Wien Hong
Orcid: 0000-0002-2873-0190
According to our database1,
Wien Hong
authored at least 56 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
1
2
3
1
2
3
6
5
4
3
4
1
1
4
1
3
1
1
3
1
2
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
J. Vis. Commun. Image Represent., 2025
2024
On the bitmap compression for joint coding and data hiding of AMBTC compressed images.
Multim. Tools Appl., October, 2024
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing.
J. Inf. Secur. Appl., 2024
2023
An unsolvable pixel reduced authentication method for color images with grayscale invariance.
J. King Saud Univ. Comput. Inf. Sci., October, 2023
An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique.
Multim. Tools Appl., April, 2023
Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques.
J. Inf. Secur. Appl., March, 2023
A Data Hiding Scheme for JPEG Images Based on EMD with Coefficient Selection Strategy.
Proceedings of the 2023 8th International Conference on Multimedia Systems and Signal Processing, 2023
2022
Adaptive encoding based lossless data hiding method for VQ compressed images using tabu search.
Inf. Sci., 2022
2021
An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match.
IEEE Access, 2021
2020
An efficient reversible authentication scheme for demosaiced images with improved detectability.
Signal Process. Image Commun., 2020
Reversible and recoverable authentication method for demosaiced images using adaptive coding technique.
J. Inf. Secur. Appl., 2020
Comput. J., 2020
2019
Symmetry, 2019
A difference matching technique for data embedment based on absolute moment block truncation coding.
Multim. Tools Appl., 2019
KSII Trans. Internet Inf. Syst., 2019
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer.
Inf. Sci., 2019
On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism.
Int. J. Netw. Secur., 2019
2018
Symmetry, 2018
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.
Symmetry, 2018
Efficient Data Hiding Based on Block Truncation Coding Using Pixel Pair Matching Technique.
Symmetry, 2018
An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching.
Multim. Tools Appl., 2018
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
Inf. Sci., 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Reversible Data Hiding Scheme for AMBTC Images Using Gray Code and Exclusive-OR Approaches.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018
2017
IEEE Signal Process. Lett., 2017
An efficient reversible image authentication method using improved PVO and LSB substitution techniques.
Signal Process. Image Commun., 2017
Multim. Tools Appl., 2017
Data hiding in AMBTC images using quantization level modification and perturbation technique.
Multim. Tools Appl., 2017
2016
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering.
Signal Process. Image Commun., 2016
Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting.
KSII Trans. Internet Inf. Syst., 2016
High capacity reversible steganography in encrypted images based on feature mining in plaintext domain.
Int. J. Embed. Syst., 2016
A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Encrypted image-based reversible data hiding with public key cryptography from difference expansion.
Signal Process. Image Commun., 2015
Inf. Sci., 2015
EAI Endorsed Trans. Creative Technol., 2015
Comput. J., 2015
2014
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map.
KSII Trans. Internet Inf. Syst., 2014
2013
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique.
Inf. Sci., 2013
Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013
A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Signal Process. Lett., 2012
Signal Process. Image Commun., 2012
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system.
J. Syst. Softw., 2012
Proceedings of the Fourth International Conference on Digital Image Processing, 2012
Proceedings of the Fourth International Conference on Digital Image Processing, 2012
2011
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism.
J. Vis. Commun. Image Represent., 2011
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011
2010
A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification.
Signal Process., 2010
A local variance-controlled reversible data hiding method using prediction and histogram-shifting.
J. Syst. Softw., 2010
An Efficient Prediction-and-Shifting Embedding Technique for High Quality Reversible Data Hiding.
EURASIP J. Adv. Signal Process., 2010
2009
Reversible data hiding for high quality images using modification of prediction errors.
J. Syst. Softw., 2009
2008
A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008