Chin-Chen Chang

According to our database1, Chin-Chen Chang authored at least 862 papers between 1980 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019

High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement.
J. Visual Communication and Image Representation, 2019

Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019

2018
Security Issues in Ultralightweight RFID Authentication Protocols.
Wireless Personal Communications, 2018

Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wireless Communications and Mobile Computing, 2018

Efficient Information Hiding Based on Theory of Numbers.
Symmetry, 2018

Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018

An Efficient Object Detection Algorithm Based on Compressed Networks.
Symmetry, 2018

An Effective Authentication Scheme Using DCT for Mobile Devices.
Symmetry, 2018

Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Processing, 2018

Perceptual hashing for color images based on hybrid extraction of structural features.
Signal Processing, 2018

High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift.
Security and Communication Networks, 2018

A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization.
Security and Communication Networks, 2018

Efficient access control system based on aesthetic QR code.
Personal and Ubiquitous Computing, 2018

Untraceable biometric-based three-party authenticated key exchange for dynamic systems.
Peer-to-Peer Networking and Applications, 2018

Reversible data hiding for VQ indices using hierarchical state codebook mapping.
Multimedia Tools Appl., 2018

Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems".
Multimedia Tools Appl., 2018

Effective reversible image steganography based on rhombus prediction and local complexity.
Multimedia Tools Appl., 2018

A biometric-based authenticated key agreement scheme for session initiation protocol in ip-based multimedia networks.
Multimedia Tools Appl., 2018

A turtle shell-based visual secret sharing scheme with reversibility and authentication.
Multimedia Tools Appl., 2018

A selective encryption scheme of CABAC based on video context in high efficiency video coding.
Multimedia Tools Appl., 2018

Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method.
Multimedia Tools Appl., 2018

Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multimedia Tools Appl., 2018

Sudoku-based secret sharing approach with cheater prevention using QR code.
Multimedia Tools Appl., 2018

A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator.
Multimedia Tools Appl., 2018

High-Capacity Reversible Data Hiding Method for JPEG Images.
JSW, 2018

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction.
TIIS, 2018

Generalized PVO-K Embedding Technique for Reversible Data Hiding.
I. J. Network Security, 2018

A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
I. J. Network Security, 2018

An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes.
I. J. Network Security, 2018

Framework for practical and receipt-free remote voting.
IET Information Security, 2018

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE MultiMedia, 2018

A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning.
IEEE MultiMedia, 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Communications Letters, 2018

Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients.
Displays, 2018

An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018

An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining.
Comput. J., 2018

Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier.
IEEE Access, 2018

Parameter Selection for Denoising Algorithms Using NR-IQA with CNN.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Services Computing, 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Processing, 2017

Notes on "Secure authentication scheme for IoT and cloud servers".
Pervasive and Mobile Computing, 2017

Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multimedia Tools Appl., 2017

A semantic compression scheme for digital images based on vector quantization and data hiding.
Multimedia Tools Appl., 2017

Data hiding based on extended turtle shell matrix construction method.
Multimedia Tools Appl., 2017

A one-card-pass user authentication scheme using image morphing.
Multimedia Tools Appl., 2017

Secure multi-group data hiding based on gemd map.
Multimedia Tools Appl., 2017

A difference expansion based reversible information hiding scheme with high stego image visual quality.
Multimedia Tools Appl., 2017

Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
Mobile Information Systems, 2017

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches.
J. Comput. Sci. Technol., 2017

An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification.
TIIS, 2017

A unified score propagation model for web spam demotion algorithm.
Inf. Retr. Journal, 2017

A Novel Micropayment Scheme with Variable Denomination.
I. J. Network Security, 2017

Turbo Unequal Error Protection Codes with Multiple Protection Levels.
I. J. Network Security, 2017

A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
I. J. Network Security, 2017

Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization.
I. J. Network Security, 2017

An Efficient and Secure Smart Card Based Password Authentication Scheme.
I. J. Network Security, 2017

Secure CAS-based authentication scheme for mobile pay-TV systems.
Int. J. Communication Systems, 2017

Smart card-based password authenticated key agreement protocol using chaotic maps.
Int. J. Communication Systems, 2017

Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE MultiMedia, 2017

Feature bundling in decision tree algorithm.
Intell. Data Anal., 2017

Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Communications Letters, 2017

A high payload steganographic algorithm based on edge detection.
Displays, 2017

Reversible data hiding in encrypted images using reformed JPEG compression.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

A reversible data hiding scheme for image interpolation based on reference matrix.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

Extended Exploiting-Modification-Direction Data Hiding with High Capacity.
Proceedings of the International Conference on Video and Image Processing, 2017

VQ Compression Enhancer with Huffman Coding.
Proceedings of the Genetic and Evolutionary Computing, 2017

Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation.
Wireless Personal Communications, 2016

A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wireless Personal Communications, 2016

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2016

Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.
IEEE Trans. Cybernetics, 2016

High capacity reversible data hiding scheme for encrypted images.
Sig. Proc.: Image Comm., 2016

A secure authentication scheme with provable correctness for pay-TV systems.
Security and Communication Networks, 2016

Progressive secret image sharing scheme using meaningful shadows.
Security and Communication Networks, 2016

Robust off-line e-cash scheme with recoverability and anonymity revocation.
Security and Communication Networks, 2016

Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Security and Communication Networks, 2016

A highly efficient and secure electronic cash system based on secure sharing in cloud environment.
Security and Communication Networks, 2016

High capacity data hiding for binary image based on block classification.
Multimedia Tools Appl., 2016

Reversible data hiding scheme based on histogram shifting of n-bit planes.
Multimedia Tools Appl., 2016

Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images.
Multimedia Tools Appl., 2016

A new distortion-free data embedding scheme for high-dynamic range images.
Multimedia Tools Appl., 2016

Very efficient variable-length codes for the lossless compression of VQ indices.
Multimedia Tools Appl., 2016

An aesthetic QR code solution based on error correction mechanism.
Journal of Systems and Software, 2016

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electrical and Computer Engineering, 2016

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images.
TIIS, 2016

A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization.
TIIS, 2016

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
TIIS, 2016

A magic cube based information hiding scheme of large payload.
J. Inf. Sec. Appl., 2016

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
I. J. Network Security, 2016

Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
I. J. Network Security, 2016

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
I. J. Network Security, 2016

Security Analysis on Secure Untraceable Off-line Electronic Cash System.
I. J. Network Security, 2016

Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
I. J. Network Security, 2016

An Integratable Verifiable Secret Sharing Mechanism.
I. J. Network Security, 2016

A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
I. J. Network Security, 2016

Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability.
I. J. Network Security, 2016

A Strong RSA-based and Certificateless-based Signature Scheme.
I. J. Network Security, 2016

An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards.
I. J. Network Security, 2016

Efficient Pixel Prediction Algorithm for Reversible Data Hiding.
I. J. Network Security, 2016

A High Payload Steganographic Scheme for Compressed Images with Hamming Code.
I. J. Network Security, 2016

A practical lottery using oblivious transfer.
Int. J. Communication Systems, 2016

A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards.
Int. J. Communication Systems, 2016

A novel data-hiding and compression scheme based on block classification of SMVQ indices.
Digital Signal Processing, 2016

An improved least-significant-bit substitution method using the modulo three strategy.
Displays, 2016

A New Card Authentication Scheme Based on Image Watermarking and Encryption.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Reversible data hiding exploiting high-correlation regulation for high-quality images.
Security and Communication Networks, 2015

Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Security and Communication Networks, 2015

A dependable storage service system in cloud environment.
Security and Communication Networks, 2015

A provably secure smart card-based authenticated group key exchange protocol.
Security and Communication Networks, 2015

The credit card visual authentication scheme based on GF(28) field.
Multimedia Tools Appl., 2015

An adaptive reversible steganographic scheme based on the just noticeable distortion.
Multimedia Tools Appl., 2015

Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
Multimedia Tools Appl., 2015

An image-based key agreement protocol using the morphing technique.
Multimedia Tools Appl., 2015

A grouped-scalable secret image sharing scheme.
Multimedia Tools Appl., 2015

Scanned binary image watermarking based on additive model and sampling.
Multimedia Tools Appl., 2015

A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
Mobile Information Systems, 2015

A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm.
J. Visual Communication and Image Representation, 2015

AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Visual Communication and Image Representation, 2015

Quadri-directional searching algorithm for secret image sharing using meaningful shadows.
J. Visual Communication and Image Representation, 2015

Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
TIIS, 2015

Reversible data hiding with oriented and minimized distortions using cascading trellis coding.
Inf. Sci., 2015

A reversible compression code hiding using SOC and SMVQ indices.
Inf. Sci., 2015

A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
I. J. Network Security, 2015

Group Authentication and Group Key Distribution for Ad Hoc Networks.
I. J. Network Security, 2015

A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties.
I. J. Network Security, 2015

Ciphertext-Auditable Identity-Based Encryption.
I. J. Network Security, 2015

Adjustment Hiding Method Based on Exploiting Modification Direction.
I. J. Network Security, 2015

A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET.
I. J. Network Security, 2015

A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
I. J. Network Security, 2015

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
I. J. Network Security, 2015

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Communication Systems, 2015

Second-order steganographic method based on adaptive reference matrix.
IET Image Processing, 2015

Multi-round dynamic swap optimisation for table-based steganography.
IET Image Processing, 2015

Novel and practical scheme based on secret sharing for laptop data protection.
IET Information Security, 2015

Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digital Signal Processing, 2015

A reversible data hiding scheme based on the Sudoku technique.
Displays, 2015

A Proxy User Authentication Protocol Using Source-Based Image Morphing.
Comput. J., 2015

Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Reversible data hiding for VQ indices using XOR operator and SOC codes.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Secure Electronic Coupons.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A New Ultralightweight RFID Protocol for Low-Cost Tags: R 2 AP.
Wireless Personal Communications, 2014

A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting.
IEEE Trans. Image Processing, 2014

A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing.
Sig. Proc.: Image Comm., 2014

Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding.
Smart CR, 2014

Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.
Signal Processing, 2014

Simulatable and secure certificate-based threshold signature without pairings.
Security and Communication Networks, 2014

Verifiable secret sharing based on the Chinese remainder theorem.
Security and Communication Networks, 2014

High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting.
Multimedia Tools Appl., 2014

A DNA-based data hiding technique with low modification rates.
Multimedia Tools Appl., 2014

A novel (n, t, n) secret image sharing scheme without a trusted third party.
Multimedia Tools Appl., 2014

Reversible data embedding for indices based on histogram analysis.
J. Visual Communication and Image Representation, 2014

A high capacity data hiding scheme for binary images based on block patterns.
Journal of Systems and Software, 2014

Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.
TIIS, 2014

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images.
TIIS, 2014

A Fast and Secure Scheme for Data Outsourcing in the Cloud.
TIIS, 2014

Image Watermarking Scheme Based on Scale-Invariant Feature Transform.
TIIS, 2014

Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees.
TIIS, 2014

A Reversible Data Hiding Scheme for SMVQ Indices.
Informatica, Lith. Acad. Sci., 2014

A Simple Password Authentication Scheme Based on Geometric Hashing Function.
I. J. Network Security, 2014

An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation.
I. J. Network Security, 2014

A Reversible Steganography Suitable for Embedding Small Amounts of Data.
I. J. Network Security, 2014

An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
I. J. Network Security, 2014

Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System.
I. J. Network Security, 2014

Generalized Secret Sharing with Linear Hierarchical Secrets.
I. J. Network Security, 2014

Generalized Secret Sharing with Linear Hierarchical Secrets.
I. J. Network Security, 2014

Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity.
I. J. Network Security, 2014

An authenticated group key distribution mechanism using theory of numbers.
Int. J. Communication Systems, 2014

An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
Int. J. Communication Systems, 2014

An authentication and key agreement protocol for satellite communications.
Int. J. Communication Systems, 2014

The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
IJAHUC, 2014

A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy.
Fundam. Inform., 2014

A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment.
Comput. J., 2014

Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Virtual Primary Key for Reversible Watermarking Textual Relational Databases.
Proceedings of the Intelligent Systems and Applications, 2014

Applying Histogram Modification to Embed Secret Message in AMBTC.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication.
Wireless Personal Communications, 2013

A Novel Electronic English Auction System With a Secure On-Shelf Mechanism.
IEEE Trans. Information Forensics and Security, 2013

An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism.
IEEE Trans. Circuits Syst. Video Techn., 2013

Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism.
Signal Processing, 2013

Adaptive self-recovery for tampered images based on VQ indexing and inpainting.
Signal Processing, 2013

Analyzing and removing SureSign watermark.
Signal Processing, 2013

Authenticated RFID security mechanism based on chaotic maps.
Security and Communication Networks, 2013

A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Security and Communication Networks, 2013

Lossless Information Hiding in the VQ Index Table.
JSW, 2013

A high-performance reversible data-hiding scheme for LZW codes.
Journal of Systems and Software, 2013

A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies.
Journal of Systems and Software, 2013

An Efficient Smart Card Based Authentication Scheme Using Image Encryption.
J. Inf. Sci. Eng., 2013

Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
Image Vision Comput., 2013

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability.
TIIS, 2013

A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy.
TIIS, 2013

An Image Encryption Scheme Based on Concatenated Torus Automorphisms.
TIIS, 2013

Provably secure three party encrypted key exchange scheme with explicit authentication.
Inf. Sci., 2013

An Efficient Oblivious Transfer Protocol Using Residue Number System.
I. J. Network Security, 2013

Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
I. J. Network Security, 2013

An Anonymous Multi-Receiver Encryption Based on RSA.
I. J. Network Security, 2013

A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
I. J. Network Security, 2013

A Smart Card-based Authentication Scheme Using User Identify Cryptography.
I. J. Network Security, 2013

A fault-tolerant group key agreement protocol exploiting dynamic setting.
Int. J. Communication Systems, 2013

Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digital Signal Processing, 2013

Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725].
Digital Signal Processing, 2013

Robust image hashing using non-uniform sampling in discrete Fourier domain.
Digital Signal Processing, 2013

A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A high payload data embedding scheme using dual stego-images with reversibility.
Proceedings of the 9th International Conference on Information, 2013

2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wireless Personal Communications, 2012

A Secure Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Industrial Electronics, 2012

A novel multi-group exploiting modification direction method based on switch map.
Signal Processing, 2012

Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.
Signal Processing, 2012

An adaptive prediction-error expansion oriented reversible information hiding scheme.
Pattern Recognition Letters, 2012

A multi-threshold secret image sharing scheme based on MSP.
Pattern Recognition Letters, 2012

A hierarchical threshold secret image sharing.
Pattern Recognition Letters, 2012

Guest Editors' Introduction: Special Section on ISIP 2011.
Journal of Multimedia, 2012

Optimizing least-significant-bit substitution using cat swarm optimization strategy.
Inf. Sci., 2012

Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity.
Inf. Sci., 2012

A fast VQ codebook search with initialization and search order.
Inf. Sci., 2012

Reversible Data Hiding Scheme Based on Image Inpainting.
Fundam. Inform., 2012

Nucleus and cytoplast contour detector from a cervical smear image.
Expert Syst. Appl., 2012

Graph structure analysis based on complex network.
Digital Signal Processing, 2012

Efficient illumination compensation techniques for text images.
Digital Signal Processing, 2012

An Efficient and Flexible Mobile Payment Protocol.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Protecting the content integrity of digital imagery with fidelity preservation.
TOMCCAP, 2011

A reversible data hiding scheme for VQ indices using locally adaptive coding.
J. Visual Communication and Image Representation, 2011

Guest Editorial.
JSW, 2011

A Prediction-Based Adaptive Reversible Data Embedding Scheme.
JSW, 2011

A novel image watermarking in redistributed invariant wavelet domain.
Journal of Systems and Software, 2011

A secure fragile watermarking scheme based on chaos-and-hamming code.
Journal of Systems and Software, 2011

Guest Editorial.
JNW, 2011

A Hierarchical Fragile Watermarking with VQ Index Recovery.
Journal of Multimedia, 2011

A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
Journal of Multimedia, 2011

Guest Editorial.
JCP, 2011

An adaptable threshold detector.
Inf. Sci., 2011

Meaningful secret sharing technique with authentication and remedy abilities.
Inf. Sci., 2011

Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images.
IJPRAI, 2011

Cheating resistance and reversibility-oriented secret sharing mechanism.
IET Information Security, 2011

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.
IEICE Transactions, 2011

Reversible Steganography for BTC-compressed Images.
Fundam. Inform., 2011

A steganographic scheme by fully exploiting modification directions.
Expert Syst. Appl., 2011

A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images.
Digital Signal Processing, 2011

Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Comput. J., 2011

Image Data Hiding Schemes Based on Graph Coloring.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

General Threshold Signature Based on the Chinese Remainder Theorem.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs.
Wireless Personal Communications, 2010

An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks.
IEEE Trans. Wireless Communications, 2010

Intelligent systems for future generation communications.
The Journal of Supercomputing, 2010

High capacity SMVQ-based hiding scheme using adaptive index.
Signal Processing, 2010

Guest Editorial.
JSW, 2010

Guest Editorial.
JSW, 2010

Guest Editorial.
JSW, 2010

An encoding method for both image compression and data lossless information hiding.
Journal of Systems and Software, 2010

Using quad smoothness to efficiently control capacity-distortion of reversible data hiding.
Journal of Systems and Software, 2010

Guest Editorial.
JNW, 2010

Guest Editorial.
JNW, 2010

Guest Editorial.
Journal of Multimedia, 2010

Hiding Secret Data in an Image Using Codeword Imitation.
JIPS, 2010

A Grayscale Image Steganography Based upon Discrete Cosine Transformation.
JDIM, 2010

Guest Editorial.
JCP, 2010

Guest Editorial.
JCP, 2010

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
JCM, 2010

A novel self-tuning feedback controller for active queue management supporting TCP flows.
Inf. Sci., 2010

A high payload frequency-based reversible image hiding method.
Inf. Sci., 2010

A reversible data hiding scheme using complementary embedding strategy.
Inf. Sci., 2010

A data-hiding scheme based on one-way hash function.
IJMIS, 2010

An Improved Biometrics-based User Authentication Scheme without Concurrency System.
IJIIP, 2010

An efficient e-mail protocol providing perfect forward secrecy for mobile devices.
Int. J. Communication Systems, 2010

Digital rights management for multimedia content over 3G mobile networks.
Expert Syst. Appl., 2010

High payload steganography mechanism using hybrid edge detector.
Expert Syst. Appl., 2010

An efficient and reliable E-DRM scheme for mobile environments.
Expert Syst. Appl., 2010

Data hiding based on the similarity between neighboring pixels with reversibility.
Digital Signal Processing, 2010

Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digital Signal Processing, 2010

An efficient and fair buyer-seller fingerprinting scheme for large scale networks.
Computers & Security, 2010

A Robust Public Watermarking Scheme Based on DWT.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A simple image encoding method with data lossless information hiding.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A reversible and multiple-layer embedding strategy with high capacity.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A technique of embedding digital data in an image compression code reversibly.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A Large Payload EMD Embedding Scheme with High Stego-image Quality.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Self-verifying visual secret sharing using error diffusion and interpolation techniques.
IEEE Trans. Information Forensics and Security, 2009

Reversible Data Hiding Based on Histogram Modification of Pixel Differences.
IEEE Trans. Circuits Syst. Video Techn., 2009

Dual Digital Watermarking for Internet Media Based on Hybrid Strategies.
IEEE Trans. Circuits Syst. Video Techn., 2009

A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Techn., 2009

Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2^m).
IEEE Trans. Computers, 2009

A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding.
Soft Comput., 2009

Distortion-free secret image sharing mechanism using modulus operator.
Pattern Recognition, 2009

Sharing a verifiable secret image using two shadows.
Pattern Recognition, 2009

A lossless data embedding technique by joint neighboring coding.
Pattern Recognition, 2009

Authors reply 'Sharing secrets in stego images with authentication'.
Pattern Recognition, 2009

Reversible information hiding for VQ indices based on locally adaptive coding.
J. Visual Communication and Image Representation, 2009

Editorial.
JSW, 2009

Lossless Compression Schemes of Vector Quantization Indices Using State Codebook.
JSW, 2009

An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
Journal of Systems and Software, 2009

A reversible information hiding scheme using left-right and up-down chinese character representation.
Journal of Systems and Software, 2009

A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy.
Journal of Systems and Software, 2009

Search-order coding method with indicator-elimination property.
Journal of Systems and Software, 2009

Editorial.
JNW, 2009

Robust t-out-of-n oblivious transfer mechanism based on CRT.
J. Network and Computer Applications, 2009

Editorial.
Journal of Multimedia, 2009

Editorial.
JCP, 2009

Editorial.
JCP, 2009

A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009

Preserving robustness and removability for digital watermarks using subsampling and difference correlation.
Inf. Sci., 2009

A novel key management scheme for dynamic multicast communications.
Int. J. Communication Systems, 2009

Non-iterative privacy preservation for online lotteries.
IET Information Security, 2009

Concurrent error detection and correction in dual basis multiplier over GF(2m).
IET Circuits, Devices & Systems, 2009

NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Inform., 2009

An Information-Hiding Scheme Based on Quantization-Based Embedding Technique.
Fundam. Inform., 2009

An Image Authentication Based on Discrete Fourier Transform.
Fundam. Inform., 2009

Preventing Cheating in Computational Visual Cryptography.
Fundam. Inform., 2009

A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes.
Fundam. Inform., 2009

Roaming across wireless local area networks using SIM-based authentication protocol.
Computer Standards & Interfaces, 2009

Design of electronic t-out-of-n lotteries on the Internet.
Computer Standards & Interfaces, 2009

On the security of a copyright protection scheme based on visual cryptography.
Computer Standards & Interfaces, 2009

An efficient proxy raffle protocol with anonymity-preserving.
Computer Standards & Interfaces, 2009

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Computers & Security, 2009

Enhanced authentication scheme with anonymity for roaming service in global mobility networks.
Computer Communications, 2009

An on-line electronic check system with mutual authentication.
Computers & Electrical Engineering, 2009

Data Hiding in Images by Hybrid LSB Substitution.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Information Hiding in Dual Images with Reversibility.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Embedding Secret Messages Using Modified Huffman Coding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A reversible data hiding scheme based on dual steganographic images.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Embedding secret messages based on chaotic map and Huffman coding.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

The design of e-traveler's check with efficiency and mutual authentication.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A New Intelligent Authorization Agent Model in Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Self-Reference Watermarking Scheme Based on Wet Paper Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A High Embedding Efficiency Steganography Scheme for Wet Paper Codes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Resistant Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wireless Personal Communications, 2008

Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol.
Security and Communication Networks, 2008

Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognition, 2008

A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity.
Pattern Recognition, 2008

Lossless data hiding for color images based on block truncation coding.
Pattern Recognition, 2008

Sharing secrets in stego images with authentication.
Pattern Recognition, 2008

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognition, 2008

Editorial.
JSW, 2008

An embedding technique based upon block prediction.
Journal of Systems and Software, 2008

Adaptive watermark mechanism for rightful ownership protection.
Journal of Systems and Software, 2008

New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol., 2008

Editorial.
JCP, 2008

Editorial.
JCM, 2008

Editorial.
JCM, 2008

An extended difference expansion algorithm for reversible watermarking.
Image Vision Comput., 2008

Lossless nibbled data embedding scheme based on difference expansion.
Image Vision Comput., 2008

An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vision Comput., 2008

Joint coding and embedding techniques for multimedia images.
Inf. Sci., 2008

A novel secret image sharing scheme in color images using small shadow images.
Inf. Sci., 2008

Reversible data-embedding scheme using differences between original and predicted pixel values.
IET Information Security, 2008

Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Computers & Digital Techniques, 2008

Reversible Steganographic Method with High Payload for JPEG Images.
IEICE Transactions, 2008

LSB-Based Steganography Using Reflected Gray Code.
IEICE Transactions, 2008

A Color Image Authentication Method Using Partitioned Palette and Morphological Operations.
IEICE Transactions, 2008

A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Inform., 2008

A Large Payload Data Embedding Technique for Color Images.
Fundam. Inform., 2008

Three-Phase Lossless Data Hiding Method for the VQ Index Table.
Fundam. Inform., 2008

Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies.
Fundam. Inform., 2008

High Capacity Data Hiding for Grayscale Images.
Fundam. Inform., 2008

Isolated items discarding strategy for discovering high utility itemsets.
Data Knowl. Eng., 2008

Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Computer Standards & Interfaces, 2008

A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Assigning Keys in a Hierarchy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Effective Demosaicking and Zooming Algorithm for CFA Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Image Authentication Scheme for Halftone Images Based upon Error Diffusion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A New Probabilistic Visual Secret Sharing Scheme for Color Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Security design for three-party encrypted key exchange protocol using smart cards.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Using nearest covering codes to embed secret information in grayscale images.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Lossless Data Hiding Based on Histogram Modification for Image Authentication.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Improved EMD Embedding Scheme Based on Secret Image Difference.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Hiding Information Employing Reduplicating Embedding.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Reversibly sharing and hiding secret using expansion strategy.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

2007
Adaptive Data Hiding Scheme for Palette Images.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wireless Personal Communications, 2007

Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook.
IEEE Trans. Image Processing, 2007

Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes.
IEEE Trans. Information Forensics and Security, 2007

An efficient image authentication method based on Hamming code.
Pattern Recognition, 2007

Lossless recovery of a VQ index table with embedded secret data.
J. Visual Communication and Image Representation, 2007

Novel image copy detection with rotating tolerance.
Journal of Systems and Software, 2007

TFRP: An efficient microaggregation algorithm for statistical disclosure control.
Journal of Systems and Software, 2007

Secure communications for cluster-based ad hoc networks using node identities.
J. Network and Computer Applications, 2007

Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots.
J. Network and Computer Applications, 2007

Combined association rules for dealing with missing values.
J. Information Science, 2007

Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci., 2007

Reversible hiding in DCT-based compressed images.
Inf. Sci., 2007

Reversible steganographic method using SMVQ approach based on declustering.
Inf. Sci., 2007

Color image retrieval technique based on color features and image bitmap.
Inf. Process. Manage., 2007

A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, Lith. Acad. Sci., 2007

Anonymous authentication scheme for wireless communications.
IJMC, 2007

An RSA-based (t, n) threshold proxy signature scheme with freewill identities.
IJICS, 2007

Scalable and systolic Montgomery multiplier over GF(2m) generated by trinomials.
IET Circuits, Devices & Systems, 2007

Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels.
IEEE Communications Letters, 2007

An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Inform., 2007

A Novel Image Hiding Scheme Based on VQ and Hamming Distance.
Fundam. Inform., 2007

VQ Codebook Searching Algorithm Based on Correlation Property.
Fundam. Inform., 2007

Secret Image Hiding and Sharing Based on the (t, n)-Threshold.
Fundam. Inform., 2007

Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality.
Fundam. Inform., 2007

Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Inform., 2007

A new steganographic method for color and grayscale image hiding.
Computer Vision and Image Understanding, 2007

Security enhancement of an IC-card-based remote login mechanism.
Computer Networks, 2007

MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining.
Advanced Engineering Informatics, 2007

Improved JPEG Scheme Based on Adaptive Block Encoding.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Paper Currency Verification with Support Vector Machines.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ.
Proceedings of the Advances in Multimedia Information Processing, 2007

Two-Phase Algorithms for a Novel Utility-Frequent Mining Model.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Conference Key Distribution Scheme Using Interpolating Polynomials.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Density-Based Image Vector Quantization Using a Genetic Algorithm.
Proceedings of the Advances in Multimedia Modeling, 2007

A Color Image Hiding Scheme Based on SMVQ and Modulo Operator.
Proceedings of the Advances in Multimedia Modeling, 2007

Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Reversible Data Embedding Technique for Palette Images Using De-clustering.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Reversible Quantization-Index Modulation Using Neighboring Correlation.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A High Payload VQ Steganographic Method for Binary Images.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A New Image Compression Scheme Based on Locally Adaptive Coding.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

An Improvement on Authenticated Key Agreement Scheme.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

An e-mail signature protocol for anti-spam work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Secret Image Sharing Using Quadratic Residues.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Improvements of EMD Embedding for Large Payloads.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Secret Sharing and Information Hiding by Shadow Images.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Reversible Data Embedding for Vector Quantization Indices.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

High Payload Data Embedding with Hybrid Strategy.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Semi-blind Watermarking Based on Discrete Wavelet Transform.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Significance-Preserving Codebook Using Generic Algorithm.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Digital Watermarking Scheme Based on Singular Value Decomposition.
Proceedings of the Combinatorics, 2007

A New (t, n)-Threshold Scheme Based on Difference Equations.
Proceedings of the Combinatorics, 2007

Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

An Efficient Fragile Watermarking for Web Pages Tamper-Proof.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wireless Communications and Mobile Computing, 2006

Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.
IEEE Trans. Information Forensics and Security, 2006

A Reversible Data Hiding Scheme Based on Side Match Vector Quantization.
IEEE Trans. Circuits Syst. Video Techn., 2006

Removing blocking effects using an artificial neural network.
Signal Processing, 2006

Fast codebook search algorithms based on tree-structured vector quantization.
Pattern Recognition Letters, 2006

A watermarking-based image ownership and tampering authentication scheme.
Pattern Recognition Letters, 2006

Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels.
Pattern Recognition, 2006

Error resilient locally adaptive data compression.
Journal of Systems and Software, 2006

A difference expansion oriented data hiding scheme for restoring the original host images.
Journal of Systems and Software, 2006

Reversible index-domain information hiding scheme based on side-match vector quantization.
Journal of Systems and Software, 2006

A new edge detection approach based on image context analysis.
Image Vision Comput., 2006

A novel efficient (t, n) threshold proxy signature scheme.
Inf. Sci., 2006

New image steganographic methods using run-length approach.
Inf. Sci., 2006

An image coding scheme using SMVQ and support vector machines.
Neurocomputing, 2006

An Access Control System with Time-constraint Using Support Vector Machines.
I. J. Network Security, 2006

A secure and efficient authentication scheme for mobile users.
IJMC, 2006

A Robust Content-Based Copy Detection Scheme.
Fundam. Inform., 2006

A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization.
Fundam. Inform., 2006

An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression.
Fundam. Inform., 2006

Perfect Hashing Schemes for Mining Traversal Patterns.
Fundam. Inform., 2006

Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images.
Fundam. Inform., 2006

A Novel Index Coding Scheme for Vector Quantization.
Fundam. Inform., 2006

Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing.
Fundam. Inform., 2006

An anonymous voting mechanism based on the key exchange protocol.
Computers & Security, 2006

A parallel residue-to-binary conversion algorithm without trial division.
Computers & Electrical Engineering, 2006

A division algorithm for residue numbers.
Applied Mathematics and Computation, 2006

A Novel Key Agreement Scheme in a Multiple Server Environment.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A DCT-based Recoverable Image Authentication.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

Novel Steganographic Schemes Based on Row-Major Mapping Relation.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

An Image Hiding Scheme Based on Du's Disk Allocation Method.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Improved SMVQ Scheme with Edge-Directed Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Progressive Image Transmission Using Significant Features and Linear Regression Prediction.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Reusability on Learning Object Repository.
Proceedings of the Advances in Web Based Learning, 2006

A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Multipurpose Wavelet-Based Image Watermarking.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Wavelet-Based Progressive Digital Image Transmission Scheme.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An ImageWatermarking Scheme Using Pattern Coding Technique.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An Untraceable Electronic Cash System Using Fair Blind Signatures.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A New Scheme for the Electronic Coin.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A Secret Image Sharing Scheme Based on Vector Quantization Mechanism.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
An efficient authentication protocol for mobile satellite communication systems.
Operating Systems Review, 2005

SVD-based digital image watermarking scheme.
Pattern Recognition Letters, 2005

Hiding secret data in images via predictive coding.
Pattern Recognition, 2005

A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization.
Image Vision Comput., 2005

An image zooming technique based on vector quantization approximation.
Image Vision Comput., 2005

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization.
Informatica (Slovenia), 2005

Hiding Data in Halftone Images.
Informatica, Lith. Acad. Sci., 2005

Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, Lith. Acad. Sci., 2005

Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, Lith. Acad. Sci., 2005

Data Compressor for VQ Index Tables.
Fundam. Inform., 2005

A New Density-Based Scheme for Clustering Based on Genetic Algorithm.
Fundam. Inform., 2005

An Inverse Halftoning Technique Using Modified Look-Up Tables.
Fundam. Inform., 2005

An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy.
Fundam. Inform., 2005

The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain.
Des. Codes Cryptography, 2005

Sharing visual multi-secrets using circle shares.
Computer Standards & Interfaces, 2005

Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Computer Standards & Interfaces, 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Computer Standards & Interfaces, 2005

An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Computer Standards & Interfaces, 2005

A novel digital image watermarking scheme based on the vector quantization technique.
Computers & Security, 2005

Efficient authentication protocols of GSM.
Computer Communications, 2005

Perfect Hashing Schemes for Mining Association Rules.
Comput. J., 2005

A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Computers and Artificial Intelligence, 2005

An iterative modular multiplication algorithm in RNS.
Applied Mathematics and Computation, 2005

A time-stamping protocol for digital watermarking.
Applied Mathematics and Computation, 2005

A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli.
Applied Mathematics and Computation, 2005

Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Applied Mathematics and Computation, 2005

Authentication schemes with no verification table.
Applied Mathematics and Computation, 2005

A scheme for threshold multi-secret sharing.
Applied Mathematics and Computation, 2005

Secret Hiding Using Side Match Vector Quantization.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

FA-Tree - A Dynamic Indexing Structure for Spatial Data.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

An Efficient Algorithm for Incremental Mining of Association Rules.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005

Image Retrieval Using Spatial Color and Edge Detection.
Proceedings of the Advances in Multimedia Information Processing, 2005

A Reversible Information Hiding Scheme Based on Vector Quantization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Method for Searching Similar Images Using Quality Index Measurement.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Improving Image Quality for JPEG Compression.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Hiding Data in Binary Images.
Proceedings of the Information Security Practice and Experience, 2005

A Search Scheme Resulting in Mixing Compressed Text Files.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Image Refining Method Using Digital Watermark via Vector Quantization.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Sharing a Secret Two-Tone Image in Two Gray-Level Images.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Improvement on Strong-Password Authentication Protocols.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

A Novel Conference Key Distribution System with Re-keying Protocol.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

An efficient deniable authentication protocol.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Time-bounded Based Password Authentication Scheme.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Image Copy Detection with Rotating Tolerance.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Fast Algorithm for Mining Share-Frequent Itemsets.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

A Parallel Modular Exponentiation Scheme for Transformed Exponents.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap.
Proceedings of the Information Retrieval Technology, 2005

An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Authenticated Encryption Schemes with Message Linkage for Threshold Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A New Design for Efficient t-out-n Oblivious Transfer Scheme.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A DCT-Domain System for Hiding Fractal Compressed Images.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Wireless Personal Communications, 2004

A progressive secret reveal system based on SPIHT image transmission.
Sig. Proc.: Image Comm., 2004

A color image watermarking scheme based on color quantization.
Signal Processing, 2004

A secure one-time password authentication scheme with low-computation for mobile communications.
Operating Systems Review, 2004

Remarks on fingerprint-based remote user authentication scheme using smart cards.
Operating Systems Review, 2004

A convertible group signature scheme.
Operating Systems Review, 2004

An improvement of delegated multisignature scheme with document decomposition.
Operating Systems Review, 2004

A secure one-time password authentication scheme using smart cards without limiting login times.
Operating Systems Review, 2004

An improvement on a deniable authentication protocol.
Operating Systems Review, 2004

A secure and efficient strong-password authentication protocol.
Operating Systems Review, 2004

Novel full-search schemes for speeding up image coding using vector quantization.
Real-Time Imaging, 2004

A steganographic method for digital images using side match.
Pattern Recognition Letters, 2004

Information hiding based on search-order coding for VQ indices.
Pattern Recognition Letters, 2004

A new design of efficient partially blind signature scheme.
Journal of Systems and Software, 2004

An Efficient Graph-Based Method for Parallel Mining Problems.
JIKM, 2004

Retrieving digital images from a JPEG compressed image database.
Image Vision Comput., 2004

High Capacity Data Hiding in JPEG-Compressed Images.
Informatica, Lith. Acad. Sci., 2004

VQ-Based Image Watermarking Using Anti-Gray Coding.
Informatica, Lith. Acad. Sci., 2004

An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique.
IJPRAI, 2004

A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math., 2004

Signing a digital signature without using one-way hash functions and message redundancy schemes.
IEEE Communications Letters, 2004

Scenery Image Segmentation Using Support Vector Machines.
Fundam. Inform., 2004

Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Inform., 2004

An Adaptive Steganographic Scheme for Color Images.
Fundam. Inform., 2004

A New Repeating Color Watermarking Scheme Based on Human Visual Model.
EURASIP J. Adv. Sig. Proc., 2004

A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
Computer Standards & Interfaces, 2004

A novel three-party encrypted key exchange protocol.
Computer Standards & Interfaces, 2004

A fair and secure mobile agent environment based on blind signature and proxy host.
Computers & Security, 2004

A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes.
Comput. J., 2004

An Adaptive Steganography for Index-Based Images Using Codeword Grouping.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Detection and Restoration of a Tampered Medical Image.
Proceedings of the Medical Imaging and Augmented Reality: Second International Workshop, 2004

A Signature Scheme with (t, n) Shared Verification and Message Recovery.
Proceedings of the iiWAS'2004, 2004

A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

A Chinese Remainder Theorem Oriented Information Hiding Scheme.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

Progressive Image Transmission Using Singular Value Decomposition.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004

A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004

A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

A New FP-Tree Algorithm for Mining Frequent Itemsets.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Supervising Secret-Key Agreements in a Level-Based Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Using IC Cards to Remotely Login Passwords without Verification Tables.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Secret Sharing with Access Structures in a Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Bandwidth Efficiency of an Image Compression Method for Information Hiding.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A New Scheme to Protect Confidential Images.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Yet Another Attack on a QR-based Password Authentication System.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Spatial Video Retrieval Based on the Piecewise Method.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Steganography Using JPEG-Compressed Images.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

A Novel Information Hiding Scheme Based on BTC.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
The Visual Computer, 2003

A self-encryption mechanism for authentication of roaming and teleconference services.
IEEE Trans. Wireless Communications, 2003

Using set partitioning in hierarchical trees to authenticate digital images.
Sig. Proc.: Image Comm., 2003

Error prevention and resilience of VQ encoded images.
Signal Processing, 2003

A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes.
Real-Time Imaging, 2003

Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy.
Pattern Recognition, 2003

An efficient protocol for anonymous multicast and reception.
Inf. Process. Lett., 2003

Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards.
Informatica, Lith. Acad. Sci., 2003

A Watermarking Scheme Based on Principal Component Analysis Technique.
Informatica, Lith. Acad. Sci., 2003

Edge Detection Using Block Truncation Coding.
IJPRAI, 2003

Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Inform., 2003

A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Inform., 2003

An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Inform., 2003

An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Inform., 2003

A New Channel for Image Hiding Based on Interpolating polynomials.
Fundam. Inform., 2003

A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Generation Comp. Syst., 2003

Security enhancement for anonymous secure e-voting over a network.
Computer Standards & Interfaces, 2003

The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Computer Standards & Interfaces, 2003

A flexible date-attachment scheme on e-cash.
Computers & Security, 2003

Efficient anonymous auction protocols with freewheeling bids.
Computers & Security, 2003

Construction of Symmetrical Reversible Variable Length Codes Using Backtracking.
Comput. J., 2003

Parallel computational algorithms for generalized Chinese remainder theorem.
Computers & Electrical Engineering, 2003

Similar Image Retrieval Based on Wavelet Transformation.
Proceedings of the Wavelet Analysis and Its Applications, 2003

A Method for Sending Confidential Messages to a Group without Trusted Parties.
Proceedings of the Parallel and Distributed Processing and Applications, 2003

An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Robust and Recoverable Tamper Proofing Technique for Image Authentication.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

Signature Schemes Based on Two Hard Problems Simultaneously.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Lossless Image Compression Based on Two-Way Smaller Difference.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Huffman Tree Decomposition and Its Coding Applications.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
An ElGamal-Like Cryptosystem for Enciphering Large Messages.
IEEE Trans. Knowl. Data Eng., 2002

An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images.
Real-Time Imaging, 2002

A fast pixel mapping algorithm using principal component analysis.
Pattern Recognition Letters, 2002

Cryptanalysis of an encryption scheme for binary images.
Pattern Recognition Letters, 2002

An image intellectual property protection scheme for gray-level images using visual secret sharing strategy.
Pattern Recognition Letters, 2002

Detection and restoration of tampered JPEG compressed images.
Journal of Systems and Software, 2002

Sharing multiple secrets in digital images.
Journal of Systems and Software, 2002

A steganographic method based upon JPEG and quantization table modification.
Inf. Sci., 2002

Recognition of Image Authenticity Using Significant DCT Coefficients Quantization.
Informatica (Slovenia), 2002

A Feature-Oriented Copyright Owner Proving Technique for Still Images.
International Journal of Software Engineering and Knowledge Engineering, 2002

Both Color and Gray Scale Secret Images Hiding in a Color Image.
IJPRAI, 2002

A Fast and Secure Image Hiding Scheme Based on LSB Substitution.
IJPRAI, 2002

A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels.
IJPRAI, 2002

Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding.
Int. J. Comput. Proc. Oriental Lang., 2002

A New Micro-Payment System Using General Payword Chain.
Electronic Commerce Research, 2002

A Dynamic Color Palette for Color Images Coding.
Proceedings of the Advances in Multimedia Information Processing, 2002

A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density.
Proceedings of the Advances in Multimedia Information Processing, 2002

A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications.
Proceedings of the Advances in Multimedia Information Processing, 2002

An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002

An Association Rule Mining Method for Spatial Database.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

Cryptanalysis of the WD Public-Key Cryptosystem.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

Sharing a Secret Gray Image in Multiple Images.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

A Hybrid Method for Estimating the Euclidean Distance between Two Vectors.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

An Image Copyright Protection Scheme Based on Torus Automorphism.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

Key Exchange Protocols for Multiparty Communication Services.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2001
Spatial Similarity Retrieval in Video Databases.
J. Visual Communication and Image Representation, 2001

A new encryption algorithm for image cryptosystems.
Journal of Systems and Software, 2001

A New Two-Path Search Algorithm for Block Motion Estimation of Video Data.
J. Inf. Sci. Eng., 2001

New method of secret image sharing based upon vector quantization.
J. Electronic Imaging, 2001

A Novel Progressive Image Transmission Technique for Chinese Calligraphy.
Int. J. Comput. Proc. Oriental Lang., 2001

Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance.
Int. J. Comput. Proc. Oriental Lang., 2001

A Generalized Secret Image Sharing and Recovery Scheme.
Proceedings of the Advances in Multimedia Information Processing, 2001

A Novel Scheme for Securing Image Steganography.
Proceedings of the Advances in Multimedia Information Processing, 2001

A Color Image Retrieval Method Based on Local Histogram.
Proceedings of the Advances in Multimedia Information Processing, 2001

Image Retrieval Based on Tolerable Difference of Direction.
Proceedings of the 15th International Conference on Information Networking, 2001

Cryptanalysis of the Improved User Efficient Blind Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
Proceedings of the Information and Communications Security, Third International Conference, 2001

A Progressive Image Transmission Scheme Based on Block Truncation Coding.
Proceedings of the Human Society and the Internet, 2001

2000
An efficient computation of Euclidean distances using approximated look-up table.
IEEE Trans. Circuits Syst. Video Techn., 2000

A new lossless compression scheme based on Huffman coding scheme for image compression.
Sig. Proc.: Image Comm., 2000

Breadth-first search oriented symbolic picture representation for spatial match retrieval.
Journal of Systems and Software, 2000

Digital watermarking of images using neural networks.
J. Electronic Imaging, 2000

A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme.
Informatica (Slovenia), 2000

A Compact Sparse Matrix Representation Using Random Hash Functions.
Data Knowl. Eng., 2000

A threshold decryption scheme without session keys.
Computers & Electrical Engineering, 2000

An Improved Prediction Method for Quadtree Image Coding.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000

A Method for Protecting Digital Images from Being Copied Illegally.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000

A Perspective on the Development of Digital Libraries in Taiwan.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000

An efficient accessing technique of Chinese characters using Boshiamy Chinese input system.
Proceedings of the Fifth International Workshop on Information Retrieval with Asian Languages, 2000, Hong Kong, China, September 30, 2000

Computing watermarks from images using quadtrees.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

A New Scheme for Sharing Secret Color Images in Computer Network.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

A Proof of Copyright Ownership Using Moment-Preserving.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

Detecting Dealer Cheating in Secret Sharing Systems.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
A watermarking technique based on one-way hash functions.
IEEE Trans. Consumer Electronics, 1999

Reconstruction of lost blocks using codeword estimation.
IEEE Trans. Consumer Electronics, 1999

Variable rate vector quantization scheme based on quadtree segmentation.
IEEE Trans. Consumer Electronics, 1999

Low complexity index-compressed vector quantization for image compression.
IEEE Trans. Consumer Electronics, 1999

A concept of designing cheater identification methods for secret sharing.
Journal of Systems and Software, 1999

Partition search filter and its performance analysis.
Journal of Systems and Software, 1999

(t, n) Threshold Digital Signature With Traceability Property.
J. Inf. Sci. Eng., 1999

An Improved Threshold Scheme Based on Modular ARithmetic.
J. Inf. Sci. Eng., 1999

A fast modular multiplication algorithm for calculating the product AB modulo N.
Inf. Process. Lett., 1999

Conference key distribution schemes for portable communication systems.
Computer Communications, 1999

Tree Structured Vector Quantization with Dynamic Path Search.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
A virtual image cryptosystem based upon vector quantization.
IEEE Trans. Image Processing, 1998

A predictive image coding scheme using a smaller codebook.
Sig. Proc.: Image Comm., 1998

An adaptive exponentiation method.
Journal of Systems and Software, 1998

A spatial match retrieval mechanism for symbolic pictures.
Journal of Systems and Software, 1998

Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search.
J. Electronic Imaging, 1998

Sharing Secret Omages using Shadow Codebooks.
Inf. Sci., 1998

A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures.
Data Knowl. Eng., 1998

Threshold signature schemes with traceable signers in group communications.
Computer Communications, 1998

Using RSA with low exponent in a public network.
Computer Communications, 1998

Authenticity of public keys in asymmetric cryptosystems.
Computer Communications, 1998

An on-line secret sharing scheme for multi-secrets.
Computer Communications, 1998

A Scheme for Obtaining a Message from the Digital Multisignature.
Proceedings of the Public Key Cryptography, 1998

An Efficient Data Structure for Storing Similar Binary Images.
Proceedings of the 5th International Conference of Foundations of Data Organization (FODO'98), 1998

1997
Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval.
IEEE Trans. Knowl. Data Eng., 1997

A new image coding algorithm using variable-rate side-match finite-state vector quantization.
IEEE Trans. Image Processing, 1997

Diagonal axes method (DAM): a fast search algorithm for vector quantization.
IEEE Trans. Circuits Syst. Video Techn., 1997

A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Computing, 1997

A secure voting system on a public network.
Networks, 1997

An Improved VQ Codebook Search Algorithm Using Principal Component Analysis.
J. Visual Communication and Image Representation, 1997

Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval.
J. Inf. Sci. Eng., 1997

A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997

Authenticated Encryption Schemes with Linkage Between Message Blocks.
Inf. Process. Lett., 1997

A Simple Approach for Generating RSA Keys.
Inf. Process. Lett., 1997

Spatial match retrieval based on direction signatures using multiple key hashing scheme.
Int. J. Intell. Syst., 1997

A Cost Optimal Search Technique for the Knapsack Problem.
International Journal of High Speed Computing, 1997

A Digital Signature Scheme Based upon the Theory of Quadratic residues.
Cryptologia, 1997

Three ID-based information security functions.
Computer Communications, 1997

1996
A spatial data representation: an adaptive 2D-H string.
Pattern Recognition Letters, 1996

Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval.
Journal of Systems and Software, 1996

An Improvement to Ziegler's Sparse Matrix Compression Algorithm.
Journal of Systems and Software, 1996

On Key Changeable ID-Based Digital Signature Scheme.
J. Inf. Sci. Eng., 1996

Cryptanalysis of the Secret Exponent of the RSA Scheme.
J. Inf. Sci. Eng., 1996

A Fast Search Algorithm for Vector Quantization.
J. Inf. Sci. Eng., 1996

Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries.
Inf. Sci., 1996

Integrating Authentication in Public Key Distribution System.
Inf. Process. Lett., 1996

Autenticated Encryption Schemes with Message Linkage.
Inf. Process. Lett., 1996

A Spatial Filter for Similarity Retrieval.
IJPRAI, 1996

Optimal Linear Hashing Files for Orthogonal Range Retrieval.
Proceedings of the COMPSAC '96, 1996

Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
CODAS, 1996

A Temporal Join Mechanism Based on Trie-Ranking Data Structure.
CODAS, 1996

A group-oriented (t, n) undeniable signature scheme without trusted center.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

A dynamic secret sharing scheme with cheater detection.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
New Public-Key Cipher System Based Upon the Diophantine Equations.
IEEE Trans. Computers, 1995

A near pattern-matching scheme based upon principal component analysis.
Pattern Recognition Letters, 1995

An exact match retrieval scheme based upon principal component analysis.
Pattern Recognition Letters, 1995

Relative coordinates oriented symbolic string for spatial relationship retrieval.
Pattern Recognition, 1995

Parallel Computation of the Modular Cascade Exponentiation.
Parallel Algorithms Appl., 1995

Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries.
J. Inf. Sci. Eng., 1995

Shortest Weighted Length Addition Chains.
J. Inf. Sci. Eng., 1995

A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm.
J. Inf. Sci. Eng., 1995

Dynamic Pictorial Databases Design for Similarity Retrieval.
Inf. Sci., 1995

A cryptographic implementation for dynamic access control in a user hierarchy.
Computers & Security, 1995

Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Computer Communications, 1995

Remote scheme for password authentication based on theory of quadratic residues.
Computer Communications, 1995

Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Application of geometric hashing to iconic database retrieval.
Pattern Recognition Letters, 1994

New concepts for multiple stack systems: Born and reborn.
Journal of Systems and Software, 1994

A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem.
J. Inf. Sci. Eng., 1994

Controlling Access in Tree Hierarchies.
Inf. Sci., 1994

Optimal Multiple Key Hashing Files for Orthogonal Range Queries.
Inf. Sci., 1994

A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis.
IJPRAI, 1994

Authentication and protection of public keys.
Computers & Security, 1994

Access control with binary keys.
Computers & Security, 1994

A scheme to determine the relationship between two users in a hierarchy.
Computers & Security, 1994

Method for constructing a group-oriented cipher system.
Computer Communications, 1994

Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem.
Computer Communications, 1994

1993
An object-oriented similarity retrieval algorithm for iconic image databases.
Pattern Recognition Letters, 1993

A hashing-oriented nearest neighbor searching scheme.
Pattern Recognition Letters, 1993

A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers.
IEEE Journal on Selected Areas in Communications, 1993

Algebraic operations on encryped relational databases.
Inf. Syst., 1993

Optimal MMI file systems for orthogonal range retrieval.
Inf. Syst., 1993

Controlling the Access Requests in an Information Protection System.
Inf. Process. Manage., 1993

Master Keys for an M 3 Cryptoscheme.
Cryptologia, 1993

A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files.
BIT, 1993

A Refinement of a Compression-Oriented Addressing Scheme.
BIT, 1993

Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval.
Proceedings of the Advances in Spatial Databases, 1993

Similarity Retrieval on Pictorial Databases Based upon Module Operation.
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA), 1993

1992
A Chinese Character Retrieval Scheme Using Shuang Pinyin.
J. Inf. Sci. Eng., 1992

Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci., 1992

A conference key broadcasting system using sealed locks.
Inf. Syst., 1992

Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst., 1992

On GDM allocation for partial range queries.
Inf. Syst., 1992

Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manage., 1992

A Record-Oriented Cryptosystem for Database Sharing (Short Note).
Comput. J., 1992

Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files.
Comput. J., 1992

Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems.
Comput. J., 1992

A Solution to Generalized Group Oriented Cryptography.
Proceedings of the IT Security: The Need for International Cooperation, 1992

De-Clustering Image Databases.
Future Databases, 1992

The Design of a Conference Key Distribution System.
Proceedings of the Advances in Cryptology, 1992

1991
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw., Pract. Exper., 1991

Retrieval of similar pictures on pictorial databases.
Pattern Recognition, 1991

A shape recognition scheme based on relative distances of feature points from the centroid.
Pattern Recognition, 1991

Spatial Match Retrieval of Symbolic Pictures.
J. Inf. Sci. Eng., 1991

A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets.
J. Inf. Sci. Eng., 1991

A note on allocating k-ary multiple key hashing files among multiple disks.
Inf. Sci., 1991

Password authentication using Newton's interpolating polynomials.
Inf. Syst., 1991

On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks.
Inf. Syst., 1991

A dynamic key-lock-pair access control scheme.
Computers & Security, 1991

On the Design of a Machine-Independent Perfect Hashing Scheme.
Comput. J., 1991

1990
A Dynamic Access Control Mechanism in Information Protection Systems.
J. Inf. Sci. Eng., 1990

A New Password Authentication Scheme.
J. Inf. Sci. Eng., 1990

A Reciprocal Confluence Tree Unit and Its Applications.
BIT, 1990

1989
Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989

1988
An Ordered Minimal Perfect Hashing Scheme with Single Parameter.
Inf. Process. Lett., 1988

A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files.
Comput. J., 1988

Application of Principal Component Analysis to Multi-Disk Concurrent Accessing.
BIT, 1988

Orthogonal Range Retrieval Using Bucket Address Hashing.
Proceedings of the Statistical and Scientific Database Management, 1988

1987
Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval.
J. Inf. Sci. Eng., 1987

Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System.
J. Inf. Sci. Eng., 1987

Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems.
Comput. J., 1987

An Information Protection Scheme Based Upon Number Theory.
Comput. J., 1987

Performance of Two-Disk Partition Data Allocations.
BIT, 1987

1986
A scheme for constructing ordered minimal perfect hashing functions.
Inf. Sci., 1986

Letter-oriented reciprocal hashing scheme.
Inf. Sci., 1986

A Letter-Oriented Minimal Perfect Hashing Scheme.
Comput. J., 1986

On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems.
BIT, 1986

The Idea of De-Clustering and its Applications.
Proceedings of the VLDB'86 Twelfth International Conference on Very Large Data Bases, 1986

On the Design of Ordered Minimal Perfect Hashing Functions.
Proceedings of the Second International Conference on Data Engineering, 1986

1985
On the Complexity of File Allocation Problem.
FODO, 1985

Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems.
FODO, 1985

On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems.
FODO, 1985

Database Research and Development in Taiwan.
FODO, 1985

The Study of a Letter Oriented Minimal Perfect Hashing Scheme.
FODO, 1985

1984
Performance Analyses of Cartesian Product Files and Random Files.
IEEE Trans. Software Eng., 1984

Optimal information retrieval when queries are not random.
Inf. Sci., 1984

An ordered minimal perfect hashing scheme based upon Euler's theorem.
Inf. Sci., 1984

1983
The hierarchical ordering in multiattribute files.
Inf. Sci., 1983

1982
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries.
IEEE Trans. Software Eng., 1982

1980
Some Properties of Cartesian Product Files.
Proceedings of the 1980 ACM SIGMOD International Conference on Management of Data, 1980


  Loading...