Chin-Feng Lee

According to our database1, Chin-Feng Lee authored at least 71 papers between 1995 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Generalized PVO-K Embedding Technique for Reversible Data Hiding.
I. J. Network Security, 2018

An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018

2017
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
Multimedia Tools Appl., 2017

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing.
Proceedings of the Genetic and Evolutionary Computing, 2017

VQ Compression Enhancer with Huffman Coding.
Proceedings of the Genetic and Evolutionary Computing, 2017

2016
Steganographic access control in data hiding using run-length encoding and modulo-operations.
Security and Communication Networks, 2016

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
TIIS, 2016

Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework.
Proceedings of the International Conference on Networking and Network Applications, 2016

A Pixel Value Ordering Predictor for High-Capacity Reversible Data Hiding.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
Adjustment Hiding Method Based on Exploiting Modification Direction.
I. J. Network Security, 2015

An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

pNFS-Based Software-Defined Storage for Information Lifecycle Management.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
A High Capacity Reversible Multiple-Image Hiding Scheme.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Lossless Text Steganography in Compression Coding.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
The Journal of Supercomputing, 2013

Reversible data hiding scheme based on dual stegano-images using orientation combinations.
Telecommunication Systems, 2013

Histogram-shifting-imitated reversible data hiding.
Journal of Systems and Software, 2013

An Adjustable Frequency Bat Algorithm Based on Flight Direction to Improve Solution Accuracy for Optimization Problems.
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Memory Forensics for Key Evidence Investigations in Case Illustrations.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Server-less RFID authentication and searching protocol with enhanced security.
Int. J. Communication Systems, 2012

An efficient image interpolation increasing payload in reversible data hiding.
Expert Syst. Appl., 2012

Adjustable prediction-based reversible data hiding.
Digital Signal Processing, 2012

Employing LSB and VQ for Undetectable Secret Data Hiding.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

An Efficient Lossless Data Hiding Scheme on VQ Index Coding.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
A Prediction-Based Adaptive Reversible Data Embedding Scheme.
JSW, 2011

A secure fragile watermarking scheme based on chaos-and-hamming code.
Journal of Systems and Software, 2011

Anti-Forensics with Steganographic Data Embedding in Digital Images.
IEEE Journal on Selected Areas in Communications, 2011

Two RFID-based Solutions to Enhance Inpatient Medication Safety.
J. Medical Systems, 2011

A Hierarchical Fragile Watermarking with VQ Index Recovery.
Journal of Multimedia, 2011

Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Reversible Data Hiding Based on VQ Compression Code.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Embedding capacity raising in reversible data hiding based on prediction of difference expansion.
Journal of Systems and Software, 2010

A novel data hiding scheme based on modulus function.
Journal of Systems and Software, 2010

An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks.
Image Vision Comput., 2010

Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls.
IJIPT, 2010

A reversible and multiple-layer embedding strategy with high capacity.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
An Embedding Technique Based upon Block Prediction and Code Cascading Shift.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Data Concealment Scheme for HTML Documents Based on Color Code.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Embedding Secret Messages Using Modified Huffman Coding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A reversible data hiding scheme based on dual steganographic images.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Embedding secret messages based on chaotic map and Huffman coding.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vision Comput., 2008

Efficient Image Recovery Based on Self-Embedding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Blind Associative Watermarking Technique Using Self-Embedding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant Region.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Complete Double Layered Embedding Scheme for Information Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Effective Demosaicking and Zooming Algorithm for CFA Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Blind Associative Watermark Detection Scheme Using Self-Embedding Technique.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Reversible Data Embedding Using the Sliding Window.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

An Improved EMD Embedding Scheme Based on Secret Image Difference.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Hiding Information Employing Reduplicating Embedding.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

High-Capacity Data Hiding Using Virtual Window Partition.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A data mining approach to database compression.
Information Systems Frontiers, 2006

Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

2005
An FP-split method for fast association rules mining.
Proceedings of the ITRE 2005, 2005

2004
On-line personalized sales promotion in electronic commerce.
Expert Syst. Appl., 2004

2000
Breadth-first search oriented symbolic picture representation for spatial match retrieval.
Journal of Systems and Software, 2000

1998
A spatial match retrieval mechanism for symbolic pictures.
Journal of Systems and Software, 1998

A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures.
Data Knowl. Eng., 1998

1997
Spatial match retrieval based on direction signatures using multiple key hashing scheme.
Int. J. Intell. Syst., 1997

1996
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
CODAS, 1996

1995
Relative coordinates oriented symbolic string for spatial relationship retrieval.
Pattern Recognition, 1995


  Loading...