Chwei-Shyong Tsai

According to our database1, Chwei-Shyong Tsai authored at least 39 papers between 2000 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
A new visual cryptography with multi-level encoding.
J. Vis. Lang. Comput., 2014

Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface.
J. Sensors, 2014

2013
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images.
Journal of Systems and Software, 2013

2012
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Security and Communication Networks, 2012

2011
Coloured visual cryptography using fixed size meaningful share.
Int. J. Comput. Math., 2011

A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011

2010
A novel adaptive steganography based on local complexity and human vision sensitivity.
Journal of Systems and Software, 2010

Reversible image steganographic scheme via predictive coding.
Displays, 2010

A tabular steganography scheme for graphical password authentication.
Comput. Sci. Inf. Syst., 2010

Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
Journal of Systems and Software, 2009

A HDWT-based reversible data hiding method.
Journal of Systems and Software, 2009

A new authenticated group key agreement in a mobile environment.
Annales des Télécommunications, 2009

Multi-level visual secret sharing scheme with smooth-looking.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Adaptive lossless steganographic scheme with centralized difference expansion.
Pattern Recognition, 2008

Visual secret sharing for multiple secrets.
Pattern Recognition, 2008

A high quality steganographic method with pixel-value differencing and modulus function.
Journal of Systems and Software, 2008

Using adaptive resonance theory and data-mining techniques for materials recommendation based on the e-library environment.
The Electronic Library, 2008

A Block-Based Authentication Watermarking Technique for Binary Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2006
Password Authentication Schemes: Current Status and Key Issues.
I. J. Network Security, 2006

Reversible Watermarking: Current Status and Key Issues.
I. J. Network Security, 2006

Robust Image Hiding Method.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.
Proceedings of the Computational Science and Its Applications, 2006

2005
A new multi-secret images sharing scheme using Largrange's interpolation.
Journal of Systems and Software, 2005

An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet.
I. J. Network Security, 2005

Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Applied Mathematics and Computation, 2005

2004
A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004

A New Repeating Color Watermarking Scheme Based on Human Visual Model.
EURASIP J. Adv. Sig. Proc., 2004

Generalization of proxy signature based on elliptic curves.
Computer Standards & Interfaces, 2004

Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling.
Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Scienes, 2004

On the Security of an Enhanced Authentication Key Exchange Protocol.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci., 2003

A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Inform., 2003

An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Inform., 2003

2002
Sharing multiple secrets in digital images.
Journal of Systems and Software, 2002

2001
A Generalized Secret Image Sharing and Recovery Scheme.
Proceedings of the Advances in Multimedia Information Processing, 2001

2000
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000

A New Scheme for Sharing Secret Color Images in Computer Network.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000


  Loading...