Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chwei-Shyong Tsai
@article{DBLP:journals/mta/TsaiWCY24, author = {Chwei{-}Shyong Tsai and Hsien{-}Chu Wu and Wei{-}Ting Chen and Josh Jia{-}Ching Ying}, title = {{ATFS:} {A} deep learning framework for angle transformation and face swapping of face de-identification}, journal = {Multim. Tools Appl.}, volume = {83}, number = {12}, pages = {36797--36822}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16123-0}, doi = {10.1007/S11042-023-16123-0}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/TsaiWCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/TsaiZW22, author = {Chwei{-}Shyong Tsai and Yung{-}Sung Zhang and Chi{-}Yao Weng}, title = {Separable reversible data hiding in encrypted images based on Paillier cryptosystem}, journal = {Multim. Tools Appl.}, volume = {81}, number = {13}, pages = {18807--18827}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12684-8}, doi = {10.1007/S11042-022-12684-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/TsaiZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WuFTY22, author = {Hsien{-}Chu Wu and Wen{-}Li Fan and Chwei{-}Shyong Tsai and Josh Jia{-}Ching Ying}, title = {An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks}, journal = {Multim. Tools Appl.}, volume = {81}, number = {14}, pages = {19351--19375}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-11018-4}, doi = {10.1007/S11042-021-11018-4}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WuFTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/TsaiCWY21, author = {Chwei{-}Shyong Tsai and Hsin{-}Liang Chen and Hsien{-}Chu Wu and Josh Jia{-}Ching Ying}, title = {A Puzzle-Based Data Sharing Approach with Cheating Prevention Using {QR} Code}, journal = {Symmetry}, volume = {13}, number = {10}, pages = {1896}, year = {2021}, url = {https://doi.org/10.3390/sym13101896}, doi = {10.3390/SYM13101896}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/TsaiCWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/TsaiWLY21, author = {Chwei{-}Shyong Tsai and Hsien{-}Chu Wu and Yu{-}Wen Li and Josh Jia{-}Ching Ying}, title = {Applying {GMEI-GAN} to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques}, journal = {Symmetry}, volume = {13}, number = {12}, pages = {2438}, year = {2021}, url = {https://doi.org/10.3390/sym13122438}, doi = {10.3390/SYM13122438}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/TsaiWLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmhi/TsaiHLL19, author = {Chwei{-}Shyong Tsai and Qi{-}Xian Huang and Tsung{-}Hung Lin and Tian{-}Fu Lee}, title = {Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems}, booktitle = {Proceedings of the third International Conference on Medical and Health Informatics 2019, {ICMHI} 2019, Xiamen, China, May 17-19, 2019}, pages = {167--171}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3340037.3340064}, doi = {10.1145/3340037.3340064}, timestamp = {Wed, 03 Nov 2021 13:30:34 +0100}, biburl = {https://dblp.org/rec/conf/icmhi/TsaiHLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/PanWWCCT15, author = {Jeng{-}Shyang Pan and Chi{-}Yao Weng and Mu{-}En Wu and Chuan{-}Yih Chen and Chien{-}Ming Chen and Chwei{-}Shyong Tsai}, editor = {Jeng{-}Shyang Pan and Ivan Lee and Hsiang{-}Cheh Huang and Ching{-}Yu Yang}, title = {A {KL} Divergence Function for Randomized Secret Shares}, booktitle = {2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2015, Adelaide, Australia, September 23-25, 2015}, pages = {231--234}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IIH-MSP.2015.87}, doi = {10.1109/IIH-MSP.2015.87}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/PanWWCCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/ChenCYCHYTHLCPL14, author = {Po{-}Ying Chen and Chi{-}Chang Chen and Wen{-}Kuan Yeh and Yukan Chang and Der{-}Chen Huang and Shyr{-}Shen Yu and Chwei{-}Shyong Tsai and Yu{-}Jung Huang and Wei{-}Cheng Lin and Shao{-}I Chu and Chung{-}Long Pan and Tsung{-}Hung Lin and Shyh{-}Chang Liu}, title = {Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface}, journal = {J. Sensors}, volume = {2014}, pages = {238350:1--238350:7}, year = {2014}, url = {https://doi.org/10.1155/2014/238350}, doi = {10.1155/2014/238350}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/ChenCYCHYTHLCPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlc/LeeCLCT14, author = {Cheng{-}Chi Lee and Hong{-}Hao Chen and Hung{-}Ting Liu and Guo{-}Wei Chen and Chwei{-}Shyong Tsai}, title = {A new visual cryptography with multi-level encoding}, journal = {J. Vis. Lang. Comput.}, volume = {25}, number = {3}, pages = {243--250}, year = {2014}, url = {https://doi.org/10.1016/j.jvlc.2013.11.001}, doi = {10.1016/J.JVLC.2013.11.001}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlc/LeeCLCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChenCWT13, author = {Chiu{-}Mei Chen and Chiao{-}Min Chen and Hsien{-}Chu Wu and Chwei{-}Shyong Tsai}, title = {Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images}, journal = {J. Syst. Softw.}, volume = {86}, number = {1}, pages = {38--46}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2012.06.046}, doi = {10.1016/J.JSS.2012.06.046}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChenCWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeLT12, author = {Cheng{-}Chi Lee and Tsung{-}Hung Lin and Chwei{-}Shyong Tsai}, title = {Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications}, journal = {Secur. Commun. Networks}, volume = {5}, number = {12}, pages = {1375--1378}, year = {2012}, url = {https://doi.org/10.1002/sec.430}, doi = {10.1002/SEC.430}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/LouCWT11, author = {Der{-}Chyuan Lou and Hong{-}Hao Chen and Hsien{-}Chu Wu and Chwei{-}Shyong Tsai}, title = {A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares}, journal = {Displays}, volume = {32}, number = {3}, pages = {118--134}, year = {2011}, url = {https://doi.org/10.1016/j.displa.2011.02.001}, doi = {10.1016/J.DISPLA.2011.02.001}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/displays/LouCWT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/WuWWT11, author = {Hsien{-}Chu Wu and Hao{-}Cheng Wang and Chung{-}Ming Wang and Chwei{-}Shyong Tsai}, title = {Coloured visual cryptography using fixed size meaningful share}, journal = {Int. J. Comput. Math.}, volume = {88}, number = {6}, pages = {1239--1255}, year = {2011}, url = {https://doi.org/10.1080/00207160.2010.500373}, doi = {10.1080/00207160.2010.500373}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/WuWWT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/LinLTG10, author = {Tsung{-}Hung Lin and Cheng{-}Chi Lee and Chwei{-}Shyong Tsai and Shin{-}Dong Guo}, title = {A tabular steganography scheme for graphical password authentication}, journal = {Comput. Sci. Inf. Syst.}, volume = {7}, number = {4}, pages = {823--841}, year = {2010}, url = {https://doi.org/10.2298/CSIS081223028L}, doi = {10.2298/CSIS081223028L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/LinLTG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/WuWTW10, author = {Hsien{-}Chu Wu and Hao{-}Cheng Wang and Chwei{-}Shyong Tsai and Chung{-}Ming Wang}, title = {Reversible image steganographic scheme via predictive coding}, journal = {Displays}, volume = {31}, number = {1}, pages = {35--43}, year = {2010}, url = {https://doi.org/10.1016/j.displa.2009.10.002}, doi = {10.1016/J.DISPLA.2009.10.002}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/displays/WuWTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/LouWWLT10, author = {Der{-}Chyuan Lou and Nan{-}I Wu and Chung{-}Ming Wang and Zong{-}Han Lin and Chwei{-}Shyong Tsai}, title = {A novel adaptive steganography based on local complexity and human vision sensitivity}, journal = {J. Syst. Softw.}, volume = {83}, number = {7}, pages = {1236--1248}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.01.050}, doi = {10.1016/J.JSS.2010.01.050}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/LouWWLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/WangSCT10, author = {Chun{-}Yu Wang and Ni{-}Shan Shiao and Hong{-}Hao Chen and Chwei{-}Shyong Tsai}, editor = {Kwan{-}Ho You and Sang{-}Won Lee and Won Kim and Dongho Won}, title = {Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing}, booktitle = {Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2010, Suwon, Republic of Korea, January 14-15, 2010}, pages = {15}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/2108616.2108635}, doi = {10.1145/2108616.2108635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/WangSCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/LeeLT09, author = {Cheng{-}Chi Lee and Tsung{-}Hung Lin and Chwei{-}Shyong Tsai}, title = {A new authenticated group key agreement in a mobile environment}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {64}, number = {11-12}, pages = {735--744}, year = {2009}, url = {https://doi.org/10.1007/s12243-009-0096-z}, doi = {10.1007/S12243-009-0096-Z}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/LeeLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChanCYHTC09, author = {Yung{-}Kuan Chan and Wen{-}Tang Chen and Shyr{-}Shen Yu and Yu{-}An Ho and Chwei{-}Shyong Tsai and Yen{-}Ping Chu}, title = {A HDWT-based reversible data hiding method}, journal = {J. Syst. Softw.}, volume = {82}, number = {3}, pages = {411--421}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2008.07.008}, doi = {10.1016/J.JSS.2008.07.008}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChanCYHTC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WuLTCC09, author = {Hsien{-}Chu Wu and Chih{-}Chiang Lee and Chwei{-}Shyong Tsai and Yen{-}Ping Chu and Hung{-}Ruei Chen}, title = {A high capacity reversible data hiding scheme with edge prediction and difference expansion}, journal = {J. Syst. Softw.}, volume = {82}, number = {12}, pages = {1966--1973}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2009.06.056}, doi = {10.1016/J.JSS.2009.06.056}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WuLTCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/ChenLLWT09, author = {Hong{-}Hao Chen and Cheng{-}Chi Lee and Chih{-}Chiang Lee and Hsien{-}Chu Wu and Chwei{-}Shyong Tsai}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {Multi-level visual secret sharing scheme with smooth-looking}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {155--160}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1655954}, doi = {10.1145/1655925.1655954}, timestamp = {Sun, 28 Feb 2021 18:18:34 +0100}, biburl = {https://dblp.org/rec/conf/interaction/ChenLLWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/el/TsaiC08, author = {Chwei{-}Shyong Tsai and Mu{-}Yen Chen}, title = {Using adaptive resonance theory and data-mining techniques for materials recommendation based on the e-library environment}, journal = {Electron. Libr.}, volume = {26}, number = {3}, pages = {287--302}, year = {2008}, url = {https://doi.org/10.1108/02640470810879455}, doi = {10.1108/02640470810879455}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/el/TsaiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WangWTH08, author = {Chung{-}Ming Wang and Nan{-}I Wu and Chwei{-}Shyong Tsai and Min{-}Shiang Hwang}, title = {A high quality steganographic method with pixel-value differencing and modulus function}, journal = {J. Syst. Softw.}, volume = {81}, number = {1}, pages = {150--158}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.01.049}, doi = {10.1016/J.JSS.2007.01.049}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/WangWTH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/LeeWTC08, author = {Chih{-}Chiang Lee and Hsien{-}Chu Wu and Chwei{-}Shyong Tsai and Yen{-}Ping Chu}, title = {Adaptive lossless steganographic scheme with centralized difference expansion}, journal = {Pattern Recognit.}, volume = {41}, number = {6}, pages = {2097--2106}, year = {2008}, url = {https://doi.org/10.1016/j.patcog.2007.11.018}, doi = {10.1016/J.PATCOG.2007.11.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/LeeWTC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/FengWTCC08, author = {Jen{-}Bang Feng and Hsien{-}Chu Wu and Chwei{-}Shyong Tsai and Ya{-}Fen Chang and Yen{-}Ping Chu}, title = {Visual secret sharing for multiple secrets}, journal = {Pattern Recognit.}, volume = {41}, number = {12}, pages = {3572--3581}, year = {2008}, url = {https://doi.org/10.1016/j.patcog.2008.05.031}, doi = {10.1016/J.PATCOG.2008.05.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/FengWTCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/WuLLT08, author = {Hsien{-}Chu Wu and Yu{-}Chi Liu and Kuo{-}Ching Liu and Chwei{-}Shyong Tsai}, editor = {Jeng{-}Shyang Pan and Ajith Abraham and Chin{-}Chen Chang}, title = {A Block-Based Authentication Watermarking Technique for Binary Images}, booktitle = {Eighth International Conference on Intelligent Systems Design and Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes}, pages = {513--518}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISDA.2008.144}, doi = {10.1109/ISDA.2008.144}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isda/WuLLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FengLTC06, author = {Jen{-}Bang Feng and Iuon{-}Chang Lin and Chwei{-}Shyong Tsai and Yen{-}Ping Chu}, title = {Reversible Watermarking: Current Status and Key Issues}, journal = {Int. J. Netw. Secur.}, volume = {2}, number = {3}, pages = {161--170}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n3/ijns-2006-v2-n3-p161-170.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FengLTC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TsaiLH06, author = {Chwei{-}Shyong Tsai and Cheng{-}Chi Lee and Min{-}Shiang Hwang}, title = {Password Authentication Schemes: Current Status and Key Issues}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {2}, pages = {101--115}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p101-115.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TsaiLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/WuYT06, author = {Hsien{-}Chu Wu and Chuan{-}Po Yeh and Chwei{-}Shyong Tsai}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {A Semi-fragile Watermarking Scheme Based on {SVD} and {VQ} Techniques}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {406--415}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_44}, doi = {10.1007/11751595\_44}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/WuYT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcis/ChanHTC06, author = {Yung{-}Kuan Chan and Yu{-}An Ho and Chwei{-}Shyong Tsai and Yen{-}Ping Chu}, title = {Robust Image Hiding Method}, booktitle = {Proceedings of the 2006 Joint Conference on Information Sciences, {JCIS} 2006, Kaohsiung, Taiwan, ROC, October 8-11, 2006}, publisher = {Atlantis Press}, year = {2006}, url = {https://doi.org/10.2991/jcis.2006.227}, doi = {10.2991/JCIS.2006.227}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/jcis/ChanHTC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/TsaiLH05, author = {Chwei{-}Shyong Tsai and Shu{-}Chen Lin and Min{-}Shiang Hwang}, title = {Cryptanalysis of an authenticated encryption scheme using self-certified public keys}, journal = {Appl. Math. Comput.}, volume = {166}, number = {1}, pages = {118--122}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.04.073}, doi = {10.1016/J.AMC.2004.04.073}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/TsaiLH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenCT05, author = {Ching{-}Wen Chen and Ming{-}Chin Chuang and Chwei{-}Shyong Tsai}, title = {An Efficient Authentication Scheme between {MANET} and {WLAN} on IPv6 Based Internet}, journal = {Int. J. Netw. Secur.}, volume = {1}, number = {1}, pages = {14--23}, year = {2005}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n1/ijns-2005-v1-n1-p14-23.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenCT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/FengWTC05, author = {Jen{-}Bang Feng and Hsien{-}Chu Wu and Chwei{-}Shyong Tsai and Yen{-}Ping Chu}, title = {A new multi-secret images sharing scheme using Largrange's interpolation}, journal = {J. Syst. Softw.}, volume = {76}, number = {3}, pages = {327--339}, year = {2005}, url = {https://doi.org/10.1016/j.jss.2004.07.250}, doi = {10.1016/J.JSS.2004.07.250}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/FengWTC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HwangTT04, author = {Min{-}Shiang Hwang and Shiang{-}Feng Tzeng and Chwei{-}Shyong Tsai}, title = {Generalization of proxy signature based on elliptic curves}, journal = {Comput. Stand. Interfaces}, volume = {26}, number = {2}, pages = {73--84}, year = {2004}, url = {https://doi.org/10.1016/S0920-5489(03)00075-8}, doi = {10.1016/S0920-5489(03)00075-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/HwangTT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/TsaiC04, author = {Chwei{-}Shyong Tsai and Chin{-}Chen Chang}, title = {A New Repeating Color Watermarking Scheme Based on Human Visual Model}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2004}, number = {13}, pages = {1965--1972}, year = {2004}, url = {https://doi.org/10.1155/S1110865704405071}, doi = {10.1155/S1110865704405071}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/TsaiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/TsaiC04, author = {Chwei{-}Shyong Tsai and Chin{-}Chen Chang}, title = {A Pattern Mapping Based Digital Image Watermarking}, journal = {Informatica (Slovenia)}, volume = {28}, number = {2}, pages = {181--188}, year = {2004}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/TsaiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/HwangCLT04, author = {Min{-}Shiang Hwang and Ting Yi Chang and Shu{-}Chen Lin and Chwei{-}Shyong Tsai}, title = {On the Security of an Enhanced Authentication Key Exchange Protocol}, booktitle = {18th International Conference on Advanced Information Networking and Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan}, pages = {160--163}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/AINA.2004.1283777}, doi = {10.1109/AINA.2004.1283777}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/HwangCLT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metmbs/ChanCCTC04, author = {Wen{-}Ling Chan and Yen{-}Ping Chu and Yung{-}fu Chen and Chwei{-}Shyong Tsai and Jan{-}Gowth Chang}, editor = {Faramarz Valafar and Homayoun Valafar}, title = {Identification of Mouse mslp2 from {EST} Databases by Repeated Searching, Comparison, and Assembling}, booktitle = {Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Scienes, {METMBS} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}}, pages = {271--275}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Thu, 23 Jun 2016 15:53:27 +0200}, biburl = {https://dblp.org/rec/conf/metmbs/ChanCCTC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/TsaiC03, author = {Chwei{-}Shyong Tsai and Chin{-}Chen Chang}, title = {An Improvement to Image Segment Based on Human Visual System for Object-based Coding}, journal = {Fundam. Informaticae}, volume = {58}, number = {2}, pages = {167--178}, year = {2003}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi58-2-07}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/TsaiC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/TsaiC03a, author = {Chwei{-}Shyong Tsai and Chin{-}Chen Chang}, title = {A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect}, journal = {Fundam. Informaticae}, volume = {58}, number = {2}, pages = {179--188}, year = {2003}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi58-2-08}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/TsaiC03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/TsaiTH03, author = {Chwei{-}Shyong Tsai and Shiang{-}Feng Tzeng and Min{-}Shiang Hwang}, title = {Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers}, journal = {Informatica}, volume = {14}, number = {3}, pages = {393--402}, year = {2003}, url = {http://content.iospress.com/articles/informatica/inf14-3-09}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/TsaiTH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/TsaiCC02, author = {Chwei{-}Shyong Tsai and Chin{-}Chen Chang and Tung{-}Shou Chen}, title = {Sharing multiple secrets in digital images}, journal = {J. Syst. Softw.}, volume = {64}, number = {2}, pages = {163--170}, year = {2002}, url = {https://doi.org/10.1016/S0164-1212(02)00034-1}, doi = {10.1016/S0164-1212(02)00034-1}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/TsaiCC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/TsaiC01, author = {Chwei{-}Shyong Tsai and Chin{-}Chen Chang}, editor = {Heung{-}Yeung Shum and Mark Liao and Shih{-}Fu Chang}, title = {A Generalized Secret Image Sharing and Recovery Scheme}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2001, Second {IEEE} Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2195}, pages = {963--968}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45453-5\_129}, doi = {10.1007/3-540-45453-5\_129}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/pcm/TsaiC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/ChangT00, author = {Chin{-}Chen Chang and Chwei{-}Shyong Tsai}, title = {A Technique for Computing Watermarks from Digital Images}, journal = {Informatica (Slovenia)}, volume = {24}, number = {3}, year = {2000}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/ChangT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ChangTC00, author = {Chin{-}Chen Chang and Chwei{-}Shyong Tsai and Tung{-}Shou Chen}, title = {A New Scheme for Sharing Secret Color Images in Computer Network}, booktitle = {Seventh International Conference on Parallel and Distributed Systems, {ICPADS} 2000, Iwate, Japan, July 4-7, 2000}, pages = {21--27}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICPADS.2000.857679}, doi = {10.1109/ICPADS.2000.857679}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ChangTC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.