Ching-Nung Yang

Orcid: 0000-0002-3881-7329

According to our database1, Ching-Nung Yang authored at least 193 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An enhanced AMBTC for color image compression using color palette.
Multim. Tools Appl., March, 2024

A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain.
IEEE Internet Things J., March, 2024

Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks.
IEEE Trans. Wirel. Commun., January, 2024

Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024

CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection.
IEEE Trans. Multim., 2024

Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction.
IEEE Trans. Cloud Comput., 2024

2023
Dual efficient reversible data hiding using Hamming code and OPAP.
J. Inf. Secur. Appl., August, 2023

A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding.
J. Inf. Secur. Appl., June, 2023

(<i>k, n</i>) secret image sharing scheme with privileged set.
J. Inf. Secur. Appl., March, 2023

RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things.
IEEE Internet Things J., February, 2023

RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing.
ACM Trans. Multim. Comput. Commun. Appl., January, 2023

Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism.
IEEE Trans. Cloud Comput., 2023

Secret image sharing by using multi-prime modular arithmetic.
Signal Process., 2023

An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States.
CoRR, 2023

Privacy-Preserving Quantum Two-Party Geometric Intersection.
CoRR, 2023

Ensuring FHIR Authentication and Data Integrity by Smart Contract and Blockchain Enabled NFT.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Bidirectional Hash Chain Based Key Pre-distribution for Wireless Sensor Networks.
Proceedings of the 8th International Conference on Automation, 2023

2022
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2022

AMBTC-based secret image sharing by simple modular arithmetic.
J. Vis. Commun. Image Represent., 2022

2021
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021

Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

On the Analysis and Design of Visual Cryptography With Error Correcting Capability.
IEEE Trans. Circuits Syst. Video Technol., 2021

A Common Method of Share Authentication in Image Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2021

CP-PSIS: CRT and polynomial-based progressive secret image sharing.
Signal Process., 2021

Secure image secret sharing over distributed cloud network.
Signal Process., 2021

Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.
J. Inf. Secur. Appl., 2021

A (<i>k, n</i>) secret document sharing with meaningful shares.
J. Inf. Secur. Appl., 2021

Two-dimensional diagonal layer hash chain based key pre-distribution scheme.
J. Inf. Secur. Appl., 2021

Geometric rectification-based neural network architecture for image manipulation detection.
Int. J. Intell. Syst., 2021

Blockchain-based decentralized reputation system in E-commerce environment.
Future Gener. Comput. Syst., 2021

2020
DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication.
Signal Process., 2020

A general framework for partial reversible data hiding using hamming code.
Signal Process., 2020

Sharing and hiding a secret image in color palette images with authentication.
Multim. Tools Appl., 2020

High capacity partial reversible data hiding by hamming code.
Multim. Tools Appl., 2020

Probabilistic color visual cryptography schemes for black and white secret images.
J. Vis. Commun. Image Represent., 2020

Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020

(<i>k</i>, <i>n</i>) scalable secret image sharing with multiple decoding options.
J. Intell. Fuzzy Syst., 2020

Cheating immune <i>k</i>-out-of-<i>n</i> block-based progressive visual cryptography.
J. Inf. Secur. Appl., 2020

A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy.
J. Inf. Secur. Appl., 2020

A (t, n) threshold quantum visual secret sharing.
Int. J. Sens. Networks, 2020

2019
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data.
IEEE Trans. Serv. Comput., 2019

k Out of n Region-Based Progressive Visual Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2019

An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial.
Symmetry, 2019

Invertible secret image sharing with steganography and authentication for AMBTC compressed images.
Signal Process. Image Commun., 2019

Enhanced embedding capacity for the SMSD-based data-hiding method.
Signal Process. Image Commun., 2019

Machine Learning for Wireless Multimedia Data Security.
Secur. Commun. Networks, 2019

Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme.
Multim. Tools Appl., 2019

Threshold changeable secret image sharing scheme based on interpolation polynomial.
Multim. Tools Appl., 2019

Generalizing Hamming+k data hiding by overlapped pixels.
Multim. Tools Appl., 2019

A combination of color-black-and-white visual cryptography and polynomial based secret image sharing.
J. Vis. Commun. Image Represent., 2019

A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image.
J. Vis. Commun. Image Represent., 2019

Exploiting error control in matrix coding-based data hiding over lossy channel.
J. Real Time Image Process., 2019

Data Hiding Using Sequential Hamming + k with m Overlapped Pixels.
KSII Trans. Internet Inf. Syst., 2019

Original image tracing with image relational graph for near-duplicate image elimination.
Int. J. Comput. Sci. Eng., 2019

Partial reversible AMBTC-based secret image sharing with steganography.
Digit. Signal Process., 2019

Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019

Boolean Operation Based Visual Cryptography.
IEEE Access, 2019

Video Copy Detection Using Spatio-Temporal CNN Features.
IEEE Access, 2019

A Novel Quantum Visual Secret Sharing Scheme.
IEEE Access, 2019

2018
Improving recovered image quality in secret image sharing by simple modular arithmetic.
Signal Process. Image Commun., 2018

Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes.
Signal Process. Image Commun., 2018

A construction method of (t, k, n)-essential secret image sharing scheme.
Signal Process. Image Commun., 2018

Quantum Relief algorithm.
Quantum Inf. Process., 2018

Study of detection method for spoofed IP against DDoS attacks.
Pers. Ubiquitous Comput., 2018

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Pers. Ubiquitous Comput., 2018

Special issue: Advanced technology for smart home automation and entertainment.
Pers. Ubiquitous Comput., 2018

Enhancing multi-factor cheating prevention in visual cryptography based minimum (<i>k</i>, <i>n</i>)-connected graph.
J. Vis. Commun. Image Represent., 2018

Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.
J. Vis. Commun. Image Represent., 2018

Adaptive real-time reversible data hiding for JPEG images.
J. Real Time Image Process., 2018

An enhanced threshold visual secret sharing based on random grids.
J. Real Time Image Process., 2018

A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.
J. Real Time Image Process., 2018

Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real Time Image Process., 2018

Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real Time Image Process., 2018

Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real Time Image Process., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

(k, n) secret image sharing scheme capable of cheating detection.
EURASIP J. Wirel. Commun. Netw., 2018

Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming + <i>k</i>.
Digit. Signal Process., 2018

Separable reversible data hiding in encrypted halftone image.
Displays, 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding.
IEEE Access, 2018

2017
Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Inf. Forensics Secur., 2017

Scalable secret image sharing scheme with essential shadows.
Signal Process. Image Commun., 2017

Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Vis. Commun. Image Represent., 2017

New privilege-based visual cryptography with arbitrary privilege levels.
J. Vis. Commun. Image Represent., 2017

A new sharing digital image scheme with clearer shadow images.
Comput. Stand. Interfaces, 2017

Improving stego image quality in image interpolation based data hiding.
Comput. Stand. Interfaces, 2017

On the Analysis of k-Secure t-Conference Key Distribution Scheme.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Extended color visual cryptography for black and white secret image.
Theor. Comput. Sci., 2016

Privacy-preserving outsourced gene data search in encryption domain.
Secur. Commun. Networks, 2016

Data hiding based on overlapped pixels using hamming code.
Multim. Tools Appl., 2016

Enhanced Boolean-based multi secret image sharing scheme.
J. Syst. Softw., 2016

Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real Time Image Process., 2016

Secure protection of video recorder video in smart car.
Int. J. Distributed Sens. Networks, 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Trans. Inf. Syst., 2016

Essential secret image sharing scheme with the same size of shadows.
Digit. Signal Process., 2016

Enhancing security for two-party comparison over encrypted data.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

3-Out-of-n Cheating Prevention Visual Cryptographic Schemes.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Coverless Information Hiding Method Based on Multi-keywords.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
(1, 7, 4) Data hiding scheme for searching in hidden text with automata.
Vietnam. J. Comput. Sci., 2015

Reducing Code Length of Second-Order Spectral-Null Code.
IEEE Trans. Computers, 2015

Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach.
Signal Process. Image Commun., 2015

Generalized random grids-based threshold visual cryptography with meaningful shares.
Signal Process., 2015

Watermark with DSA signature using predictive coding.
Multim. Tools Appl., 2015

Random grid-based visual secret sharing with multiple decryptions.
J. Vis. Commun. Image Represent., 2015

Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels.
Inf. Sci., 2015

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality.
Digit. Signal Process., 2015

Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing.
J. Comput. Inf. Technol., 2015

E-Health Services for Elderly Care Based on Google Cloud Messaging.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

2014
Flexible Visual Cryptography Scheme and Its Application.
Trans. Data Hiding Multim. Secur., 2014

Visual Cryptography Based Watermarking.
Trans. Data Hiding Multim. Secur., 2014

Property Analysis of XOR-Based Visual Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2014

Reducing shadow size in smooth scalable secret image sharing.
Secur. Commun. Networks, 2014

A secret sharing scheme for EBTC using steganography.
J. Intell. Manuf., 2014

New extended visual cryptography schemes with clearer shadow images.
Inf. Sci., 2014

A discussion on the relationship between probabilistic visual cryptography and random grid.
Inf. Sci., 2014

Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Visual Cryptography Scheme with Autostereogram.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Two-in-One Image Secret Sharing Scheme Based on Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Steganography Based on Grayscale Images Using (5, 3) Hamming Code.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Essential Visual Cryptographic Scheme with Different Importance of Shares.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Improving Data Hiding Capacity Based on Hamming Code.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Data Hiding Based on Radix-2.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing.
IEEE Trans. Inf. Forensics Secur., 2013

Aspect ratio invariant visual cryptography by image filtering and resizing.
Pers. Ubiquitous Comput., 2013

MSRC: (M)icropayment (S)cheme with ability to (R)eturn (C)hanges.
Math. Comput. Model., 2013

Natural language letter based visual cryptography scheme.
J. Vis. Commun. Image Represent., 2013

Essential secret image sharing scheme with different importance of shadows.
J. Vis. Commun. Image Represent., 2013

Sharing more information in gray visual cryptography scheme.
J. Vis. Commun. Image Represent., 2013

Data-Hiding for Halftone Images Using an Improved CPT scheme.
KSII Trans. Internet Inf. Syst., 2013

Threshold Secret Image Sharing.
IACR Cryptol. ePrint Arch., 2013

Cheating Immune Block-Based Progressive Visual Cryptography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

A Comment on "Sharing Secret Images Using Blakley's Concept".
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2012

Enhanced Matrix-Based Secret Image Sharing Scheme.
IEEE Signal Process. Lett., 2012

Improvements of a two-in-one image secret sharing scheme based on gray mixing model.
J. Vis. Commun. Image Represent., 2012

Efficient (n, t, n) secret sharing schemes.
J. Syst. Softw., 2012

Query Tree Algorithm for RFID Tag with Binary-Coded Decimal EPC.
IEEE Commun. Lett., 2012

Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing
CoRR, 2012

Region-in-Region Incrementing Visual Cryptography Scheme.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Visual Cryptography Based Watermarking: Definition and Meaning.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks.
IEEE Trans. Computers, 2011

A general (k, n) scalable secret image sharing scheme with the smooth scalability.
J. Syst. Softw., 2011

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.
KSII Trans. Internet Inf. Syst., 2011

An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision.
IEEE Commun. Lett., 2011

Flexible Visual Cryptography Scheme without Distortion.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability.
Image Vis. Comput., 2010

2009
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty.
Signal Process., 2009

A comment on "Sharing secrets in stegoimages with authentication".
Pattern Recognit., 2009

Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes.
J. Inf. Sci. Eng., 2009

Enhancing Privacy and Security in RFID-Enabled Banknotes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Micropayment schemes with ability to return changes.
Proceedings of the iiWAS'2009, 2009

2008
Image Secret Sharing.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit Shift.
IEEE Trans. Computers, 2008

Colored visual cryptography scheme based on additive color mixing.
Pattern Recognit., 2008

Security Analysis of Authentication of Images Using Recursive Visual Cryptography.
Cryptologia, 2008

Visual Cryptography Schemes with Reversing.
Comput. J., 2008

New Steganography Scheme in Halftone Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Improvements of image sharing with steganography and authentication.
J. Syst. Softw., 2007

User-friendly image sharing using polynomials with different primes.
Int. J. Imaging Syst. Technol., 2007

Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality.
Int. J. Pattern Recognit. Artif. Intell., 2007

User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes.
Proceedings of the Advances in Multimedia Modeling, 2007

An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Image Secret Sharing.
Proceedings of the Encyclopedia of Multimedia, 2006

Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables.
IEEE Trans. Computers, 2006

Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation.
Pattern Recognit., 2006

New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme.
Integr. Comput. Aided Eng., 2006

Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

Authorized Tracking and Tracing for RFID Tags.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Real Perfect Contrast Visual Secret Sharing Schemes with Reversing.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
A comment on "Systematic single asymmetric error-correcting Codes".
IEEE Trans. Inf. Theory, 2005

Design of efficient second-order spectral- codes.
IEEE Trans. Inf. Theory, 2005

Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion.
Pattern Recognit. Lett., 2005

Size-Adjustable Visual Secret Sharing Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

2004
New visual secret sharing schemes using probabilistic method.
Pattern Recognit. Lett., 2004

An algorithm to enumerate codewords for third-order spectral-null codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
New Audio Secret Sharing Schemes With Time Division Technique.
J. Inf. Sci. Eng., 2003

An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

2002
Improvements on Audio and Optical Cryptography.
J. Inf. Sci. Eng., 2002

A Note on Efficient Color Visual Encryption.
J. Inf. Sci. Eng., 2002

2000
New Colored Visual Secret Sharing Schemes.
Des. Codes Cryptogr., 2000

1998
DC<sub><i>m</i></sub> Codes for Constructing <i>t</i>-EC/AUED Codes.
IEEE Trans. Computers, 1998

1997
A Note on Error-Correcting Codes for Authentication and Subliminal Channels.
Inf. Process. Lett., 1997

1996
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes.
IEEE Trans. Computers, 1996


  Loading...