Browsing by Author 蔡垂雄


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 89  next >
Issue DateTitleAuthor(s)Text
-(The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange ProtocolM. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai-
-Adaptive lossless steganographic scheme with centralized difference expansionLee, C.C.; 蔡垂雄; Wu, H.C.; Tsai, C.S.; Chu, Y.P.-
-(Applied Mathematics and Computation, 166(1):118-112)Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public KeysC. S. Tsai; S. C. Lin; M. S. Hwang-
-A BST-based robust image hiding methodHo, Y.A.; 蔡垂雄; Chan, Y.K.; Tsai, C.S.; Chu, Y.P.; 詹永寬-
-Canny邊緣偵測器與基因演算法為基礎之依據物件特徵斷裂物件輪廓連結器王軍傑; Wang, Chun-Chieh-
-A certificate-based watermarking scheme for coloured imagesWu, N.I.; 蔡垂雄; Wang, C.M.; Tsai, C.S.; Hwang, M.S.; 王宗銘 -
-A CHEAT-PREVENTING VISUAL CRYPTOGRAPHY SCHEME BY REFERRING THE SPECIAL POSITIONTsai, C.S.; 蔡垂雄; Wang, H.C.; Wu, H.C.; Wang, C.M.-
-Colored Digital Watermarking Technology Based on Visual CryptographyH. C. Wu; C. S. Tsai; S. C. Huang-
-Coloured visual cryptography using fixed size meaningful shareWu, H.C.; 蔡垂雄; Wang, H.C.; Wang, C.M.; Tsai, C.S.-
-(Computer Standards & Interfaces, 24(2):073-084)Generalization of Proxy Signature Based on Elliptic CurvesM. S. Hwang; S. F. Tzeng; C. S. Tsai-
-Cryptanalysis of an authenticated encryption scheme using self-certified public keysTsai, C.S.; 蔡垂雄; Lin, S.C.; Hwang, M.S.-
-(Eurasip Journal on Applied Signal Processing, 2004(13):1965-1972)A New Repeating Color Watermarking Scheme Based on Human Visual ModelC. S. Tsai; C. C. Chang
-Exploring Smart Phone Based Marketing Application for Retail Business葉宜璇; Yeh, Yi-Hsuan-
-(Fundamenta Informaticae, 58(2):167-178)An Improvement to Image Segment Based on Human Visual System for Object-Based CodingC. S. Tsai; C. C. Chang-
-(Fundamenta Informaticae, 58(2):179-188)A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking EffectC. S. Tsai; C. C. Chang-
-Generalization of proxy signature based on elliptic curvesHwang, M.S.; 蔡垂雄; Tzeng, S.F.; Tsai, C.S.-
-A HDWT-based reversible data hiding methodChan, Y.K.; 蔡垂雄; Chen, W.T.; Yu, S.S.; Ho, Y.A.; Tsai, C.S.; Chu, Y.P.; 喻石生 ; 詹永寬-
-A high capacity reversible data hiding scheme with edge prediction and difference expansionWu, H.C.; 蔡垂雄; Lee, C.C.; Tsai, C.S.; Chu, Y.P.; Chen, H.R.-
-A high quality steganographic method with pixel-value differencing and modulus functionWang, C.M.; 蔡垂雄; Wu, N.I.; Tsai, C.S.; Hwang, M.S.; 王宗銘 -
-(IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB ReplacementH. C. Wu; N. I. Wu; C. S. Tsai; M. S. Hwang-