Yuan-Liang Tang

According to our database1, Yuan-Liang Tang authored at least 18 papers between 1996 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Image Authentication and Recovery through Optimal Selection of Block Types.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

A robust watermarking technique based on the polarity relationship between blocks.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

2014
An Image Authentication and Recovery Method Using Optimal Selection of Block Types.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

2013
Print-and-Scan Resilient Watermarking through Polarizing DCT Coefficients.
IEICE Trans. Inf. Syst., 2013

2012
Print-and-Scan Resilient Watermarking Based on Modulating the Averages of DCT Coefficients.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

2008
Efficient Image Recovery Based on Self-Embedding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Robust Watermarking Algorithm Based on Salient Image Features.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A new convertible authenticated encryption scheme with message linkages.
Comput. Electr. Eng., 2007

Secure Fast Pre-authentication Based on IEEE 802.11i.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Robust Near-Reversible Data Embedding Using Histogram Projection.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Image authentication using hierarchical semi-fragile watermarks.
Proceedings of the e-Business and Telecommunication Networks, 2006

2005
A secure and efficient authentication protocol for anonymous channel in wireless communications.
Appl. Math. Comput., 2005

2004
Image Authentication Using Hierarchical Semi-Fragile Watermarks.
Proceedings of the ICETE 2004, 2004

Image Authentication Using Relation Measures of Wavelet Coefficients.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2001
An Improvement of SPLICE/AS in WIDE against Guessing Attack.
Informatica, 2001

Two Simple Batch Verifying Multiple Digital Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

1996
Tracking moving objects during low altitude flight.
Mach. Vis. Appl., 1996


  Loading...