【演講投影片】
回首頁
編號演講題目分類下載次數
12014逢甲大學簡介-英文影片406
22014逢甲大學簡介-簡體中文影片332
32019中正大學工學院之父影片411
4A Color Image Hiding Scheme Based on SMVQ and Modulo OperatorPPT338
5A Data Embedding Scheme Based on a Magic Matrix and Wet Paper CodesPPT317
6A Data Hiding Scheme Based on a Reference Matrix and a Location TablePPT294
7A High Capacity Reversible Data Hiding Scheme for AnnotationPPT251
8A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital ImagesPPT286
9A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo ImagesPPT274
10A New Classification Mechanism for Retinal ImagesPPT272
11A Novel Reversible Data Embedding Scheme Using Chinese Remainder Theorem for Vector Quantizer IndexPPT278
12A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based ImagesPPT353
13A Novel Steganographic Method for Data Hiding on TextPPT270
14A Quadratic-Residue-based Fragile Watermarking SchemePPT295
15A Restricted Region-based Data-hiding SchemePPT259
16A Self-Reference Watermarking Scheme Based on Wet Paper CodingPPT315
17A Virtual Image Cryptosystem Based upon Vector QuantizationPPT267
18A Watermarking Scheme for Categorical Relational DatabasesPPT542
19Adaptive Lossless Image Coding Using Least Squares Optimization With Edge-Look-AheadPPT292
20An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data MiningPPT263
21An Information Hiding Scheme Using SudokuPPT322
22An Innovative Steganographic Scheme Based on Vector QuantizationPPT249
23Applying De-Clustering Concept to Information HidingPPT283
24Authenticatable Visual Secret SharingPPT277
25De-Clustering and Its Application to SteganographyPPT292
26Digital Watermarking and Its ApplicationsPPT267
27Embedding Data in a Wet Digital Image Using Fully Exploiting Modification DirectionsPPT277
28Embedding Secret Messages in TextsPPT273
29Embedding Secrets Using Magic MatricesPPT256
30Emoticon-based Text Steganography in ChatPPT334
31Extended Exploiting-Modification-Direction Data Hiding with High Embedding CapacityPPT262
32Guide for Writing a Project Proposal and Key to Success in Academic ResearchPPT253
33Hiding Data in a Color Palette Image with Hybrid StrategiesPPT295
34Hiding Information in Region-based Wet ImagesPPT257
35Hiding Information in VQ Index Tables with ReversibilityPPT296
36Hiding Secrets in a Digital ImagePPT266
37How to publish IEEE journal papersPPT330
38Information Hiding Techniques Using Magic MatrixPPT255
39Information Hiding TechniquesPPT275
40Information Hiding Technology Current Research and Future TrendPPT261
41Information Steganography Using Magic MatrixPPT272
42Innovative Information Hiding for Digital MediaPPT252
43Lossless Compression Schemes of Vector Quantization Indices Using State CodebookPPT425
44My Research ProjectsPPT251
45Recent Developments in Hiding InformationPPT248
46Recent Developments on Multimedia and Secure Networking TechnologiesPPT271
47Recent_Developments_in_Information_HidingPPT257
48Reversible Data Hiding Scheme Using Two Steganographic ImagesPPT285
49Reversible Data Hiding in JPEG Images Based on Adjustable Padding (paper)PPT282
50Reversible Data Hiding in JPEG Images Based on Adjustable PaddingPPT330
51Secret Image Sharing with Reversible SteganographyPPT286
52Security and Privacy in PervasiveUbiquitous Computing SystemsPPT248
53Sharing Secret Message Using Meaningful Digital Images with Cheating DetectionPPT240
54Some Novel Steganographic Methods for Digital ImagesPPT246
55Some Steganographic Methods for Delivering Secret Messages Using Cover MediaPPT241
56Some Techniques for Sharing Digital Secret ImagesPPT229
57Steganographic Systems for Secret MessagesPPT241
58Table Look-up Methods for Storing and Retrieving Secret MessagesPPT239
59The Design of E-Traveler’s Check with Efficiency and Mutual AuthenticationPPT406
60The Design of Visual CryptosystemsPPT372
61The Development of File StructuresPPT249
62The Recent Development of Information Hiding SteganographyPPT252
63The Recent Developments in Visual CryptographyPPT294
64The Recent Developments in Visual Secret SharingPPT302
65Toward the Applications of Chinese Remainder Theorem in Computer SciencePPT268
66Turtle Shell Based Information Hiding MechanismPPT292
67Two-level controllers hierarchy for a scalable and distributed multicast security protocolPPT233
68Using Genetic Algorithm to Embed Important Information in an Image Compression FilePPT272
69Using Meaningful Digital Shadow Images to Recover a Secret MessagePPT259
70Using Nearest Covering Codes to Embed Secret Information in Grayscale ImagesPPT255
71Using Table Look-up Methods to Hide Secret InformationPPT248
72Visual Cryptography and Information SteganographyPPT309
73Visual CryptographyPPT263
74Visual CryptosystemsPPT248
75Visual Secret SharingPPT258
76一個基于相鄰區塊相似性和動態次編碼簿的低位元率向量量化圖像壓縮法PPT351
77一種兼顧影像壓縮與資訊隱藏之技術PPT294
78大學生的學習經驗與生涯規劃PPT263
79中國剩餘定理之妙用PPT21
80中國剩餘定理在信息科學之應用 (簡中)影片451
81中國剩餘定理在信息科學之應用PPT287
82反叢聚及其在資訊隱藏之應用PPT274
83可逆與不可逆的信息偽裝術PPT303
84如何出人頭地——青年學者的成功經驗分享PPT145
85如何加速指數運算PPT383
86如何平衡教學與研究PPT281
87如何做一個成功的研究生PPT340
88如何做一個成功的資訊人PPT316
89如何做科技研究 (視頻)影片414
90如何做科技研究PPT263
91如何做科技研究與撰寫高品質的學術論文PPT451
92如何造密碼 (簡中)PPT614
93如何造密碼PPT311
94如何創作高品質的科技論文PPT292
95如何撰寫完美的研究計畫書PPT1295
96如何撰寫科技論文PPT301
97利用網路聊天室傳送機密訊息PPT269
98快速資料擷取技術的發展PPT265
99我的工作經驗與心得PPT267
100青年學者學術成長經驗之分享PPT267
101信息安全專業的出路 (簡中)PPT405
102信息系統科學的研究方法PPT257
103信息隱藏技術和最佳化問題PPT274
104研究方法論PPT273
105研究生的學習與成長PPT279
106科技論文寫作、投稿、發表要領PPT284
107原像重現的浮水印技術PPT288
108師法自然的資訊偽裝術PPT22
109國際壯遊之我見我聞PPT334
110基于反聚類的信息隱藏術 (Information Hiding Based on Declustering)PPT319
111基於(7,4)漢明碼的隱寫技術PPT337
112基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題PPT320
113基於邊緣吻合向量量化編碼法之資訊隱藏PPT351
114基於魔術矩陣的隱寫技術PPT294
115培養正確的學術觀PPT283
116密碼學及其應用PPT29
117張靖群 A Novel Turtle Shell Based Scheme For Data Hiding (視頻)影片346
118張靖群 A Novel Turtle Shell Based Scheme For Data HidingPPT331
119張語錄—伴你走向成功之路PPT318
120從大學看未來PPT358
121從影像壓縮到數位浮水印PPT283
122博士生的學習與成長PPT284
123提昇學術研究效率之策略與技巧PPT341
124植基於反叢聚之信息隱藏術 (Information Hiding Based on Declustering)PPT280
125植基於邊緣吻合向量量化編碼法之資訊隱藏PPT269
126視覺密碼與數位簽章PPT333
127視覺密碼學PPT420
128開啟光明的人生PPT281
129項目申請和學術論文撰寫經驗談PPT29
130資訊安全的最新發展PPT303
131資訊安全簡介PPT305
132資訊偽裝術PPT286
133資訊隱藏術的最新發展PPT309
134電子商務安全PPT336
135電子簽章及其在電子商務上之應用PPT385
136圖像偽裝術的最新發展PPT256
137圖像隱藏術PPT276
138漫談大學教師的學術生涯規劃PPT418
139影像偽裝技術PPT258
140影像偽裝術的最新發展PPT259
141影像隱藏術PPT319
142撰寫科技研究論文之要領PPT270
143數學與資訊工程PPT274
144學術工作及計畫書撰寫經驗分享PPT296
145學術研究工作的經驗分享PPT274
146邁向成功之路PPT395
147隱像術PPT271
148叢聚及其在資訊隱藏之應用PPT278