Tzung-Her Chen
Orcid: 0000-0001-5775-6034
According to our database1,
Tzung-Her Chen
authored at least 82 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares.
Multim. Tools Appl., March, 2024
Multiparty Quantum Key Agreement Protocol Based on 2-Qubit Grover Search with swapping.
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024
2023
A Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids.
IEEE Access, 2023
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023
2022
Medical cooperative authenticated key agreement schemes with involvement of personal care assistant in telemedicine.
Comput. Methods Programs Biomed., 2022
2021
Symmetry, 2021
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security.
Symmetry, 2021
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
Security-enhanced cloud-based image secret sharing and authentication using POB number system.
Multim. Tools Appl., 2021
A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Multim. Tools Appl., 2020
2019
Multim. Tools Appl., 2019
Int. J. Commun. Syst., 2019
2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Proceedings of the New Trends in Computer Technologies and Applications, 2018
2017
Multim. Tools Appl., 2017
Int. J. Netw. Secur., 2017
2016
Multim. Tools Appl., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
2015
Signal Process. Image Commun., 2015
J. Vis. Commun. Image Represent., 2015
Int. J. Netw. Secur., 2015
Visual multiple-secret sharing for flexible general access structure by random grids.
Displays, 2015
2014
J. Vis. Commun. Image Represent., 2014
Int. J. Digit. Crime Forensics, 2014
An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
Secur. Commun. Networks, 2013
IET Image Process., 2013
Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern.
Displays, 2013
Displays, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Genetic and Evolutionary Computing, 2013
Proceedings of the Genetic and Evolutionary Computing, 2013
Dynamic range optimization by flexible local contrast enhancement using luminance map.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013
2012
Joint fingerprinting and decryption with noise-resistant for vector quantization images.
Signal Process., 2012
Signal Process., 2012
Signal Process., 2012
2011
IEEE Trans. Circuits Syst. Video Technol., 2011
Signal Process., 2011
2010
J. Zhejiang Univ. Sci. C, 2010
Compression-unimpaired batch-image encryption combining vector quantization and index compression.
Inf. Sci., 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
J. Organ. Comput. Electron. Commer., 2009
Inf. Sci., 2009
Comput. Stand. Interfaces, 2009
A self-verification authentication mechanism for mobile satellite communication systems.
Comput. Electr. Eng., 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
J. Syst. Softw., 2008
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008
Comput. Electr. Eng., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
A cheating prevention scheme for binary visual cryptography with homogeneous secret images.
Pattern Recognit., 2007
Comput. Stand. Interfaces, 2007
A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
2006
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol.
Pattern Recognit., 2006
2005
IEEE Trans. Ind. Electron., 2005
Appl. Math. Comput., 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
2004
2002
J. Syst. Softw., 2002