Chwei-Shyong Tsai
According to our database1,
Chwei-Shyong Tsai
authored at least 45 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification.
Multim. Tools Appl., April, 2024
2022
An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks.
Multim. Tools Appl., 2022
Multim. Tools Appl., 2022
2021
Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques.
Symmetry, 2021
Symmetry, 2021
2019
Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems.
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019
2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface.
J. Sensors, 2014
2013
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images.
J. Syst. Softw., 2013
2012
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Secur. Commun. Networks, 2012
2011
Int. J. Comput. Math., 2011
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011
2010
A novel adaptive steganography based on local complexity and human vision sensitivity.
J. Syst. Softw., 2010
Comput. Sci. Inf. Syst., 2010
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
2009
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
J. Syst. Softw., 2009
Ann. des Télécommunications, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2008
Pattern Recognit., 2008
A high quality steganographic method with pixel-value differencing and modulus function.
J. Syst. Softw., 2008
Using adaptive resonance theory and data-mining techniques for materials recommendation based on the e-library environment.
Electron. Libr., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2006
Int. J. Netw. Secur., 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
J. Syst. Softw., 2005
Int. J. Netw. Secur., 2005
Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Appl. Math. Comput., 2005
2004
A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004
EURASIP J. Adv. Signal Process., 2004
Comput. Stand. Interfaces, 2004
Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling.
Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Scienes, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Informatica, 2003
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Informaticae, 2003
An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Informaticae, 2003
2002
2001
Proceedings of the Advances in Multimedia Information Processing, 2001
2000
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000