BibTeX records: Chwei-Shyong Tsai

download as .bib file

@article{DBLP:journals/mta/TsaiWCY24,
  author       = {Chwei{-}Shyong Tsai and
                  Hsien{-}Chu Wu and
                  Wei{-}Ting Chen and
                  Josh Jia{-}Ching Ying},
  title        = {{ATFS:} {A} deep learning framework for angle transformation and face
                  swapping of face de-identification},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {12},
  pages        = {36797--36822},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16123-0},
  doi          = {10.1007/S11042-023-16123-0},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/TsaiWCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/TsaiZW22,
  author       = {Chwei{-}Shyong Tsai and
                  Yung{-}Sung Zhang and
                  Chi{-}Yao Weng},
  title        = {Separable reversible data hiding in encrypted images based on Paillier
                  cryptosystem},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {13},
  pages        = {18807--18827},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12684-8},
  doi          = {10.1007/S11042-022-12684-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/TsaiZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WuFTY22,
  author       = {Hsien{-}Chu Wu and
                  Wen{-}Li Fan and
                  Chwei{-}Shyong Tsai and
                  Josh Jia{-}Ching Ying},
  title        = {An image authentication and recovery system based on discrete wavelet
                  transform and convolutional neural networks},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {14},
  pages        = {19351--19375},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-11018-4},
  doi          = {10.1007/S11042-021-11018-4},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WuFTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/TsaiCWY21,
  author       = {Chwei{-}Shyong Tsai and
                  Hsin{-}Liang Chen and
                  Hsien{-}Chu Wu and
                  Josh Jia{-}Ching Ying},
  title        = {A Puzzle-Based Data Sharing Approach with Cheating Prevention Using
                  {QR} Code},
  journal      = {Symmetry},
  volume       = {13},
  number       = {10},
  pages        = {1896},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13101896},
  doi          = {10.3390/SYM13101896},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/TsaiCWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/TsaiWLY21,
  author       = {Chwei{-}Shyong Tsai and
                  Hsien{-}Chu Wu and
                  Yu{-}Wen Li and
                  Josh Jia{-}Ching Ying},
  title        = {Applying {GMEI-GAN} to Generate Meaningful Encrypted Images in Reversible
                  Data Hiding Techniques},
  journal      = {Symmetry},
  volume       = {13},
  number       = {12},
  pages        = {2438},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13122438},
  doi          = {10.3390/SYM13122438},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/TsaiWLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmhi/TsaiHLL19,
  author       = {Chwei{-}Shyong Tsai and
                  Qi{-}Xian Huang and
                  Tsung{-}Hung Lin and
                  Tian{-}Fu Lee},
  title        = {Computation-Efficient Three-Party Encrypted Key Exchange for Telecare
                  Medicine Information Systems},
  booktitle    = {Proceedings of the third International Conference on Medical and Health
                  Informatics 2019, {ICMHI} 2019, Xiamen, China, May 17-19, 2019},
  pages        = {167--171},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3340037.3340064},
  doi          = {10.1145/3340037.3340064},
  timestamp    = {Wed, 03 Nov 2021 13:30:34 +0100},
  biburl       = {https://dblp.org/rec/conf/icmhi/TsaiHLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/PanWWCCT15,
  author       = {Jeng{-}Shyang Pan and
                  Chi{-}Yao Weng and
                  Mu{-}En Wu and
                  Chuan{-}Yih Chen and
                  Chien{-}Ming Chen and
                  Chwei{-}Shyong Tsai},
  editor       = {Jeng{-}Shyang Pan and
                  Ivan Lee and
                  Hsiang{-}Cheh Huang and
                  Ching{-}Yu Yang},
  title        = {A {KL} Divergence Function for Randomized Secret Shares},
  booktitle    = {2015 International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing, {IIH-MSP} 2015, Adelaide, Australia,
                  September 23-25, 2015},
  pages        = {231--234},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IIH-MSP.2015.87},
  doi          = {10.1109/IIH-MSP.2015.87},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/PanWWCCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/ChenCYCHYTHLCPL14,
  author       = {Po{-}Ying Chen and
                  Chi{-}Chang Chen and
                  Wen{-}Kuan Yeh and
                  Yukan Chang and
                  Der{-}Chen Huang and
                  Shyr{-}Shen Yu and
                  Chwei{-}Shyong Tsai and
                  Yu{-}Jung Huang and
                  Wei{-}Cheng Lin and
                  Shao{-}I Chu and
                  Chung{-}Long Pan and
                  Tsung{-}Hung Lin and
                  Shyh{-}Chang Liu},
  title        = {Using Capacitance Sensor to Extract Characteristic Signals of Dozing
                  from Skin Surface},
  journal      = {J. Sensors},
  volume       = {2014},
  pages        = {238350:1--238350:7},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/238350},
  doi          = {10.1155/2014/238350},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/ChenCYCHYTHLCPL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlc/LeeCLCT14,
  author       = {Cheng{-}Chi Lee and
                  Hong{-}Hao Chen and
                  Hung{-}Ting Liu and
                  Guo{-}Wei Chen and
                  Chwei{-}Shyong Tsai},
  title        = {A new visual cryptography with multi-level encoding},
  journal      = {J. Vis. Lang. Comput.},
  volume       = {25},
  number       = {3},
  pages        = {243--250},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jvlc.2013.11.001},
  doi          = {10.1016/J.JVLC.2013.11.001},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlc/LeeCLCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChenCWT13,
  author       = {Chiu{-}Mei Chen and
                  Chiao{-}Min Chen and
                  Hsien{-}Chu Wu and
                  Chwei{-}Shyong Tsai},
  title        = {Common carotid artery condition recognition technology using waveform
                  features extracted from ultrasound spectrum images},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {1},
  pages        = {38--46},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2012.06.046},
  doi          = {10.1016/J.JSS.2012.06.046},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ChenCWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeLT12,
  author       = {Cheng{-}Chi Lee and
                  Tsung{-}Hung Lin and
                  Chwei{-}Shyong Tsai},
  title        = {Cryptanalysis of a secure and efficient authentication protocol for
                  anonymous channel in wireless communications},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1375--1378},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.430},
  doi          = {10.1002/SEC.430},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/LouCWT11,
  author       = {Der{-}Chyuan Lou and
                  Hong{-}Hao Chen and
                  Hsien{-}Chu Wu and
                  Chwei{-}Shyong Tsai},
  title        = {A novel authenticatable color visual secret sharing scheme using non-expanded
                  meaningful shares},
  journal      = {Displays},
  volume       = {32},
  number       = {3},
  pages        = {118--134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.displa.2011.02.001},
  doi          = {10.1016/J.DISPLA.2011.02.001},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/displays/LouCWT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/WuWWT11,
  author       = {Hsien{-}Chu Wu and
                  Hao{-}Cheng Wang and
                  Chung{-}Ming Wang and
                  Chwei{-}Shyong Tsai},
  title        = {Coloured visual cryptography using fixed size meaningful share},
  journal      = {Int. J. Comput. Math.},
  volume       = {88},
  number       = {6},
  pages        = {1239--1255},
  year         = {2011},
  url          = {https://doi.org/10.1080/00207160.2010.500373},
  doi          = {10.1080/00207160.2010.500373},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/WuWWT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/LinLTG10,
  author       = {Tsung{-}Hung Lin and
                  Cheng{-}Chi Lee and
                  Chwei{-}Shyong Tsai and
                  Shin{-}Dong Guo},
  title        = {A tabular steganography scheme for graphical password authentication},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {7},
  number       = {4},
  pages        = {823--841},
  year         = {2010},
  url          = {https://doi.org/10.2298/CSIS081223028L},
  doi          = {10.2298/CSIS081223028L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/LinLTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/WuWTW10,
  author       = {Hsien{-}Chu Wu and
                  Hao{-}Cheng Wang and
                  Chwei{-}Shyong Tsai and
                  Chung{-}Ming Wang},
  title        = {Reversible image steganographic scheme via predictive coding},
  journal      = {Displays},
  volume       = {31},
  number       = {1},
  pages        = {35--43},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.displa.2009.10.002},
  doi          = {10.1016/J.DISPLA.2009.10.002},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/displays/WuWTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/LouWWLT10,
  author       = {Der{-}Chyuan Lou and
                  Nan{-}I Wu and
                  Chung{-}Ming Wang and
                  Zong{-}Han Lin and
                  Chwei{-}Shyong Tsai},
  title        = {A novel adaptive steganography based on local complexity and human
                  vision sensitivity},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {7},
  pages        = {1236--1248},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2010.01.050},
  doi          = {10.1016/J.JSS.2010.01.050},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/LouWWLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/WangSCT10,
  author       = {Chun{-}Yu Wang and
                  Ni{-}Shan Shiao and
                  Hong{-}Hao Chen and
                  Chwei{-}Shyong Tsai},
  editor       = {Kwan{-}Ho You and
                  Sang{-}Won Lee and
                  Won Kim and
                  Dongho Won},
  title        = {Enhance the visual quality of shares and recovered secret on meaningful
                  shares visual secret sharing},
  booktitle    = {Proceedings of the 4th International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2010, Suwon, Republic of Korea,
                  January 14-15, 2010},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/2108616.2108635},
  doi          = {10.1145/2108616.2108635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/WangSCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/LeeLT09,
  author       = {Cheng{-}Chi Lee and
                  Tsung{-}Hung Lin and
                  Chwei{-}Shyong Tsai},
  title        = {A new authenticated group key agreement in a mobile environment},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {64},
  number       = {11-12},
  pages        = {735--744},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12243-009-0096-z},
  doi          = {10.1007/S12243-009-0096-Z},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/LeeLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChanCYHTC09,
  author       = {Yung{-}Kuan Chan and
                  Wen{-}Tang Chen and
                  Shyr{-}Shen Yu and
                  Yu{-}An Ho and
                  Chwei{-}Shyong Tsai and
                  Yen{-}Ping Chu},
  title        = {A HDWT-based reversible data hiding method},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {3},
  pages        = {411--421},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2008.07.008},
  doi          = {10.1016/J.JSS.2008.07.008},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ChanCYHTC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WuLTCC09,
  author       = {Hsien{-}Chu Wu and
                  Chih{-}Chiang Lee and
                  Chwei{-}Shyong Tsai and
                  Yen{-}Ping Chu and
                  Hung{-}Ruei Chen},
  title        = {A high capacity reversible data hiding scheme with edge prediction
                  and difference expansion},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {12},
  pages        = {1966--1973},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2009.06.056},
  doi          = {10.1016/J.JSS.2009.06.056},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/WuLTCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/ChenLLWT09,
  author       = {Hong{-}Hao Chen and
                  Cheng{-}Chi Lee and
                  Chih{-}Chiang Lee and
                  Hsien{-}Chu Wu and
                  Chwei{-}Shyong Tsai},
  editor       = {Sungwon Sohn and
                  Ling Chen and
                  Soonwook Hwang and
                  Kyungeun Cho and
                  Shigeo Kawata and
                  Kyhyun Um and
                  Franz I. S. Ko and
                  Kae{-}Dal Kwack and
                  Jong Hyung Lee and
                  Gang Kou and
                  Kiyoshi Nakamura and
                  Alvis Cheuk M. Fong and
                  Patrick C. M. Ma},
  title        = {Multi-level visual secret sharing scheme with smooth-looking},
  booktitle    = {Proceedings of the 2nd International Conference on Interaction Sciences:
                  Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea,
                  24-26 November 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {403},
  pages        = {155--160},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655925.1655954},
  doi          = {10.1145/1655925.1655954},
  timestamp    = {Sun, 28 Feb 2021 18:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/interaction/ChenLLWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/el/TsaiC08,
  author       = {Chwei{-}Shyong Tsai and
                  Mu{-}Yen Chen},
  title        = {Using adaptive resonance theory and data-mining techniques for materials
                  recommendation based on the e-library environment},
  journal      = {Electron. Libr.},
  volume       = {26},
  number       = {3},
  pages        = {287--302},
  year         = {2008},
  url          = {https://doi.org/10.1108/02640470810879455},
  doi          = {10.1108/02640470810879455},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/el/TsaiC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WangWTH08,
  author       = {Chung{-}Ming Wang and
                  Nan{-}I Wu and
                  Chwei{-}Shyong Tsai and
                  Min{-}Shiang Hwang},
  title        = {A high quality steganographic method with pixel-value differencing
                  and modulus function},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {1},
  pages        = {150--158},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.01.049},
  doi          = {10.1016/J.JSS.2007.01.049},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/WangWTH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/LeeWTC08,
  author       = {Chih{-}Chiang Lee and
                  Hsien{-}Chu Wu and
                  Chwei{-}Shyong Tsai and
                  Yen{-}Ping Chu},
  title        = {Adaptive lossless steganographic scheme with centralized difference
                  expansion},
  journal      = {Pattern Recognit.},
  volume       = {41},
  number       = {6},
  pages        = {2097--2106},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.patcog.2007.11.018},
  doi          = {10.1016/J.PATCOG.2007.11.018},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/LeeWTC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/FengWTCC08,
  author       = {Jen{-}Bang Feng and
                  Hsien{-}Chu Wu and
                  Chwei{-}Shyong Tsai and
                  Ya{-}Fen Chang and
                  Yen{-}Ping Chu},
  title        = {Visual secret sharing for multiple secrets},
  journal      = {Pattern Recognit.},
  volume       = {41},
  number       = {12},
  pages        = {3572--3581},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.patcog.2008.05.031},
  doi          = {10.1016/J.PATCOG.2008.05.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/FengWTCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/WuLLT08,
  author       = {Hsien{-}Chu Wu and
                  Yu{-}Chi Liu and
                  Kuo{-}Ching Liu and
                  Chwei{-}Shyong Tsai},
  editor       = {Jeng{-}Shyang Pan and
                  Ajith Abraham and
                  Chin{-}Chen Chang},
  title        = {A Block-Based Authentication Watermarking Technique for Binary Images},
  booktitle    = {Eighth International Conference on Intelligent Systems Design and
                  Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
                  3 Volumes},
  pages        = {513--518},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISDA.2008.144},
  doi          = {10.1109/ISDA.2008.144},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isda/WuLLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengLTC06,
  author       = {Jen{-}Bang Feng and
                  Iuon{-}Chang Lin and
                  Chwei{-}Shyong Tsai and
                  Yen{-}Ping Chu},
  title        = {Reversible Watermarking: Current Status and Key Issues},
  journal      = {Int. J. Netw. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {161--170},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n3/ijns-2006-v2-n3-p161-170.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FengLTC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiLH06,
  author       = {Chwei{-}Shyong Tsai and
                  Cheng{-}Chi Lee and
                  Min{-}Shiang Hwang},
  title        = {Password Authentication Schemes: Current Status and Key Issues},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {101--115},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p101-115.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TsaiLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/WuYT06,
  author       = {Hsien{-}Chu Wu and
                  Chuan{-}Po Yeh and
                  Chwei{-}Shyong Tsai},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {A Semi-fragile Watermarking Scheme Based on {SVD} and {VQ} Techniques},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {406--415},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_44},
  doi          = {10.1007/11751595\_44},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/WuYT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcis/ChanHTC06,
  author       = {Yung{-}Kuan Chan and
                  Yu{-}An Ho and
                  Chwei{-}Shyong Tsai and
                  Yen{-}Ping Chu},
  title        = {Robust Image Hiding Method},
  booktitle    = {Proceedings of the 2006 Joint Conference on Information Sciences,
                  {JCIS} 2006, Kaohsiung, Taiwan, ROC, October 8-11, 2006},
  publisher    = {Atlantis Press},
  year         = {2006},
  url          = {https://doi.org/10.2991/jcis.2006.227},
  doi          = {10.2991/JCIS.2006.227},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/jcis/ChanHTC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/TsaiLH05,
  author       = {Chwei{-}Shyong Tsai and
                  Shu{-}Chen Lin and
                  Min{-}Shiang Hwang},
  title        = {Cryptanalysis of an authenticated encryption scheme using self-certified
                  public keys},
  journal      = {Appl. Math. Comput.},
  volume       = {166},
  number       = {1},
  pages        = {118--122},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.04.073},
  doi          = {10.1016/J.AMC.2004.04.073},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/TsaiLH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenCT05,
  author       = {Ching{-}Wen Chen and
                  Ming{-}Chin Chuang and
                  Chwei{-}Shyong Tsai},
  title        = {An Efficient Authentication Scheme between {MANET} and {WLAN} on IPv6
                  Based Internet},
  journal      = {Int. J. Netw. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {14--23},
  year         = {2005},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n1/ijns-2005-v1-n1-p14-23.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenCT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/FengWTC05,
  author       = {Jen{-}Bang Feng and
                  Hsien{-}Chu Wu and
                  Chwei{-}Shyong Tsai and
                  Yen{-}Ping Chu},
  title        = {A new multi-secret images sharing scheme using Largrange's interpolation},
  journal      = {J. Syst. Softw.},
  volume       = {76},
  number       = {3},
  pages        = {327--339},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jss.2004.07.250},
  doi          = {10.1016/J.JSS.2004.07.250},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/FengWTC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HwangTT04,
  author       = {Min{-}Shiang Hwang and
                  Shiang{-}Feng Tzeng and
                  Chwei{-}Shyong Tsai},
  title        = {Generalization of proxy signature based on elliptic curves},
  journal      = {Comput. Stand. Interfaces},
  volume       = {26},
  number       = {2},
  pages        = {73--84},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0920-5489(03)00075-8},
  doi          = {10.1016/S0920-5489(03)00075-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/HwangTT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/TsaiC04,
  author       = {Chwei{-}Shyong Tsai and
                  Chin{-}Chen Chang},
  title        = {A New Repeating Color Watermarking Scheme Based on Human Visual Model},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2004},
  number       = {13},
  pages        = {1965--1972},
  year         = {2004},
  url          = {https://doi.org/10.1155/S1110865704405071},
  doi          = {10.1155/S1110865704405071},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/TsaiC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/TsaiC04,
  author       = {Chwei{-}Shyong Tsai and
                  Chin{-}Chen Chang},
  title        = {A Pattern Mapping Based Digital Image Watermarking},
  journal      = {Informatica (Slovenia)},
  volume       = {28},
  number       = {2},
  pages        = {181--188},
  year         = {2004},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/TsaiC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/HwangCLT04,
  author       = {Min{-}Shiang Hwang and
                  Ting Yi Chang and
                  Shu{-}Chen Lin and
                  Chwei{-}Shyong Tsai},
  title        = {On the Security of an Enhanced Authentication Key Exchange Protocol},
  booktitle    = {18th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages        = {160--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/AINA.2004.1283777},
  doi          = {10.1109/AINA.2004.1283777},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/HwangCLT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metmbs/ChanCCTC04,
  author       = {Wen{-}Ling Chan and
                  Yen{-}Ping Chu and
                  Yung{-}fu Chen and
                  Chwei{-}Shyong Tsai and
                  Jan{-}Gowth Chang},
  editor       = {Faramarz Valafar and
                  Homayoun Valafar},
  title        = {Identification of Mouse mslp2 from {EST} Databases by Repeated Searching,
                  Comparison, and Assembling},
  booktitle    = {Proceedings of the International Conference on Mathematics and Engineering
                  Techniques in Medicine and Biological Scienes, {METMBS} '04, June
                  21-24, 2004, Las Vegas, Nevada, {USA}},
  pages        = {271--275},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Thu, 23 Jun 2016 15:53:27 +0200},
  biburl       = {https://dblp.org/rec/conf/metmbs/ChanCCTC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/TsaiC03,
  author       = {Chwei{-}Shyong Tsai and
                  Chin{-}Chen Chang},
  title        = {An Improvement to Image Segment Based on Human Visual System for Object-based
                  Coding},
  journal      = {Fundam. Informaticae},
  volume       = {58},
  number       = {2},
  pages        = {167--178},
  year         = {2003},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi58-2-07},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/TsaiC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/TsaiC03a,
  author       = {Chwei{-}Shyong Tsai and
                  Chin{-}Chen Chang},
  title        = {A DWT-based Deblocking Technique Based on Edge Detection and Zero
                  Masking for Reducing Blocking Effect},
  journal      = {Fundam. Informaticae},
  volume       = {58},
  number       = {2},
  pages        = {179--188},
  year         = {2003},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi58-2-08},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/TsaiC03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/TsaiTH03,
  author       = {Chwei{-}Shyong Tsai and
                  Shiang{-}Feng Tzeng and
                  Min{-}Shiang Hwang},
  title        = {Improved Non-Repudiable Threshold Proxy Signature Scheme with Known
                  Signers},
  journal      = {Informatica},
  volume       = {14},
  number       = {3},
  pages        = {393--402},
  year         = {2003},
  url          = {http://content.iospress.com/articles/informatica/inf14-3-09},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/TsaiTH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/TsaiCC02,
  author       = {Chwei{-}Shyong Tsai and
                  Chin{-}Chen Chang and
                  Tung{-}Shou Chen},
  title        = {Sharing multiple secrets in digital images},
  journal      = {J. Syst. Softw.},
  volume       = {64},
  number       = {2},
  pages        = {163--170},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0164-1212(02)00034-1},
  doi          = {10.1016/S0164-1212(02)00034-1},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/TsaiCC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/TsaiC01,
  author       = {Chwei{-}Shyong Tsai and
                  Chin{-}Chen Chang},
  editor       = {Heung{-}Yeung Shum and
                  Mark Liao and
                  Shih{-}Fu Chang},
  title        = {A Generalized Secret Image Sharing and Recovery Scheme},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2001, Second
                  {IEEE} Pacific Rim Conference on Multimedia, Bejing, China, October
                  24-26, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2195},
  pages        = {963--968},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45453-5\_129},
  doi          = {10.1007/3-540-45453-5\_129},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/pcm/TsaiC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/ChangT00,
  author       = {Chin{-}Chen Chang and
                  Chwei{-}Shyong Tsai},
  title        = {A Technique for Computing Watermarks from Digital Images},
  journal      = {Informatica (Slovenia)},
  volume       = {24},
  number       = {3},
  year         = {2000},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/ChangT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ChangTC00,
  author       = {Chin{-}Chen Chang and
                  Chwei{-}Shyong Tsai and
                  Tung{-}Shou Chen},
  title        = {A New Scheme for Sharing Secret Color Images in Computer Network},
  booktitle    = {Seventh International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2000, Iwate, Japan, July 4-7, 2000},
  pages        = {21--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICPADS.2000.857679},
  doi          = {10.1109/ICPADS.2000.857679},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ChangTC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics