Chi-Shiang Chan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j18]Yuan-Yu Tsai, Yushiou Tsai, I-Ting Chi, Chi-Shiang Chan:
A Vertex-Based 3D Authentication Algorithm Based on Spatial Subdivision. Symmetry 10(10): 422 (2018) - 2016
- [j17]Yuan-Yu Tsai, Yao-Hsien Huang, Ruo-Jhu Lin, Chi-Shiang Chan:
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting. IJDCF 8(2): 48-61 (2016) - 2015
- [c17]Wen-Chuan Wu, Chi-Shiang Chan, Chih-Yang Lin, Zi-Wei Lin:
Joint SVD and QR codes for image authentication. APSIPA 2015: 1137-1140 - 2014
- [j16]Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai:
An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix. I. J. Network Security 16(4): 313-317 (2014) - [j15]Yuan-Yu Tsai, Jian-Ting Chen, Chi-Shiang Chan:
Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding. I. J. Network Security 16(5): 363-368 (2014) - [j14]Chi-Shiang Chan, Yung-Chen Chou, Yi-Hui Chen, Yuan-Yu Tsai:
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations. TIIS 8(5): 1785-1800 (2014) - [j13]Yuan-Yu Tsai, Jian-Ting Chen, Yin-Chi Kuo, Chi-Shiang Chan:
A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality. TIIS 8(9): 3286-3301 (2014) - [c16]Yi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, Wei-Lin Huang:
Tagged visual cryptography with access control. ICME Workshops 2014: 1-5 - [c15]Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. IIH-MSP 2014: 110-113 - 2013
- [c14]Wei-Liang Tai, Chi-Shiang Chan, Chien-An Chu:
Apply Run-length encoding on pixel differences to do image hiding. ICICS 2013: 1-5 - 2012
- [j12]Chi-Shiang Chan, Yuan-Yu Tsai, Chao-Liang Liu:
An Image Hiding Scheme by Linking Pixels in the Circular Way. TIIS 6(6): 1718-1734 (2012) - [c13]Chiao-Chih Huang, Yi-Hui Chen, Yuan-Yu Tsai, Chi-Shiang Chan:
An Image Hiding Method by Linking Multiple Pixels with XOR Operator. ICGEC 2012: 39-42 - 2011
- [j11]Chi-Shiang Chan:
An image authentication method by applying Hamming code on rearranged bits. Pattern Recognition Letters 32(14): 1679-1690 (2011) - [c12]Yuan-Yu Tsai, Chi-Shiang Chan:
A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding. ICGEC 2011: 172-175 - [c11]Pei-Yu Lin, Chi-Shiang Chan:
A Verifiable and Recoverable Secret Image Sharing Mechanism. ISPA 2011: 288-293 - 2010
- [j10]Pei-Yu Lin, Chi-Shiang Chan:
Invertible secret image sharing with steganography. Pattern Recognition Letters 31(13): 1887-1893 (2010) - [c10]Chi-Shiang Chan, Ching-Yun Chang:
Hiding secret in parity check bits by applying XOR Function. IEEE ICCI 2010: 835-839 - [c9]
2000 – 2009
- 2009
- [j9]Chi-Shiang Chan:
On Using LSB Matching Function for Data Hiding in Pixels. Fundam. Inform. 96(1-2): 49-59 (2009) - [j8]Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang:
Non-iterative privacy preservation for online lotteries. IET Information Security 3(4): 139-147 (2009) - [c8]Chi-Shiang Chan, Ching-Yun Chang:
An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. ICUIMC 2009: 246-250 - [c7]Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, Mingchu Li:
Reversible Steganography for VQ Indices Using the Modified State Codebook. IIH-MSP 2009: 320-323 - 2007
- [j7]Chi-Shiang Chan, Chin-Chen Chang:
An efficient image authentication method based on Hamming code. Pattern Recognition 40(2): 681-690 (2007) - [c6]Chi-Shiang Chan, Chin-Chen Chang:
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470 - 2006
- [j6]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan:
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39(6): 1155-1167 (2006) - [j5]Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng:
Removing blocking effects using an artificial neural network. Signal Processing 86(9): 2381-2387 (2006) - [c5]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan:
A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478 - 2005
- [j4]Chi-Shiang Chan, Chin-Chen Chang:
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. Fundam. Inform. 65(4): 291-305 (2005) - [j3]Chin-Chen Chang, Chi-Shiang Chan:
An Inverse Halftoning Technique Using Modified Look-Up Tables. Fundam. Inform. 68(3): 207-220 (2005) - [c4]Chi-Shiang Chan, Chin-Chen Chang:
A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. AINA 2005: 75-78 - 2003
- [j2]Chin-Chen Chang, Chi-Shiang Chan:
A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica, Lith. Acad. Sci. 14(4): 431-444 (2003) - [j1]Chin-Chen Chang, Ju Yuan Hsiao, Chi-Shiang Chan:
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7): 1583-1595 (2003) - [c3]Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao:
Lossless Image Compression Based on Two-Way Smaller Difference. AINA 2003: 821-824 - 2002
- [c2]Chin-Chen Chang, Chi-Shiang Chan, Ya-Ping Pan:
An Inverse Halftoning Technique using Genetic Algorithm. ISDB 2002: 184-189 - 2001
- [c1]Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao:
A Color Image Retrieval Method Based on Local Histogram. IEEE Pacific Rim Conference on Multimedia 2001: 831-836
Coauthor Index
last updated on 2019-02-13 21:05 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint