Ching-Nung Yang

According to our database1, Ching-Nung Yang authored at least 127 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
k Out of n Region-Based Progressive Visual Cryptography.
IEEE Trans. Circuits Syst. Video Techn., 2019

2018
Improving recovered image quality in secret image sharing by simple modular arithmetic.
Sig. Proc.: Image Comm., 2018

Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes.
Sig. Proc.: Image Comm., 2018

A construction method of (t, k, n)-essential secret image sharing scheme.
Sig. Proc.: Image Comm., 2018

Quantum Relief algorithm.
Quantum Information Processing, 2018

Study of detection method for spoofed IP against DDoS attacks.
Personal and Ubiquitous Computing, 2018

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Personal and Ubiquitous Computing, 2018

Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph.
J. Visual Communication and Image Representation, 2018

Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.
J. Visual Communication and Image Representation, 2018

Adaptive real-time reversible data hiding for JPEG images.
J. Real-Time Image Processing, 2018

An enhanced threshold visual secret sharing based on random grids.
J. Real-Time Image Processing, 2018

A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.
J. Real-Time Image Processing, 2018

Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real-Time Image Processing, 2018

Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real-Time Image Processing, 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k.
Digital Signal Processing, 2018

Separable reversible data hiding in encrypted halftone image.
Displays, 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding.
IEEE Access, 2018

2017
Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Information Forensics and Security, 2017

Scalable secret image sharing scheme with essential shadows.
Sig. Proc.: Image Comm., 2017

Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Visual Communication and Image Representation, 2017

New privilege-based visual cryptography with arbitrary privilege levels.
J. Visual Communication and Image Representation, 2017

A new sharing digital image scheme with clearer shadow images.
Computer Standards & Interfaces, 2017

Improving stego image quality in image interpolation based data hiding.
Computer Standards & Interfaces, 2017

On the Analysis of k-Secure t-Conference Key Distribution Scheme.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Extended color visual cryptography for black and white secret image.
Theor. Comput. Sci., 2016

Privacy-preserving outsourced gene data search in encryption domain.
Security and Communication Networks, 2016

Data hiding based on overlapped pixels using hamming code.
Multimedia Tools Appl., 2016

Enhanced Boolean-based multi secret image sharing scheme.
Journal of Systems and Software, 2016

Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real-Time Image Processing, 2016

Secure protection of video recorder video in smart car.
IJDSN, 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Transactions, 2016

Essential secret image sharing scheme with the same size of shadows.
Digital Signal Processing, 2016

Enhancing security for two-party comparison over encrypted data.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

3-Out-of-n Cheating Prevention Visual Cryptographic Schemes.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Coverless Information Hiding Method Based on Multi-keywords.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
(1, 7, 4) Data hiding scheme for searching in hidden text with automata.
Vietnam J. Computer Science, 2015

Reducing Code Length of Second-Order Spectral-Null Code.
IEEE Trans. Computers, 2015

Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach.
Sig. Proc.: Image Comm., 2015

Generalized random grids-based threshold visual cryptography with meaningful shares.
Signal Processing, 2015

Watermark with DSA signature using predictive coding.
Multimedia Tools Appl., 2015

Random grid-based visual secret sharing with multiple decryptions.
J. Visual Communication and Image Representation, 2015

Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels.
Inf. Sci., 2015

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality.
Digital Signal Processing, 2015

Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing.
CIT, 2015

E-Health Services for Elderly Care Based on Google Cloud Messaging.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

2014
Flexible Visual Cryptography Scheme and Its Application.
Trans. Data Hiding and Multimedia Security, 2014

Property Analysis of XOR-Based Visual Cryptography.
IEEE Trans. Circuits Syst. Video Techn., 2014

Reducing shadow size in smooth scalable secret image sharing.
Security and Communication Networks, 2014

A secret sharing scheme for EBTC using steganography.
J. Intelligent Manufacturing, 2014

New extended visual cryptography schemes with clearer shadow images.
Inf. Sci., 2014

A discussion on the relationship between probabilistic visual cryptography and random grid.
Inf. Sci., 2014

Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Visual Cryptography Scheme with Autostereogram.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Two-in-One Image Secret Sharing Scheme Based on Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Steganography Based on Grayscale Images Using (5, 3) Hamming Code.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Essential Visual Cryptographic Scheme with Different Importance of Shares.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Data Hiding Based on Radix-2.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing.
IEEE Trans. Information Forensics and Security, 2013

Aspect ratio invariant visual cryptography by image filtering and resizing.
Personal and Ubiquitous Computing, 2013

MSRC: (M)icropayment (S)cheme with ability to (R)eturn (C)hanges.
Mathematical and Computer Modelling, 2013

Natural language letter based visual cryptography scheme.
J. Visual Communication and Image Representation, 2013

Essential secret image sharing scheme with different importance of shadows.
J. Visual Communication and Image Representation, 2013

Sharing more information in gray visual cryptography scheme.
J. Visual Communication and Image Representation, 2013

Data-Hiding for Halftone Images Using an Improved CPT scheme.
TIIS, 2013

Cheating Immune Block-Based Progressive Visual Cryptography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

A Comment on "Sharing Secret Images Using Blakley's Concept".
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Threshold Secret Image Sharing.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography.
IEEE Trans. Circuits Syst. Video Techn., 2012

Enhanced Matrix-Based Secret Image Sharing Scheme.
IEEE Signal Process. Lett., 2012

Improvements of a two-in-one image secret sharing scheme based on gray mixing model.
J. Visual Communication and Image Representation, 2012

Efficient (n, t, n) secret sharing schemes.
Journal of Systems and Software, 2012

Query Tree Algorithm for RFID Tag with Binary-Coded Decimal EPC.
IEEE Communications Letters, 2012

Region-in-Region Incrementing Visual Cryptography Scheme.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Visual Cryptography Based Watermarking: Definition and Meaning.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks.
IEEE Trans. Computers, 2011

A general (k, n) scalable secret image sharing scheme with the smooth scalability.
Journal of Systems and Software, 2011

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.
TIIS, 2011

An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision.
IEEE Communications Letters, 2011

Flexible Visual Cryptography Scheme without Distortion.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability.
Image Vision Comput., 2010

2009
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty.
Signal Processing, 2009

A comment on "Sharing secrets in stegoimages with authentication".
Pattern Recognition, 2009

Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes.
J. Inf. Sci. Eng., 2009

Enhancing Privacy and Security in RFID-Enabled Banknotes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Micropayment schemes with ability to return changes.
Proceedings of the iiWAS'2009, 2009

2008
Image Secret Sharing.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit Shift.
IEEE Trans. Computers, 2008

Colored visual cryptography scheme based on additive color mixing.
Pattern Recognition, 2008

Security Analysis of Authentication of Images Using Recursive Visual Cryptography.
Cryptologia, 2008

Visual Cryptography Schemes with Reversing.
Comput. J., 2008

New Steganography Scheme in Halftone Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Improvements of image sharing with steganography and authentication.
Journal of Systems and Software, 2007

User-friendly image sharing using polynomials with different primes.
Int. J. Imaging Systems and Technology, 2007

Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality.
IJPRAI, 2007

User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes.
Proceedings of the Advances in Multimedia Modeling, 2007

An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Image Secret Sharing.
Proceedings of the Encyclopedia of Multimedia, 2006

Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables.
IEEE Trans. Computers, 2006

Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation.
Pattern Recognition, 2006

Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme.
Integrated Computer-Aided Engineering, 2006

Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

Authorized Tracking and Tracing for RFID Tags.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Real Perfect Contrast Visual Secret Sharing Schemes with Reversing.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
A comment on "Systematic single asymmetric error-correcting Codes".
IEEE Trans. Information Theory, 2005

Design of efficient second-order spectral- codes.
IEEE Trans. Information Theory, 2005

Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion.
Pattern Recognition Letters, 2005

Size-Adjustable Visual Secret Sharing Schemes.
IEICE Transactions, 2005

Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size.
Proceedings of the Computational Science and Its Applications, 2005

2004
New visual secret sharing schemes using probabilistic method.
Pattern Recognition Letters, 2004

2003
New Audio Secret Sharing Schemes With Time Division Technique.
J. Inf. Sci. Eng., 2003

An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

2002
Improvements on Audio and Optical Cryptography.
J. Inf. Sci. Eng., 2002

A Note on Efficient Color Visual Encryption.
J. Inf. Sci. Eng., 2002

2000
New Colored Visual Secret Sharing Schemes.
Des. Codes Cryptography, 2000

1998
DCm Codes for Constructing t-EC/AUED Codes.
IEEE Trans. Computers, 1998

1997
A Note on Error-Correcting Codes for Authentication and Subliminal Channels.
Inf. Process. Lett., 1997

1996
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes.
IEEE Trans. Computers, 1996


  Loading...