Chi-Shiang Chan

Orcid: 0000-0001-7324-8320

According to our database1, Chi-Shiang Chan authored at least 39 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images.
IEEE Access, 2022

2021
Automatic Brain Cancer Segmentation on PET Image.
Int. J. Pattern Recognit. Artif. Intell., 2021

2018
A Vertex-Based 3D Authentication Algorithm Based on Spatial Subdivision.
Symmetry, 2018

2016
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting.
Int. J. Digit. Crime Forensics, 2016

2015
Embedding information on search-order codes of VQ indices by rearranging the indicators.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Joint SVD and QR codes for image authentication.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality.
KSII Trans. Internet Inf. Syst., 2014

Role-Balance Based Multi-Secret Images Sharing using Boolean Operations.
KSII Trans. Internet Inf. Syst., 2014

Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding.
Int. J. Netw. Secur., 2014

An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix.
Int. J. Netw. Secur., 2014

An Image Hiding Method by Applying Tree Structure on Linking Pixels.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Tagged visual cryptography with access control.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
Apply Run-length encoding on pixel differences to do image hiding.
Proceedings of the 9th International Conference on Information, 2013

2012
A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor.
J. Inf. Hiding Multim. Signal Process., 2012

An Image Hiding Scheme by Linking Pixels in the Circular Way.
KSII Trans. Internet Inf. Syst., 2012

An Image Hiding Method by Linking Multiple Pixels with XOR Operator.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
An image authentication method by applying Hamming code on rearranged bits.
Pattern Recognit. Lett., 2011

A Verifiable and Recoverable Secret Image Sharing Mechanism.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Invertible secret image sharing with steganography.
Pattern Recognit. Lett., 2010

Hiding data in parity check bit.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Hiding secret in parity check bits by applying XOR Function.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
Non-iterative privacy preservation for online lotteries.
IET Inf. Secur., 2009

On Using LSB Matching Function for Data Hiding in Pixels.
Fundam. Informaticae, 2009

Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2007
An efficient image authentication method based on Hamming code.
Pattern Recognit., 2007

A Color Image Hiding Scheme Based on SMVQ and Modulo Operator.
Proceedings of the Advances in Multimedia Modeling, 2007

2006
Removing blocking effects using an artificial neural network.
Signal Process., 2006

Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels.
Pattern Recognit., 2006

A Secret Image Sharing Scheme Based on Vector Quantization Mechanism.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
An Inverse Halftoning Technique Using Modified Look-Up Tables.
Fundam. Informaticae, 2005

An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy.
Fundam. Informaticae, 2005

A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2003
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy.
Pattern Recognit., 2003

A Watermarking Scheme Based on Principal Component Analysis Technique.
Informatica, 2003

Lossless Image Compression Based on Two-Way Smaller Difference.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
An Inverse Halftoning Technique using Genetic Algorithm.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

2001
A Color Image Retrieval Method Based on Local Histogram.
Proceedings of the Advances in Multimedia Information Processing, 2001


  Loading...