Der-Chyuan Lou
Orcid: 0000-0001-6697-7648
According to our database1,
Der-Chyuan Lou
authored at least 60 papers
between 1991 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones.
Internet Things, October, 2023
2021
An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match.
IEEE Access, 2021
2018
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.
Symmetry, 2018
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
Inf. Sci., 2018
2015
Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.
J. Medical Syst., 2015
2014
Secur. Commun. Networks, 2014
An efficient <i>t</i>-out-of-<i>n</i> oblivious transfer for information security and privacy protection.
Int. J. Commun. Syst., 2014
2013
Pattern Recognit. Lett., 2013
High Performance Reversible Data Hiding for Mobile Applications and Human Interaction.
Int. J. Technol. Hum. Interact., 2013
2012
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis.
Inf. Sci., 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
2011
Int. J. Commun. Syst., 2011
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011
2010
A novel adaptive steganography based on local complexity and human vision sensitivity.
J. Syst. Softw., 2010
Fast modular multiplication based on complement representation and canonical recoding.
Int. J. Comput. Math., 2010
2009
Informatica (Slovenia), 2009
Message estimation for universal steganalysis using multi-classification support vector machine.
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2007
Integer factorization for RSA cryptosystem under a PVM environment.
Comput. Syst. Sci. Eng., 2007
A copyright protection scheme for digital images using visual cryptography technique.
Comput. Stand. Interfaces, 2007
Comput. Secur., 2007
Appl. Math. Comput., 2007
Appl. Math. Comput., 2007
An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques.
Appl. Math. Comput., 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
J. Syst. Softw., 2006
J. Syst. Softw., 2006
Informatica, 2006
Int. J. Pattern Recognit. Artif. Intell., 2006
Comput. Stand. Interfaces, 2006
Comput. Stand. Interfaces, 2006
2005
Informatica, 2005
Proceedings of the ITRE 2005, 2005
Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem.
IEEE Trans. Multim., 2004
Parallel Modular Exponentiation Using Signed-Digit-Folding Technique.
Informatica (Slovenia), 2004
Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques.
Int. J. Comput. Math., 2004
2003
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture.
J. Inf. Sci. Eng., 2003
Int. J. Comput. Math., 2003
2002
Inf. Process. Lett., 2002
Int. J. Comput. Math., 2002
An efficient steganographic approach.
Comput. Syst. Sci. Eng., 2002
2001
Spatial database with each picture self-contained multiscape and access control in a hierarchy.
J. Syst. Softw., 2001
2000
IEEE Trans. Consumer Electron., 2000
Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem.
Proceedings of the 2000 International Conference on Image Processing, 2000
1998
1997
Int. J. High Speed Comput., 1997
Int. J. Comput. Math., 1997
1991