Tzung-Her Chen

Orcid: 0000-0001-5775-6034

According to our database1, Tzung-Her Chen authored at least 81 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares.
Multim. Tools Appl., March, 2024

2023
A Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids.
IEEE Access, 2023

A Security-enhanced Steganography Scheme for RGBE-format HDR Images.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

2022
Medical cooperative authenticated key agreement schemes with involvement of personal care assistant in telemedicine.
Comput. Methods Programs Biomed., 2022

2021
New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy.
Symmetry, 2021

Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security.
Symmetry, 2021

Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains.
Secur. Commun. Networks, 2021

Commutative encryption and authentication for OpenEXR high dynamic range images.
Multim. Tools Appl., 2021

Security-enhanced cloud-based image secret sharing and authentication using POB number system.
Multim. Tools Appl., 2021

A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Multiple secret image sharing with general access structure.
Multim. Tools Appl., 2020

2019
On the security of threshold random grid-based visual secret sharing.
Multim. Tools Appl., 2019

Secure and efficient protection for HTTP cookies with self-verification.
Int. J. Commun. Syst., 2019

2018
On the design of a two-decoding-option image secret sharing scheme.
Multim. Tools Appl., 2018

A novel DRM scheme for accommodating expectations of personal use.
Multim. Tools Appl., 2018

On the security of a BTC-based-compression image authentication scheme.
Multim. Tools Appl., 2018

A Weighted Threshold Visual Cryptography.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

2017
A new buyer-seller watermarking protocol without multiple watermarks insertion.
Multim. Tools Appl., 2017

A Novel Weighted Visual Cryptography Scheme with High Visual Quality.
Int. J. Netw. Secur., 2017

2016
On the difficulty of aligning VSS random grids.
Signal Process. Image Commun., 2016

A multi-watermarking protocol for health information management.
Multim. Tools Appl., 2016

On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services.
Int. J. Netw. Secur., 2016

An Improved Anonymous Buyer-Reseller Watermarking Protocol.
Int. J. Netw. Secur., 2016

2015
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes.
Signal Process. Image Commun., 2015

Friendly progressive random-grid-based visual secret sharing with adaptive contrast.
J. Vis. Commun. Image Represent., 2015

Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC.
Int. J. Netw. Secur., 2015

Visual multiple-secret sharing for flexible general access structure by random grids.
Displays, 2015

2014
Multi-factor cheating prevention in visual secret sharing by hybrid codebooks.
J. Vis. Commun. Image Represent., 2014

Distortionless visual multi-secret sharing based on random grid.
Inf. Sci., 2014

Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication.
Int. J. Digit. Crime Forensics, 2014

An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
A security-enhanced key agreement protocol based on chaotic maps.
Secur. Commun. Networks, 2013

A batch image encryption scheme based on chaining random grids.
Sci. Iran., 2013

Quality-adaptive visual secret sharing by random grids.
J. Syst. Softw., 2013

Quality-improved threshold visual secret sharing scheme by random grids.
IET Image Process., 2013

Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern.
Displays, 2013

A random grid-based cyclic access structure VSS scheme for multiple secret images.
Displays, 2013

Encryption in High Dynamic Range Images for RGBE Format.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Tailor-Made Encryption Scheme for High-Dynamic Range Images.
Proceedings of the Genetic and Evolutionary Computing, 2013

Robust Watermarking for Multiple Images and Users Based on Visual Cryptography.
Proceedings of the Genetic and Evolutionary Computing, 2013

Dynamic range optimization by flexible local contrast enhancement using luminance map.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Joint fingerprinting and decryption with noise-resistant for vector quantization images.
Signal Process., 2012

Insight into collusion attacks in random-grid-based visual secret sharing.
Signal Process., 2012

Yet another multiple-image encryption by rotating random grids.
Signal Process., 2012

Multi-image encryption by circular random grids.
Inf. Sci., 2012

2011
User-Friendly Random-Grid-Based Visual Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2011

Efficient multi-secret image sharing based on Boolean operations.
Signal Process., 2011

Threshold visual secret sharing by random grids.
J. Syst. Softw., 2011

2010
A new protocol of wide use for e-mail with perfect forward secrecy.
J. Zhejiang Univ. Sci. C, 2010

A novel user-participating authentication scheme.
J. Syst. Softw., 2010

Compression-unimpaired batch-image encryption combining vector quantization and index compression.
Inf. Sci., 2010

Chaos-Based Image Integrity Authentication Code.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

High-Capacity Multi-secret Sharing by Random Grid.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Visual secret sharing by random grids revisited.
Pattern Recognit., 2009

A Practical and Efficient Electronic Checkbook.
J. Organ. Comput. Electron. Commer., 2009

A novel secret image sharing scheme for true-color images with size constraint.
Inf. Sci., 2009

Friendly Color Visual Secret Sharing by Random Grids.
Fundam. Informaticae, 2009

Preventing Cheating in Computational Visual Cryptography.
Fundam. Informaticae, 2009

On the security of a copyright protection scheme based on visual cryptography.
Comput. Stand. Interfaces, 2009

A self-verification authentication mechanism for mobile satellite communication systems.
Comput. Electr. Eng., 2009

Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Yet Another Friendly Progressive Visual Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A round- and computation-efficient three-party authenticated key exchange protocol.
J. Syst. Softw., 2008

Public Key Authentication Schemes for Local Area Networks.
Informatica, 2008

Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008

A new method for using hash functions to solve remote user authentication.
Comput. Electr. Eng., 2008

Multiple-Image Encryption by Rotating Random Grids.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Assigning Keys in a Hierarchy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A cheating prevention scheme for binary visual cryptography with homogeneous secret images.
Pattern Recognit., 2007

A Secure YS-Like User Authentication Scheme.
Informatica, 2007

A lightweight and anonymous copyright-protection protocol.
Comput. Stand. Interfaces, 2007

A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Security enhancement of a novel proxy key generation protocol.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol.
Pattern Recognit., 2006

Cheating in Visual Cryptography.
Des. Codes Cryptogr., 2006

2005
A publicly verifiable copyright-proving scheme resistant to malicious attacks.
IEEE Trans. Ind. Electron., 2005

Remarks on some signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

Distortion-Aware Multimedia Authentication using an Enhanced Hash Function.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

2004
Secure SAS-like password authentication schemes.
Comput. Stand. Interfaces, 2004

2002
A public verifiable copy protection technique for still images.
J. Syst. Softw., 2002


  Loading...