BibTeX records: Ching-Nung Yang

download as .bib file

@article{DBLP:journals/iotj/HuangCZYYC24,
  author       = {Jingwang Huang and
                  Qi Cui and
                  Zhili Zhou and
                  Keping Yu and
                  Ching{-}Nung Yang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing
                  Computation in IoT Environment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {2382--2393},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3293165},
  doi          = {10.1109/JIOT.2023.3293165},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HuangCZYYC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangLCKLX24,
  author       = {Ching{-}Nung Yang and
                  Peng Li and
                  Hsiang{-}Han Cheng and
                  Hsin{-}Chuan Kuo and
                  Ming{-}Chan Lu and
                  Lizhi Xiong},
  title        = {A Security Model of Multihospital {FHIR} Database Authorization Based
                  on Secret Sharing and Blockchain},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {6},
  pages        = {10325--10335},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3328989},
  doi          = {10.1109/JIOT.2023.3328989},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangLCKLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiongZYK24,
  author       = {Lizhi Xiong and
                  Mengtao Zhang and
                  Ching{-}Nung Yang and
                  Cheonshik Kim},
  title        = {An enhanced {AMBTC} for color image compression using color palette},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {11},
  pages        = {31783--31803},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16734-7},
  doi          = {10.1007/S11042-023-16734-7},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiongZYK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiongHYS24,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Ching{-}Nung Yang and
                  Yun{-}Qing Shi},
  title        = {Reversible Data Hiding in Shared Images With Separate Cover Image
                  Reconstruction and Secret Extraction},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {12},
  number       = {1},
  pages        = {186--199},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCC.2024.3351143},
  doi          = {10.1109/TCC.2024.3351143},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/XiongHYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/XiongXYZ24,
  author       = {Lizhi Xiong and
                  Jianhua Xu and
                  Ching{-}Nung Yang and
                  Xinpeng Zhang},
  title        = {CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for
                  Robust Copy-Move Forgery Detection},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {6090--6101},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3345160},
  doi          = {10.1109/TMM.2023.3345160},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/XiongXYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/YangWC24,
  author       = {Ching{-}Nung Yang and
                  Xiaotian Wu and
                  Min{-}Jung Chung},
  title        = {Enhancement of Information Carrying and Decoding for Visual Cryptography
                  with Error Correction},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {20},
  number       = {1},
  pages        = {23:1--23:24},
  year         = {2024},
  url          = {https://doi.org/10.1145/3612927},
  doi          = {10.1145/3612927},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/YangWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ZhouWCYMYG24,
  author       = {Zhili Zhou and
                  Yao Wan and
                  Qi Cui and
                  Keping Yu and
                  Shahid Mumtaz and
                  Ching{-}Nung Yang and
                  Mohsen Guizani},
  title        = {Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing
                  Computation in Wireless Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {23},
  number       = {1},
  pages        = {423--435},
  year         = {2024},
  url          = {https://doi.org/10.1109/TWC.2023.3278108},
  doi          = {10.1109/TWC.2023.3278108},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/ZhouWCYMYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XiongHZYX23,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Xinwei Zhong and
                  Ching{-}Nung Yang and
                  Neal N. Xiong},
  title        = {{RSIS:} {A} Secure and Reliable Secret Image Sharing System Based
                  on Extended Hamming Codes in Industrial Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {3},
  pages        = {1933--1945},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2021.3139657},
  doi          = {10.1109/JIOT.2021.3139657},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XiongHZYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLK23,
  author       = {Ching{-}Nung Yang and
                  Peng Li and
                  Hsin{-}Chuan Kuo},
  title        = {(\emph{k, n}) secret image sharing scheme with privileged set},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103413},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103413},
  doi          = {10.1016/J.JISA.2022.103413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuYCL23,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Hong{-}Wu Cai and
                  Yanxiao Liu},
  title        = {A hybrid approach combining data hiding with visual cryptography for
                  secure extraction of data hiding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103520},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103520},
  doi          = {10.1016/J.JISA.2023.103520},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuYCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimYZJ23,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang and
                  Zhili Zhou and
                  Ki{-}Hyun Jung},
  title        = {Dual efficient reversible data hiding using Hamming code and {OPAP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103544},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103544},
  doi          = {10.1016/J.JISA.2023.103544},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimYZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/YangZLW23,
  author       = {Ching{-}Nung Yang and
                  Cheng{-}En Zheng and
                  Ming{-}Chan Lu and
                  Xiaotian Wu},
  title        = {Secret image sharing by using multi-prime modular arithmetic},
  journal      = {Signal Process.},
  volume       = {205},
  pages        = {108882},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sigpro.2022.108882},
  doi          = {10.1016/J.SIGPRO.2022.108882},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/YangZLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiongHYZ23,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Ching{-}Nung Yang and
                  Xinpeng Zhang},
  title        = {Reversible Data Hiding in Shared Images Based on Syndrome Decoding
                  and Homomorphism},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {3085--3098},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3259478},
  doi          = {10.1109/TCC.2023.3259478},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/XiongHYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/XiongHYX23,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Ching{-}Nung Yang and
                  Zhihua Xia},
  title        = {{RDH-DES:} Reversible Data Hiding over Distributed Encrypted-Image
                  Servers Based on Secret Sharing},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {5:1--5:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3512797},
  doi          = {10.1145/3512797},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/XiongHYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cacre/YangLW23,
  author       = {Ching{-}Nung Yang and
                  Hung{-}Yi Lin and
                  Chang{-}Ji Wang},
  editor       = {Fumin Zhang and
                  Lichuan Zhang},
  title        = {Bidirectional Hash Chain Based Key Pre-distribution for Wireless Sensor
                  Networks},
  booktitle    = {8th International Conference on Automation, Control and Robotics Engineering,
                  {CACRE} 2023, Hong Kong, China, July 13-15, 2023},
  pages        = {68--72},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CACRE58689.2023.10208473},
  doi          = {10.1109/CACRE58689.2023.10208473},
  timestamp    = {Mon, 21 Aug 2023 08:22:32 +0200},
  biburl       = {https://dblp.org/rec/conf/cacre/YangLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmhi/YangKC23,
  author       = {Ching{-}Nung Yang and
                  Hsin{-}Chuan Kuo and
                  Hsiang{-}Han Cheng},
  title        = {Ensuring {FHIR} Authentication and Data Integrity by Smart Contract
                  and Blockchain Enabled {NFT}},
  booktitle    = {The 7th International Conference on Medical and Health Informatics,
                  {ICMHI} 2023, Kyoto, Japan, May 12-14, 2023},
  pages        = {123--128},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3608298.3608322},
  doi          = {10.1145/3608298.3608322},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmhi/YangKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-12605,
  author       = {Wenjie Liu and
                  Yong Xu and
                  James C. N. Yang and
                  Wen{-}Bin Yu and
                  Lian{-}Hua Chi},
  title        = {Privacy-Preserving Quantum Two-Party Geometric Intersection},
  journal      = {CoRR},
  volume       = {abs/2309.12605},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.12605},
  doi          = {10.48550/ARXIV.2309.12605},
  eprinttype    = {arXiv},
  eprint       = {2309.12605},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-12605.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-12719,
  author       = {Wenjie Liu and
                  Yong Xu and
                  Ching{-}Nung Yang and
                  Peipei Gao and
                  Wen{-}Bin Yu},
  title        = {An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol
                  Using Bell States},
  journal      = {CoRR},
  volume       = {abs/2309.12719},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.12719},
  doi          = {10.48550/ARXIV.2309.12719},
  eprinttype    = {arXiv},
  eprint       = {2309.12719},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-12719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-13659,
  author       = {Wenjie Liu and
                  Yinsong Xu and
                  Maojun Zhang and
                  Junxiu Chen and
                  Ching{-}Nung Yang},
  title        = {A Novel Quantum Visual Secret Sharing Scheme},
  journal      = {CoRR},
  volume       = {abs/2309.13659},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.13659},
  doi          = {10.48550/ARXIV.2309.13659},
  eprinttype    = {arXiv},
  eprint       = {2309.13659},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-13659.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YangWCZ22,
  author       = {Ching{-}Nung Yang and
                  Xiaotian Wu and
                  Min{-}Jung Chung and
                  Xuliang Zhang},
  title        = {AMBTC-based secret image sharing by simple modular arithmetic},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {84},
  pages        = {103482},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jvcir.2022.103482},
  doi          = {10.1016/J.JVCIR.2022.103482},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/YangWCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/XiongHYS22,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Ching{-}Nung Yang and
                  Yun{-}Qing Shi},
  title        = {Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party
                  Based on Lightweight Cryptography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {1},
  pages        = {75--91},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3055072},
  doi          = {10.1109/TCSVT.2021.3055072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/XiongHYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhouWYFSW21,
  author       = {Zhili Zhou and
                  Meimin Wang and
                  Ching{-}Nung Yang and
                  Zhangjie Fu and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {Blockchain-based decentralized reputation system in E-commerce environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {124},
  pages        = {155--167},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.05.035},
  doi          = {10.1016/J.FUTURE.2021.05.035},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhouWYFSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhouPWYL21,
  author       = {Zhili Zhou and
                  Wenyan Pan and
                  Q. M. Jonathan Wu and
                  Ching{-}Nung Yang and
                  Zhihan Lv},
  title        = {Geometric rectification-based neural network architecture for image
                  manipulation detection},
  journal      = {Int. J. Intell. Syst.},
  volume       = {36},
  number       = {12},
  pages        = {6993--7016},
  year         = {2021},
  url          = {https://doi.org/10.1002/int.22577},
  doi          = {10.1002/INT.22577},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhouPWYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWLK21,
  author       = {Ching{-}Nung Yang and
                  Xiaotian Wu and
                  Hsuan{-}Yu Lin and
                  Cheonshik Kim},
  title        = {Intragroup and intergroup secret image sharing based on homomorphic
                  Lagrange interpolation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102910},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102910},
  doi          = {10.1016/J.JISA.2021.102910},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangTL21,
  author       = {Ching{-}Nung Yang and
                  Po{-}Yu Tsai and
                  Yanxiao Liu},
  title        = {A (\emph{k, n}) secret document sharing with meaningful shares},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102973},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102973},
  doi          = {10.1016/J.JISA.2021.102973},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangKW21,
  author       = {Ching{-}Nung Yang and
                  Chung{-}Lun Kao and
                  Chang{-}Ji Wang},
  title        = {Two-dimensional diagonal layer hash chain based key pre-distribution
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103038},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103038},
  doi          = {10.1016/J.JISA.2021.103038},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/WuYL21,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Jian{-}Ming Li},
  title        = {Secure image secret sharing over distributed cloud network},
  journal      = {Signal Process.},
  volume       = {178},
  pages        = {107768},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107768},
  doi          = {10.1016/J.SIGPRO.2020.107768},
  timestamp    = {Wed, 04 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/WuYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/XiongHY21,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Ching{-}Nung Yang},
  title        = {{CP-PSIS:} {CRT} and polynomial-based progressive secret image sharing},
  journal      = {Signal Process.},
  volume       = {185},
  pages        = {108064},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2021.108064},
  doi          = {10.1016/J.SIGPRO.2021.108064},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/XiongHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangY21,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Yun Yang},
  title        = {On the Analysis and Design of Visual Cryptography With Error Correcting
                  Capability},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {31},
  number       = {6},
  pages        = {2465--2479},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSVT.2020.3017126},
  doi          = {10.1109/TCSVT.2020.3017126},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YangY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YanLYZW21,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Ching{-}Nung Yang and
                  Xinpeng Zhang and
                  Shudong Wang},
  title        = {A Common Method of Share Authentication in Image Secret Sharing},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {31},
  number       = {7},
  pages        = {2896--2908},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSVT.2020.3025527},
  doi          = {10.1109/TCSVT.2020.3025527},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YanLYZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongZYH21,
  author       = {Lizhi Xiong and
                  Xinwei Zhong and
                  Ching{-}Nung Yang and
                  Xiao Han},
  title        = {Transform Domain-Based Invertible and Lossless Secret Image Sharing
                  With Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2912--2925},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3065794},
  doi          = {10.1109/TIFS.2021.3065794},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongZYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiuYS21,
  author       = {Yanxiao Liu and
                  Ching{-}Nung Yang and
                  Qindong Sun},
  title        = {Thresholds Based Image Extraction Schemes in Big Data Environment
                  in Intelligent Traffic Management},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {3952--3960},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.2994386},
  doi          = {10.1109/TITS.2020.2994386},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/LiuYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/LiuXCY20,
  author       = {Wenjie Liu and
                  Yinsong Xu and
                  Junxiu Chen and
                  Ching{-}Nung Yang},
  title        = {A (t, n) threshold quantum visual secret sharing},
  journal      = {Int. J. Sens. Networks},
  volume       = {33},
  number       = {2},
  pages        = {74--84},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSNET.2020.107863},
  doi          = {10.1504/IJSNET.2020.107863},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/LiuXCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuYY20,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Yi{-}Yun Yang},
  title        = {A hybrid scheme for enhancing recovered image quality in polynomial
                  based secret image sharing by modify-and-recalculate strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102452},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102452},
  doi          = {10.1016/J.JISA.2020.102452},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WuYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLL20,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Peng Li},
  title        = {Cheating immune \emph{k}-out-of-\emph{n} block-based progressive visual
                  cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102660},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102660},
  doi          = {10.1016/J.JISA.2020.102660},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/LiuYSC20,
  author       = {Yan{-}Xiao Liu and
                  Ching{-}Nung Yang and
                  Qin{-}Dong Sun and
                  Yi{-}Cheng Chen},
  title        = {(\emph{k}, \emph{n}) scalable secret image sharing with multiple decoding
                  options},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {38},
  number       = {1},
  pages        = {219--228},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-179396},
  doi          = {10.3233/JIFS-179396},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/LiuYSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/ZhouYKC20,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Cheonshik Kim and
                  Stelvio Cimato},
  title        = {Introduction to the special issue on deep learning for real-time information
                  hiding and forensics},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {1},
  pages        = {1--5},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-020-00947-2},
  doi          = {10.1007/S11554-020-00947-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/ZhouYKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuY20,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang},
  title        = {Probabilistic color visual cryptography schemes for black and white
                  secret images},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {70},
  pages        = {102793},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jvcir.2020.102793},
  doi          = {10.1016/J.JVCIR.2020.102793},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WuYL20,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Yen{-}Wei Liu},
  title        = {High capacity partial reversible data hiding by hamming code},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {31-32},
  pages        = {23425--23444},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-09098-9},
  doi          = {10.1007/S11042-020-09098-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WuYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WuYY20,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Yi{-}Yun Yang},
  title        = {Sharing and hiding a secret image in color palette images with authentication},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {35-36},
  pages        = {25657--25677},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-09253-2},
  doi          = {10.1007/S11042-020-09253-2},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WuYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/XiongZY20,
  author       = {Lizhi Xiong and
                  Xinwei Zhong and
                  Ching{-}Nung Yang},
  title        = {{DWT-SISA:} a secure and effective discrete wavelet transform-based
                  secret image sharing with authentication},
  journal      = {Signal Process.},
  volume       = {173},
  pages        = {107571},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107571},
  doi          = {10.1016/J.SIGPRO.2020.107571},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/XiongZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/WuYL20,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Yen{-}Wei Liu},
  title        = {A general framework for partial reversible data hiding using hamming
                  code},
  journal      = {Signal Process.},
  volume       = {175},
  pages        = {107657},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107657},
  doi          = {10.1016/J.SIGPRO.2020.107657},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/WuYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouCYS19,
  author       = {Zhili Zhou and
                  Jingcheng Chen and
                  Ching{-}Nung Yang and
                  Xingming Sun},
  title        = {Video Copy Detection Using Spatio-Temporal {CNN} Features},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {100658--100665},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2930173},
  doi          = {10.1109/ACCESS.2019.2930173},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouCYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuXZCY19,
  author       = {Wenjie Liu and
                  Yinsong Xu and
                  Maojun Zhang and
                  Junxiu Chen and
                  Ching{-}Nung Yang},
  title        = {A Novel Quantum Visual Secret Sharing Scheme},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {114374--114384},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2931073},
  doi          = {10.1109/ACCESS.2019.2931073},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuXZCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouYCW19,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Song{-}Ruei Cai and
                  Daoshun Wang},
  title        = {Boolean Operation Based Visual Cryptography},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {165496--165508},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2951722},
  doi          = {10.1109/ACCESS.2019.2951722},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhouYCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/ZhouYYS19,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Yimin Yang and
                  Xingming Sun},
  title        = {Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing
                  Attacks in Cloud Environment},
  journal      = {Complex.},
  volume       = {2019},
  pages        = {2875676:1--2875676:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2875676},
  doi          = {10.1155/2019/2875676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/ZhouYYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WuY19,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang},
  title        = {Partial reversible AMBTC-based secret image sharing with steganography},
  journal      = {Digit. Signal Process.},
  volume       = {93},
  pages        = {22--33},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.dsp.2019.06.016},
  doi          = {10.1016/J.DSP.2019.06.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/WuY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/HuangZYLW19,
  author       = {Fang Huang and
                  Zhili Zhou and
                  Ching{-}Nung Yang and
                  Xiya Liu and
                  Tao Wang},
  title        = {Original image tracing with image relational graph for near-duplicate
                  image elimination},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {18},
  number       = {3},
  pages        = {294--304},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJCSE.2019.098540},
  doi          = {10.1504/IJCSE.2019.098540},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/HuangZYLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/KimSYCW19,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang and
                  Yi{-}Cheng Chen and
                  Song{-}Yu Wu},
  title        = {Data Hiding Using Sequential Hamming + k with m Overlapped Pixels},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {12},
  pages        = {6159--6174},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.12.020},
  doi          = {10.3837/TIIS.2019.12.020},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/KimSYCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YangCLK19,
  author       = {Ching{-}Nung Yang and
                  Yung{-}Shun Chou and
                  Yan{-}Xiao Liu and
                  Cheonshik Kim},
  title        = {Exploiting error control in matrix coding-based data hiding over lossy
                  channel},
  journal      = {J. Real Time Image Process.},
  volume       = {16},
  number       = {3},
  pages        = {577--588},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11554-018-0829-1},
  doi          = {10.1007/S11554-018-0829-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YangCLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuCYY19,
  author       = {Xiaotian Wu and
                  Dong Chen and
                  Ching{-}Nung Yang and
                  Yi{-}Yun Yang},
  title        = {A (k, n) threshold partial reversible AMBTC-based visual cryptography
                  using one reference image},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {59},
  pages        = {550--562},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jvcir.2019.02.008},
  doi          = {10.1016/J.JVCIR.2019.02.008},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuCYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuY19,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang},
  title        = {A combination of color-black-and-white visual cryptography and polynomial
                  based secret image sharing},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {61},
  pages        = {74--84},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jvcir.2019.03.020},
  doi          = {10.1016/J.JVCIR.2019.03.020},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimSYC19,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang and
                  Yung{-}Shun Chou},
  title        = {Generalizing Hamming+k data hiding by overlapped pixels},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {13},
  pages        = {17995--18015},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-7101-3},
  doi          = {10.1007/S11042-018-7101-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimSYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YangWCK19,
  author       = {Ching{-}Nung Yang and
                  Song{-}Yu Wu and
                  Yung{-}Shun Chou and
                  Cheonshik Kim},
  title        = {Enhanced stego-image quality and embedding capacity for the partial
                  reversible data hiding scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {13},
  pages        = {18595--18616},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7220-5},
  doi          = {10.1007/S11042-019-7220-5},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/YangWCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuYWSB19,
  author       = {Yan{-}Xiao Liu and
                  Ching{-}Nung Yang and
                  Chi{-}Ming Wu and
                  Qin{-}Dong Sun and
                  Wei Bi},
  title        = {Threshold changeable secret image sharing scheme based on interpolation
                  polynomial},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {13},
  pages        = {18653--18667},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7205-4},
  doi          = {10.1007/S11042-019-7205-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuYWSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanYSXM19,
  author       = {Zhaoqing Pan and
                  Ching{-}Nung Yang and
                  Victor S. Sheng and
                  Naixue Xiong and
                  Weizhi Meng},
  title        = {Machine Learning for Wireless Multimedia Data Security},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7682306:1--7682306:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7682306},
  doi          = {10.1155/2019/7682306},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanYSXM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/LiuYSWLC19,
  author       = {Yan{-}Xiao Liu and
                  Ching{-}Nung Yang and
                  Qin{-}Dong Sun and
                  Song{-}Yu Wu and
                  Shin{-}Shang Lin and
                  Yung{-}Shun Chou},
  title        = {Enhanced embedding capacity for the SMSD-based data-hiding method},
  journal      = {Signal Process. Image Commun.},
  volume       = {78},
  pages        = {216--222},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.image.2019.07.013},
  doi          = {10.1016/J.IMAGE.2019.07.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/LiuYSWLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/WuY19,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang},
  title        = {Invertible secret image sharing with steganography and authentication
                  for {AMBTC} compressed images},
  journal      = {Signal Process. Image Commun.},
  volume       = {78},
  pages        = {437--447},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.image.2019.08.007},
  doi          = {10.1016/J.IMAGE.2019.08.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/WuY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/WuLWY19,
  author       = {Zhen Wu and
                  Yi{-}Ning Liu and
                  Dong Wang and
                  Ching{-}Nung Yang},
  title        = {An Efficient Essential Secret Image Sharing Scheme Using Derivative
                  Polynomial},
  journal      = {Symmetry},
  volume       = {11},
  number       = {1},
  pages        = {69},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11010069},
  doi          = {10.3390/SYM11010069},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/WuLWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangWL19,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Yi{-}Chin Lin},
  title        = {k Out of n Region-Based Progressive Visual Cryptography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {29},
  number       = {1},
  pages        = {252--262},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSVT.2017.2771255},
  doi          = {10.1109/TCSVT.2017.2771255},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YangWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/FuHSVY19,
  author       = {Zhangjie Fu and
                  Fengxiao Huang and
                  Xingming Sun and
                  Athanasios V. Vasilakos and
                  Ching{-}Nung Yang},
  title        = {Enabling Semantic Search Based on Conceptual Graphs over Encrypted
                  Outsourced Data},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {813--823},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2016.2622697},
  doi          = {10.1109/TSC.2016.2622697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/FuHSVY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuYS18,
  author       = {Yanxiao Liu and
                  Ching{-}Nung Yang and
                  Qin{-}Dong Sun},
  title        = {Enhance Embedding Capacity of Generalized Exploiting Modification
                  Directions in Data Hiding},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {5374--5378},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2787803},
  doi          = {10.1109/ACCESS.2017.2787803},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouYCS18,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Yi Cao and
                  Xingming Sun},
  title        = {Secret Image Sharing Based on Encrypted Pixels},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {15021--15025},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2811722},
  doi          = {10.1109/ACCESS.2018.2811722},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouYCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/KimSLY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Lu Leng and
                  Ching{-}Nung Yang},
  title        = {Separable reversible data hiding in encrypted halftone image},
  journal      = {Displays},
  volume       = {55},
  pages        = {71--79},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.displa.2018.04.002},
  doi          = {10.1016/J.DISPLA.2018.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/displays/KimSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/KimSYC18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang and
                  Yung{-}Shun Chou},
  title        = {Improving capacity of Hamming (\emph{n}, \emph{k})+1 stego-code by
                  using optimized Hamming +{\unicode{8239}}\emph{k}},
  journal      = {Digit. Signal Process.},
  volume       = {78},
  pages        = {284--293},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.dsp.2018.03.016},
  doi          = {10.1016/J.DSP.2018.03.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/KimSYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/0001SY18,
  author       = {Yan{-}Xiao Liu and
                  Qin{-}Dong Sun and
                  Ching{-}Nung Yang},
  title        = {(k, n) secret image sharing scheme capable of cheating detection},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2018},
  pages        = {72},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13638-018-1084-7},
  doi          = {10.1186/S13638-018-1084-7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/0001SY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiuYWZJ18,
  author       = {Yanxiao Liu and
                  Ching{-}Nung Yang and
                  Yichuan Wang and
                  Lei Zhu and
                  Wenjiang Ji},
  title        = {Cheating identifiable secret sharing scheme using symmetric bivariate
                  polynomial},
  journal      = {Inf. Sci.},
  volume       = {453},
  pages        = {21--29},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.04.043},
  doi          = {10.1016/J.INS.2018.04.043},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiuYWZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimCYZB18,
  author       = {Cheonshik Kim and
                  Chin{-}Chen Chang and
                  Ching{-}Nung Yang and
                  Xinpeng Zhang and
                  Jinsuk Baek},
  title        = {Special Issue: Real-Time Data Hiding and Visual Cryptography},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-018-0749-0},
  doi          = {10.1007/S11554-018-0749-0},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimCYZB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/LiYK18,
  author       = {Peng Li and
                  Ching{-}Nung Yang and
                  Qian Kong},
  title        = {A novel two-in-one image secret sharing scheme based on perfect black
                  visual cryptography},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {41--50},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-016-0621-z},
  doi          = {10.1007/S11554-016-0621-Z},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/LiYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YanLY18,
  author       = {Xuehu Yan and
                  Xin Liu and
                  Ching{-}Nung Yang},
  title        = {An enhanced threshold visual secret sharing based on random grids},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {61--73},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-015-0540-4},
  doi          = {10.1007/S11554-015-0540-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YanLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimSLY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Lu Leng and
                  Ching{-}Nung Yang},
  title        = {Lossless data hiding for absolute moment block truncation coding using
                  histogram modification},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {101--114},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-016-0641-8},
  doi          = {10.1007/S11554-016-0641-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimSKY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Byung{-}Gyu Kim and
                  Ching{-}Nung Yang},
  title        = {Secure medical images based on data hiding using a hybrid scheme with
                  the Hamming code, LSB, and {OPAP}},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {115--126},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-017-0674-7},
  doi          = {10.1007/S11554-017-0674-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimSKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YangKL18,
  author       = {Ching{-}Nung Yang and
                  Cheonshik Kim and
                  Yen{-}Hung Lo},
  title        = {Adaptive real-time reversible data hiding for {JPEG} images},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {147--157},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-015-0555-x},
  doi          = {10.1007/S11554-015-0555-X},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YangKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YangWP18,
  author       = {Ching{-}Nung Yang and
                  Fu{-}Heng Wu and
                  Sheng{-}Lung Peng},
  title        = {Enhancing multi-factor cheating prevention in visual cryptography
                  based minimum (\emph{k}, \emph{n})-connected graph},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {55},
  pages        = {660--676},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jvcir.2018.07.012},
  doi          = {10.1016/J.JVCIR.2018.07.012},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/YangWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LiuYCWS18,
  author       = {Yanxiao Liu and
                  Ching{-}Nung Yang and
                  Yung{-}Shun Chou and
                  Song{-}Yu Wu and
                  Qin{-}Dong Sun},
  title        = {Progressive (k, n) secret image sharing Scheme with meaningful shadow
                  images by {GEMD} and {RGEMD}},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {55},
  pages        = {766--777},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jvcir.2018.08.003},
  doi          = {10.1016/J.JVCIR.2018.08.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/LiuYCWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KimKRY18,
  author       = {Cheonshik Kim and
                  Bryan Kim and
                  Joel J. P. C. Rodrigues and
                  James C. N. Yang},
  title        = {Special issue: Advanced technology for smart home automation and entertainment},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1102-5},
  doi          = {10.1007/S00779-017-1102-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/KimKRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KimSY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang},
  title        = {Self-embedding fragile watermarking scheme to restoration of a tampered
                  image using {AMBTC}},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {11--22},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1061-x},
  doi          = {10.1007/S00779-017-1061-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/KimSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LeeBKY18,
  author       = {Yong{-}Joon Lee and
                  Namkyun Baik and
                  Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Study of detection method for spoofed {IP} against DDoS attacks},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {35--44},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1097-y},
  doi          = {10.1007/S00779-017-1097-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/LeeBKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiuGYQY18,
  author       = {Wenjie Liu and
                  Peipei Gao and
                  Wenbin Yu and
                  Zhiguo Qu and
                  Ching{-}Nung Yang},
  title        = {Quantum Relief algorithm},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {10},
  pages        = {280},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-2048-x},
  doi          = {10.1007/S11128-018-2048-X},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiuGYQY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/LiLY18,
  author       = {Peng Li and
                  Zuquan Liu and
                  Ching{-}Nung Yang},
  title        = {A construction method of (t, k, n)-essential secret image sharing
                  scheme},
  journal      = {Signal Process. Image Commun.},
  volume       = {65},
  pages        = {210--220},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.image.2018.04.002},
  doi          = {10.1016/J.IMAGE.2018.04.002},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/LiLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/WuYZH18,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Yi Ting Zhuang and
                  Shen{-}Chieh Hsu},
  title        = {Improving recovered image quality in secret image sharing by simple
                  modular arithmetic},
  journal      = {Signal Process. Image Commun.},
  volume       = {66},
  pages        = {42--49},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.image.2018.05.001},
  doi          = {10.1016/J.IMAGE.2018.05.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/WuYZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/LiuYWC18,
  author       = {Yan{-}Xiao Liu and
                  Ching{-}Nung Yang and
                  Song{-}Yu Wu and
                  Yung{-}Shun Chou},
  title        = {Progressive (k, n) secret image sharing schemes based on Boolean operations
                  and covering codes},
  journal      = {Signal Process. Image Commun.},
  volume       = {66},
  pages        = {77--86},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.image.2018.05.004},
  doi          = {10.1016/J.IMAGE.2018.05.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/LiuYWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangHK17,
  author       = {Ching{-}Nung Yang and
                  Shen{-}Chieh Hsu and
                  Cheonshik Kim},
  title        = {Improving stego image quality in image interpolation based data hiding},
  journal      = {Comput. Stand. Interfaces},
  volume       = {50},
  pages        = {209--215},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.10.005},
  doi          = {10.1016/J.CSI.2016.10.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/YangHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangWYWK17,
  author       = {Ching{-}Nung Yang and
                  Chihi{-}Han Wu and
                  Zong{-}Xuan Yeh and
                  Daoshun Wang and
                  Cheonshik Kim},
  title        = {A new sharing digital image scheme with clearer shadow images},
  journal      = {Comput. Stand. Interfaces},
  volume       = {51},
  pages        = {118--131},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.11.015},
  doi          = {10.1016/J.CSI.2016.11.015},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/YangWYWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YangLW17,
  author       = {Ching{-}Nung Yang and
                  Jung{-}Kuo Liao and
                  Daoshun Wang},
  title        = {New privilege-based visual cryptography with arbitrary privilege levels},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {42},
  pages        = {121--131},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2016.10.014},
  doi          = {10.1016/J.JVCIR.2016.10.014},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/YangLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YangWCF17,
  author       = {Ching{-}Nung Yang and
                  Xiaotian Wu and
                  Yung{-}Chien Chou and
                  Zhangjie Fu},
  title        = {Constructions of general (k, n) reversible AMBTC-based visual cryptography
                  with two decryption options},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {48},
  pages        = {182--194},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.06.012},
  doi          = {10.1016/J.JVCIR.2017.06.012},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/YangWCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/LiuY17,
  author       = {Yan{-}Xiao Liu and
                  Ching{-}Nung Yang},
  title        = {Scalable secret image sharing scheme with essential shadows},
  journal      = {Signal Process. Image Commun.},
  volume       = {58},
  pages        = {49--55},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.image.2017.06.011},
  doi          = {10.1016/J.IMAGE.2017.06.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/LiuY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouWWYS17,
  author       = {Zhili Zhou and
                  Yunlong Wang and
                  Q. M. Jonathan Wu and
                  Ching{-}Nung Yang and
                  Xingming Sun},
  title        = {Effective and Efficient Global Context Verification for Image Copy
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {48--63},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601065},
  doi          = {10.1109/TIFS.2016.2601065},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouWWYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangLC17,
  author       = {Ching{-}Nung Yang and
                  Jian{-}Ming Li and
                  Yung{-}Shun Chou},
  title        = {On the Analysis of k-Secure t-Conference Key Distribution Scheme},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {91--95},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163076},
  doi          = {10.1145/3163058.3163076},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/YangLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/LiYZ16,
  author       = {Peng Li and
                  Ching{-}Nung Yang and
                  Zhili Zhou},
  title        = {Essential secret image sharing scheme with the same size of shadows},
  journal      = {Digit. Signal Process.},
  volume       = {50},
  pages        = {51--60},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dsp.2015.12.004},
  doi          = {10.1016/J.DSP.2015.12.004},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/LiYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhouYCSLW16,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Beijing Chen and
                  Xingming Sun and
                  Qi Liu and
                  Q. M. Jonathan Wu},
  title        = {Effective and Efficient Image Copy Detection with Resistance to Arbitrary
                  Rotation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {6},
  pages        = {1531--1540},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015EDP7341},
  doi          = {10.1587/TRANSINF.2015EDP7341},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhouYCSLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KimSSY16,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Ching{-}Nung Yang},
  title        = {Secure protection of video recorder video in smart car},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {12},
  number       = {12},
  year         = {2016},
  url          = {https://doi.org/10.1177/1550147716681792},
  doi          = {10.1177/1550147716681792},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KimSSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YangSYK16,
  author       = {Ching{-}Nung Yang and
                  Li{-}Zhe Sun and
                  Xuehu Yan and
                  Cheonshik Kim},
  title        = {Design a new visual cryptography for human-verifiable authentication
                  in accessing a database},
  journal      = {J. Real Time Image Process.},
  volume       = {12},
  number       = {2},
  pages        = {483--494},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11554-015-0511-9},
  doi          = {10.1007/S11554-015-0511-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YangSYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/YangCC16,
  author       = {Ching{-}Nung Yang and
                  Cheng{-}Hua Chen and
                  Song{-}Ruei Cai},
  title        = {Enhanced Boolean-based multi secret image sharing scheme},
  journal      = {J. Syst. Softw.},
  volume       = {116},
  pages        = {22--34},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jss.2015.01.031},
  doi          = {10.1016/J.JSS.2015.01.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/YangCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimY16a,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Data hiding based on overlapped pixels using hamming code},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {23},
  pages        = {15651--15663},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2355-x},
  doi          = {10.1007/S11042-014-2355-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimY16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangFSY16,
  author       = {Fengxiao Huang and
                  Zhangjie Fu and
                  Xingming Sun and
                  Ching{-}Nung Yang},
  title        = {Privacy-preserving outsourced gene data search in encryption domain},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {5178--5186},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1687},
  doi          = {10.1002/SEC.1687},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangFSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YangSC16,
  author       = {Ching{-}Nung Yang and
                  Li{-}Zhe Sun and
                  Song{-}Ruei Cai},
  title        = {Extended color visual cryptography for black and white secret image},
  journal      = {Theor. Comput. Sci.},
  volume       = {609},
  pages        = {143--161},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2015.09.016},
  doi          = {10.1016/J.TCS.2015.09.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/YangSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhouMZWY16,
  author       = {Zhili Zhou and
                  Yan Mu and
                  Ningsheng Zhao and
                  Q. M. Jonathan Wu and
                  Ching{-}Nung Yang},
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {Coverless Information Hiding Method Based on Multi-keywords},
  booktitle    = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {39--47},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48671-0\_4},
  doi          = {10.1007/978-3-319-48671-0\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhouMZWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/CimatoDMY16,
  author       = {Stelvio Cimato and
                  Ernesto Damiani and
                  Silvia Mella and
                  Ching{-}Nung Yang},
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {Key Recovery in Public Clouds: {A} Survey on Cross-VM Side Channel
                  Attacks},
  booktitle    = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {456--467},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48671-0\_40},
  doi          = {10.1007/978-3-319-48671-0\_40},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/CimatoDMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YangCWC16,
  author       = {Ching{-}Nung Yang and
                  Stelvio Cimato and
                  Jihi{-}Han Wu and
                  Song{-}Ruei Cai},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {400--406},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005740504000406},
  doi          = {10.5220/0005740504000406},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YangCWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/YangYHF16,
  author       = {Ching{-}Nung Yang and
                  Zong{-}Xuan Yeh and
                  Shen{-}Chieh Hsu and
                  Zhangjie Fu},
  editor       = {Xiang Fei and
                  Lipo Wang and
                  Chunlei Ji and
                  Qiang Sun and
                  Niansheng Chen and
                  Xiaoyong Song and
                  Xin Wang},
  title        = {Enhancing security for two-party comparison over encrypted data},
  booktitle    = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
                  Shanghai, China, November 19-21, 2016},
  pages        = {439--443},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICSAI.2016.7810995},
  doi          = {10.1109/ICSAI.2016.7810995},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icsai/YangYHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/YangLF15,
  author       = {Ching{-}Nung Yang and
                  Jia{-}Bin Lai and
                  Zhangjie Fu},
  title        = {Protecting User Privacy for Cloud Computing by Bivariate Polynomial
                  Based Secret Sharing},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {341--355},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002593},
  doi          = {10.2498/CIT.1002593},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/YangLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/YanWNY15,
  author       = {Xuehu Yan and
                  Shen Wang and
                  Xiamu Niu and
                  Ching{-}Nung Yang},
  title        = {Halftone visual cryptography with minimum auxiliary black pixels and
                  uniform image quality},
  journal      = {Digit. Signal Process.},
  volume       = {38},
  pages        = {53--65},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dsp.2014.12.002},
  doi          = {10.1016/J.DSP.2014.12.002},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/YanWNY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangL15,
  author       = {Ching{-}Nung Yang and
                  Che{-}Yu Lin},
  title        = {Almost-aspect-ratio-invariant visual cryptography without adding extra
                  subpixels},
  journal      = {Inf. Sci.},
  volume       = {312},
  pages        = {131--151},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.03.024},
  doi          = {10.1016/J.INS.2015.03.024},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YanWNY15,
  author       = {Xuehu Yan and
                  Shen Wang and
                  Xiamu Niu and
                  Ching{-}Nung Yang},
  title        = {Random grid-based visual secret sharing with multiple decryptions},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {26},
  pages        = {94--104},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jvcir.2014.11.003},
  doi          = {10.1016/J.JVCIR.2014.11.003},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/YanWNY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimY15a,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Watermark with {DSA} signature using predictive coding},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {14},
  pages        = {5189--5203},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1667-6},
  doi          = {10.1007/S11042-013-1667-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimY15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/YanWNY15,
  author       = {Xuehu Yan and
                  Shen Wang and
                  Xiamu Niu and
                  Ching{-}Nung Yang},
  title        = {Generalized random grids-based threshold visual cryptography with
                  meaningful shares},
  journal      = {Signal Process.},
  volume       = {109},
  pages        = {317--333},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.sigpro.2014.12.002},
  doi          = {10.1016/J.SIGPRO.2014.12.002},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/YanWNY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/YangLWC15,
  author       = {Ching{-}Nung Yang and
                  Peng Li and
                  Chih{-}Cheng Wu and
                  Song{-}Ruei Cai},
  title        = {Reducing shadow size in essential secret image sharing by conjunctive
                  hierarchical approach},
  journal      = {Signal Process. Image Commun.},
  volume       = {31},
  pages        = {1--9},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.image.2014.11.003},
  doi          = {10.1016/J.IMAGE.2014.11.003},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/YangLWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YangLP15,
  author       = {Ching{-}Nung Yang and
                  Zih{-}Yang Lin and
                  Sheng{-}Lung Peng},
  title        = {Reducing Code Length of Second-Order Spectral-Null Code},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {2},
  pages        = {492--503},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2013.231},
  doi          = {10.1109/TC.2013.231},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YangLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vjcs/HoaTKY15,
  author       = {Le Quang Hoa and
                  Nguyen Huy Truong and
                  Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {(1, 7, 4) Data hiding scheme for searching in hidden text with automata},
  journal      = {Vietnam. J. Comput. Sci.},
  volume       = {2},
  number       = {4},
  pages        = {257--265},
  year         = {2015},
  url          = {https://doi.org/10.1007/s40595-015-0050-0},
  doi          = {10.1007/S40595-015-0050-0},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vjcs/HoaTKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcity/YangWTK15,
  author       = {Ching{-}Nung Yang and
                  Fu{-}Heng Wu and
                  Sin{-}Yen Tsai and
                  Wen{-}Chung Kuo},
  title        = {E-Health Services for Elderly Care Based on Google Cloud Messaging},
  booktitle    = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2
                  2015, Chengdu, China, December 19-21, 2015},
  pages        = {9--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartCity.2015.39},
  doi          = {10.1109/SMARTCITY.2015.39},
  timestamp    = {Thu, 13 Apr 2023 12:52:26 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcity/YangWTK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2014,
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19321-2},
  doi          = {10.1007/978-3-319-19321-2},
  isbn         = {978-3-319-19320-5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangY14,
  author       = {Ching{-}Nung Yang and
                  Yao{-}Yu Yang},
  title        = {New extended visual cryptography schemes with clearer shadow images},
  journal      = {Inf. Sci.},
  volume       = {271},
  pages        = {246--263},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.099},
  doi          = {10.1016/J.INS.2014.02.099},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangWW14,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Daoshun Wang},
  title        = {A discussion on the relationship between probabilistic visual cryptography
                  and random grid},
  journal      = {Inf. Sci.},
  volume       = {278},
  pages        = {141--173},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.03.033},
  doi          = {10.1016/J.INS.2014.03.033},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/KimSSTY14,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Raylin Tso and
                  Ching{-}Nung Yang},
  title        = {A secret sharing scheme for {EBTC} using steganography},
  journal      = {J. Intell. Manuf.},
  volume       = {25},
  number       = {2},
  pages        = {241--249},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10845-012-0660-7},
  doi          = {10.1007/S10845-012-0660-7},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/KimSSTY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuYY14,
  author       = {Yan{-}Xiao Liu and
                  Ching{-}Nung Yang and
                  Po{-}Han Yeh},
  title        = {Reducing shadow size in smooth scalable secret image sharing},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2237--2244},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.930},
  doi          = {10.1002/SEC.930},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangW14,
  author       = {Ching{-}Nung Yang and
                  Daoshun Wang},
  title        = {Property Analysis of XOR-Based Visual Cryptography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {24},
  number       = {2},
  pages        = {189--197},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCSVT.2013.2276708},
  doi          = {10.1109/TCSVT.2013.2276708},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YangW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/CimatoYW14,
  author       = {Stelvio Cimato and
                  James C. N. Yang and
                  Chih{-}Cheng Wu},
  title        = {Visual Cryptography Based Watermarking},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {91--109},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_6},
  doi          = {10.1007/978-3-642-55046-1\_6},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/CimatoYW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LiuGWY14,
  author       = {Feng Liu and
                  Teng Guo and
                  Chuan Kun Wu and
                  Ching{-}Nung Yang},
  title        = {Flexible Visual Cryptography Scheme and Its Application},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {110--130},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_7},
  doi          = {10.1007/978-3-642-55046-1\_7},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LiuGWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangKY14,
  author       = {Yu{-}Chih Huang and
                  Wen{-}Chung Kuo and
                  Ching{-}Nung Yang},
  title        = {Data Hiding Based on Radix-2},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {170--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.22},
  doi          = {10.1109/ASIAJCIS.2014.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcc/KimY14,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  editor       = {James Jong Hyuk Park and
                  Albert Y. Zomaya and
                  Hwa{-}Young Jeong and
                  Mohammad S. Obaidat},
  title        = {Improving Data Hiding Capacity Based on Hamming Code},
  booktitle    = {Frontier and Innovation in Future Computing and Communications, Proceedings
                  of the 2014 {FTRA} International Symposium on Frontier and Innovation
                  in Future Computing and Communications, {FCC} 2014, Auckland, New
                  Zealand, January 13-16, 2014},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {301},
  pages        = {697--706},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-94-017-8798-7\_80},
  doi          = {10.1007/978-94-017-8798-7\_80},
  timestamp    = {Fri, 27 Mar 2020 08:55:45 +0100},
  biburl       = {https://dblp.org/rec/conf/fcc/KimY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/YanWNY14,
  author       = {Xuehu Yan and
                  Shen Wang and
                  Xiamu Niu and
                  Ching{-}Nung Yang},
  editor       = {Chu Kiong Loo and
                  Keem Siah Yap and
                  Kok Wai Wong and
                  Andrew Teoh Beng Jin and
                  Kaizhu Huang},
  title        = {Essential Visual Cryptographic Scheme with Different Importance of
                  Shares},
  booktitle    = {Neural Information Processing - 21st International Conference, {ICONIP}
                  2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8836},
  pages        = {636--643},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12643-2\_77},
  doi          = {10.1007/978-3-319-12643-2\_77},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/YanWNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiYK14,
  author       = {Peng Li and
                  Ching{-}Nung Yang and
                  Qian Kong},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Two-in-One Image Secret Sharing Scheme Based on Boolean Operations},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {305--318},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_23},
  doi          = {10.1007/978-3-319-19321-2\_23},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YanCYC14,
  author       = {Xuehu Yan and
                  Guohui Chen and
                  Ching{-}Nung Yang and
                  Song{-}Ruei Cai},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast
                  by Boolean Operations},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {319--332},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_24},
  doi          = {10.1007/978-3-319-19321-2\_24},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YanCYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangYY14,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Visual Cryptography Scheme with Autostereogram},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_27},
  doi          = {10.1007/978-3-319-19321-2\_27},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimY14,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Steganography Based on Grayscale Images Using (5, 3) Hamming Code},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {588--598},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_45},
  doi          = {10.1007/978-3-319-19321-2\_45},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuyTKY13,
  author       = {Phan Trung Huy and
                  Nguyen Hai Thanh and
                  Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Data-Hiding for Halftone Images Using an Improved {CPT} scheme},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {405--424},
  year         = {2013},
  url          = {https://doi.org/10.3837/tiis.2013.02.013},
  doi          = {10.3837/TIIS.2013.02.013},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/HuyTKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LinYLL13,
  author       = {Hsiao{-}Ching Lin and
                  Ching{-}Nung Yang and
                  Chi{-}Sung Laih and
                  Hui{-}Tang Lin},
  title        = {Natural language letter based visual cryptography scheme},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {3},
  pages        = {318--331},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.01.003},
  doi          = {10.1016/J.JVCIR.2013.01.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/LinYLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LiYWKM13,
  author       = {Peng Li and
                  Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Qian Kong and
                  Yanpeng Ma},
  title        = {Essential secret image sharing scheme with different importance of
                  shadows},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {7},
  pages        = {1106--1114},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.07.005},
  doi          = {10.1016/J.JVCIR.2013.07.005},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/LiYWKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LiYKML13,
  author       = {Peng Li and
                  Ching{-}Nung Yang and
                  Qian Kong and
                  Yanpeng Ma and
                  Zheng Liu},
  title        = {Sharing more information in gray visual cryptography scheme},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {8},
  pages        = {1380--1393},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.09.010},
  doi          = {10.1016/J.JVCIR.2013.09.010},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/LiYKML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/YangW13,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu},
  title        = {{MSRC:} (M)icropayment (S)cheme with ability to (R)eturn (C)hanges},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {96--107},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.07.010},
  doi          = {10.1016/J.MCM.2012.07.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/YangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/YangCSK13,
  author       = {Ching{-}Nung Yang and
                  Pin{-}Wei Chen and
                  Hsiang{-}Wen Shih and
                  Cheonshik Kim},
  title        = {Aspect ratio invariant visual cryptography by image filtering and
                  resizing},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {17},
  number       = {5},
  pages        = {843--850},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00779-012-0535-0},
  doi          = {10.1007/S00779-012-0535-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/YangCSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSDY13,
  author       = {Daoshun Wang and
                  Tao Song and
                  Lin Dong and
                  Ching{-}Nung Yang},
  title        = {Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {2059--2072},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2281108},
  doi          = {10.1109/TIFS.2013.2281108},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSDY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/HuyKAHY13,
  author       = {Phan Trung Huy and
                  Cheonshik Kim and
                  Nguyen Tuan Anh and
                  Le Quang Hoa and
                  Ching{-}Nung Yang},
  editor       = {James J. Park and
                  Hamid R. Arabnia and
                  Cheonshik Kim and
                  Weisong Shi and
                  Joon{-}Min Gil},
  title        = {Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules},
  booktitle    = {Grid and Pervasive Computing - 8th International Conference, {GPC}
                  2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7861},
  pages        = {649--658},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38027-3\_70},
  doi          = {10.1007/978-3-642-38027-3\_70},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/HuyKAHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GuoLWYWR13,
  author       = {Teng Guo and
                  Feng Liu and
                  Chuan Kun Wu and
                  Ching{-}Nung Yang and
                  Wen Wang and
                  YaWei Ren},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Threshold Secret Image Sharing},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {404--412},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_29},
  doi          = {10.1007/978-3-319-02726-5\_29},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/GuoLWYWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XuWLY13,
  author       = {Xing{-}Fu Xu and
                  Daoshun Wang and
                  Shundong Li and
                  Ching{-}Nung Yang},
  editor       = {Kebin Jia and
                  Jeng{-}Shyang Pan and
                  Yao Zhao and
                  Lakhmi C. Jain},
  title        = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes},
  booktitle    = {Ninth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
                  16-18, 2013},
  pages        = {369--372},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IIH-MSP.2013.99},
  doi          = {10.1109/IIH-MSP.2013.99},
  timestamp    = {Wed, 01 Apr 2020 17:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/XuWLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YangWC13,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Chih{-}Wei Chou},
  editor       = {Kebin Jia and
                  Jeng{-}Shyang Pan and
                  Yao Zhao and
                  Lakhmi C. Jain},
  title        = {A Comment on "Sharing Secret Images Using Blakley's Concept"},
  booktitle    = {Ninth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
                  16-18, 2013},
  pages        = {383--386},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IIH-MSP.2013.102},
  doi          = {10.1109/IIH-MSP.2013.102},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/YangWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YangL13,
  author       = {Ching{-}Nung Yang and
                  Jia{-}Bin Lai},
  title        = {Protecting Data Privacy and Security for Cloud Computing Based on
                  Secret Sharing},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {259--266},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.46},
  doi          = {10.1109/ISBAST.2013.46},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/YangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLW13,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Chih{-}Cheng Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Cheating Immune Block-Based Progressive Visual Cryptography},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_7},
  doi          = {10.1007/978-3-662-43886-2\_7},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLWYWR13,
  author       = {Teng Guo and
                  Feng Liu and
                  Chuan Kun Wu and
                  Ching{-}Nung Yang and
                  Wen Wang and
                  YaWei Ren},
  title        = {Threshold Secret Image Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/524},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLWYWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/YangHL12,
  author       = {Ching{-}Nung Yang and
                  Li{-}Jen Hu and
                  Jia{-}Bin Lai},
  title        = {Query Tree Algorithm for {RFID} Tag with Binary-Coded Decimal {EPC}},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {16},
  number       = {10},
  pages        = {1616--1619},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCOMM.2012.090312.121213},
  doi          = {10.1109/LCOMM.2012.090312.121213},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/YangHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/LiuHYZ12,
  author       = {Yan{-}Xiao Liu and
                  Lein Harn and
                  Ching{-}Nung Yang and
                  Yuqing Zhang},
  title        = {Efficient (n, t, n) secret sharing schemes},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {6},
  pages        = {1325--1332},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2012.01.027},
  doi          = {10.1016/J.JSS.2012.01.027},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/LiuHYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LiMSY12,
  author       = {Peng Li and
                  Peijun Ma and
                  Xiaohong Su and
                  Ching{-}Nung Yang},
  title        = {Improvements of a two-in-one image secret sharing scheme based on
                  gray mixing model},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {23},
  number       = {3},
  pages        = {441--453},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jvcir.2012.01.003},
  doi          = {10.1016/J.JVCIR.2012.01.003},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/LiMSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/YangWLK12,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Yi{-}Chin Lin and
                  Cheonshik Kim},
  title        = {Enhanced Matrix-Based Secret Image Sharing Scheme},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {19},
  number       = {12},
  pages        = {789--792},
  year         = {2012},
  url          = {https://doi.org/10.1109/LSP.2012.2220348},
  doi          = {10.1109/LSP.2012.2220348},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/YangWLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangSWH12,
  author       = {Ching{-}Nung Yang and
                  Hsiang{-}Wen Shih and
                  Chih{-}Cheng Wu and
                  Lein Harn},
  title        = {{\textdollar}k{\textdollar} Out of {\textdollar}n{\textdollar} Region
                  Incrementing Scheme in Visual Cryptography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {22},
  number       = {5},
  pages        = {799--810},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCSVT.2011.2180952},
  doi          = {10.1109/TCSVT.2011.2180952},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YangSWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KimSSY12,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Ching{-}Nung Yang},
  editor       = {Jeng{-}Shyang Pan and
                  Shyi{-}Ming Chen and
                  Ngoc Thanh Nguyen},
  title        = {A (2, 2) Secret Sharing Scheme Based on Hamming Code and {AMBTC}},
  booktitle    = {Intelligent Information and Database Systems - 4th Asian Conference,
                  {ACIIDS} 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7197},
  pages        = {129--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28490-8\_14},
  doi          = {10.1007/978-3-642-28490-8\_14},
  timestamp    = {Thu, 16 Mar 2023 20:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/KimSSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CimatoYW12,
  author       = {Stelvio Cimato and
                  Ching{-}Nung Yang and
                  Chih{-}Cheng Wu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Visual Cryptography Based Watermarking: Definition and Meaning},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {435--448},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_36},
  doi          = {10.1007/978-3-642-40099-5\_36},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CimatoYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLW12,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Chih{-}Cheng Wu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Region-in-Region Incrementing Visual Cryptography Scheme},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {449--463},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_37},
  doi          = {10.1007/978-3-642-40099-5\_37},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-6123,
  author       = {Daoshun Wang and
                  Tao Song and
                  Lin Dong and
                  Ching{-}Nung Yang},
  title        = {Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing},
  journal      = {CoRR},
  volume       = {abs/1210.6123},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.6123},
  eprinttype    = {arXiv},
  eprint       = {1210.6123},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-6123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/YangH11,
  author       = {Ching{-}Nung Yang and
                  Jyun{-}Yan He},
  title        = {An Effective 16-bit Random Number Aided Query Tree Algorithm for {RFID}
                  Tag Anti-Collision},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {15},
  number       = {5},
  pages        = {539--541},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCOMM.2011.031411.110213},
  doi          = {10.1109/LCOMM.2011.031411.110213},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/YangH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/YangYK11,
  author       = {Ching{-}Nung Yang and
                  Guo{-}Cin Ye and
                  Cheonshik Kim},
  title        = {Data Hiding in Halftone Images by {XOR} Block-Wise Operation with
                  Difference Minimization},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {457--476},
  year         = {2011},
  url          = {https://doi.org/10.3837/tiis.2011.02.013},
  doi          = {10.3837/TIIS.2011.02.013},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/YangYK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/YangC11,
  author       = {Ching{-}Nung Yang and
                  Yu{-}Ying Chu},
  title        = {A general (k, n) scalable secret image sharing scheme with the smooth
                  scalability},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {10},
  pages        = {1726--1733},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2011.05.008},
  doi          = {10.1016/J.JSS.2011.05.008},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/YangC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YangCW11,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Yang Chiu and
                  Gen{-}Cheng Wu},
  title        = {Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by
                  Reducing Random Walks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {60},
  number       = {10},
  pages        = {1503--1510},
  year         = {2011},
  url          = {https://doi.org/10.1109/TC.2010.242},
  doi          = {10.1109/TC.2010.242},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YangCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuGWY11,
  author       = {Feng Liu and
                  Teng Guo and
                  Chuan Kun Wu and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Flexible Visual Cryptography Scheme without Distortion},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_18},
  doi          = {10.1007/978-3-642-32205-1\_18},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuGWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/YangC10,
  author       = {Ching{-}Nung Yang and
                  Chuei{-}Bang Ciou},
  title        = {Image secret sharing method with two-decoding-options: Lossless recovery
                  and previewing capability},
  journal      = {Image Vis. Comput.},
  volume       = {28},
  number       = {12},
  pages        = {1600--1610},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.imavis.2010.04.003},
  doi          = {10.1016/J.IMAVIS.2010.04.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ivc/YangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/YangL09,
  author       = {Ching{-}Nung Yang and
                  Bing{-}Ling Lu},
  title        = {Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure
                  Fingerprinting Codes},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {25},
  number       = {1},
  pages        = {1--10},
  year         = {2009},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200901\_01.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/YangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/YangC09,
  author       = {Ching{-}Nung Yang and
                  Chuei{-}Bang Ciou},
  title        = {A comment on "Sharing secrets in stegoimages with authentication"},
  journal      = {Pattern Recognit.},
  volume       = {42},
  number       = {7},
  pages        = {1615--1619},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.patcog.2009.01.024},
  doi          = {10.1016/J.PATCOG.2009.01.024},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/YangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/YangPC09,
  author       = {Ching{-}Nung Yang and
                  An{-}Guo Peng and
                  Tse{-}Shih Chen},
  title        = {{MTVSS:} (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on
                  resolving alignment difficulty},
  journal      = {Signal Process.},
  volume       = {89},
  number       = {8},
  pages        = {1602--1624},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.sigpro.2009.02.014},
  doi          = {10.1016/J.SIGPRO.2009.02.014},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/YangPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/YangWCCL09,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Chih{-}Yang Chiu and
                  Shin{-}Yan Chiou and
                  Wen{-}Chiuan Liao},
  editor       = {Gabriele Kotsis and
                  David Taniar and
                  Eric Pardede and
                  Ismail Khalil},
  title        = {Micropayment schemes with ability to return changes},
  booktitle    = {iiWAS'2009 - The Eleventh International Conference on Information
                  Integration and Web-based Applications and Services, 14-16 December
                  2009, Kuala Lumpur, Malaysia},
  pages        = {356--363},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1806338.1806403},
  doi          = {10.1145/1806338.1806403},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/YangWCCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/YangCCWW09,
  author       = {Ching{-}Nung Yang and
                  Jie{-}Ru Chen and
                  Chih{-}Yang Chiu and
                  Gen{-}Chin Wu and
                  Chih{-}Cheng Wu},
  title        = {Enhancing Privacy and Security in RFID-Enabled Banknotes},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
                  2009},
  pages        = {439--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISPA.2009.77},
  doi          = {10.1109/ISPA.2009.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/YangCCWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangWC08,
  author       = {Ching{-}Nung Yang and
                  Chung{-}Chun Wang and
                  Tse{-}Shih Chen},
  title        = {Visual Cryptography Schemes with Reversing},
  journal      = {Comput. J.},
  volume       = {51},
  number       = {6},
  pages        = {710--722},
  year         = {2008},
  url          = {https://doi.org/10.1093/comjnl/bxm118},
  doi          = {10.1093/COMJNL/BXM118},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YangC08,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Security Analysis of Authentication of Images Using Recursive Visual
                  Cryptography},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {131--136},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701869669},
  doi          = {10.1080/01611190701869669},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/YangC08,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Colored visual cryptography scheme based on additive color mixing},
  journal      = {Pattern Recognit.},
  volume       = {41},
  number       = {10},
  pages        = {3114--3129},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.patcog.2008.03.031},
  doi          = {10.1016/J.PATCOG.2008.03.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/YangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Yang08,
  author       = {Ching{-}Nung Yang},
  title        = {Efficient Encoding Algorithm for Second-Order Spectral-Null Codes
                  Using Cyclic Bit Shift},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {7},
  pages        = {876--888},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2007.70849},
  doi          = {10.1109/TC.2007.70849},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Yang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YangYCY08,
  author       = {Ching{-}Nung Yang and
                  Yao{-}Yu Yang and
                  Tse{-}Shih Chen and
                  Guo{-}Cin Ye},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {New Steganography Scheme in Halftone Images},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1520--1523},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.265},
  doi          = {10.1109/IIH-MSP.2008.265},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/YangYCY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mm/LukacPY08,
  author       = {Rastislav Lukac and
                  Konstantinos N. Plataniotis and
                  Ching{-}Nung Yang},
  editor       = {Borko Furht},
  title        = {Image Secret Sharing},
  booktitle    = {Encyclopedia of Multimedia, 2nd Ed},
  pages        = {338--343},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-78414-4\_82},
  doi          = {10.1007/978-0-387-78414-4\_82},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/mm/LukacPY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/YangC07,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Extended Visual Secret Sharing Schemes: Improving the Shadow Image
                  Quality},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {21},
  number       = {5},
  pages        = {879--898},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0218001407005740},
  doi          = {10.1142/S0218001407005740},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/YangC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imst/YangYL07,
  author       = {Ching{-}Nung Yang and
                  Kun{-}Hsuan Yu and
                  Rastislav Lukac},
  title        = {User-friendly image sharing using polynomials with different primes},
  journal      = {Int. J. Imaging Syst. Technol.},
  volume       = {17},
  number       = {1},
  pages        = {40--47},
  year         = {2007},
  url          = {https://doi.org/10.1002/ima.20096},
  doi          = {10.1002/IMA.20096},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imst/YangYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/YangCYW07,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen and
                  Kun{-}Hsuan Yu and
                  Chung{-}Chun Wang},
  title        = {Improvements of image sharing with steganography and authentication},
  journal      = {J. Syst. Softw.},
  volume       = {80},
  number       = {7},
  pages        = {1070--1076},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jss.2006.11.022},
  doi          = {10.1016/J.JSS.2006.11.022},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/YangCYW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YangC07,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {An Image Secret Sharing Scheme with the Capability of Previvewing
                  the Secret Image},
  booktitle    = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages        = {1535--1538},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICME.2007.4284955},
  doi          = {10.1109/ICME.2007.4284955},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/YangC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/YangYL07,
  author       = {Ching{-}Nung Yang and
                  Kun{-}Hsuan Yu and
                  Rastislav Lukac},
  editor       = {Tat{-}Jen Cham and
                  Jianfei Cai and
                  Chitra Dorai and
                  Deepu Rajan and
                  Tat{-}Seng Chua and
                  Liang{-}Tien Chia},
  title        = {User-Friendly Image Sharing in Multimedia Database Using Polynomials
                  with Different Primes},
  booktitle    = {Advances in Multimedia Modeling, 13th International Multimedia Modeling
                  Conference, {MMM} 2007, Singapore, January 9-12, 2007. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4352},
  pages        = {443--452},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69429-8\_45},
  doi          = {10.1007/978-3-540-69429-8\_45},
  timestamp    = {Wed, 10 Jun 2020 15:40:49 +0200},
  biburl       = {https://dblp.org/rec/conf/mmm/YangYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icae/YangCC06,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen and
                  Ming{-}Hung Ching},
  title        = {Embed additional private information into two-dimensional bar codes
                  by the visual secret sharing scheme},
  journal      = {Integr. Comput. Aided Eng.},
  volume       = {13},
  number       = {2},
  pages        = {189--199},
  year         = {2006},
  url          = {https://doi.org/10.3233/ica-2006-13207},
  doi          = {10.3233/ICA-2006-13207},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icae/YangCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangC06,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {New Size-Reduced Visual Secret Sharing Schemes with Half Reduction
                  of Shadow Size},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {2},
  pages        = {620--625},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.2.620},
  doi          = {10.1093/IETFEC/E89-A.2.620},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/YangC06,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Reduce shadow size in aspect ratio invariant visual secret sharing
                  schemes using a square block-wise operation},
  journal      = {Pattern Recognit.},
  volume       = {39},
  number       = {7},
  pages        = {1300--1314},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.patcog.2006.01.013},
  doi          = {10.1016/J.PATCOG.2006.01.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/YangC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YangL06,
  author       = {Ching{-}Nung Yang and
                  Dong{-}Jing Lee},
  title        = {Some New Efficient Second-Order Spectral-Null Codes with Small Lookup
                  Tables},
  journal      = {{IEEE} Trans. Computers},
  volume       = {55},
  number       = {7},
  pages        = {924--927},
  year         = {2006},
  url          = {https://doi.org/10.1109/TC.2006.111},
  doi          = {10.1109/TC.2006.111},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangWC06,
  author       = {Ching{-}Nung Yang and
                  Chung{-}Chun Wang and
                  Tse{-}Shih Chen},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Real Perfect Contrast Visual Secret Sharing Schemes with Reversing},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {433--447},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_30},
  doi          = {10.1007/11767480\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YangWC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ChenYL06,
  author       = {Ming{-}Yang Chen and
                  Ching{-}Nung Yang and
                  Chi{-}Sung Laih},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {Authorized Tracking and Tracing for {RFID} Tags},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {435--444},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_44},
  doi          = {10.1007/11807964\_44},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ChenYL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciar/YangC06,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  editor       = {Aur{\'{e}}lio C. Campilho and
                  Mohamed S. Kamel},
  title        = {Visual Secret Sharing Scheme: Improving the Contrast of a Recovered
                  Image Via Different Pixel Expansions},
  booktitle    = {Image Analysis and Recognition, Third International Conference, {ICIAR}
                  2006, P{\'{o}}voa de Varzim, Portugal, September 18-20, 2006,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4141},
  pages        = {468--479},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11867586\_44},
  doi          = {10.1007/11867586\_44},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iciar/YangC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoscale/YangL06,
  author       = {Ching{-}Nung Yang and
                  Bing{-}Ling Lu},
  editor       = {Xiaohua Jia},
  title        = {Improved tracing algorithm for random-error-resilient collusion-secure
                  fingerprinting codes in {P2P} information systems},
  booktitle    = {Proceedings of the 1st International Conference on Scalable Information
                  Systems, Infoscale 2006, Hong Kong, May 30-June 1, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {152},
  pages        = {54},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146847.1146902},
  doi          = {10.1145/1146847.1146902},
  timestamp    = {Tue, 06 Nov 2018 16:57:28 +0100},
  biburl       = {https://dblp.org/rec/conf/infoscale/YangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mm/LukacPY06,
  author       = {Rastislav Lukac and
                  Konstantinos N. Plataniotis and
                  Ching{-}Nung Yang},
  editor       = {Borko Furht},
  title        = {Image Secret Sharing},
  booktitle    = {Encyclopedia of Multimedia},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-30038-4\_101},
  doi          = {10.1007/0-387-30038-4\_101},
  timestamp    = {Wed, 26 Jun 2019 12:55:10 +0200},
  biburl       = {https://dblp.org/rec/reference/mm/LukacPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangC05,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Size-Adjustable Visual Secret Sharing Schemes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {9},
  pages        = {2471--2474},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietfec/e88-a.9.2471},
  doi          = {10.1093/IETFEC/E88-A.9.2471},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/YangC05,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Aspect ratio invariant visual secret sharing schemes with minimum
                  pixel expansion},
  journal      = {Pattern Recognit. Lett.},
  volume       = {26},
  number       = {2},
  pages        = {193--206},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.patrec.2004.08.025},
  doi          = {10.1016/J.PATREC.2004.08.025},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/YangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YangC05,
  author       = {Ching{-}Nung Yang and
                  Guo{-}Jau Chen},
  title        = {A comment on "Systematic single asymmetric error-correcting Codes"},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {3},
  pages        = {1214--1217},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2004.842760},
  doi          = {10.1109/TIT.2004.842760},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/YangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Yang05,
  author       = {Ching{-}Nung Yang},
  title        = {Design of efficient second-order spectral- codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {4},
  pages        = {1580--1584},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.844085},
  doi          = {10.1109/TIT.2005.844085},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Yang05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/YangC05,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {New Size-Reduced Visual Secret Sharing Schemes with Half Reduction
                  of Shadow Size},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3480},
  pages        = {19--28},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424758\_3},
  doi          = {10.1007/11424758\_3},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/YangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciar/YangC05,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  editor       = {Mohamed S. Kamel and
                  Aur{\'{e}}lio C. Campilho},
  title        = {New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square
                  Block-Wise Operation},
  booktitle    = {Image Analysis and Recognition, Second International Conference, {ICIAR}
                  2005, Toronto, Canada, September 28-30, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3656},
  pages        = {1167--1174},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11559573\_141},
  doi          = {10.1007/11559573\_141},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iciar/YangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciar/YangC05a,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  editor       = {Mohamed S. Kamel and
                  Aur{\'{e}}lio C. Campilho},
  title        = {Extended Visual Secret Sharing Schemes with High-Quality Shadow Images
                  Using Gray Sub Pixels},
  booktitle    = {Image Analysis and Recognition, Second International Conference, {ICIAR}
                  2005, Toronto, Canada, September 28-30, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3656},
  pages        = {1184--1191},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11559573\_143},
  doi          = {10.1007/11559573\_143},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciar/YangC05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/Yang04b,
  author       = {Ching{-}Nung Yang},
  title        = {New visual secret sharing schemes using probabilistic method},
  journal      = {Pattern Recognit. Lett.},
  volume       = {25},
  number       = {4},
  pages        = {481--494},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.patrec.2003.12.011},
  doi          = {10.1016/J.PATREC.2003.12.011},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/Yang04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/YangC04,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {An algorithm to enumerate codewords for third-order spectral-null
                  codes},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {88},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365127},
  doi          = {10.1109/ISIT.2004.1365127},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/YangC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LinLY03,
  author       = {Chen{-}Chi Lin and
                  Chi{-}Sung Laih and
                  Ching{-}Nung Yang},
  title        = {New Audio Secret Sharing Schemes With Time Division Technique},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {19},
  number       = {4},
  pages        = {605--614},
  year         = {2003},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2003/200307\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LinLY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/YangT03,
  author       = {Ching{-}Nung Yang and
                  Hsu{-}Tun Teng},
  title        = {An Efficient Method for Finding Minmum Hash Chain of Multi-Payword
                  Chains in Micropayment},
  booktitle    = {2003 {IEEE} International Conference on Electronic Commerce {(CEC}
                  2003), 24-27 June 2003, Newport Beach, CA, {USA}},
  pages        = {45--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/COEC.2003.1210231},
  doi          = {10.1109/COEC.2003.1210231},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/YangT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/Yang02,
  author       = {Ching{-}Nung Yang},
  title        = {A Note on Efficient Color Visual Encryption},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {18},
  number       = {3},
  pages        = {367--372},
  year         = {2002},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2002/200205\_02.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/Yang02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/Yang02a,
  author       = {Ching{-}Nung Yang},
  title        = {Improvements on Audio and Optical Cryptography},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {18},
  number       = {3},
  pages        = {381--391},
  year         = {2002},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2002/200205\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/Yang02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YangL00,
  author       = {Ching{-}Nung Yang and
                  Chi{-}Sung Laih},
  title        = {New Colored Visual Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {20},
  number       = {3},
  pages        = {325--336},
  year         = {2000},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YangL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YangL98,
  author       = {Ching{-}Nung Yang and
                  Chi{-}Sung Laih},
  title        = {DC\({}_{\mbox{\emph{m}}}\) Codes for Constructing \emph{t}-EC/AUED
                  Codes},
  journal      = {{IEEE} Trans. Computers},
  volume       = {47},
  number       = {4},
  pages        = {492},
  year         = {1998},
  url          = {https://doi.org/10.1109/12.675719},
  doi          = {10.1109/12.675719},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YangL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/YangL97,
  author       = {Ching{-}Nung Yang and
                  Chi{-}Sung Laih},
  title        = {A Note on Error-Correcting Codes for Authentication and Subliminal
                  Channels},
  journal      = {Inf. Process. Lett.},
  volume       = {62},
  number       = {3},
  pages        = {141--143},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00053-7},
  doi          = {10.1016/S0020-0190(97)00053-7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/YangL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LaihY96,
  author       = {Chi{-}Sung Laih and
                  Ching{-}Nung Yang},
  title        = {On the Analysis and Design of Group Theoretical T-syEC/AUED Codes},
  journal      = {{IEEE} Trans. Computers},
  volume       = {45},
  number       = {1},
  pages        = {103--108},
  year         = {1996},
  url          = {https://doi.org/10.1109/12.481491},
  doi          = {10.1109/12.481491},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LaihY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics