Pei-Ju Chiang

According to our database1, Pei-Ju Chiang authored at least 12 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Distributed Control of Heat Conduction in Thermal Inductive Materials with 2D Geometrical Isomorphism.
Entropy, 2014

2013
Stereo vision for the measurement of turning tool size.
Proceedings of the IEEE 6th International Workshop on Computational Intelligence and Applications, 2013

2012
Quantitative Analysis of Vascular Structures Using Image Processing.
Proceedings of the Fourth International Conference on Computational Intelligence, 2012

2011
Extrinsic Signature Embedding and Detection in Electrophotographic Halftoned Images Through Exposure Modulation.
IEEE Trans. Inf. Forensics Secur., 2011

2010
Printer and Scanner Forensics: Models and Methods.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

2009
Printer and scanner forensics.
IEEE Signal Process. Mag., 2009

2007
Channel model and operational capacity analysis of printed text documents.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Sensor Forensics: Printers, Cameras and Scanners, They Never Lie.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Information embedding and extraction for electrophotographic printing processes.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Extrinsic signatures embedding and detection for information hiding and secure printing in electrophotography.
Proceedings of the American Control Conference, 2006

2005
Printer identification based on graylevel co-occurrence features for security and forensic applications..
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

2004
Signature-embedding in printed documents for security and forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004


  Loading...