Tung-Shou Chen

According to our database1, Tung-Shou Chen authored at least 88 papers between 1992 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching.
Multimedia Tools Appl., 2018

A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator.
Multimedia Tools Appl., 2018

Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness.
J. Comput. Sci. Technol., 2018

Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
Inf. Sci., 2018

An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining.
Comput. J., 2018

Reversible Data Hiding in Partially-Encrypted Images.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Reversible Data Hiding Scheme for AMBTC Images Using Gray Code and Exclusive-OR Approaches.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2017
High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction.
IEEE Signal Process. Lett., 2017

An efficient reversible image authentication method using improved PVO and LSB substitution techniques.
Sig. Proc.: Image Comm., 2017

An efficient reversible data hiding method for AMBTC compressed images.
Multimedia Tools Appl., 2017

Data hiding in AMBTC images using quantization level modification and perturbation technique.
Multimedia Tools Appl., 2017

2016
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering.
Sig. Proc.: Image Comm., 2016

Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting.
TIIS, 2016

An improved least-significant-bit substitution method using the modulo three strategy.
Displays, 2016

Effectiveness of combing airdrop and mobile devices in word card teaching.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

VoIP communication quality and flow volume preference - A SIP and Red5 example.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

2015
A Novel Anti-classification Approach for Knowledge Protection.
J. Medical Systems, 2015

Reversible data hiding using Delaunay triangulation and selective embedment.
Inf. Sci., 2015

A High Visual Quality Embedding Method in Edges Based on Pixel Pair Difference.
EAI Endorsed Trans. Creative Technologies, 2015

Reversible Steganographic Method Using Complexity Control and Human Visual System.
Comput. J., 2015

2014
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map.
TIIS, 2014

2013
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving.
The Journal of Supercomputing, 2013

Fast pruning superfluous support vectors in SVMs.
Pattern Recognition Letters, 2013

Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Using MapReduce Framework for Mining Association Rules.
Proceedings of the Information Technology Convergence, 2013

2012
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.
IEEE Trans. Information Forensics and Security, 2012

An Improved Reversible Data Hiding in Encrypted Images Using Side Match.
IEEE Signal Process. Lett., 2012

Data embedding using pixel value differencing and diamond encoding with multiple-base notational system.
Journal of Systems and Software, 2012

An enhanced smoothness evaluation for reversible data hiding in encrypted images.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

2011
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism.
J. Visual Communication and Image Representation, 2011

2010
A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification.
Signal Processing, 2010

A local variance-controlled reversible data hiding method using prediction and histogram-shifting.
Journal of Systems and Software, 2010

2009
Reversible data hiding for high quality images using modification of prediction errors.
Journal of Systems and Software, 2009

2008
A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC).
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Prediction Filling Differences for Compress a Set of HDR Images.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
Audio-Signal Authenticating System Based on Asymmetric Signature Schemes.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Content-based Rate Controlled Data Hiding in JPEG-LS.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A new binary support vector system for increasing detection rate of credit card fraud.
IJPRAI, 2006

A New Face Recognition Method for Blurred Images Using Multi-Channel Wiener Filter.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An ImageWatermarking Scheme Using Pattern Coding Technique.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A New Binary Classifier: Clustering-Launched Classification.
Proceedings of the Computational Intelligence, 2006

2005
A crisscross checking technique for tamper detection in halftone images.
Journal of Systems and Software, 2005

New visual cryptography system based on circular shadow image and fixed angle segmentation.
J. Electronic Imaging, 2005

A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

Novel Questionnaire-Responded Transaction Approach with SVM for Credit Card Fraud Detection.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Hardware Accelerator for Vector Quantization by Using Pruned Look-Up Table.
Proceedings of the Computational Science and Its Applications, 2005

Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Using the ACM Technique to Refine Protein Spots in 2DGE Images.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A simple and efficient watermark technique based on JPEG2000 Codec.
Multimedia Syst., 2004

Two-Dimensional Electrophoresis Image Filter Based on Vector Quantization Technique.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

A Research to Increase Users' Satisfaction and Loyalty Based on the Customer Satisfaction Index: A Case Study on the National Taichung Institute of Technology's Library.
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004

2003
Detecting and restoring the tampered images based on iteration-free fractal compression.
Journal of Systems and Software, 2003

Fractal Image Process Based Image Comparison Search Engine.
J. Inf. Sci. Eng., 2003

An Efficient Block-based Scheme for Progressively Transmitting Lossless Images.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003

A new improvement of SPIHT progressive image transmission.
Proceedings of the Fifth International Symposium on Multimedia Software Engineering, 2003

A new detection method of halftone images based on crisscross checking technique.
Proceedings of the Fifth International Symposium on Multimedia Software Engineering, 2003

A new data hiding method in binary image.
Proceedings of the Fifth International Symposium on Multimedia Software Engineering, 2003

A simple and efficient watermarking technique based on JPEG2000 codec.
Proceedings of the Fifth International Symposium on Multimedia Software Engineering, 2003

2002
Sharing multiple secrets in digital images.
Journal of Systems and Software, 2002

A steganographic method based upon JPEG and quantization table modification.
Inf. Sci., 2002

Recognition of Image Authenticity Using Significant DCT Coefficients Quantization.
Informatica (Slovenia), 2002

An Intellectual Chinese Input System for Mobile Phones Based Upon Chinese Phonetic Symbols.
Int. J. Comput. Proc. Oriental Lang., 2002

Design of a Chinese Search Engine Based on Homophonic Chinese Character Encoding.
Int. J. Comput. Proc. Oriental Lang., 2002

A New Search Engine for Chinese Document Image Retrieval Based on Chinese Character Segmentation Features.
Int. J. Comput. Proc. Oriental Lang., 2002

A New Improvement of JPEG Progressive Image Transmission Using Weight Table of Quantized DCT Coefficient Bits.
Proceedings of the Advances in Multimedia Information Processing, 2002

2001
A new encryption algorithm for image cryptosystems.
Journal of Systems and Software, 2001

A New Two-Path Search Algorithm for Block Motion Estimation of Video Data.
J. Inf. Sci. Eng., 2001

New method of secret image sharing based upon vector quantization.
J. Electronic Imaging, 2001

A Progressive Image Transmission Scheme Based on Block Truncation Coding.
Proceedings of the Human Society and the Internet, 2001

2000
An efficient computation of Euclidean distances using approximated look-up table.
IEEE Trans. Circuits Syst. Video Techn., 2000

A Compact Sparse Matrix Representation Using Random Hash Functions.
Data Knowl. Eng., 2000

An Improved Prediction Method for Quadtree Image Coding.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000

An efficient accessing technique of Chinese characters using Boshiamy Chinese input system.
Proceedings of the Fifth International Workshop on Information Retrieval with Asian Languages, 2000, Hong Kong, China, September 30, 2000

A New Scheme for Sharing Secret Color Images in Computer Network.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

1999
Reconstruction of lost blocks using codeword estimation.
IEEE Trans. Consumer Electronics, 1999

Tree Structured Vector Quantization with Dynamic Path Search.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
A virtual image cryptosystem based upon vector quantization.
IEEE Trans. Image Processing, 1998

A predictive image coding scheme using a smaller codebook.
Sig. Proc.: Image Comm., 1998

Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search.
J. Electronic Imaging, 1998

1997
A new image coding algorithm using variable-rate side-match finite-state vector quantization.
IEEE Trans. Image Processing, 1997

Diagonal axes method (DAM): a fast search algorithm for vector quantization.
IEEE Trans. Circuits Syst. Video Techn., 1997

An Improved VQ Codebook Search Algorithm Using Principal Component Analysis.
J. Visual Communication and Image Representation, 1997

1995
SIMPLE: An Optimal Disk System with Two Restricted Heads.
Inf. Process. Lett., 1995

1992
Amortized Analysis of Disk Scheduling Algorithm V(R).
J. Inf. Sci. Eng., 1992

Amortized Analysis of Some Disk Scheduling Algorithms: SSTF, SCAN, and N-Step SCAN.
BIT, 1992


  Loading...