Der-Chyuan Lou

According to our database1, Der-Chyuan Lou authored at least 56 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.
Symmetry, 2018

Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
Inf. Sci., 2018

2015
Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.
J. Medical Systems, 2015

2014
Special issue on applied cryptography for information and communication networks.
Security and Communication Networks, 2014

An efficient t-out-of-n oblivious transfer for information security and privacy protection.
Int. J. Communication Systems, 2014

2013
Active steganalysis for interpolation-error based reversible data hiding.
Pattern Recognition Letters, 2013

Efficient Mobile Conference Scheme for Wireless Communication.
Informatica, Lith. Acad. Sci., 2013

High Performance Reversible Data Hiding for Mobile Applications and Human Interaction.
IJTHI, 2013

2012
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis.
Inf. Sci., 2012

Medical image protection using secret sharing scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
Efficient three-party password-based key exchange scheme.
Int. J. Communication Systems, 2011

A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011

2010
A novel adaptive steganography based on local complexity and human vision sensitivity.
Journal of Systems and Software, 2010

Fast modular multiplication based on complement representation and canonical recoding.
Int. J. Comput. Math., 2010

2009
Computational Reduction of Wilson's Primality Test for Modern Cryptosystems.
Informatica (Slovenia), 2009

Message estimation for universal steganalysis using multi-classification support vector machine.
Computer Standards & Interfaces, 2009

Multiple layer data hiding scheme for medical images.
Computer Standards & Interfaces, 2009

On the security of a copyright protection scheme based on visual cryptography.
Computer Standards & Interfaces, 2009

A low-complexity LUT-based squaring algorithm.
Computers & Mathematics with Applications, 2009

Secret Sharing Method for Gray-level Images.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
An efficient Montgomery exponentiation algorithm for public-key cryptosystems.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Fast Modular Multiplication for E-Commerce Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Lossless Secret Image Sharing Method.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
Integer factorization for RSA cryptosystem under a PVM environment.
Comput. Syst. Sci. Eng., 2007

A copyright protection scheme for digital images using visual cryptography technique.
Computer Standards & Interfaces, 2007

Dual-wrapped digital watermarking scheme for image copyright protection.
Computers & Security, 2007

Fast modular multi-exponentiation using modified complex arithmetic.
Applied Mathematics and Computation, 2007

Fast binary multiplication by performing dot counting and complement recoding.
Applied Mathematics and Computation, 2007

An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques.
Applied Mathematics and Computation, 2007

Length Estimation for Embedded Message Using Support Vector Machine.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Reversible Data Embedding Using Reduced Difference Expansion.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
Journal of Systems and Software, 2006

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
Journal of Systems and Software, 2006

Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem.
Informatica, Lith. Acad. Sci., 2006

A robust buyer-seller watermarking scheme based on DWT.
IJPRAI, 2006

A semi-blind digital watermarking scheme based on singular value decomposition.
Computer Standards & Interfaces, 2006

A robust watermarking scheme using self-reference image.
Computer Standards & Interfaces, 2006

2005
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications.
Informatica, Lith. Acad. Sci., 2005

A robust watermarking scheme for digital image using self similarity.
Proceedings of the ITRE 2005, 2005

A two-stage reconfigurable image processing system.
Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005

2004
A steganographic scheme for secure communications based on the chaos and euler Theorem.
IEEE Trans. Multimedia, 2004

Parallel Modular Exponentiation Using Signed-Digit-Folding Technique.
Informatica (Slovenia), 2004

Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques.
Int. J. Comput. Math., 2004

2003
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture.
J. Inf. Sci. Eng., 2003

Fast exponentiation by folding the signed-digit exponent in half.
Int. J. Comput. Math., 2003

2002
Parallel distance transforms on a linear array architecture.
Inf. Process. Lett., 2002

Application of Parallel Virtual Machine Framework to the Strong Prime Problem.
Int. J. Comput. Math., 2002

An efficient steganographic approach.
Comput. Syst. Sci. Eng., 2002

Steganographic Method for Secure Communications.
Computers & Security, 2002

2001
Spatial database with each picture self-contained multiscape and access control in a hierarchy.
Journal of Systems and Software, 2001

2000
Fault resilient and compression tolerant digital signature for image authentication.
IEEE Trans. Consumer Electronics, 2000

Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem.
Proceedings of the 2000 International Conference on Image Processing, 2000

1998
An adaptive exponentiation method.
Journal of Systems and Software, 1998

1997
A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Computing, 1997

A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997

A Cost Optimal Search Technique for the Knapsack Problem.
International Journal of High Speed Computing, 1997


  Loading...