Ran-Zan Wang

Orcid: 0000-0002-7792-1567

According to our database1, Ran-Zan Wang authored at least 36 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Using ResNet to Utilize 4-class T2-FLAIR Slice Classification Based on the Cholinergic Pathways Hyperintensities Scale for Pathological Aging.
CoRR, 2023

2020
The Nested QR Code.
IEEE Signal Process. Lett., 2020

2017
A Novel Visible Watermarking Scheme Based on Distance Transform.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Automatic genaration of sketch-like pencil drawing from image.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Extended photomosaic with QR code capability.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

2015
A Simple Watermarking Scheme with High Perceptual Quality for Still Color Images Based on RWM and Centroid.
J. Inf. Hiding Multim. Signal Process., 2015

Prevention of cheating in visual cryptography by using coherent patterns.
Inf. Sci., 2015

2014
Data Transmission System for Mobile Device by Audio Hiding Approach.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Energy Consumption Analysis for Sensors in Multi-sink Wireless Sensor Networks.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

High-Payload Lossless Data Hiding Scheme with Block Statistics Characteristics.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Rendering 3D Solid Model.
Proceedings of the Genetic and Evolutionary Computing, 2014

2013
Blind QR Code Steganographic Approach Based upon Error Correction Capability.
KSII Trans. Internet Inf. Syst., 2013

A Novel Data Hiding Method Using Sphere Encoding.
Proceedings of the Genetic and Evolutionary Computing, 2013

Non-expanding Friendly Visual Cryptography.
Proceedings of the Genetic and Evolutionary Computing, 2013

Hierarchical Particle Swarm Optimization Algorithm of IPSVR Problem.
Proceedings of the Genetic and Evolutionary Computing, 2013

2012
Verifiable Visual Cryptography.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
Tagged Visual Cryptography.
IEEE Signal Process. Lett., 2011

Random grid-based visual cryptography with identifiable shares.
J. Electronic Imaging, 2011

Improved Invertible Secret Image Sharing with Steganography.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Scalable Secret Image Sharing With Smaller Shadow Images.
IEEE Signal Process. Lett., 2010

Scalable user-friendly image sharing.
J. Vis. Commun. Image Represent., 2010

High-Payload Image Hiding Scheme Using k-Way Block Matching.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Region Incrementing Visual Cryptography.
IEEE Signal Process. Lett., 2009

Steganalysis of Reversible Contrast Mapping Watermarking.
IEEE Signal Process. Lett., 2009

An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding.
Proceedings of the Advances in Image and Video Technology, Third Pacific Rim Symposium, 2009

Multisecret Image Sharing.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A Vision-Based Augmented-Reality System For Multiuser Collaborative Environments.
IEEE Trans. Multim., 2008

Hiding Images Using Modified Search-Order Coding and Modulus Function.
Int. J. Pattern Recognit. Artif. Intell., 2008

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering.
EURASIP J. Adv. Signal Process., 2008

2007
Scalable secret image sharing.
Signal Process. Image Commun., 2007

An image-hiding method with high hiding capacity based on best-block matching and k-means clustering.
Pattern Recognit., 2007

Sharing multiple secrets in visual cryptography.
Pattern Recognit., 2007

2006
High-payload image steganography using two-way block matching.
IEEE Signal Process. Lett., 2006

Secret image sharing with smaller shadow images.
Pattern Recognit. Lett., 2006

2001
Image hiding by optimal LSB substitution and genetic algorithm.
Pattern Recognit., 2001


  Loading...