default search action
Chin-Feng Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j49]Chin-Feng Lee, Kuo-Chung Chan:
A Novel Dual Image Reversible Data Hiding Scheme Based on Vector Coordinate With Triangular Order Coding. IEEE Access 12: 90794-90814 (2024) - [c60]Chin-Feng Lee, Ting-Yu Kang, Iuon-Chang Lin:
Dual Medical-Image Reversible Data Embedding Method with Vector Directions. ICMHI 2024: 244-250 - [c59]Chin-Feng Lee, Tzu-Ching Tsai, Iuon-Chang Lin:
The Study of Reversible Data Hiding with Contrast Enhancement for Medical Images. ICMHI 2024: 275-280 - 2023
- [j48]Chin-Feng Lee, Kuo-Chung Chan:
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy. Comput. Syst. Sci. Eng. 44(2): 1551-1566 (2023) - [c58]Chin-Feng Lee, Kuo-Chung Chan:
Dual Image Reversible Data Hiding Based on Coordinate Vector Directions via Communication Networking. CCIOT 2023: 10-16 - [c57]Chin-Feng Lee, Tz-Ruei Kang, Hsing-Yu Hou:
Investigating Factors Influencing the Retention Intention of Digital Companion for Learning Project: Case of a Technology University in Taiwan. iCAST 2023: 321-325 - [c56]Chin-Feng Lee, Yu-Ming Huang, Zi-Yi Huang:
Healthcare Material Review with Online Chatbot and Care-receiver Sentiment Analysis Information System. ICMHI 2023: 118-122 - [c55]Chin-Feng Lee, Chung-Wei Hsu, Iuon-Chang Lin:
A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Images. ICMHI 2023: 287-292 - 2021
- [j47]Guo-Hua Qiu, Chin-Feng Lee, Chinchen Chang:
Turtle-shell data embedding method with high image fidelity. Int. J. Embed. Syst. 14(2): 149-159 (2021) - [j46]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Yen-Hsi Li:
High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix. Symmetry 13(4): 583 (2021) - 2020
- [j45]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Ying-Xiang Wang, Yen-Hsi Lee:
Data Hiding Method Based on 3D Magic Cube. IEEE Access 8: 39445-39453 (2020) - [j44]Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang:
Greedy algorithm for image quality optimisation based on turtle-shell steganography. Int. J. Comput. Sci. Eng. 23(1): 50-62 (2020) - [j43]Chin-Feng Lee, Chin-Chen Chang, Guanlong Li:
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. KSII Trans. Internet Inf. Syst. 14(6): 2554-2575 (2020) - [j42]Jau-Ji Shen, Chin-Feng Lee, Fang-Wei Hsu, Somya Agrawal:
A self-embedding fragile image authentication based on singular value decomposition. Multim. Tools Appl. 79(35-36): 25969-25988 (2020) - [j41]Chin-Feng Lee, Jau-Ji Shen, Yi-Jhen Wu, Somya Agrawal:
PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity. Symmetry 12(7): 1164 (2020) - [j40]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Yu-Ju Tseng, Yu-Chi Kao:
A generalized pixel value ordering data hiding with adaptive embedding capability. J. Supercomput. 76(4): 2683-2714 (2020) - [c54]Chin-Feng Lee, Jau-Ji Shen, Zih-Cyuan Chao, Somya Agrawal:
An Improved Lossless Information Hiding in SMVQ Compressed Images. ICFET 2020: 119-124 - [c53]Jau-Ji Shen, Chin-Feng Lee, Chin-Ting Yeh, Somya Agrawal:
An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network. ICFET 2020: 168-172 - [c52]Jau-Ji Shen, Chin-Feng Lee, Yu-Chuan Chen, Somya Agrawal:
Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network. ICFET 2020: 178-182
2010 – 2019
- 2019
- [j39]Jianjun Li, Chin-Feng Lee, Chin-Chen Chang, Jiang-Yi Lin, Yun-He Wu:
Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering. IEEE Access 7: 142947-142962 (2019) - [j38]Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng, Chi-Hua Chen:
An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems. IEEE Access 7: 148472-148484 (2019) - [j37]Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao, Somya Agrawal:
Overlapping pixel value ordering predictor for high-capacity reversible data hiding. J. Real Time Image Process. 16(4): 835-855 (2019) - [j36]Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen, Somya Agrawal:
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery. Sensors 19(10): 2267 (2019) - [j35]Chin-Feng Lee, Chi-Yao Weng, Cheng-Yu Kao:
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput. 23(19): 9719-9731 (2019) - [c51]Chin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu, Yong-Yuan Deng, Ching-Cheng Liu:
Digital Image Anti-counterfeiting Technology. BWCCA 2019: 670-677 - [c50]Chin-Feng Lee, Jau-Ji Shen, Yi-Jhen Wu, Somya Agrawal:
Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity. iCAST 2019: 1-6 - [c49]Jau-Ji Shen, Chin-Feng Lee, Yen-Hsi Li, Somya Agrawal:
Image Steganographic Scheme Based on Doublelayer Magic Matrix. iCAST 2019: 1-6 - 2018
- [j34]Chin-Feng Lee, Chin-Chen Chang, Xiaozhu Xie, Ke Mao, Run-Hua Shi:
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53: 30-39 (2018) - [j33]Jianjun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang:
Generalized PVO-K Embedding Technique for Reversible Data Hiding. Int. J. Netw. Secur. 20(1): 65-77 (2018) - [j32]Chin-Feng Lee, Ya-Chen Li, Shu-Chuan Chu, John F. Roddick:
Data Hiding Scheme Based on A Flower-Shaped Reference Matrix. J. Netw. Intell. 3(2): 138-151 (2018) - [j31]Chin-Feng Lee, Yi-Jia Wang, Shu-Chuan Chu, John F. Roddick:
An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions. J. Netw. Intell. 3(3): 214-234 (2018) - [c48]Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng:
A Survey of Authentication Protocols in VANET. BWCCA 2018: 572-577 - [c47]Chin-Feng Lee, Jau-Ji Shen, Fang-Wei Hsu:
A Survey of Semi-fragile Watermarking Authentication. IIH-MSP (1) 2018: 264-271 - [c46]Chin-Feng Lee, Jau-Ji Shen, Ting-Yi Ou-Yang:
A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing. IIH-MSP (1) 2018: 272-279 - [c45]Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao:
High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method. IIH-MSP (1) 2018: 280-288 - 2017
- [j30]Chin-Feng Lee, Chi-Yao Weng, Kuan-Ting Li:
VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy. J. Inf. Hiding Multim. Signal Process. 8(1): 54-67 (2017) - [j29]Chin-Feng Lee, Chi-Yao Weng, Kai-Chin Chen:
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multim. Tools Appl. 76(7): 9993-10016 (2017) - [c44]Chin-Feng Lee, Ying-Xiang Wang:
An image hiding scheme based on magic square. iCAST 2017: 301-305 - [c43]Chin-Feng Lee, Chin-Chen Chang, Qun-Feng Zeng:
VQ Compression Enhancer with Huffman Coding. ICGEC 2017: 101-108 - [c42]Chi-Yao Weng, Yen-Chia Huang, Chin-Feng Lee, Dong-Peng Lin:
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing. ICGEC 2017: 109-117 - [c41]Chin-Feng Lee, Jau-Ji Shen, Yu-Hua Lai:
A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification. IIH-MSP (1) 2017: 3-11 - [c40]Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen:
Steganographic Image Hiding Schemes Based on Edge Detection. IIH-MSP (1) 2017: 12-20 - 2016
- [j28]Ya-Feng Di, Chin-Feng Lee, Zhi-Hui Wang, Chin-Chen Chang, Jianjun Li:
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition. KSII Trans. Internet Inf. Syst. 10(12): 5268-5285 (2016) - [j27]Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma:
Steganographic access control in data hiding using run-length encoding and modulo-operations. Secur. Commun. Networks 9(2): 139-148 (2016) - [c39]Jau-Ji Shen, Chin-Feng Lee, Kun-Liang Hou:
Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework. NaNA 2016: 288-293 - [c38]Chin-Feng Lee, Yu-Ju Tseng:
A Pixel Value Ordering Predictor for High-Capacity Reversible Data Hiding. NaNA 2016: 319-324 - 2015
- [j26]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
Adjustment Hiding Method Based on Exploiting Modification Direction. Int. J. Netw. Secur. 17(5): 607-618 (2015) - [j25]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map. J. Inf. Hiding Multim. Signal Process. 6(1): 1-28 (2015) - [c37]Kuo Sheng Deng, Chin-Feng Lee, Jerry Chou, Yi-Chen Shih, Shang Hao Chuang, Po Hsuan Wu:
pNFS-Based Software-Defined Storage for Information Lifecycle Management. CCBD 2015: 89-92 - [c36]Chin-Feng Lee, Si-Ting Chen, Jau-Ji Shen:
Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix. IIH-MSP 2015: 113-116 - [c35]Chin-Feng Lee, Yu-Ju Tseng:
An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation. IIH-MSP 2015: 117-120 - 2014
- [c34]Chin-Feng Lee, Jui-Yu Chen, Si-Ting Chen:
A High Capacity Reversible Multiple-Image Hiding Scheme. ICS 2014: 875-884 - 2013
- [j24]Zhi-Hui Wang, Chin-Feng Lee, Ching-Yun Chang:
Histogram-shifting-imitated reversible data hiding. J. Syst. Softw. 86(2): 315-323 (2013) - [j23]Chin-Feng Lee, Yu-Lin Huang:
Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 52(4): 2237-2247 (2013) - [j22]Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J. Supercomput. 66(2): 1093-1110 (2013) - [c33]Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:
Memory Forensics for Key Evidence Investigations in Case Illustrations. AsiaJCIS 2013: 96-101 - [c32]Chin-Feng Lee, Chin-Chen Chang, Cheng-You Gao:
A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation. IIH-MSP 2013: 485-488 - [c31]Yi-Ting Chen, Bin-Yih Liao, Chin-Feng Lee, Wu-Der Tsay, Mei-Chiao Lai:
An Adjustable Frequency Bat Algorithm Based on Flight Direction to Improve Solution Accuracy for Optimization Problems. RVSP 2013: 172-177 - [p1]Chin-Feng Lee, Hsing-Ling Chen:
Lossless Text Steganography in Compression Coding. Recent Advances in Information Hiding and Applications 2013: 155-179 - 2012
- [j21]Chin-Feng Lee, Hsing-Ling Chen:
Adjustable prediction-based reversible data hiding. Digit. Signal Process. 22(6): 941-953 (2012) - [j20]Chin-Feng Lee, Yu-Lin Huang:
An efficient image interpolation increasing payload in reversible data hiding. Expert Syst. Appl. 39(8): 6712-6719 (2012) - [j19]Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih:
Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun. Syst. 25(3): 376-385 (2012) - [c30]Chin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang:
An Efficient Lossless Data Hiding Scheme on VQ Index Coding. AsiaJCIS 2012: 6-9 - [c29]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - [c28]Cheng-Ta Huang, Wei-Jen Wang, Min-Yi Tsai, Chin-Feng Lee:
Employing LSB and VQ for Undetectable Secret Data Hiding. UIC/ATC 2012: 644-649 - 2011
- [j18]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Hierarchical Fragile Watermarking with VQ Index Recovery. J. Multim. 6(3): 277-284 (2011) - [j17]Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee:
Two RFID-based Solutions to Enhance Inpatient Medication Safety. J. Medical Syst. 35(3): 369-375 (2011) - [j16]Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee, Cheng-Hsing Yang:
Anti-Forensics with Steganographic Data Embedding in Digital Images. IEEE J. Sel. Areas Commun. 29(7): 1392-1403 (2011) - [j15]Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. J. Syst. Softw. 84(9): 1462-1470 (2011) - [j14]Chin-Feng Lee, Ying-Hsuan Huang, Chin-Chen Chang, Tien-Chung Liu:
A Prediction-Based Adaptive Reversible Data Embedding Scheme. J. Softw. 6(9): 1813-1820 (2011) - [c27]Chin-Feng Lee, Ming-Chi Shih:
Reversible Data Hiding Based on VQ Compression Code. ICGEC 2011: 208-211 - [c26]Chin-Feng Lee, Kai-Chin Chen:
Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method. IIH-MSP 2011: 256-259 - 2010
- [j13]Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu:
Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls. Int. J. Internet Protoc. Technol. 5(3): 166-173 (2010) - [j12]Chin-Feng Lee, Hsing-Ling Chen, Shu-Hua Lai:
An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks. Image Vis. Comput. 28(8): 1293-1302 (2010) - [j11]Chin-Feng Lee, Wan-Ting Chang:
Recovery of Color Images by Composed Associative Mining and Edge Detection. J. Inf. Hiding Multim. Signal Process. 1(4): 310-324 (2010) - [j10]Chin-Feng Lee, Hsing-Ling Chen:
A novel data hiding scheme based on modulus function. J. Syst. Softw. 83(5): 832-843 (2010) - [j9]Chin-Feng Lee, Hsing-Ling Chen, Hao-Kuan Tso:
Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J. Syst. Softw. 83(10): 1864-1872 (2010) - [c25]Chin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu:
A reversible and multiple-layer embedding strategy with high capacity. ICUIMC 2010: 51
2000 – 2009
- 2009
- [c24]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. IAS 2009: 615-618 - [c23]Chin-Feng Lee, Chin-Chen Chang, Tien-Chung Liu:
A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. HIS (1) 2009: 13-16 - [c22]Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang:
A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237 - [c21]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang:
Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341 - [c20]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin:
Embedding Secret Messages Using Modified Huffman Coding. IIH-MSP 2009: 278-281 - [c19]Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang:
An Embedding Technique Based upon Block Prediction and Code Cascading Shift. IIH-MSP 2009: 361-364 - [c18]Chin-Feng Lee, Hsing-Ling Chen:
Data Concealment Scheme for HTML Documents Based on Color Code. IIH-MSP 2009: 632-635 - 2008
- [j8]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis. Comput. 26(12): 1670-1676 (2008) - [c17]Chin-Feng Lee, Lin-Yi Chuang, Chin-Chen Chang:
Hiding Information Employing Reduplicating Embedding. APSCC 2008: 825-828 - [c16]Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang:
An Improved EMD Embedding Scheme Based on Secret Image Difference. EUC (1) 2008: 129-135 - [c15]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395 - [c14]Chin-Feng Lee, Hsing-Ling Chen:
Reversible Data Embedding Using the Sliding Window. IIH-MSP 2008: 1118-1121 - [c13]Chin-Feng Lee, Huai-En Lee:
A Blind Associative Watermark Detection Scheme Using Self-Embedding Technique. IIH-MSP 2008: 1122-1125 - [c12]Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang:
An Effective Demosaicking and Zooming Algorithm for CFA Images. IIH-MSP 2008: 1150-1153 - [c11]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree. IIH-MSP 2008: 1293-1296 - [c10]Chin-Feng Lee, Shu-Ching Wang, Yi-Jia Wang:
Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant Region. ISDA (1) 2008: 287-290 - [c9]Yuan-Liang Tang, Chin-Feng Lee, Huai-En Lee:
Efficient Image Recovery Based on Self-Embedding. ISDA (3) 2008: 398-402 - [c8]Chin-Feng Lee, Tsung-Chia Yang:
A Blind Associative Watermarking Technique Using Self-Embedding. ISDA (3) 2008: 409-413 - [c7]Chin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao:
Complete Double Layered Embedding Scheme for Information Hiding. ISDA (3) 2008: 525-528 - 2007
- [c6]Chin-Feng Lee, Hsing-Ling Chen:
High-Capacity Data Hiding Using Virtual Window Partition. IIH-MSP 2007: 315-318 - [c5]Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang:
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. IIH-MSP 2007: 489-492 - [c4]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. IIH-MSP 2007: 497-500 - 2006
- [j7]Chin-Feng Lee, S. Wesley Changchien, Wei-Tse Wang, Jau-Ji Shen:
A data mining approach to database compression. Inf. Syst. Frontiers 8(3): 147-161 (2006) - [c3]Chin-Feng Lee, Chia-Hsing Tsai:
Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases. IMECS 2006: 298-305 - 2005
- [c2]Chin-Feng Lee, Tsung-Hsien Shen:
An FP-split method for fast association rules mining. ITRE 2005: 459-463 - 2004
- [j6]S. Wesley Changchien, Chin-Feng Lee, Yu-Jung Hsu:
On-line personalized sales promotion in electronic commerce. Expert Syst. Appl. 27(1): 35-52 (2004) - 2000
- [j5]Chin-Feng Lee, Chin-Chen Chang:
Breadth-first search oriented symbolic picture representation for spatial match retrieval. J. Syst. Softw. 52(1): 11-23 (2000)
1990 – 1999
- 1998
- [j4]Chin-Chen Chang, Chin-Feng Lee:
A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. Data Knowl. Eng. 26(2): 121-133 (1998) - [j3]Chin-Chen Chang, Chin-Feng Lee:
A spatial match retrieval mechanism for symbolic pictures. J. Syst. Softw. 44(1): 73-83 (1998) - 1997
- [j2]Chin-Chen Chang, Chin-Feng Lee:
Spatial match retrieval based on direction signatures using multiple key hashing scheme. Int. J. Intell. Syst. 12(10): 777-788 (1997) - 1996
- [c1]Chin-Feng Lee, Chin-Chen Chang:
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. CODAS 1996: 526-529 - 1995
- [j1]Chin-Chen Chang, Chin-Feng Lee:
Relative coordinates oriented symbolic string for spatial relationship retrieval. Pattern Recognit. 28(4): 563-570 (1995)