【演講投影片】
回首頁
編號演講題目分類下載次數
12014逢甲大學簡介-英文影片412
22014逢甲大學簡介-簡體中文影片338
32019中正大學工學院之父影片418
450th-anniversary影片1
5A Color Image Hiding Scheme Based on SMVQ and Modulo OperatorPPT346
6A Data Embedding Scheme Based on a Magic Matrix and Wet Paper CodesPPT325
7A Data Hiding Scheme Based on a Reference Matrix and a Location TablePPT299
8A High Capacity Reversible Data Hiding Scheme for AnnotationPPT258
9A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital ImagesPPT291
10A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo ImagesPPT282
11A New Classification Mechanism for Retinal ImagesPPT276
12A Novel Reversible Data Embedding Scheme Using Chinese Remainder Theorem for Vector Quantizer IndexPPT284
13A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based ImagesPPT358
14A Novel Steganographic Method for Data Hiding on TextPPT273
15A Quadratic-Residue-based Fragile Watermarking SchemePPT301
16A Restricted Region-based Data-hiding SchemePPT263
17A Self-Reference Watermarking Scheme Based on Wet Paper CodingPPT318
18A Virtual Image Cryptosystem Based upon Vector QuantizationPPT272
19A Watermarking Scheme for Categorical Relational DatabasesPPT547
20Adaptive Lossless Image Coding Using Least Squares Optimization With Edge-Look-AheadPPT302
21An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data MiningPPT269
22An Information Hiding Scheme Using SudokuPPT329
23An Innovative Steganographic Scheme Based on Vector QuantizationPPT253
24Applying De-Clustering Concept to Information HidingPPT294
25Authenticatable Visual Secret SharingPPT280
26De-Clustering and Its Application to SteganographyPPT297
27Digital Watermarking and Its ApplicationsPPT270
28Embedding Data in a Wet Digital Image Using Fully Exploiting Modification DirectionsPPT281
29Embedding Secret Messages in TextsPPT277
30Embedding Secrets Using Magic MatricesPPT262
31Emoticon-based Text Steganography in ChatPPT340
32Extended Exploiting-Modification-Direction Data Hiding with High Embedding CapacityPPT265
33Guide for Writing a Project Proposal and Key to Success in Academic ResearchPPT257
34Hiding Data in a Color Palette Image with Hybrid StrategiesPPT300
35Hiding Information in Region-based Wet ImagesPPT262
36Hiding Information in VQ Index Tables with ReversibilityPPT305
37Hiding Secrets in a Digital ImagePPT270
38How to publish IEEE journal papersPPT338
39Information Hiding Techniques Using Magic MatrixPPT263
40Information Hiding TechniquesPPT279
41Information Hiding Technology Current Research and Future TrendPPT269
42Information Steganography Using Magic MatrixPPT278
43Innovative Information Hiding for Digital MediaPPT259
44Lossless Compression Schemes of Vector Quantization Indices Using State CodebookPPT433
45My Research ProjectsPPT255
46Recent Developments in Hiding InformationPPT251
47Recent Developments on Multimedia and Secure Networking TechnologiesPPT278
48Recent_Developments_in_Information_HidingPPT264
49Reversible Data Hiding Scheme Using Two Steganographic ImagesPPT289
50Reversible Data Hiding in JPEG Images Based on Adjustable Padding (paper)PPT288
51Reversible Data Hiding in JPEG Images Based on Adjustable PaddingPPT336
52Secret Image Sharing with Reversible SteganographyPPT289
53Security and Privacy in PervasiveUbiquitous Computing SystemsPPT252
54Sharing Secret Message Using Meaningful Digital Images with Cheating DetectionPPT246
55Some Novel Steganographic Methods for Digital ImagesPPT250
56Some Steganographic Methods for Delivering Secret Messages Using Cover MediaPPT247
57Some Techniques for Sharing Digital Secret ImagesPPT234
58Steganographic Systems for Secret MessagesPPT244
59Table Look-up Methods for Storing and Retrieving Secret MessagesPPT243
60The Design of E-Traveler’s Check with Efficiency and Mutual AuthenticationPPT410
61The Design of Visual CryptosystemsPPT377
62The Development of File StructuresPPT253
63The Recent Development of Information Hiding SteganographyPPT255
64The Recent Developments in Visual CryptographyPPT301
65The Recent Developments in Visual Secret SharingPPT306
66Toward the Applications of Chinese Remainder Theorem in Computer SciencePPT273
67Turtle Shell Based Information Hiding MechanismPPT300
68Two-level controllers hierarchy for a scalable and distributed multicast security protocolPPT238
69Using Genetic Algorithm to Embed Important Information in an Image Compression FilePPT278
70Using Meaningful Digital Shadow Images to Recover a Secret MessagePPT265
71Using Nearest Covering Codes to Embed Secret Information in Grayscale ImagesPPT259
72Using Table Look-up Methods to Hide Secret InformationPPT253
73Visual Cryptography and Information SteganographyPPT314
74Visual CryptographyPPT267
75Visual CryptosystemsPPT251
76Visual Secret SharingPPT263
77一個基于相鄰區塊相似性和動態次編碼簿的低位元率向量量化圖像壓縮法PPT360
78一種兼顧影像壓縮與資訊隱藏之技術PPT299
79大學生的學習經驗與生涯規劃PPT266
80中國剩餘定理之妙用PPT26
81中國剩餘定理在信息科學之應用 (簡中)影片457
82中國剩餘定理在信息科學之應用PPT291
83五十周年系慶-張真誠特聘講座教授影片3
84反叢聚及其在資訊隱藏之應用PPT279
85可逆與不可逆的信息偽裝術PPT309
86如何出人頭地——青年學者的成功經驗分享PPT150
87如何加速指數運算PPT392
88如何平衡教學與研究PPT283
89如何做一個成功的研究生PPT347
90如何做一個成功的資訊人PPT322
91如何做科技研究 (視頻)影片418
92如何做科技研究PPT266
93如何做科技研究與撰寫高品質的學術論文PPT471
94如何造密碼 (簡中)PPT643
95如何造密碼PPT317
96如何創作高品質的科技論文PPT295
97如何撰寫完美的研究計畫書PPT1340
98如何撰寫科技論文PPT307
99利用網路聊天室傳送機密訊息PPT276
100快速資料擷取技術的發展PPT268
101我的工作經驗與心得PPT270
102青年學者學術成長經驗之分享PPT273
103信息安全專業的出路 (簡中)PPT411
104信息系統科學的研究方法PPT262
105信息隱藏技術和最佳化問題PPT280
106研究方法論PPT278
107研究生的學習與成長PPT281
108科技論文寫作、投稿、發表要領PPT290
109原像重現的浮水印技術PPT291
110師法自然的資訊偽裝術PPT25
111國際壯遊之我見我聞PPT338
112基于反聚類的信息隱藏術 (Information Hiding Based on Declustering)PPT323
113基於(7,4)漢明碼的隱寫技術PPT345
114基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題PPT323
115基於邊緣吻合向量量化編碼法之資訊隱藏PPT357
116基於魔術矩陣的隱寫技術PPT300
117培養正確的學術觀PPT286
118密碼學及其應用PPT32
119張靖群 A Novel Turtle Shell Based Scheme For Data Hiding (視頻)影片352
120張靖群 A Novel Turtle Shell Based Scheme For Data HidingPPT335
121張語錄—伴你走向成功之路PPT323
122從大學看未來PPT362
123從影像壓縮到數位浮水印PPT289
124博士生的學習與成長PPT287
125提昇學術研究效率之策略與技巧PPT346
126植基於反叢聚之信息隱藏術 (Information Hiding Based on Declustering)PPT283
127植基於邊緣吻合向量量化編碼法之資訊隱藏PPT272
128視覺密碼與數位簽章PPT337
129視覺密碼學PPT426
130開啟光明的人生PPT285
131項目申請和學術論文撰寫經驗談PPT33
132資訊安全的最新發展PPT309
133資訊安全簡介PPT308
134資訊偽裝術PPT293
135資訊隱藏術的最新發展PPT315
136電子商務安全PPT339
137電子簽章及其在電子商務上之應用PPT399
138圖像偽裝術的最新發展PPT260
139圖像隱藏術PPT281
140漫談大學教師的學術生涯規劃PPT428
141影像偽裝技術PPT261
142影像偽裝術的最新發展PPT264
143影像隱藏術PPT324
144撰寫科技研究論文之要領PPT273
145數學與資訊工程PPT277
146學術工作及計畫書撰寫經驗分享PPT300
147學術研究工作的經驗分享PPT281
148邁向成功之路PPT409
149隱像術PPT276
150叢聚及其在資訊隱藏之應用PPT286