Yen-Ping Chu

According to our database1, Yen-Ping Chu authored at least 34 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Automatic band Segmentation and Detection of 1D-gel Images with Different Exposures.
Int. J. Pattern Recognit. Artif. Intell., 2014

A Study of Open Data for Tourism Service.
Int. J. Electron. Bus. Manag., 2014

2010
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining.
Int. J. Multim. Intell. Secur., 2010

Resampling Halftone Images Using Interpolation and Error-Diffusion.
Comput. J., 2010

2009
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
J. Syst. Softw., 2009

A HDWT-based reversible data hiding method.
J. Syst. Softw., 2009

Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks.
Int. J. Netw. Secur., 2009

A Novel Image Data Hiding Scheme with Diamond Encoding.
EURASIP J. Inf. Secur., 2009

High-capacity reversible data hiding in binary images using pattern substitution.
Comput. Stand. Interfaces, 2009

2008
Edge Enhancement Nucleus and Cytoplast Contour Detector of Cervical Smear Images.
IEEE Trans. Syst. Man Cybern. Part B, 2008

Adaptive lossless steganographic scheme with centralized difference expansion.
Pattern Recognit., 2008

Visual secret sharing for multiple secrets.
Pattern Recognit., 2008

Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Syst. Sci. Eng., 2008

A generic application sharing architecture based on message-oriented middleware platform.
Comput. Stand. Interfaces, 2008

Enhancement of fairness in a DiffServ network using a novel queuing algorithm.
Comput. Stand. Interfaces, 2008

Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Comput. Commun., 2008

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Comput. Commun., 2008

Gradient Direction Edge Enhancement Based Nucleus and Cytoplasm Contour Detector of Cervical Smear Images.
Proceedings of the Medical Biometrics, First International Conference, 2008

Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Exchangeable E-Cash Scheme by E-Mint.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Halftone image resampling by interpolation and error-diffusion.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A multiple-level visual secret-sharing scheme without image size expansion.
Inf. Sci., 2007

Improving Fairness in DiffServ Networks Using Adaptive Aggregate Markers.
IEICE Trans. Inf. Syst., 2007

An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A minute lossy method for 2D-gel images compression.
Int. J. Imaging Syst. Technol., 2006

Reversible Watermarking: Current Status and Key Issues.
Int. J. Netw. Secur., 2006

Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows.
IEICE Trans. Inf. Syst., 2006

Identification of mouse mslp2 gene from EST databases by repeated searching, comparison, and assembling.
Comput. Biol. Medicine, 2006

Robust Image Hiding Method.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Object Finding System Based on RFID Technology.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
A new multi-secret images sharing scheme using Largrange's interpolation.
J. Syst. Softw., 2005

A Duplicate Chinese Document Image Retrieval System.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling.
Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Scienes, 2004


  Loading...