default search action
Jau-Ji Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j27]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Yen-Hsi Li:
High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix. Symmetry 13(4): 583 (2021) - [c35]Pei-Chun Lai, Jau-Ji Shen, Yung-Chen Chou:
A High Embedding Capacity Steganographic Method Using Maximum and Minimum pixels Difference Adaptive Strategy. SNPD 2021: 202-207 - 2020
- [j26]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Ying-Xiang Wang, Yen-Hsi Lee:
Data Hiding Method Based on 3D Magic Cube. IEEE Access 8: 39445-39453 (2020) - [j25]Tzu-Chuen Lu, Ting-Chi Chang, Jau-Ji Shen:
An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme. IEEE Access 8: 90824-90837 (2020) - [j24]Jau-Ji Shen, Chin-Feng Lee, Fang-Wei Hsu, Somya Agrawal:
A self-embedding fragile image authentication based on singular value decomposition. Multim. Tools Appl. 79(35-36): 25969-25988 (2020) - [j23]Chin-Feng Lee, Jau-Ji Shen, Yi-Jhen Wu, Somya Agrawal:
PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity. Symmetry 12(7): 1164 (2020) - [j22]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Yu-Ju Tseng, Yu-Chi Kao:
A generalized pixel value ordering data hiding with adaptive embedding capability. J. Supercomput. 76(4): 2683-2714 (2020) - [c34]Chin-Feng Lee, Jau-Ji Shen, Zih-Cyuan Chao, Somya Agrawal:
An Improved Lossless Information Hiding in SMVQ Compressed Images. ICFET 2020: 119-124 - [c33]Jau-Ji Shen, Chin-Feng Lee, Chin-Ting Yeh, Somya Agrawal:
An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network. ICFET 2020: 168-172 - [c32]Jau-Ji Shen, Chin-Feng Lee, Yu-Chuan Chen, Somya Agrawal:
Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network. ICFET 2020: 178-182
2010 – 2019
- 2019
- [j21]Jau-Ji Shen, Chun-Hsiu Yeh, Jinn-Ke Jan:
A new approach of lossy image compression based on hybrid image resizing techniques. Int. Arab J. Inf. Technol. 16(2): 226-235 (2019) - [j20]Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao, Somya Agrawal:
Overlapping pixel value ordering predictor for high-capacity reversible data hiding. J. Real Time Image Process. 16(4): 835-855 (2019) - [j19]Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen, Somya Agrawal:
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery. Sensors 19(10): 2267 (2019) - [c31]Chin-Feng Lee, Jau-Ji Shen, Yi-Jhen Wu, Somya Agrawal:
Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity. iCAST 2019: 1-6 - [c30]Tzu-Chuen Lu, Jau-Ji Shen, Ting-Chi Chang:
Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling. iCAST 2019: 1-4 - [c29]Jau-Ji Shen, Chin-Feng Lee, Yen-Hsi Li, Somya Agrawal:
Image Steganographic Scheme Based on Doublelayer Magic Matrix. iCAST 2019: 1-6 - 2018
- [j18]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Reversible Data Hiding for VQ-Compressed Images. Int. J. Netw. Secur. 20(1): 1-8 (2018) - [j17]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 20(4): 801-804 (2018) - [c28]Chin-Feng Lee, Jau-Ji Shen, Fang-Wei Hsu:
A Survey of Semi-fragile Watermarking Authentication. IIH-MSP (1) 2018: 264-271 - [c27]Chin-Feng Lee, Jau-Ji Shen, Ting-Yi Ou-Yang:
A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing. IIH-MSP (1) 2018: 272-279 - [c26]Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao:
High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method. IIH-MSP (1) 2018: 280-288 - 2017
- [j16]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 19(5): 858-862 (2017) - [j15]Chia-Sung Chang, Jau-Ji Shen:
Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques. IEEE Trans. Image Process. 26(8): 3921-3935 (2017) - [c25]Chin-Feng Lee, Jau-Ji Shen, Yu-Hua Lai:
A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification. IIH-MSP (1) 2017: 3-11 - [c24]Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen:
Steganographic Image Hiding Schemes Based on Edge Detection. IIH-MSP (1) 2017: 12-20 - 2016
- [j14]Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Data Distortion Watermarking Relational Databases. Int. J. Netw. Secur. 18(6): 1022-1033 (2016) - [c23]Jau-Ji Shen, Chun-Hsiu Yeh, Jinn-Ke Jan:
Effective quality improvement of upscaled images by differential image scheme. ICNC-FSKD 2016: 1887-1892 - [c22]Jau-Ji Shen, Chin-Feng Lee, Kun-Liang Hou:
Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework. NaNA 2016: 288-293 - 2015
- [c21]Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen:
A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service. ICOIN 2015: 31-36 - [c20]Chin-Feng Lee, Si-Ting Chen, Jau-Ji Shen:
Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix. IIH-MSP 2015: 113-116 - [c19]Chun-Hsiu Yeh, Jau-Ji Shen, Jinn-Ke Jan:
Equalized CR-dropping for Image Compression. IIH-MSP 2015: 121-124 - 2014
- [c18]Chun-Ta Li, Jau-Ji Shen, Chin-Wen Lee:
Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services. IOV 2014: 367-375 - 2013
- [c17]Yi-Pei Hsieh, Chia-Sung Chang, Jau-Ji Shen:
A New Robust Watermarking Scheme Based on Features Classification Tree. IIH-MSP 2013: 481-484 - 2012
- [c16]Jinn-Ke Jan, Jau-Ji Shen, Chun-Hsiu Yeh:
Two Phased Decompression Scheme for Quality Improvement of Vector Quantized Images. ICGEC 2012: 161-164 - [c15]Yung-Chen Chou, Chih-Chao Wang, Jau-Ji Shen:
A Robust Information Hiding Scheme with Range Coding on Color-Image. ICGEC 2012: 173-176 - 2011
- [c14]Jau-Ji Shen, Wei-Cheng Huang:
The First Robust Image Tamper Detection Scheme under Brightness. ICGEC 2011: 200-203 - [c13]Jau-Ji Shen, Ya-Hsin Lo:
A New Approach of Image Compression Based on Difference Vector Quantization. IIH-MSP 2011: 137-140 - 2010
- [j13]Jau-Ji Shen, Jia-Min Ren:
A robust associative watermarking technique based on vector quantization. Digit. Signal Process. 20(5): 1408-1423 (2010) - [j12]Chun-Wei Yang, Jau-Ji Shen:
Recover the tampered image based on VQ indexing. Signal Process. 90(1): 331-343 (2010)
2000 – 2009
- 2009
- [c12]Jau-Ji Shen, Jia-Chiuan Wu:
Meaningful Inner Link Objects for Automatic Text Categorization. IIH-MSP 2009: 266-269 - [c11]Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang:
An Embedding Technique Based upon Block Prediction and Code Cascading Shift. IIH-MSP 2009: 361-364 - 2008
- [j11]Jau-Ji Shen, Po-Wei Hsu:
A Fragile Associative Watermarking on 2D Barcode for Data Authentication. Int. J. Netw. Secur. 7(3): 301-309 (2008) - [c10]Chin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao:
Complete Double Layered Embedding Scheme for Information Hiding. ISDA (3) 2008: 525-528 - 2007
- [j10]Jau-Ji Shen, Chin-Chen Chang, Yu-Chiang Li:
Combined association rules for dealing with missing values. J. Inf. Sci. 33(4): 468-480 (2007) - [j9]Jau-Ji Shen, Po-Wei Hsu:
A robust associative watermarking technique based on similarity diagrams. Pattern Recognit. 40(4): 1355-1367 (2007) - 2006
- [j8]Chin-Feng Lee, S. Wesley Changchien, Wei-Tse Wang, Jau-Ji Shen:
A data mining approach to database compression. Inf. Syst. Frontiers 8(3): 147-161 (2006) - [c9]Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen:
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. ICICIC (1) 2006: 197-200 - [c8]Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. IIH-MSP 2006: 453-456 - [c7]Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. IIH-MSP 2006: 545-548 - 2005
- [j7]Jau-Ji Shen, Ching-Ying Lin, Hung-Wen Yang:
Cryptanalysis of a New Efficient MAKEP for Wireless Communications. Int. J. Netw. Secur. 1(2): 118-121 (2005) - [j6]Jau-Ji Shen, S. Wesley Changchien, Tao-Yuan Lin:
A Petri-Net Based Modeling Apporach to Concurrent Software Engineering Tasks. J. Inf. Sci. Eng. 21(4): 767-795 (2005) - [c6]Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen:
Improving Image Quality for JPEG Compression. KES (3) 2005: 442-448 - [c5]Jau-Ji Shen, Po-Wei Hsu:
Watermarking with Association Rules Alignment. KES (2) 2005: 1159-1167 - [c4]Chin-Chen Chang, Jau-Ji Shen, Yung-Chen Chou:
FA-Tree - A Dynamic Indexing Structure for Spatial Data. WSTST 2005: 1071-1080 - 2004
- [j5]Jau-Ji Shen, Iuon-Chang Lin, Min-Shiang Hwang:
A Secure LITESET Scheme. IEICE Trans. Inf. Syst. 87-D(11): 2509-2512 (2004) - 2003
- [j4]Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:
Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22(7): 591-595 (2003) - [j3]Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang:
Security enhancement for Optimal Strong-Password Authentication protocol. ACM SIGOPS Oper. Syst. Rev. 37(2): 7-12 (2003) - [j2]Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang:
Security enhancement for optimal strong-password authentication protocol. ACM SIGOPS Oper. Syst. Rev. 37(3): 12-16 (2003) - [j1]Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:
A modified remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 49(2): 414-416 (2003) - [c3]Jau-Ji Shen, Ming-Tsung Chen:
A Recycle Technique of Association Rule for Missing Value Completion. AINA 2003: 526-529 - [c2]Jau-Ji Shen, Tzung-Liang Hung:
Minimizing Transmission Cost for Distributed Database Design Based on Ontology Schema. AINA 2003: 638-643 - 2002
- [c1]Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen:
A Compact Patricia Trie for a Large Set of Keys. ISDB 2002: 31-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint