Shiuh-Jeng Wang
Orcid: 0000-0002-4546-7865
According to our database1,
Shiuh-Jeng Wang
authored at least 118 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime.
IEEE Trans. Inf. Forensics Secur., 2024
Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images.
Proceedings of the 2024 5th International Conference on Computing, 2024
A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding Mechanisms.
Proceedings of the 2024 5th International Conference on Computing, 2024
The Study of More Susceptible to Fake News Makers with Influencing Factors in Social Media.
Proceedings of the 2024 5th International Conference on Computing, 2024
2022
J. Supercomput., 2022
Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube.
IEEE Access, 2022
2021
J. Supercomput., 2021
2020
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation.
Inf. Sci., 2020
Proceedings of the ICFET 2020, 2020
2019
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks.
Multim. Tools Appl., 2019
J. Vis. Commun. Image Represent., 2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
J. Supercomput., 2018
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements.
J. Supercomput., 2018
Pers. Ubiquitous Comput., 2018
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
2017
Int. J. Inf. Sec., 2017
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017
2016
J. Supercomput., 2016
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016
2015
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Security and privacy information technologies and applications for wireless pervasive computing environments.
Inf. Sci., 2015
Proceedings of the Information and Communication Technology, 2015
2014
J. Supercomput., 2014
Visible watermarking with reversibility of multimedia images for ownership declarations.
J. Supercomput., 2014
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems.
Peer-to-Peer Netw. Appl., 2014
Peer-to-Peer Netw. Appl., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Information and Communication Technology, 2014
2013
J. Supercomput., 2013
Editorial of special section on advanced in high performance, algorithm, and framework for future computing.
J. Supercomput., 2013
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion.
J. Supercomput., 2013
Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
J. Supercomput., 2013
Telecommun. Syst., 2013
ACM Trans. Embed. Comput. Syst., 2013
Multim. Tools Appl., 2013
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping.
Inf. Sci., 2013
Int. J. Commun. Syst., 2013
Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Secur. Commun. Networks, 2012
KSII Trans. Internet Inf. Syst., 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC.
Wirel. Pers. Commun., 2011
IEEE Syst. J., 2011
A data hiding scheme using the varieties of pixel-value differencing in multimedia images.
J. Syst. Softw., 2011
Reversible steganography based on side match and hit pattern for VQ-compressed images.
Inf. Sci., 2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
2010
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Vis. Commun. Image Represent., 2010
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
J. Syst. Softw., 2010
J. Networks, 2010
J. Inf. Sci. Eng., 2010
Int. J. Inf. Technol. Commun. Convergence, 2010
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations.
Fundam. Informaticae, 2010
Comput. Law Secur. Rev., 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Int. J. Ad Hoc Ubiquitous Comput., 2009
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models.
Comput. Stand. Interfaces, 2009
Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers.
Comput. Law Secur. Rev., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks.
J. Commun., 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Inf. Sci., 2007
Comput. Stand. Interfaces, 2007
Comput. Stand. Interfaces, 2007
Comput. Networks, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia.
Proceedings of the Future Generation Communication and Networking, 2007
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions.
Proceedings of the Future Generation Communication and Networking, 2007
2006
Proceedings of the Intelligence and Security Informatics, 2006
2005
Comput. Stand. Interfaces, 2005
Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the Intelligence and Security Informatics, 2005
2004
IEEE Trans. Computers, 2004
Comput. Stand. Interfaces, 2004
Comput. Stand. Interfaces, 2004
Appl. Math. Comput., 2004
Threshold verification scheme to a valid-signature using identity only on specialized approval.
Appl. Math. Comput., 2004
Multicasting Secret Images using a Knapsack-like Cipher System.
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004
2003
Yet another log-in authentication using n-dimensional construction based on circle property.
IEEE Trans. Consumer Electron., 2003
2002
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
1999
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999
1996
ID-based authentication for mobile conference call.
Proceedings of the Information Systems Security, 1996