Chi-Yao Weng

According to our database1, Chi-Yao Weng authored at least 43 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A shareable keyword search over encrypted data in cloud computing.
The Journal of Supercomputing, 2018

A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Networking and Applications, 2018

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

2017
High-fidelity lossless data hiding based on predictors selection.
Multimedia Tools Appl., 2017

An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
Multimedia Tools Appl., 2017

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing.
Proceedings of the Genetic and Evolutionary Computing, 2017

2016
Steganographic access control in data hiding using run-length encoding and modulo-operations.
Security and Communication Networks, 2016

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Systems, 2016

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Systems, 2016

An efficient method for polyphonic audio-to-score alignment using onset detection and constant Q transform.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
A dynamic identity-based user authentication scheme for remote login systems.
Security and Communication Networks, 2015

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Systems, 2015

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Systems, 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions.
Proceedings of the Information and Communication Technology, 2015

An Adaptive Kelly Betting Strategy for Finite Repeated Games.
Proceedings of the Genetic and Evolutionary Computing, 2015

Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Systems, 2014

A Security System Based on Door Movement Detecting.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
Visible watermarking images in high quality of data hiding.
The Journal of Supercomputing, 2013

Data embedding in image-media using weight-function on modulo operations.
ACM Trans. Embedded Comput. Syst., 2013

An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
TIIS, 2013

Active One-Time Password Mechanism for User Authentication.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images.
TIIS, 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
A data hiding scheme using the varieties of pixel-value differencing in multimedia images.
Journal of Systems and Software, 2011

Anti-Forensics with Steganographic Data Embedding in Digital Images.
IEEE Journal on Selected Areas in Communications, 2011

2010
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Visual Communication and Image Representation, 2010

Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
Journal of Systems and Software, 2010

Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations.
Fundam. Inform., 2010

2009
Codebook-linked Watermarking Scheme for Digital Images.
Fundam. Inform., 2009

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Robustness-set in watermarking embedding systems using codebook classifications.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Trans. Information Forensics and Security, 2008

Secret Sharing Systems with Authentication-Based Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Histogram-based undetectable fidelity image in steganography as MSB controller.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2007
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007


  Loading...