Hsien-Chu Wu

Orcid: 0000-0002-4313-9585

According to our database1, Hsien-Chu Wu authored at least 42 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification.
Multim. Tools Appl., April, 2024

2022
GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain.
IEEE Syst. J., 2022

An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks.
Multim. Tools Appl., 2022

2021
Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques.
Symmetry, 2021

A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code.
Symmetry, 2021

A Hybrid Deep Learning Network for Long-Term Travel Time Prediction in Freeways.
Proceedings of the 2021 International Conference on Technologies and Applications of Artificial Intelligence, 2021

Deep Ensemble Learning Model for Long-Term Travel Time Prediction on Highways.
Proceedings of the Fourth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2021

2020
Efficient Extraction of Target Users for Package Promotion in Big Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

2013
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images.
J. Syst. Softw., 2013

2011
Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map.
Multim. Tools Appl., 2011

Coloured visual cryptography using fixed size meaningful share.
Int. J. Comput. Math., 2011

A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
Displays, 2011

2010
Reversible image steganographic scheme via predictive coding.
Displays, 2010

A novel color palette image authentication scheme.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
J. Syst. Softw., 2009

High-capacity reversible data hiding in binary images using pattern substitution.
Comput. Stand. Interfaces, 2009

Multi-level visual secret sharing scheme with smooth-looking.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Image segmentation by automatic histogram thresholding.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Adaptive lossless steganographic scheme with centralized difference expansion.
Pattern Recognit., 2008

Visual secret sharing for multiple secrets.
Pattern Recognit., 2008

Color Visual Cryptography Scheme Using Meaningful Shares.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Block-Based Authentication Watermarking Technique for Binary Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Image Steganographic Scheme Based on Support Vector Regression.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Tamper Detection of Relational Database Based on SVR Predictive Difference.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Lossless Data Hiding for Color Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Informaticae, 2007

Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A minute lossy method for 2D-gel images compression.
Int. J. Imaging Syst. Technol., 2006

Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A DCT-based Recoverable Image Authentication.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.
Proceedings of the Computational Science and Its Applications, 2006

2005
A new multi-secret images sharing scheme using Largrange's interpolation.
J. Syst. Softw., 2005

Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications.
Int. J. Netw. Secur., 2005

A Scheme for Key Management on Alternate Temporal Key Hash.
Int. J. Netw. Secur., 2005

A Secure Strong-Password Authentication Protocol.
Fundam. Informaticae, 2005

Sharing visual multi-secrets using circle shares.
Comput. Stand. Interfaces, 2005

A novel digital image watermarking scheme based on the vector quantization technique.
Comput. Secur., 2005

A Duplicate Chinese Document Image Retrieval System.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Informaticae, 2004

2003
Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Informaticae, 2003

2002
Detection and restoration of tampered JPEG compressed images.
J. Syst. Softw., 2002

2000
Computing watermarks from images using quadtrees.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000


  Loading...