Shiuh-Jeng Wang

Orcid: 0000-0002-4546-7865

According to our database1, Shiuh-Jeng Wang authored at least 114 papers between 1996 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Manipulating cyber army in pilot case forensics on social media.
J. Supercomput., 2022

Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube.
IEEE Access, 2022

2021
Cloud evidence tracks of storage service linking with iOS systems.
J. Supercomput., 2021

2020
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation.
Inf. Sci., 2020

Profiling Operations of Cyber Army in Manipulating Public Opinions.
Proceedings of the ICFET 2020, 2020

2019
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks.
Multim. Tools Appl., 2019

Dynamic embedding strategy of VQ-based information hiding approach.
J. Vis. Commun. Image Represent., 2019

Secure Protocol for Identity-based Provable Data Possession in Cloud Storage.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Raw reversibility of information hiding on the basis of VQ systems.
J. Supercomput., 2018

VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements.
J. Supercomput., 2018

File changes with security proof stored in cloud service systems.
Pers. Ubiquitous Comput., 2018

Tor Browser Forensics in Exploring Invisible Evidence.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Mobile Forensics for Cloud Storage Service on iOS Systems.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Mutual authentications to parties with QR-code applications in mobile systems.
Int. J. Inf. Sec., 2017

VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

2016
Data concealments with high privacy in new technology file system.
J. Supercomput., 2016

A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences.
Multim. Tools Appl., 2016

Guest Editorial: Information and Communication Security in Multimedia Applications.
Multim. Tools Appl., 2016

Guest Editorial.
IET Inf. Secur., 2016

Reversible SMVQ Image Hiding Using Adaptive Search Order Coding.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

2015
Web security in a windows system as PrivacyDefender in private browsing mode.
Multim. Tools Appl., 2015

Data hiding of high compression ratio in VQ indices with neighboring correlations.
Multim. Tools Appl., 2015

Security and privacy information technologies and applications for wireless pervasive computing environments.
Inf. Sci., 2015

A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions.
Proceedings of the Information and Communication Technology, 2015

2014
Editorial of special section on Hybrid Information Security Technologies: part II.
J. Supercomput., 2014

Visible watermarking with reversibility of multimedia images for ownership declarations.
J. Supercomput., 2014

VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems.
Peer-to-Peer Netw. Appl., 2014

Image reversibility in data embedding on the basis of blocking-predictions.
Peer-to-Peer Netw. Appl., 2014

Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics.
Proceedings of the Intelligent Systems and Applications, 2014

Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy.
Proceedings of the Information and Communication Technology, 2014

2013
Editorial of special section on hybrid information security technologies - part I.
J. Supercomput., 2013

Visible watermarking images in high quality of data hiding.
J. Supercomput., 2013

Editorial of special section on advanced in high performance, algorithm, and framework for future computing.
J. Supercomput., 2013

Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion.
J. Supercomput., 2013

Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
J. Supercomput., 2013

Special issue on wireless multimedia networks and security services.
Telecommun. Syst., 2013

Data embedding in image-media using weight-function on modulo operations.
ACM Trans. Embed. Comput. Syst., 2013

Reversible data hiding using side-match predictions on steganographic images.
Multim. Tools Appl., 2013

Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping.
Inf. Sci., 2013

Advanced processing technologies and applications for mobile communication systems.
Int. J. Commun. Syst., 2013

Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Memory Forensics for Key Evidence Investigations in Case Illustrations.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Security technologies and applications for convergence environments.
Secur. Commun. Networks, 2012

Prediction-based Reversible Data Hiding Using Empirical Histograms in Images.
KSII Trans. Internet Inf. Syst., 2012

Dual-Watermarking by QR-code Applications in Image Processing.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

iPhone social networking for evidence investigations using iTunes forensics.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC.
Wirel. Pers. Commun., 2011

VQ Applications in Steganographic Data Hiding Upon Multimedia Images.
IEEE Syst. J., 2011

A data hiding scheme using the varieties of pixel-value differencing in multimedia images.
J. Syst. Softw., 2011

Reversible steganography based on side match and hit pattern for VQ-compressed images.
Inf. Sci., 2011

A Trustworthy Computing of ADAPT Principle Guaranteeing Genuine Medical Image.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Reversible Watermarking Scheme with Visibility Using Randomize Distance.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Hash-Algorithms Output for Digital Evidence in Computer Forensics.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Vis. Commun. Image Represent., 2010

Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
J. Syst. Softw., 2010

A Generalized Temporal and Spatial Role-Based Access Control Model.
J. Networks, 2010

Guest Editorial.
J. Networks, 2010

Transforming LSB Substitution for Image-based Steganography in Matching Algorithms.
J. Inf. Sci. Eng., 2010

Hierarchical key derivation scheme for group-oriented communication systems.
Int. J. Inf. Technol. Commun. Convergence, 2010

Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations.
Fundam. Informaticae, 2010

SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases.
Comput. Law Secur. Rev., 2010

Reversible data hiding using neighboring block in VQ-compressed images.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Visual-based embedding systems with targeted secret disclosures and applications.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Codebook-linked Watermarking Scheme for Digital Images.
Fundam. Informaticae, 2009

Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models.
Comput. Stand. Interfaces, 2009

Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers.
Comput. Law Secur. Rev., 2009

Temporal and Location-Based RBAC Model.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Robustness-set in watermarking embedding systems using codebook classifications.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Hierarchical Key Agreement Protocols in Group-User Systems.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Trans. Inf. Forensics Secur., 2008

Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks.
J. Commun., 2008

Flexible Key Assignment for a Time-Token Constraint in a Hierarchy.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.
Proceedings of the Intelligence and Security Informatics, 2008

Non-embedded Image Protection Approaches Based on Vector Quantization.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Secret Sharing Systems with Authentication-Based Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Histogram-based undetectable fidelity image in steganography as MSB controller.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Packet construction for secure conference call request in ad hoc network systems.
Inf. Sci., 2007

Internet forensics on the basis of evidence gathering with Peep attacks.
Comput. Stand. Interfaces, 2007

Measures of retaining digital evidence to prosecute computer-based cyber-crimes.
Comput. Stand. Interfaces, 2007

Two-tier authentication for cluster and individual sets in mobile ad hoc networks.
Comput. Networks, 2007

Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia.
Proceedings of the Future Generation Communication and Networking, 2007

Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Accelerating VQ-based codeword search on the basis of partial search strategy.
Comput. Stand. Interfaces, 2005

Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism.
Appl. Math. Comput., 2005

Steganography of capacity required using modulo operator for embedding secret image.
Appl. Math. Comput., 2005

Gathering Digital Evidence in Response to Information Security Incidents.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Anonymous Wireless Authentication on a Portable Cellular Mobile System.
IEEE Trans. Computers, 2004

Direct construction of a secret in generalized group-oriented cryptography.
Comput. Stand. Interfaces, 2004

Remote table-based log-in authentication upon geometric triangle.
Comput. Stand. Interfaces, 2004

Anonymous message communications with user hierarchy in a multicast system.
Appl. Math. Comput., 2004

Threshold verification scheme to a valid-signature using identity only on specialized approval.
Appl. Math. Comput., 2004

Multicasting Secret Images using a Knapsack-like Cipher System.
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004

2003
Yet another log-in authentication using n-dimensional construction based on circle property.
IEEE Trans. Consumer Electron., 2003

2002
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

1999
A displacement addressing method for letter-oriented keys.
J. Syst. Softw., 1999

A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

1996
Smart card based secure password authentication scheme.
Comput. Secur., 1996

ID-based authentication for mobile conference call.
Proceedings of the Information Systems Security, 1996


  Loading...