Tzung-Her Chen

According to our database1, Tzung-Her Chen authored at least 69 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
On the security of threshold random grid-based visual secret sharing.
Multimedia Tools Appl., 2019

Secure and efficient protection for HTTP cookies with self-verification.
Int. J. Communication Systems, 2019

2018
On the design of a two-decoding-option image secret sharing scheme.
Multimedia Tools Appl., 2018

A novel DRM scheme for accommodating expectations of personal use.
Multimedia Tools Appl., 2018

On the security of a BTC-based-compression image authentication scheme.
Multimedia Tools Appl., 2018

A Weighted Threshold Visual Cryptography.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

2017
A new buyer-seller watermarking protocol without multiple watermarks insertion.
Multimedia Tools Appl., 2017

A Novel Weighted Visual Cryptography Scheme with High Visual Quality.
I. J. Network Security, 2017

2016
On the difficulty of aligning VSS random grids.
Sig. Proc.: Image Comm., 2016

A multi-watermarking protocol for health information management.
Multimedia Tools Appl., 2016

On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services.
I. J. Network Security, 2016

An Improved Anonymous Buyer-Reseller Watermarking Protocol.
I. J. Network Security, 2016

2015
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes.
Sig. Proc.: Image Comm., 2015

Friendly progressive random-grid-based visual secret sharing with adaptive contrast.
J. Visual Communication and Image Representation, 2015

Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC.
I. J. Network Security, 2015

Visual multiple-secret sharing for flexible general access structure by random grids.
Displays, 2015

2014
Multi-factor cheating prevention in visual secret sharing by hybrid codebooks.
J. Visual Communication and Image Representation, 2014

Distortionless visual multi-secret sharing based on random grid.
Inf. Sci., 2014

Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication.
IJDCF, 2014

An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
A security-enhanced key agreement protocol based on chaotic maps.
Security and Communication Networks, 2013

Quality-adaptive visual secret sharing by random grids.
Journal of Systems and Software, 2013

Quality-improved threshold visual secret sharing scheme by random grids.
IET Image Processing, 2013

Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern.
Displays, 2013

A random grid-based cyclic access structure VSS scheme for multiple secret images.
Displays, 2013

Encryption in High Dynamic Range Images for RGBE Format.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Tailor-Made Encryption Scheme for High-Dynamic Range Images.
Proceedings of the Genetic and Evolutionary Computing, 2013

Robust Watermarking for Multiple Images and Users Based on Visual Cryptography.
Proceedings of the Genetic and Evolutionary Computing, 2013

Dynamic range optimization by flexible local contrast enhancement using luminance map.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Joint fingerprinting and decryption with noise-resistant for vector quantization images.
Signal Processing, 2012

Insight into collusion attacks in random-grid-based visual secret sharing.
Signal Processing, 2012

Yet another multiple-image encryption by rotating random grids.
Signal Processing, 2012

Multi-image encryption by circular random grids.
Inf. Sci., 2012

2011
User-Friendly Random-Grid-Based Visual Secret Sharing.
IEEE Trans. Circuits Syst. Video Techn., 2011

Efficient multi-secret image sharing based on Boolean operations.
Signal Processing, 2011

Threshold visual secret sharing by random grids.
Journal of Systems and Software, 2011

2010
A new protocol of wide use for e-mail with perfect forward secrecy.
Journal of Zhejiang University - Science C, 2010

A novel user-participating authentication scheme.
Journal of Systems and Software, 2010

Compression-unimpaired batch-image encryption combining vector quantization and index compression.
Inf. Sci., 2010

Chaos-Based Image Integrity Authentication Code.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

High-Capacity Multi-secret Sharing by Random Grid.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Visual secret sharing by random grids revisited.
Pattern Recognition, 2009

A Practical and Efficient Electronic Checkbook.
J. Org. Computing and E. Commerce, 2009

A novel secret image sharing scheme for true-color images with size constraint.
Inf. Sci., 2009

Friendly Color Visual Secret Sharing by Random Grids.
Fundam. Inform., 2009

Preventing Cheating in Computational Visual Cryptography.
Fundam. Inform., 2009

On the security of a copyright protection scheme based on visual cryptography.
Computer Standards & Interfaces, 2009

A self-verification authentication mechanism for mobile satellite communication systems.
Computers & Electrical Engineering, 2009

Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Yet Another Friendly Progressive Visual Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A round- and computation-efficient three-party authenticated key exchange protocol.
Journal of Systems and Software, 2008

Public Key Authentication Schemes for Local Area Networks.
Informatica, Lith. Acad. Sci., 2008

Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Computer Standards & Interfaces, 2008

A new method for using hash functions to solve remote user authentication.
Computers & Electrical Engineering, 2008

Multiple-Image Encryption by Rotating Random Grids.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Assigning Keys in a Hierarchy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A cheating prevention scheme for binary visual cryptography with homogeneous secret images.
Pattern Recognition, 2007

A Secure YS-Like User Authentication Scheme.
Informatica, Lith. Acad. Sci., 2007

A lightweight and anonymous copyright-protection protocol.
Computer Standards & Interfaces, 2007

A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Security enhancement of a novel proxy key generation protocol.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol.
Pattern Recognition, 2006

Cheating in Visual Cryptography.
Des. Codes Cryptogr., 2006

2005
A publicly verifiable copyright-proving scheme resistant to malicious attacks.
IEEE Trans. Industrial Electronics, 2005

Remarks on some signature schemes based on factoring and discrete logarithms.
Applied Mathematics and Computation, 2005

Distortion-Aware Multimedia Authentication using an Enhanced Hash Function.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

2004
Secure SAS-like password authentication schemes.
Computer Standards & Interfaces, 2004

2002
A public verifiable copy protection technique for still images.
Journal of Systems and Software, 2002


  Loading...