Chin-Feng Lee

Orcid: 0000-0002-4829-0727

According to our database1, Chin-Feng Lee authored at least 107 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy.
Comput. Syst. Sci. Eng., 2023

A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Images.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Healthcare Material Review with Online Chatbot and Care-receiver Sentiment Analysis Information System.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Investigating Factors Influencing the Retention Intention of Digital Companion for Learning Project: Case of a Technology University in Taiwan.
Proceedings of the 12th International Conference on Awareness Science and Technology, 2023

Dual Image Reversible Data Hiding Based on Coordinate Vector Directions via Communication Networking.
Proceedings of the 8th International Conference on Cloud Computing and Internet of Things, 2023

2021
High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix.
Symmetry, 2021

Turtle-shell data embedding method with high image fidelity.
Int. J. Embed. Syst., 2021

2020
A generalized pixel value ordering data hiding with adaptive embedding capability.
J. Supercomput., 2020

PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity.
Symmetry, 2020

A self-embedding fragile image authentication based on singular value decomposition.
Multim. Tools Appl., 2020

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images.
KSII Trans. Internet Inf. Syst., 2020

Greedy algorithm for image quality optimisation based on turtle-shell steganography.
Int. J. Comput. Sci. Eng., 2020

Data Hiding Method Based on 3D Magic Cube.
IEEE Access, 2020

An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network.
Proceedings of the ICFET 2020, 2020

Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network.
Proceedings of the ICFET 2020, 2020

An Improved Lossless Information Hiding in SMVQ Compressed Images.
Proceedings of the ICFET 2020, 2020

2019
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding.
Soft Comput., 2019

Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery.
Sensors, 2019

Overlapping pixel value ordering predictor for high-capacity reversible data hiding.
J. Real Time Image Process., 2019

Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering.
IEEE Access, 2019

An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems.
IEEE Access, 2019

Image Steganographic Scheme Based on Doublelayer Magic Matrix.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Digital Image Anti-counterfeiting Technology.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions.
J. Netw. Intell., 2018

Data Hiding Scheme Based on A Flower-Shaped Reference Matrix.
J. Netw. Intell., 2018

Generalized PVO-K Embedding Technique for Reversible Data Hiding.
Int. J. Netw. Secur., 2018

An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018

A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Survey of Semi-fragile Watermarking Authentication.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Survey of Authentication Protocols in VANET.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
Multim. Tools Appl., 2017

VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy.
J. Inf. Hiding Multim. Signal Process., 2017

A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Steganographic Image Hiding Schemes Based on Edge Detection.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing.
Proceedings of the Genetic and Evolutionary Computing, 2017

VQ Compression Enhancer with Huffman Coding.
Proceedings of the Genetic and Evolutionary Computing, 2017

An image hiding scheme based on magic square.
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

2016
Steganographic access control in data hiding using run-length encoding and modulo-operations.
Secur. Commun. Networks, 2016

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
KSII Trans. Internet Inf. Syst., 2016

Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework.
Proceedings of the International Conference on Networking and Network Applications, 2016

A Pixel Value Ordering Predictor for High-Capacity Reversible Data Hiding.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map.
J. Inf. Hiding Multim. Signal Process., 2015

Adjustment Hiding Method Based on Exploiting Modification Direction.
Int. J. Netw. Secur., 2015

An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

pNFS-Based Software-Defined Storage for Information Lifecycle Management.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
A High Capacity Reversible Multiple-Image Hiding Scheme.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Lossless Text Steganography in Compression Coding.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
J. Supercomput., 2013

Reversible data hiding scheme based on dual stegano-images using orientation combinations.
Telecommun. Syst., 2013

Histogram-shifting-imitated reversible data hiding.
J. Syst. Softw., 2013

An Adjustable Frequency Bat Algorithm Based on Flight Direction to Improve Solution Accuracy for Optimization Problems.
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Memory Forensics for Key Evidence Investigations in Case Illustrations.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Server-less RFID authentication and searching protocol with enhanced security.
Int. J. Commun. Syst., 2012

An efficient image interpolation increasing payload in reversible data hiding.
Expert Syst. Appl., 2012

Adjustable prediction-based reversible data hiding.
Digit. Signal Process., 2012

Employing LSB and VQ for Undetectable Secret Data Hiding.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

An Efficient Lossless Data Hiding Scheme on VQ Index Coding.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
A Prediction-Based Adaptive Reversible Data Embedding Scheme.
J. Softw., 2011

A secure fragile watermarking scheme based on chaos-and-hamming code.
J. Syst. Softw., 2011

Anti-Forensics with Steganographic Data Embedding in Digital Images.
IEEE J. Sel. Areas Commun., 2011

Two RFID-based Solutions to Enhance Inpatient Medication Safety.
J. Medical Syst., 2011

A Hierarchical Fragile Watermarking with VQ Index Recovery.
J. Multim., 2011

Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Reversible Data Hiding Based on VQ Compression Code.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Embedding capacity raising in reversible data hiding based on prediction of difference expansion.
J. Syst. Softw., 2010

A novel data hiding scheme based on modulus function.
J. Syst. Softw., 2010

Recovery of Color Images by Composed Associative Mining and Edge Detection.
J. Inf. Hiding Multim. Signal Process., 2010

An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks.
Image Vis. Comput., 2010

Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls.
Int. J. Internet Protoc. Technol., 2010

A reversible and multiple-layer embedding strategy with high capacity.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
An Embedding Technique Based upon Block Prediction and Code Cascading Shift.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Data Concealment Scheme for HTML Documents Based on Color Code.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Embedding Secret Messages Using Modified Huffman Coding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A reversible data hiding scheme based on dual steganographic images.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Embedding secret messages based on chaotic map and Huffman coding.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vis. Comput., 2008

Efficient Image Recovery Based on Self-Embedding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Blind Associative Watermarking Technique Using Self-Embedding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant Region.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Complete Double Layered Embedding Scheme for Information Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Effective Demosaicking and Zooming Algorithm for CFA Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Blind Associative Watermark Detection Scheme Using Self-Embedding Technique.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Reversible Data Embedding Using the Sliding Window.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

An Improved EMD Embedding Scheme Based on Secret Image Difference.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Hiding Information Employing Reduplicating Embedding.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

High-Capacity Data Hiding Using Virtual Window Partition.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A data mining approach to database compression.
Inf. Syst. Frontiers, 2006

Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

2005
An FP-split method for fast association rules mining.
Proceedings of the ITRE 2005, 2005

2004
On-line personalized sales promotion in electronic commerce.
Expert Syst. Appl., 2004

2000
Breadth-first search oriented symbolic picture representation for spatial match retrieval.
J. Syst. Softw., 2000

1998
A spatial match retrieval mechanism for symbolic pictures.
J. Syst. Softw., 1998

A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures.
Data Knowl. Eng., 1998

1997
Spatial match retrieval based on direction signatures using multiple key hashing scheme.
Int. J. Intell. Syst., 1997

1996
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications, 1996

1995
Relative coordinates oriented symbolic string for spatial relationship retrieval.
Pattern Recognit., 1995


  Loading...