Chwei-Shyong Tsai

According to our database1, Chwei-Shyong Tsai authored at least 45 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification.
Multim. Tools Appl., April, 2024

2022
An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks.
Multim. Tools Appl., 2022

Separable reversible data hiding in encrypted images based on Paillier cryptosystem.
Multim. Tools Appl., 2022

2021
Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques.
Symmetry, 2021

A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code.
Symmetry, 2021

2019
Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems.
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019

2015
A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
A new visual cryptography with multi-level encoding.
J. Vis. Lang. Comput., 2014

Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface.
J. Sensors, 2014

2013
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images.
J. Syst. Softw., 2013

2012
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Secur. Commun. Networks, 2012

2011
Coloured visual cryptography using fixed size meaningful share.
Int. J. Comput. Math., 2011

A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011

2010
A novel adaptive steganography based on local complexity and human vision sensitivity.
J. Syst. Softw., 2010

Reversible image steganographic scheme via predictive coding.
Displays, 2010

A tabular steganography scheme for graphical password authentication.
Comput. Sci. Inf. Syst., 2010

Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
J. Syst. Softw., 2009

A HDWT-based reversible data hiding method.
J. Syst. Softw., 2009

A new authenticated group key agreement in a mobile environment.
Ann. des Télécommunications, 2009

Multi-level visual secret sharing scheme with smooth-looking.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Adaptive lossless steganographic scheme with centralized difference expansion.
Pattern Recognit., 2008

Visual secret sharing for multiple secrets.
Pattern Recognit., 2008

A high quality steganographic method with pixel-value differencing and modulus function.
J. Syst. Softw., 2008

Using adaptive resonance theory and data-mining techniques for materials recommendation based on the e-library environment.
Electron. Libr., 2008

A Block-Based Authentication Watermarking Technique for Binary Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2006
Password Authentication Schemes: Current Status and Key Issues.
Int. J. Netw. Secur., 2006

Reversible Watermarking: Current Status and Key Issues.
Int. J. Netw. Secur., 2006

Robust Image Hiding Method.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.
Proceedings of the Computational Science and Its Applications, 2006

2005
A new multi-secret images sharing scheme using Largrange's interpolation.
J. Syst. Softw., 2005

An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet.
Int. J. Netw. Secur., 2005

Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Appl. Math. Comput., 2005

2004
A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004

A New Repeating Color Watermarking Scheme Based on Human Visual Model.
EURASIP J. Adv. Signal Process., 2004

Generalization of proxy signature based on elliptic curves.
Comput. Stand. Interfaces, 2004

Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling.
Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Scienes, 2004

On the Security of an Enhanced Authentication Key Exchange Protocol.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2003

A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Informaticae, 2003

An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Informaticae, 2003

2002
Sharing multiple secrets in digital images.
J. Syst. Softw., 2002

2001
A Generalized Secret Image Sharing and Recovery Scheme.
Proceedings of the Advances in Multimedia Information Processing, 2001

2000
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000

A New Scheme for Sharing Secret Color Images in Computer Network.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000


  Loading...