Jau-Ji Shen

Orcid: 0000-0001-6605-7374

According to our database1, Jau-Ji Shen authored at least 61 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix.
Symmetry, 2021

A High Embedding Capacity Steganographic Method Using Maximum and Minimum pixels Difference Adaptive Strategy.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

2020
A generalized pixel value ordering data hiding with adaptive embedding capability.
J. Supercomput., 2020

PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity.
Symmetry, 2020

A self-embedding fragile image authentication based on singular value decomposition.
Multim. Tools Appl., 2020

An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme.
IEEE Access, 2020

Data Hiding Method Based on 3D Magic Cube.
IEEE Access, 2020

An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network.
Proceedings of the ICFET 2020, 2020

Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network.
Proceedings of the ICFET 2020, 2020

An Improved Lossless Information Hiding in SMVQ Compressed Images.
Proceedings of the ICFET 2020, 2020

2019
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery.
Sensors, 2019

Overlapping pixel value ordering predictor for high-capacity reversible data hiding.
J. Real Time Image Process., 2019

A new approach of lossy image compression based on hybrid image resizing techniques.
Int. Arab J. Inf. Technol., 2019

Image Steganographic Scheme Based on Doublelayer Magic Matrix.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

2018
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching.
Int. J. Netw. Secur., 2018

A Survey of Reversible Data Hiding for VQ-Compressed Images.
Int. J. Netw. Secur., 2018

A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Survey of Semi-fragile Watermarking Authentication.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

2017
Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques.
IEEE Trans. Image Process., 2017

An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching.
Int. J. Netw. Secur., 2017

A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Steganographic Image Hiding Schemes Based on Edge Detection.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
A Survey of Data Distortion Watermarking Relational Databases.
Int. J. Netw. Secur., 2016

Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework.
Proceedings of the International Conference on Networking and Network Applications, 2016

Effective quality improvement of upscaled images by differential image scheme.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
Equalized CR-dropping for Image Compression.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
A New Robust Watermarking Scheme Based on Features Classification Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Two Phased Decompression Scheme for Quality Improvement of Vector Quantized Images.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

A Robust Information Hiding Scheme with Range Coding on Color-Image.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
A New Approach of Image Compression Based on Difference Vector Quantization.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

The First Robust Image Tamper Detection Scheme under Brightness.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Recover the tampered image based on VQ indexing.
Signal Process., 2010

A robust associative watermarking technique based on vector quantization.
Digit. Signal Process., 2010

2009
Meaningful Inner Link Objects for Automatic Text Categorization.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

An Embedding Technique Based upon Block Prediction and Code Cascading Shift.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A Fragile Associative Watermarking on 2D Barcode for Data Authentication.
Int. J. Netw. Secur., 2008

Complete Double Layered Embedding Scheme for Information Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
A robust associative watermarking technique based on similarity diagrams.
Pattern Recognit., 2007

Combined association rules for dealing with missing values.
J. Inf. Sci., 2007

2006
A data mining approach to database compression.
Inf. Syst. Frontiers, 2006

A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
A Petri-Net Based Modeling Apporach to Concurrent Software Engineering Tasks.
J. Inf. Sci. Eng., 2005

Cryptanalysis of a New Efficient MAKEP for Wireless Communications.
Int. J. Netw. Secur., 2005

FA-Tree - A Dynamic Indexing Structure for Spatial Data.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

Watermarking with Association Rules Alignment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Improving Image Quality for JPEG Compression.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
A Secure LITESET Scheme.
IEICE Trans. Inf. Syst., 2004

2003
A modified remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2003

Security enhancement for optimal strong-password authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2003

Security enhancement for the timestamp-based password authentication scheme using smart cards.
Comput. Secur., 2003

Minimizing Transmission Cost for Distributed Database Design Based on Ontology Schema.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

A Recycle Technique of Association Rule for Missing Value Completion.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
A Compact Patricia Trie for a Large Set of Keys.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002


  Loading...