Wei-Liang Tai

Orcid: 0000-0001-7517-7570

According to our database1, Wei-Liang Tai authored at least 42 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact.
Symmetry, 2024

2022
Separable Reversible Watermarking in Encrypted Images for Privacy Preservation.
Symmetry, 2022

Offline User Authentication Ensuring Non-Repudiation and Anonymity.
Sensors, 2022

2021
A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments.
Symmetry, 2021

Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

2020
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.
Int. J. Netw. Secur., 2020

2019
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.
Signal Process. Image Commun., 2019

Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
Int. J. Netw. Secur., 2019

2018
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography.
Symmetry, 2018

Image self-recovery with watermark self-embedding.
Signal Process. Image Commun., 2018

2017
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity.
Symmetry, 2017

A novel hybrid image authentication scheme based on absolute moment block truncation coding.
Multim. Tools Appl., 2017

An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.
J. Inf. Secur. Appl., 2017

Comments on a Secure Authentication Scheme for IoT and Cloud Servers.
Int. J. Netw. Secur., 2017

2016
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems.
J. Inf. Hiding Multim. Signal Process., 2016

A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks.
J. Inf. Hiding Multim. Signal Process., 2016

2015
A novel reversible data hiding scheme based on AMBTC compression technique.
Multim. Tools Appl., 2015

2014
A High-Quality Image Authentication Scheme for AMBTC-compressed Images.
KSII Trans. Internet Inf. Syst., 2014

Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2014

A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Novel Image Authentication Scheme for AMBTC-Compressed Images.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices.
Informatica, 2013

A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Apply Run-length encoding on pixel differences to do image hiding.
Proceedings of the 9th International Conference on Information, 2013

2012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.
KSII Trans. Internet Inf. Syst., 2012

A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches.
Inf. Technol. Control., 2012

A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Blood Cell Image Classification Based on Hierarchical SVM.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

Object Relational Programming of Biomedical Images.
Proceedings of the 11th IEEE International Conference on Bioinformatics and Bioengineering, 2011

2009
Reversible Data Hiding Based on Histogram Modification of Pixel Differences.
IEEE Trans. Circuits Syst. Video Technol., 2009

2008
Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognit., 2008

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognit., 2008

Lossless Data Hiding Based on Histogram Modification for Image Authentication.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Reversible hiding in DCT-based compressed images.
Inf. Sci., 2007

A Novel Image Hiding Scheme Based on VQ and Hamming Distance.
Fundam. Informaticae, 2007

Improvements of EMD Embedding for Large Payloads.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization.
IEEE Trans. Circuits Syst. Video Technol., 2006

Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A Multipurpose Wavelet-Based Image Watermarking.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Secret Hiding Using Side Match Vector Quantization.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...