Der-Chyuan Lou

Orcid: 0000-0001-6697-7648

According to our database1, Der-Chyuan Lou authored at least 60 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones.
Internet Things, October, 2023

2021
An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match.
IEEE Access, 2021

2018
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.
Symmetry, 2018

Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
Inf. Sci., 2018

2015
Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.
J. Medical Syst., 2015

2014
Special issue on applied cryptography for information and communication networks.
Secur. Commun. Networks, 2014

An efficient <i>t</i>-out-of-<i>n</i> oblivious transfer for information security and privacy protection.
Int. J. Commun. Syst., 2014

2013
Active steganalysis for interpolation-error based reversible data hiding.
Pattern Recognit. Lett., 2013

Efficient Mobile Conference Scheme for Wireless Communication.
Informatica, 2013

High Performance Reversible Data Hiding for Mobile Applications and Human Interaction.
Int. J. Technol. Hum. Interact., 2013

2012
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis.
Inf. Sci., 2012

Medical image protection using secret sharing scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
Efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2011

A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011

2010
A novel adaptive steganography based on local complexity and human vision sensitivity.
J. Syst. Softw., 2010

Fast modular multiplication based on complement representation and canonical recoding.
Int. J. Comput. Math., 2010

2009
Computational Reduction of Wilson's Primality Test for Modern Cryptosystems.
Informatica (Slovenia), 2009

Message estimation for universal steganalysis using multi-classification support vector machine.
Comput. Stand. Interfaces, 2009

Multiple layer data hiding scheme for medical images.
Comput. Stand. Interfaces, 2009

On the security of a copyright protection scheme based on visual cryptography.
Comput. Stand. Interfaces, 2009

A low-complexity LUT-based squaring algorithm.
Comput. Math. Appl., 2009

Secret Sharing Method for Gray-level Images.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
An efficient Montgomery exponentiation algorithm for public-key cryptosystems.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Fast Modular Multiplication for E-Commerce Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Lossless Secret Image Sharing Method.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
Integer factorization for RSA cryptosystem under a PVM environment.
Comput. Syst. Sci. Eng., 2007

A copyright protection scheme for digital images using visual cryptography technique.
Comput. Stand. Interfaces, 2007

Dual-wrapped digital watermarking scheme for image copyright protection.
Comput. Secur., 2007

Fast modular multi-exponentiation using modified complex arithmetic.
Appl. Math. Comput., 2007

Fast binary multiplication by performing dot counting and complement recoding.
Appl. Math. Comput., 2007

An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques.
Appl. Math. Comput., 2007

Length Estimation for Embedded Message Using Support Vector Machine.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Reversible Data Embedding Using Reduced Difference Expansion.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
J. Syst. Softw., 2006

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
J. Syst. Softw., 2006

Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem.
Informatica, 2006

A robust buyer-seller watermarking scheme based on DWT.
Int. J. Pattern Recognit. Artif. Intell., 2006

A semi-blind digital watermarking scheme based on singular value decomposition.
Comput. Stand. Interfaces, 2006

A robust watermarking scheme using self-reference image.
Comput. Stand. Interfaces, 2006

2005
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications.
Informatica, 2005

A robust watermarking scheme for digital image using self similarity.
Proceedings of the ITRE 2005, 2005

A two-stage reconfigurable image processing system.
Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005

2004
A steganographic scheme for secure communications based on the chaos and euler Theorem.
IEEE Trans. Multim., 2004

Parallel Modular Exponentiation Using Signed-Digit-Folding Technique.
Informatica (Slovenia), 2004

Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques.
Int. J. Comput. Math., 2004

2003
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture.
J. Inf. Sci. Eng., 2003

Fast exponentiation by folding the signed-digit exponent in half.
Int. J. Comput. Math., 2003

2002
Parallel distance transforms on a linear array architecture.
Inf. Process. Lett., 2002

Application of Parallel Virtual Machine Framework to the Strong Prime Problem.
Int. J. Comput. Math., 2002

An efficient steganographic approach.
Comput. Syst. Sci. Eng., 2002

Steganographic Method for Secure Communications.
Comput. Secur., 2002

2001
Spatial database with each picture self-contained multiscape and access control in a hierarchy.
J. Syst. Softw., 2001

2000
Fault resilient and compression tolerant digital signature for image authentication.
IEEE Trans. Consumer Electron., 2000

Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem.
Proceedings of the 2000 International Conference on Image Processing, 2000

1998
An adaptive exponentiation method.
J. Syst. Softw., 1998

1997
A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Comput., 1997

A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997

A Cost Optimal Search Technique for the Knapsack Problem.
Int. J. High Speed Comput., 1997

Parallel computation of the multi-exponentiation for cryptosystems.
Int. J. Comput. Math., 1997

1991
A regular interconnection network.
Microprocessing and Microprogramming, 1991


  Loading...