Browsing by Author C. S. Tsai

Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 24  next >
Issue DateTitleAuthor(s)Text
-(The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange ProtocolM. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai-
-(Applied Mathematics and Computation, 166(1):118-112)Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public KeysC. S. Tsai; S. C. Lin; M. S. Hwang-
-Colored Digital Watermarking Technology Based on Visual CryptographyH. C. Wu; C. S. Tsai; S. C. Huang-
-(Computer Standards & Interfaces, 24(2):073-084)Generalization of Proxy Signature Based on Elliptic CurvesM. S. Hwang; S. F. Tzeng; C. S. Tsai-
-(Eurasip Journal on Applied Signal Processing, 2004(13):1965-1972)A New Repeating Color Watermarking Scheme Based on Human Visual ModelC. S. Tsai; C. C. Chang
-(Fundamenta Informaticae, 58(2):167-178)An Improvement to Image Segment Based on Human Visual System for Object-Based CodingC. S. Tsai; C. C. Chang-
-(Fundamenta Informaticae, 58(2):179-188)A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking EffectC. S. Tsai; C. C. Chang-
-(IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB ReplacementH. C. Wu; N. I. Wu; C. S. Tsai; M. S. Hwang-
-(IEEE International Conference on Information Technology: Research and Education (ITRE 2003), p282-p285)A New Secure Generalization of Threshold Signature SchemeM. S. Hwang; S. F. Tzeng; C. S. Tsai
-(The Imaging Science Journal, 56(5):279-290)New Data Hiding Scheme Using Pixel Swapping for Halftone ImagesY. F. Chang; J. B. Feng; C. S. Tsai; Y. P. Chu; H. C. Syu-
-(Informatica, 14(3):393-402)Improved Non-repudiable Threshold Proxy Signature Scheme with Known SignersC. S. Tsai; S. F. Tzeng; M. S. Hwang
-(Informatica, 28:181-188)A Pattern Mapping Based Digital Image WatermarkingC. S. Tsai; C. C. Chang-
-(International Journal of Information & Security, 15(2):199-210)A License Plate Recognition System in E-GovernmentH. C. Wu; C. S. Tsai; C. H. Lai-
-(International Journal of Network Security, 02(3):161-170)Reversible Watermarking: Current Status and Key IssuesJ. B. Feng; I. C. Lin; C. S. Tsai; Y. P.Chu
-(International Journal of Network Security,02(3):161-170)Reversible Watermarking: Current Status and Key IssuesJ. B. Feng; I. C. Lin; C. S. Tsai; Y. P. Chu
-(Journal of Systems and Software, 64(2):163-170)Sharing Multiple Secrets in Digital ImagesC. S. Tsai; C. C. Chang; T. S. Chen-
-(Journal of Systems and Software, 76(3):327-339)A New Multi-Secret Images Sharing Scheme Using Largrange's InterpolationJ. B. Feng; H. C. Wu; C. S. Tsai; Y. P. Chu-
-(Journal of Systems and Software, 76(3):327-339)An Efficient Authentication Scheme between MANET and WLAN Based on Mobile Ipv6C. W. Chen; M. C. Chuang; C. S. Tsai
-(Lecture Notes in Computer Science, 3982:406-415 )A Semi-fragile Watermarking Scheme Based on SVD and VQ TechniquesH. C. Wu; C. P. Yeh; C. S. Tsai-
-Optic Disk Locating of the Retinal Fundus Images Using Simple Statistic ParametersY. P. Chu; Y. F. Chen; S. F. Yang-Mao; Y. K. Chan; C. S. Tsai; W. C. Chiang-