Jau-Ji Shen
Orcid: 0000-0001-6605-7374
According to our database1,
Jau-Ji Shen
authored at least 61 papers
between 2002 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Symmetry, 2021
A High Embedding Capacity Steganographic Method Using Maximum and Minimum pixels Difference Adaptive Strategy.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
2020
J. Supercomput., 2020
PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity.
Symmetry, 2020
Multim. Tools Appl., 2020
An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme.
IEEE Access, 2020
An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network.
Proceedings of the ICFET 2020, 2020
Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network.
Proceedings of the ICFET 2020, 2020
Proceedings of the ICFET 2020, 2020
2019
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery.
Sensors, 2019
J. Real Time Image Process., 2019
Int. Arab J. Inf. Technol., 2019
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
2018
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching.
Int. J. Netw. Secur., 2018
Int. J. Netw. Secur., 2018
A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
2017
Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques.
IEEE Trans. Image Process., 2017
Int. J. Netw. Secur., 2017
A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
2016
Int. J. Netw. Secur., 2016
Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework.
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the 12th International Conference on Natural Computation, 2016
2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service.
Proceedings of the 2015 International Conference on Information Networking, 2015
2014
Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014
2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
Digit. Signal Process., 2010
2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2007
Pattern Recognit., 2007
2006
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
J. Inf. Sci. Eng., 2005
Int. J. Netw. Secur., 2005
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
2004
2003
IEEE Trans. Consumer Electron., 2003
ACM SIGOPS Oper. Syst. Rev., 2003
Security enhancement for the timestamp-based password authentication scheme using smart cards.
Comput. Secur., 2003
Minimizing Transmission Cost for Distributed Database Design Based on Ontology Schema.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
2002
A Compact Patricia Trie for a Large Set of Keys.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002