Chi-Yao Weng

Orcid: 0000-0002-0501-8475

According to our database1, Chi-Yao Weng authored at least 63 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images.
Multim. Tools Appl., November, 2023

Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm.
Entropy, February, 2023

Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping.
Entropy, 2023

2022
High-fidelity reversible data hiding based on PVO and median preserving.
J. Supercomput., 2022

High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption.
Soft Comput., 2022

An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022

Separable reversible data hiding in encrypted images based on Paillier cryptosystem.
Multim. Tools Appl., 2022

TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy.
J. Inf. Secur. Appl., 2022

2021
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021

2020
DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images.
Peer-to-Peer Netw. Appl., 2020

Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images.
Proceedings of the ICFET 2020, 2020

Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process.
Proceedings of the ICFET 2020, 2020

2019
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding.
Soft Comput., 2019

A Flexible Framework for Malicious Open XML Document Detection based on APT Attacks.
Proceedings of the IEEE INFOCOM 2019, 2019

Secure Protocol for Identity-based Provable Data Possession in Cloud Storage.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
A shareable keyword search over encrypted data in cloud computing.
J. Supercomput., 2018

A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Netw. Appl., 2018

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

Secure File Transfer Protocol for Named Data Networks Supporting Homomorphic Computations.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

2017
High-fidelity lossless data hiding based on predictors selection.
Multim. Tools Appl., 2017

An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
Multim. Tools Appl., 2017

VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy.
J. Inf. Hiding Multim. Signal Process., 2017

DCT-Based Compressed Image with Reversibility Using Modified Quantization.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing.
Proceedings of the Genetic and Evolutionary Computing, 2017

2016
Steganographic access control in data hiding using run-length encoding and modulo-operations.
Secur. Commun. Networks, 2016

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Syst., 2016

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Syst., 2016

An efficient method for polyphonic audio-to-score alignment using onset detection and constant Q transform.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
A dynamic identity-based user authentication scheme for remote login systems.
Secur. Commun. Networks, 2015

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Syst., 2015

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Syst., 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions.
Proceedings of the Information and Communication Technology, 2015

An Adaptive Kelly Betting Strategy for Finite Repeated Games.
Proceedings of the Genetic and Evolutionary Computing, 2015

Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A Security System Based on Door Movement Detecting.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
Visible watermarking images in high quality of data hiding.
J. Supercomput., 2013

Data embedding in image-media using weight-function on modulo operations.
ACM Trans. Embed. Comput. Syst., 2013

An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013

Active One-Time Password Mechanism for User Authentication.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images.
KSII Trans. Internet Inf. Syst., 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
A data hiding scheme using the varieties of pixel-value differencing in multimedia images.
J. Syst. Softw., 2011

Anti-Forensics with Steganographic Data Embedding in Digital Images.
IEEE J. Sel. Areas Commun., 2011

2010
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Vis. Commun. Image Represent., 2010

Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
J. Syst. Softw., 2010

Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations.
Fundam. Informaticae, 2010

2009
Codebook-linked Watermarking Scheme for Digital Images.
Fundam. Informaticae, 2009

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Robustness-set in watermarking embedding systems using codebook classifications.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Trans. Inf. Forensics Secur., 2008

Secret Sharing Systems with Authentication-Based Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Histogram-based undetectable fidelity image in steganography as MSB controller.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2007
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007


  Loading...