Cheng-Ta Huang

Orcid: 0000-0003-0397-8330

According to our database1, Cheng-Ta Huang authored at least 41 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images.
Multim. Tools Appl., November, 2023

Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping.
Entropy, 2023

2022
High-fidelity reversible data hiding based on PVO and median preserving.
J. Supercomput., 2022

Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube.
IEEE Access, 2022

High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
Cloud evidence tracks of storage service linking with iOS systems.
J. Supercomput., 2021

2020
A scheme of flexible and reversible information-hiding in SMVQ mechanism.
Peer-to-Peer Netw. Appl., 2020

Robust and blind image watermarking in DCT domain using inter-block coefficient correlation.
Inf. Sci., 2020

Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images.
Proceedings of the ICFET 2020, 2020

2019
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks.
Multim. Tools Appl., 2019

Dynamic embedding strategy of VQ-based information hiding approach.
J. Vis. Commun. Image Represent., 2019

Secure Protocol for Identity-based Provable Data Possession in Cloud Storage.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Raw reversibility of information hiding on the basis of VQ systems.
J. Supercomput., 2018

VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements.
J. Supercomput., 2018

File changes with security proof stored in cloud service systems.
Pers. Ubiquitous Comput., 2018

Mobile Forensics for Cloud Storage Service on iOS Systems.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Mutual authentications to parties with QR-code applications in mobile systems.
Int. J. Inf. Sec., 2017

VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

DCT-Based Compressed Image with Reversibility Using Modified Quantization.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences.
Multim. Tools Appl., 2016

A benchmark for comparison of dental radiography analysis algorithms.
Medical Image Anal., 2016

Reversible SMVQ Image Hiding Using Adaptive Search Order Coding.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

2015
Evaluation and Comparison of Anatomical Landmark Detection Methods for Cephalometric X-Ray Images: A Grand Challenge.
IEEE Trans. Medical Imaging, 2015

Data hiding of high compression ratio in VQ indices with neighboring correlations.
Multim. Tools Appl., 2015

2014
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems.
Peer-to-Peer Netw. Appl., 2014

Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
J. Supercomput., 2013

A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization.
J. Inf. Hiding Multim. Signal Process., 2013

Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping.
Inf. Sci., 2013

SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters.
Int. J. Grid High Perform. Comput., 2013

Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Memory Forensics for Key Evidence Investigations in Case Illustrations.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Employing LSB and VQ for Undetectable Secret Data Hiding.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

iPhone social networking for evidence investigations using iTunes forensics.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

An Efficient Lossless Data Hiding Scheme on VQ Index Coding.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
VQ Applications in Steganographic Data Hiding Upon Multimedia Images.
IEEE Syst. J., 2011

Reversible steganography based on side match and hit pattern for VQ-compressed images.
Inf. Sci., 2011

2010
Reversible data hiding using neighboring block in VQ-compressed images.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Non-embedded Image Protection Approaches Based on Vector Quantization.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008


  Loading...