Search:

Start a new search
Add/Remove Filters (1 filters currently applied)

Results 1-50 of 67 (Search time: 0.056 seconds).
 |  Relevance

 

Item hits:
Issue DateTitleAuthor(s)Text
1-高效能調色盤影像認証技術之研究蔡垂雄-
2-植基於支援向量迴歸之影像竄改偵測與還原技術之研究蔡垂雄-
3-植基於VQ壓縮法的強韌性影像隱藏法蔡垂雄-
4-新型低失真多媒體隱藏術之研究蔡垂雄-
5-應用可逆式資訊隱藏技術於數位版權管理之影像認證系統蔡垂雄-
6-(The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange ProtocolM. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai-
7-像素不擴張視覺機密分享技術之研究陳鴻豪; Chen, Hong-Hao-
8-(Journal of Systems and Software, 81(1):150-158)A high quality steganographic method with pixel-value differencing and modulus functionChung-Ming Wang; Nan-I Wu; Chwei-Shyong Tsai; Min-Shiang Hwang-
9-Reversible data hiding based on block scaning and adjacent pixel difference王健宇; Chien-Yu Wang
10-A Value-added Mobile System Design Provided by Construction Company for Community Residents王恩捷; En-Chieh Wang
11-(Journal of Systems and Software, 76(3):327-339)A New Multi-Secret Images Sharing Scheme Using Largrange's InterpolationJ. B. Feng; H. C. Wu; C. S. Tsai; Y. P. Chu-
12-(Fundamenta Informaticae, 58(2):167-178)An Improvement to Image Segment Based on Human Visual System for Object-Based CodingC. S. Tsai; C. C. Chang-
13-(International Journal of Information & Security, 15(2):199-210)A License Plate Recognition System in E-GovernmentH. C. Wu; C. S. Tsai; C. H. Lai-
14-(Informatica, 28:181-188)A Pattern Mapping Based Digital Image WatermarkingC. S. Tsai; C. C. Chang-
15-延伸像素排序及預測誤差估算的高藏量可逆式資訊隱藏技術之研究曾柏勳; Po-Hsun Tseng
16-以監督式學習及資料重整技術於預測慢性腎臟病之研究黃吉立; Chi-Li Huang
17-植基於直方圖位移和Paillier密碼系統的可分離及可逆式之資訊隱藏方法張永松; Yung-Sung Zhang
18-應用特徵圖可視化和卷積神經網路於花粉粒分類之研究呂俊穎; Chun-Ying Lu
19-利用集成學習分析牙周病屬性與預測類風濕性關節炎療效之相關性研究黃嘉嘉; Chia-Chia Huang
20-(Journal of Systems and Software, 76(3):327-339)An Efficient Authentication Scheme between MANET and WLAN Based on Mobile Ipv6C. W. Chen; M. C. Chuang; C. S. Tsai
21-(IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB ReplacementH. C. Wu; N. I. Wu; C. S. Tsai; M. S. Hwang-
22-A Study of the Adjustable Reversible Data Hiding Scheme Based on Two-Dimensional Prediction-Error-Histogram Modification陳柏宏; Bo-Hung Chen
23-(Computer Standards & Interfaces, 24(2):073-084)Generalization of Proxy Signature Based on Elliptic CurvesM. S. Hwang; S. F. Tzeng; C. S. Tsai-
24-(Eurasip Journal on Applied Signal Processing, 2004(13):1965-1972)A New Repeating Color Watermarking Scheme Based on Human Visual ModelC. S. Tsai; C. C. Chang
25-(Lecture Notes in Computer Science, 3982:406-415 )A Semi-fragile Watermarking Scheme Based on SVD and VQ TechniquesH. C. Wu; C. P. Yeh; C. S. Tsai-
26-(International Journal of Network Security, 02(3):161-170)Reversible Watermarking: Current Status and Key IssuesJ. B. Feng; I. C. Lin; C. S. Tsai; Y. P.Chu
27-(Applied Mathematics and Computation, 166(1):118-112)Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public KeysC. S. Tsai; S. C. Lin; M. S. Hwang-
28-一種強韌的灰階浮水印嵌入及取回技術張真誠; 陳同孝; 蔡垂雄; 陳銘煌; 謝俊宏-
29-頸動脈超音波頻譜影像之自動化切割與辨識研究陳巧旻; Chen, Chiao-Min-
30-一種用來分享彩色機密影像的技術張真誠; 陳同孝; 蔡垂雄-
31-(The Imaging Science Journal, 54(3):164-177)Multiple Images Sharing Based on Color Visual CryptographyH. C. Wu; H. C. Wang; C. S.Tsai-
32-具備自我復原的影像驗證技術之研究黃宗緯; Huang, Chung-Wei-
33-應用區域相鄰特性的影像切割技術之研究汪純妤; Wang, Chun-Yu-
34-基於區塊加密之非擴張視覺密碼與分享影像驗證研究黃宜瑾; Huang, Yi-Jing
35-新型非擴張式之高品質視覺機密分享技術研究蕭霓珊; Hsiao, Ni-Shan-
36-具可調視覺品質的新型門檻式視覺機密分享機制之研究鄭子豪; Cheng, Tzu-hao-
37-植基於預測法及可適性之運用相鄰像素及差值擴張於可逆式資訊隱藏技術研究朱雅甜; Chu, Ya-Tien-
38-Canny邊緣偵測器與基因演算法為基礎之依據物件特徵斷裂物件輪廓連結器王軍傑; Wang, Chun-Chieh-
39-(Fundamenta Informaticae, 58(2):179-188)A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking EffectC. S. Tsai; C. C. Chang-
40-A BST-based robust image hiding methodHo, Y.A.; 蔡垂雄; Chan, Y.K.; Tsai, C.S.; Chu, Y.P.; 詹永寬-
41-A high capacity reversible data hiding scheme with edge prediction and difference expansionWu, H.C.; 蔡垂雄; Lee, C.C.; Tsai, C.S.; Chu, Y.P.; Chen, H.R.-
42-Using adaptive resonance theory and data-mining techniques for materials recommendation based on the e-library environmentTsai, C.S.; 蔡垂雄; Chen, M.Y.-
43-A CHEAT-PREVENTING VISUAL CRYPTOGRAPHY SCHEME BY REFERRING THE SPECIAL POSITIONTsai, C.S.; 蔡垂雄; Wang, H.C.; Wu, H.C.; Wang, C.M.-
44-Generalization of proxy signature based on elliptic curvesHwang, M.S.; 蔡垂雄; Tzeng, S.F.; Tsai, C.S.-
45-A new multi-secret images sharing scheme using Largrange's interpolationFeng, J.B.; 蔡垂雄; Wu, H.C.; Tsai, C.S.; Chu, Y.P.-
46-A Tabular Steganography Scheme for Graphical Password AuthenticationLin, T.H.; 蔡垂雄; Lee, C.C.; Tsai, C.S.; Guo, S.D.-
47-結合類神經網路預測與投資策略於台灣50指數股票型基金之操作陳全溢; Chuan-Yih Chen
48-(Informatica, 14(3):393-402)Improved Non-repudiable Threshold Proxy Signature Scheme with Known SignersC. S. Tsai; S. F. Tzeng; M. S. Hwang
49-(Journal of Systems and Software, 64(2):163-170)Sharing Multiple Secrets in Digital ImagesC. S. Tsai; C. C. Chang; T. S. Chen-
50-Multiple image sharing based on colour visual cryptographyWu, H.C.; 蔡垂雄; Wang, H.C.; Tsai, C.S.-
Results 1-50 of 67 (Search time: 0.056 seconds).