Chi-Kwong Chan

According to our database1, Chi-Kwong Chan authored at least 19 papers between 1998 and 2007.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
A Novel Lossy Image-Hiding Scheme Based on Block Difference.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Hardware Realization of Steganographic Techniques.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A novel image-hiding scheme based on block difference.
Pattern Recognit., 2006

A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion.
Neural Process. Lett., 2006

Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Performance Evaluation of a Steganographic Method for Digital Images Using Side Match.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Video text detection and segmentation for optical character recognition.
Multim. Syst., 2005

2004
Hiding data in images by simple LSB substitution.
Pattern Recognit., 2004

Image hiding based on block difference.
Proceedings of the 8th International Conference on Control, 2004

2003
Cryptanalysis of a modified remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2003

2002
Correlation properties of an improved summation generator with 2-bit memory.
Signal Process., 2002

Security of Lin's image watermarking system.
J. Syst. Softw., 2002

Cryptanalysis of a Timestamp-Based Password Authentication Scheme.
Comput. Secur., 2002

2001
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator.
IEEE Trans. Neural Networks, 2001

Cryptanalysis of a remote password authentication scheme.
Int. J. Comput. Math., 2001

Encryption System Based on Neutral Network.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Cryptanalysis of a remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2000

An attack on the Hwang-Chang-Hwang watermarking scheme.
IEEE Trans. Consumer Electron., 2000

1998
The CHNN nonlinear combination generator.
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, 1998


  Loading...