Showing results 1 to 20 of 89
next >
Issue Date | Title | Author(s) | Text |
- | (The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange Protocol | M. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai | - |
- | Adaptive lossless steganographic scheme with centralized difference expansion | Lee, C.C.; 蔡垂雄; Wu, H.C.; Tsai, C.S.; Chu, Y.P. | - |
- | (Applied Mathematics and Computation, 166(1):118-112)Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys | C. S. Tsai; S. C. Lin; M. S. Hwang | - |
- | A BST-based robust image hiding method | Ho, Y.A.; 蔡垂雄; Chan, Y.K.; Tsai, C.S.; Chu, Y.P.; 詹永寬 | - |
- | Canny邊緣偵測器與基因演算法為基礎之依據物件特徵斷裂物件輪廓連結器 | 王軍傑; Wang, Chun-Chieh | - |
- | A certificate-based watermarking scheme for coloured images | Wu, N.I.; 蔡垂雄; Wang, C.M.; Tsai, C.S.; Hwang, M.S.; 王宗銘 | - |
- | A CHEAT-PREVENTING VISUAL CRYPTOGRAPHY SCHEME BY REFERRING THE SPECIAL POSITION | Tsai, C.S.; 蔡垂雄; Wang, H.C.; Wu, H.C.; Wang, C.M. | - |
- | Colored Digital Watermarking Technology Based on Visual Cryptography | H. C. Wu; C. S. Tsai; S. C. Huang | - |
- | Coloured visual cryptography using fixed size meaningful share | Wu, H.C.; 蔡垂雄; Wang, H.C.; Wang, C.M.; Tsai, C.S. | - |
- | (Computer Standards & Interfaces, 24(2):073-084)Generalization of Proxy Signature Based on Elliptic Curves | M. S. Hwang; S. F. Tzeng; C. S. Tsai | - |
- | Cryptanalysis of an authenticated encryption scheme using self-certified public keys | Tsai, C.S.; 蔡垂雄; Lin, S.C.; Hwang, M.S. | - |
- | (Eurasip Journal on Applied Signal Processing, 2004(13):1965-1972)A New Repeating Color Watermarking Scheme Based on Human Visual Model | C. S. Tsai; C. C. Chang | |
- | Exploring Smart Phone Based Marketing Application for Retail Business | 葉宜璇; Yeh, Yi-Hsuan | - |
- | (Fundamenta Informaticae, 58(2):167-178)An Improvement to Image Segment Based on Human Visual System for Object-Based Coding | C. S. Tsai; C. C. Chang | - |
- | (Fundamenta Informaticae, 58(2):179-188)A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect | C. S. Tsai; C. C. Chang | - |
- | Generalization of proxy signature based on elliptic curves | Hwang, M.S.; 蔡垂雄; Tzeng, S.F.; Tsai, C.S. | - |
- | A HDWT-based reversible data hiding method | Chan, Y.K.; 蔡垂雄; Chen, W.T.; Yu, S.S.; Ho, Y.A.; Tsai, C.S.; Chu, Y.P.; 喻石生 ; 詹永寬 | - |
- | A high capacity reversible data hiding scheme with edge prediction and difference expansion | Wu, H.C.; 蔡垂雄; Lee, C.C.; Tsai, C.S.; Chu, Y.P.; Chen, H.R. | - |
- | A high quality steganographic method with pixel-value differencing and modulus function | Wang, C.M.; 蔡垂雄; Wu, N.I.; Tsai, C.S.; Hwang, M.S.; 王宗銘 | - |
- | (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement | H. C. Wu; N. I. Wu; C. S. Tsai; M. S. Hwang | - |