329
According to our database1,
Ching-Nung Yang
authored at least 196 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Progressive secret image sharing based on Boolean operations and polynomial interpolations.
Multim. Syst., August, 2024
Multim. Tools Appl., March, 2024
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain.
IEEE Internet Things J., March, 2024
Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks.
IEEE Trans. Wirel. Commun., January, 2024
Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression.
IEEE Trans. Multim., 2024
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection.
IEEE Trans. Multim., 2024
Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction.
IEEE Trans. Cloud Comput., 2024
J. Inf. Secur. Appl., 2024
2023
J. Inf. Secur. Appl., August, 2023
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding.
J. Inf. Secur. Appl., June, 2023
J. Inf. Secur. Appl., March, 2023
RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things.
IEEE Internet Things J., February, 2023
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing.
ACM Trans. Multim. Comput. Commun. Appl., January, 2023
IEEE Trans. Cloud Comput., 2023
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States.
CoRR, 2023
Ensuring FHIR Authentication and Data Integrity by Smart Contract and Blockchain Enabled NFT.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023
Proceedings of the 8th International Conference on Automation, 2023
2022
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2022
J. Vis. Commun. Image Represent., 2022
2021
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Signal Process., 2021
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
Geometric rectification-based neural network architecture for image manipulation detection.
Int. J. Intell. Syst., 2021
Future Gener. Comput. Syst., 2021
2020
DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication.
Signal Process., 2020
Signal Process., 2020
Multim. Tools Appl., 2020
Multim. Tools Appl., 2020
J. Vis. Commun. Image Represent., 2020
Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020
J. Intell. Fuzzy Syst., 2020
Cheating immune <i>k</i>-out-of-<i>n</i> block-based progressive visual cryptography.
J. Inf. Secur. Appl., 2020
A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy.
J. Inf. Secur. Appl., 2020
2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
Symmetry, 2019
Invertible secret image sharing with steganography and authentication for AMBTC compressed images.
Signal Process. Image Commun., 2019
Signal Process. Image Commun., 2019
Secur. Commun. Networks, 2019
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing.
J. Vis. Commun. Image Represent., 2019
A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image.
J. Vis. Commun. Image Represent., 2019
J. Real Time Image Process., 2019
KSII Trans. Internet Inf. Syst., 2019
Original image tracing with image relational graph for near-duplicate image elimination.
Int. J. Comput. Sci. Eng., 2019
Digit. Signal Process., 2019
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019
2018
Improving recovered image quality in secret image sharing by simple modular arithmetic.
Signal Process. Image Commun., 2018
Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes.
Signal Process. Image Commun., 2018
Signal Process. Image Commun., 2018
Pers. Ubiquitous Comput., 2018
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Pers. Ubiquitous Comput., 2018
Pers. Ubiquitous Comput., 2018
Enhancing multi-factor cheating prevention in visual cryptography based minimum (<i>k</i>, <i>n</i>)-connected graph.
J. Vis. Commun. Image Represent., 2018
Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.
J. Vis. Commun. Image Represent., 2018
J. Real Time Image Process., 2018
J. Real Time Image Process., 2018
A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.
J. Real Time Image Process., 2018
Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real Time Image Process., 2018
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real Time Image Process., 2018
J. Real Time Image Process., 2018
Inf. Sci., 2018
EURASIP J. Wirel. Commun. Netw., 2018
Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming + <i>k</i>.
Digit. Signal Process., 2018
Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding.
IEEE Access, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Signal Process. Image Commun., 2017
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Vis. Commun. Image Represent., 2017
J. Vis. Commun. Image Represent., 2017
Comput. Stand. Interfaces, 2017
Comput. Stand. Interfaces, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
2016
Theor. Comput. Sci., 2016
Secur. Commun. Networks, 2016
Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real Time Image Process., 2016
Int. J. Distributed Sens. Networks, 2016
IEICE Trans. Inf. Syst., 2016
Digit. Signal Process., 2016
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Vietnam. J. Comput. Sci., 2015
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach.
Signal Process. Image Commun., 2015
Signal Process., 2015
J. Vis. Commun. Image Represent., 2015
Inf. Sci., 2015
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality.
Digit. Signal Process., 2015
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing.
J. Comput. Inf. Technol., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
2014
Trans. Data Hiding Multim. Secur., 2014
IEEE Trans. Circuits Syst. Video Technol., 2014
Secur. Commun. Networks, 2014
A discussion on the relationship between probabilistic visual cryptography and random grid.
Inf. Sci., 2014
Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Neural Information Processing - 21st International Conference, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Pers. Ubiquitous Comput., 2013
Math. Comput. Model., 2013
J. Vis. Commun. Image Represent., 2013
J. Vis. Commun. Image Represent., 2013
J. Vis. Commun. Image Represent., 2013
KSII Trans. Internet Inf. Syst., 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
IEEE Trans. Circuits Syst. Video Technol., 2012
J. Vis. Commun. Image Represent., 2012
IEEE Commun. Lett., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
2011
Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks.
IEEE Trans. Computers, 2011
J. Syst. Softw., 2011
Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.
KSII Trans. Internet Inf. Syst., 2011
An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision.
IEEE Commun. Lett., 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
2010
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability.
Image Vis. Comput., 2010
2009
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty.
Signal Process., 2009
Pattern Recognit., 2009
Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes.
J. Inf. Sci. Eng., 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the iiWAS'2009, 2009
2008
Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit Shift.
IEEE Trans. Computers, 2008
Pattern Recognit., 2008
Cryptologia, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
J. Syst. Softw., 2007
Int. J. Imaging Syst. Technol., 2007
Int. J. Pattern Recognit. Artif. Intell., 2007
User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes.
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
2006
IEEE Trans. Computers, 2006
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation.
Pattern Recognit., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme.
Integr. Comput. Aided Eng., 2006
Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IEEE Trans. Inf. Theory, 2005
Pattern Recognit. Lett., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005
2004
Pattern Recognit. Lett., 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2003
J. Inf. Sci. Eng., 2003
An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003
2002
2000
New Colored Visual Secret Sharing Schemes.
Des. Codes Cryptogr., 2000
1998
IEEE Trans. Computers, 1998
1997
Inf. Process. Lett., 1997
1996
IEEE Trans. Computers, 1996