Hsien-Chu Wu

According to our database1, Hsien-Chu Wu authored at least 34 papers between 2000 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2013
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images.
Journal of Systems and Software, 2013

2011
Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map.
Multimedia Tools Appl., 2011

Coloured visual cryptography using fixed size meaningful share.
Int. J. Comput. Math., 2011

A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011

2010
Reversible image steganographic scheme via predictive coding.
Displays, 2010

A novel color palette image authentication scheme.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
Journal of Systems and Software, 2009

High-capacity reversible data hiding in binary images using pattern substitution.
Computer Standards & Interfaces, 2009

Multi-level visual secret sharing scheme with smooth-looking.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Image segmentation by automatic histogram thresholding.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Adaptive lossless steganographic scheme with centralized difference expansion.
Pattern Recognition, 2008

Visual secret sharing for multiple secrets.
Pattern Recognition, 2008

Color Visual Cryptography Scheme Using Meaningful Shares.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Block-Based Authentication Watermarking Technique for Binary Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Image Steganographic Scheme Based on Support Vector Regression.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Tamper Detection of Relational Database Based on SVR Predictive Difference.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Lossless Data Hiding for Color Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Inform., 2007

Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A minute lossy method for 2D-gel images compression.
Int. J. Imaging Systems and Technology, 2006

Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A DCT-based Recoverable Image Authentication.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.
Proceedings of the Computational Science and Its Applications, 2006

2005
A new multi-secret images sharing scheme using Largrange's interpolation.
Journal of Systems and Software, 2005

Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications.
I. J. Network Security, 2005

A Scheme for Key Management on Alternate Temporal Key Hash.
I. J. Network Security, 2005

A Secure Strong-Password Authentication Protocol.
Fundam. Inform., 2005

Sharing visual multi-secrets using circle shares.
Computer Standards & Interfaces, 2005

A novel digital image watermarking scheme based on the vector quantization technique.
Computers & Security, 2005

A Duplicate Chinese Document Image Retrieval System.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Inform., 2004

2003
Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Inform., 2003

2002
Detection and restoration of tampered JPEG compressed images.
Journal of Systems and Software, 2002

2000
Computing watermarks from images using quadtrees.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000


  Loading...