Pei-Yu Lin

Orcid: 0000-0001-8809-1063

According to our database1, Pei-Yu Lin authored at least 46 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Confidential QR Code Approach with Higher Information Privacy.
Entropy, 2022

2021
Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

2020
Improved Beam Search for Optimizing No-Wait Flowshops With Release Times.
IEEE Access, 2020

2019
A Smart Roadside Parking System Using Bluetooth Low Energy Beacons.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2017
Video exhibition with adjustable augmented reality system based on temporal psycho-visual modulation.
EURASIP J. Image Video Process., 2017

High payload secret hiding technology for QR codes.
EURASIP J. Image Video Process., 2017

2016
Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code.
IEEE Trans. Ind. Informatics, 2016

A mobile payment mechanism with anonymity for cloud computing.
J. Syst. Softw., 2016

Efficient and accurate document image classification algorithms for low-end copy pipelines.
EURASIP J. Image Video Process., 2016

Augmented reality via temporal psycho-visual modulation.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016

QR code steganography with secret payload enhancement.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016

2015
Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching.
ACM Trans. Multim. Comput. Commun. Appl., 2015

Prevention of cheating in visual cryptography by using coherent patterns.
Inf. Sci., 2015

Active tamper detection of digital images using VQ compression.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Embedding information on search-order codes of VQ indices by rearranging the indicators.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Diverse augmented reality exhibitions for differential users based upon private quick response code.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Media pattern exhibition mechanism via mobile devices.
J. Vis. Commun. Image Represent., 2014

Imperceptible visible watermarking based on postcamera histogram operation.
J. Syst. Softw., 2014

A (n, n)-threshold Secret Sharing Scheme for Barcode Application.
Proceedings of the Intelligent Systems and Applications, 2014

An ID-Based User Authentication Scheme for Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An Image Hiding Method by Applying Tree Structure on Linking Pixels.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
Image Vis. Comput., 2013

Blind QR Code Steganographic Approach Based upon Error Correction Capability.
KSII Trans. Internet Inf. Syst., 2013

Secret Hiding Mechanism Using QR Barcode.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Secret sharing mechanism with cheater detection.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Analyze the Digital Watermarking Security Demands for the Facebook Website.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
Protecting the content integrity of digital imagery with fidelity preservation.
ACM Trans. Multim. Comput. Commun. Appl., 2011

Cheating resistance and reversibility-oriented secret sharing mechanism.
IET Inf. Secur., 2011

Verifiable and Lossless Distributed Media Content Sharing.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

A Verifiable and Recoverable Secret Image Sharing Mechanism.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs.
Wirel. Pers. Commun., 2010

Invertible secret image sharing with steganography.
Pattern Recognit. Lett., 2010

A Grayscale Image Steganography Based upon Discrete Cosine Transformation.
J. Digit. Inf. Manag., 2010

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
J. Commun., 2010

2009
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies.
IEEE Trans. Circuits Syst. Video Technol., 2009

Distortion-free secret image sharing mechanism using modulus operator.
Pattern Recognit., 2009

Preserving robustness and removability for digital watermarks using subsampling and difference correlation.
Inf. Sci., 2009

A Self-Reference Watermarking Scheme Based on Wet Paper Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Adaptive watermark mechanism for rightful ownership protection.
J. Syst. Softw., 2008

A Color Image Authentication Method Using Partitioned Palette and Morphological Operations.
IEICE Trans. Inf. Syst., 2008

2007
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, 2007

Significance-Preserving Codebook Using Generic Algorithm.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2005
Sharing a Secret Two-Tone Image in Two Gray-Level Images.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
An Efficient Graph-Based Method for Parallel Mining Problems.
J. Inf. Knowl. Manag., 2004

A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004


  Loading...