|
Subject |
Date |
Location |
1 |
A Design of an Efficient Hashing Function |
1982.01.07 |
Institute of Computer and Decision Sciences, National Tsing Hua University |
2 |
Compiler Construction Techniques |
1982.03.11 |
National Chung Hsing University, Department of Applied Math |
3 |
Design of an
Optimal Multi-key File System |
1982.06.19 |
Institute for
Information Industry |
4 |
Data Recovery
Automation |
1982.12.11 |
National Chung
Hsing University, Department of Applied Math |
5 |
A Design of a
Multi-key File System |
1982.12.18 |
Feng Chia
University, Department of Applied Math |
6 |
Recent
Developments of of Perfect Hash Functions |
1983.04.29 |
National Taiwan
University, Department of Computer Science and Information Engineering |
7 |
Application of
Database Management Systems |
1983.11.26 |
Tax
Administratration of Taichung Government |
8 |
Recent
Developments of Multi-key Hashing File Systems |
1984.02.29 |
National Taiwan
University, Department of Electrical Engineering |
9 |
Constructing an
Optimal Information Retrieval Method |
1984.05.11 |
Feng Chia
University, Department of Information Engineering |
10 |
Experiences in
Designing a Database Management System |
1984.09.22 |
Institude for
Information Industry |
11 |
Designing a
Minimal Perfect Hash Function |
1984.10.08 |
Institute of
Computer and Decision Sciences, National Tsing Hua University |
12 |
Recent
Development of Text Retrieval |
1984.10.19 |
National Taiwan
University, Department of Computer Science and Information Engineering |
13 |
Data Structure
and Information Security - from the Perspective of Sun-Tzu Theorem |
1984.11.28 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
14 |
Experiences in
Designing an Interactive Database Management System |
1984.12.21 |
Providence
College of Arts and Sciences for Women, Department of Information Science |
15 |
Recent
Developments of Key-Lock Pair Access Control Mechanism |
1985.03.15 |
National Taiwan
University, Department of Computer Science and Information Engineering |
16 |
Methodology of
Computer Software Engineering |
1985.03.27 |
Providence
College of Arts and Sciences for Women, Department of Information Science |
17 |
Information
Management Techniques |
1985.04.18 |
Taichung First
Senior High School |
18 |
Constructing a
Symbolic Database and Information Security System |
1985.04.20 |
National Cheng
Kung University, Department of Electrical Engineering |
19 |
On Design of a
Symbolic Database - from the Perspective of Theory of Numbers |
1985.05.02 |
National Chiao
Tung University, Department of Computer Science and Information Engineering,
and Department of Computer Information and Science |
20 |
Computer
Security Technology |
1985.06.07 |
Feng Chia
University, Department of Information Engineering |
21 |
How to Design a
Symbolic Database |
1985.08.02 |
CDC Computer
Company: Workshop on Maintenance and Application of the User System |
22 |
How to Manage
Enterprise Databases |
1985.09.10 |
YMCA-IMC
Workshop on Computer Research and Study |
23 |
On Developments
of Theory and Techniques |
1985.10.14 |
Feng Chia
University, Department of Civil Engineering |
24 |
Computer and
Information Management |
1985.10.20/10.26 |
Tunghai
University, International Bussiness Administration |
25 |
Information
Protection Systems |
1986.01.23 |
Academia
Sinica, Institute of Information Science |
26 |
Information
Security Systems |
1986.01.24 |
Aeronautics
Developement Center |
27 |
Recent
Developments of Data Structures and Information Security |
1986.03.06 |
Chung-Shan
Institute of Science and Technology |
28 |
Recent
Developments of Searching Techniques |
1986.03.13 |
Providence
College of Arts and Sciences for Women, Department of Information Science |
29 |
A Chinese
Form-oriented Visual Programming System |
1986.03.18 |
National Chung
Hsing University |
30 |
Recent
Developments of Data Structure Techniques |
1986.03.24 |
National Taiwan
Institute of Technology, Department of Electronic Technology |
31 |
How to
Construct a Symbolic Database |
1986.03.25 |
Institute of
Computer and Decision Sciences, National Tsing Hua University |
32 |
An Efficient
Data Searching Technique |
1986.03.31 |
Chung Yuan
Christian University, Department of Information and Computer Engineering |
33 |
Computer
Communications Security System |
1986.04.17 |
National Chiao
Tung University, Department of Computer Science and Information Engineering |
34 |
Computers and
Data Processing |
1986.05.04 |
Tunghai
University, International Bussiness Administration |
35 |
Public-Key
Cryptography |
1986.06.12 |
Taiwan Province
Government, Electrical Data Processing Center |
36 |
Advanced GPSS/S |
1986.06.16/06.17 |
Workshop on
Software Packages and Application Systems, sponsored by Ministry of Education |
37 |
Searching
Techniques for Static Data |
1986.08.20 |
Aeronautics
Developement Center |
38 |
Computers and
Data Processing |
1986.09.13 |
Tunghai
University, International Bussiness Administration |
39 |
Visual
Programming |
1986.09.20 |
Institude for
Information Industry |
40 |
Computers and
Passwords |
1986.10.05 |
Taiwan
Provincial Taichung Libarary |
41 |
Visual
Programming |
1986.10.06 |
National Chung
Hsing University, Computer and Information Network Center |
42 |
Office
Automation |
1986.10.18 |
Tunghai
University, International Bussiness Administration |
43 |
Visual
Programming |
1986.10.21 |
Department of
Electrical Data Processing, National Taichung Institude of Technology |
44 |
Information
Security |
1986.10.29 |
National Chung
Hsing University, Computer and Information Network Center |
45 |
Data Encryption
Techniques |
1986.11.14 |
World
Technology Consultant Industry |
46 |
Information
Access Control Techniques |
1986.11.14 |
World
Technology Consultant Industry |
47 |
Secure Secret
Broadcasting |
1986.11.15 |
World
Technology Consultant Industry |
48 |
Recent
Developments of Data Structures and Searching Techniques |
1986.11.19 |
National
Central University, Department of Computer Science and Information
Engineering |
49 |
Information
Access Control Techniques |
1986.12.03 |
National Tsing
Hua University, Department of Industrial Engineering |
50 |
Computers and
Communications |
1986.12.12 |
National Taiwan
Normal University, Department of Industrial Education |
51 |
Computers and
Communications |
1986.12.13 |
Taichung
County, Ching-Shui Junior High School |
52 |
The Past,
Present, and Future of Information Technology |
1986.12.22 |
National
Chin-Yi Institute of Technology |
53 |
Making Skill of Course Question Bank for Information Course |
1986.12.23 |
Taichung Home
Economical and Commercial Senior Vocational School |
54 |
Information Era |
1987.01.15 |
Victory High
School |
55 |
Recent
Developments of Data Structures and Searching Techniques |
1987.02.24 |
National/
Panasonic Taiwan |
56 |
Sun-Tzu as a
Computer Scientist |
1987.03.15 |
Taiwan
Provincial Taichung Libarary |
57 |
Advanced GPSS/S |
1987.03.17/03.18 |
Workshop on
Software Packages and Application Systems, sponsored by Ministry of Education |
58 |
Computers and
Information |
1987.03.21 |
Chia-Yi YMCA |
59 |
Computers and
Information |
1987.03.22 |
Tunghai
University, International Bussiness Administration |
60 |
The
Developments of Information Retrieval Techniques |
1987.03.24 |
Tatung
Institute of Technology, Department of Computer Science and Engineering |
61 |
A Design of
Secure Computer Passwords |
1987.03.26 |
National Cheng
Kung University, Department of Engineering Science |
62 |
Database Design
- from the Perspective of Data Analysis |
1987.04.14 |
Computer
Society of the Republic of China |
63 |
Data Retrieval
and Information Security |
1987.04.20 |
National Chung
Hsing University, Computer and Information Network Center |
64 |
Information
Science - from the Perspective of Data Analysis |
1987.04.21 |
National Chung
Hsing University, Computer and Information Network Center |
65 |
Information
Science - from the Perspective of Data Analysis |
1987.04.23 |
Aeronautics
Developement Center |
66 |
Information
Science - from the Perspective of Dicrete Mathematics |
1987.04.28 |
Tunghai
University, Department of Computer Science Information Engineering |
67 |
Key to the
Treasury of Life |
1987.05.11 |
Taichung Second
Senior High School |
68 |
Advanced GPSS/S |
1987.05.26/05.27 |
Workshop on
Software Packages and Application Systems, sponsored by Ministry of Education |
69 |
Information Era |
1987.06.23/07.07 |
Ming Dao High
School |
70 |
Visual
Programming - FORMOSA |
1987.07.09 |
World
Technology Consultant Industry |
71 |
A Database
Management System - System-Bee |
1987.07.10 |
World
Technology Consultant Industry |
72 |
Information
Security |
1987.07.23 |
Aeronautics
Developement Center |
73 |
Workshop on
Data Structures and Data Analyses |
1987.08.24/08.26 |
World
Technology Consultant Industry |
74 |
Workshop on
Information Systems and Information Auditing |
1987.08.27/08.28 |
Harvard
Management Services |
75 |
Workshop on
Information Engineering Technology |
1987.09.21/09.23 |
Chin-Peng
Management Consulting Company |
76 |
Information
Access Control Techniques |
1987.10.28 |
National Tsing Hua University, Department of Industrial
Engineering |
77 |
Designing an
Information Query System |
1987.11.02 |
Institute of
Computer and Decision Sciences, National Tsing Hua University |
78 |
Design
Principles of an Information Query System |
1987.11.04 |
Tunghai
University, Department of Computer Science Information Engineering |
79 |
System
Simulation |
1987.11.10 |
Institute of
Harbor and Marine Technology |
80 |
Clustering
Analysis and Its Applications |
1987.11.26 |
Department of
Computer Engineering, National Chiao Tung University |
81 |
Workshop on
Compilers |
1987.11.30/12.02 |
World
Technology Consultant Industry |
82 |
Clustering
Analysis and Its Applications |
1987.12.08 |
Department of
Computer Science and Information Engineering, National Cheng Kung University |
83 |
A Step to
Information Society - Using Computers |
1987.12.12 |
Feng-Yuan
Junior High School, Feng Yuan |
84 |
A Step to
Information Society - Using Computers |
1987.12.15 |
Chang-Ann
Junior High School, Chang-Hua |
85 |
Data
Compression |
1987.12.16 |
Computer and
Information Network Center, National Chung Hsing University |
86 |
Decentraliged Database Design |
1988.03.14 |
Department of
Computer Science and Engineering, Tatung Institute of Technology |
87 |
Visual
Programming |
1988.03.28 |
Department of
Industrial Engineering and Enterprise Information, Tunghai University |
88 |
On Developments
of Theory and Techniques |
1988.04.11 |
Tunghai
University, Department of Computer Science Information Engineering |
89 |
Visual
Programming |
1988.04.13 |
Aeronautic
Development Center |
90 |
Electronic Data
Compression |
1988.04.14 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
91 |
Database
Management Systems and Office Automation |
1988.04.18 |
Yung-Jing
Industrial Vocational Senior School |
92 |
Database
Management System and Office Automation |
1988.04.20 |
Taichung Home
Economical and Commercial Senior Vocational School |
93 |
Information Era |
1988.08.15 |
Taichung Home
Economical and Commercial Senior Vocational School |
94 |
Information Era |
19888.08.18 |
Taichung
Agricultural Vocational Senior High School |
95 |
Database
Management Systems |
1988.10.05 |
Aeronautic
Development Center |
96 |
Chinese String
Searching |
1988.10.12 |
Department of
Computer Science and Information Engineering/Electrical Engineering, National
Central University |
97 |
Approximate
String Searching |
1988.11.01 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
98 |
A User
Identification Scheme on Computer Networks |
1988.11.10 |
Academia Sinica |
99 |
Workshop on
Information System Technology |
1988.11.24/11.26 |
World
Technology Consultant Industry |
100 |
Recent
Developments of Information Security Technology |
1988.12.01 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
101 |
Towards
Information Society - Universal Information Education for A11 |
1988.12.08 |
Taichung First
Senior High School |
102 |
Towards
Information Society - Universal Information Education for A11 |
1988.12.10 |
Taichung Girls'
Senior High School |
103 |
Introduction to
Computer Passwords |
1989.03.15 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
104 |
Public-Key
Encryption |
1989.04.24 |
Aeronautics
Developement Center |
105 |
An Experience
in Designing a Database Management System |
1989.04.26 |
Computer
Society of the Republic of China |
106 |
Data Analysis
Technology and Its Applications |
1989.04.28 |
Department of
Computer Science and Information Engineering, National Taiwan University |
107 |
Data Analysis
Technology and Its Applications |
1989.05.10 |
Department of
Industrial Education, National Taiwan Normal University |
108 |
Information and
Computers |
1989.06.07 |
National Chung
Hsing University |
109 |
On Developments
of Theory and Techniques |
1989.06.09 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
110 |
Information
Security |
1989.06.14 |
National Chung
Hsing University |
111 |
Workshop on
Data Engineering Technology |
1989.08.28/08.30 |
Center of
Public and Business Administration Education, National Chengchi University |
112 |
Data
Compression |
1989.10.05 |
Department of
Engineering Science, National Cheng Kung University |
113 |
Computer Crime
and Computer Viruses |
1989.10.15 |
Taiwan
Provincial Taichung Library |
114 |
Computer Crime
and Countermeasures |
1989.11.01 |
Tunghai
University, Department of Computer Science Information Engineering |
115 |
Clustering
Analysis and Its Applications |
1989.12.08 |
Institute of
Information Science, Academia Sinica |
116 |
Information
Security |
1989.12.11 |
Department of
Mathematics and Science Education, National Chiayi Teachers College |
117 |
Information and
Computers |
1990.02.06 |
Taichung
Agricultural Vocational Senior High School |
118 |
Introduction to
the Design of Computer Password |
1990.03.01 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
119 |
Computer
Cryptology |
1990.03.02 |
Department of
Information Engineering, Feng Chia University |
120 |
Data Encryption |
1990.03.08 |
Department of
Electrical Engineering, Tatung Institute of Technology |
121 |
Information
Security |
1990.03.09 |
Department of
Electronical Data Processing, Ming Chuan College |
122 |
Data Encryption |
1990.03.28 |
Application
Mathematics Department, Chinese Culture University |
123 |
Design of a
Chinese String Searching Machine |
1990.03.30 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
124 |
Data Encryption |
1990.04.12 |
Taichung Home
Economical and Commercial Senior Vocational School |
125 |
Information
Security |
1990.04.12 |
Taichung Home
Economical and Commercial Senior Vocational School |
126 |
Data
Compression |
1990.04.14 |
Taichung Home
Economical and Commercial Senior Vocational School |
127 |
Computer
Security |
1990.04.18 |
College of
Medicine, National Cheng Kung University |
128 |
Computer Crime
and Computer Viruses |
1990.05.17 |
Taichung Museum
of Art |
129 |
Information
Management and Applications |
1990.06.04 |
Chia-Yi City
Government |
130 |
Information
Management and Applications |
1990.06.22 |
Chia-Yi City
Government |
131 |
Management
Computerization |
1990.07.11 |
National Yunlin
Institute of Industry |
132 |
Information
Access and Control |
1990.09.27 |
Department of
Applied Mathematics, National Chung Hsing University |
133 |
Strategies for
Chinese Compression |
1990.10.18 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
134 |
Computer Crime
and Countermeasures |
1990.10.18 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
135 |
Computer Crime
and Countermeasures |
1990.10.30 |
National Chung
Cheng University |
136 |
Compression-Based
Perfect Hashing Strategies |
1990.11.26 |
Department of
Computer Science, National Tsing Hua University |
137 |
Countermesures
against Computer Crime and Computer Viruses |
1990.11.27 |
Taiwan
Cooperative Bank |
138 |
Data
Engineering Technology |
1990.11.28 |
National
Defense Management College |
139 |
The Design of Computer Password |
1990.12.12 |
Department of
Electrical Engineering, National Yunlin Institute of Industry |
140 |
Applications of
Clustering Technology in Information Science |
1990.12.20 |
Department of
Electrical Engineering, National Cheng Kung University |
141 |
Information
Security |
1991.01.22 |
YMCA, Chia-Yi |
142 |
Design of a
Minimal Perfect Hashing Function |
1991.02.11 |
Department of
Computer Science and Engineering, The Chinese University of Hong Kong |
143 |
Office
Automation |
1991.03.06 |
Computer
Center, National Chung Cheng University |
144 |
Computer Crime
and Prevention |
1991.04.20 |
Exhibition
Center of Computer Science, National Science Council |
145 |
Computers and
Passwords |
1991.06.14 |
Department of
Electronic Engineering, National Taipei Institute of Technology |
146 |
On File Systems |
1991.09.21 |
Department of
Computer Science and Information Engineering, National Cheng Kung University |
147 |
The Application of Cryptography to Computer Security |
1991.11.09 |
Department of
Computer Science and Information Engineering, National Cheng Kung University |
148 |
The Road to Success |
1991.11.27 |
Tunghai
University, Department of Computer Science Information Engineering |
149 |
Design of Image
Databases |
1991.12.04 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
150 |
Dynamic Secret
Sharing |
1992.01.10 |
Department of
Applied Mathematics, National Sun Yat-sen University |
151 |
Introduction to
Computer Passwords |
1992.02.21 |
Sieh-Chih
Industrial and Commercial Senior Vocational School |
152 |
How to Get Ahead |
1992.03.11 |
Taiwan
Provincial Wen-Hua Senior High School |
153 |
Information
Security |
1992.04.14 |
Provincial
Chang-Hua Senior School of Commerence |
154 |
The Past, Present, and Future Trend of Science and Technology Education |
1992.04.16 |
National Chung
Cheng University |
155 |
Methodology |
1992.05.14 |
Tunghai
University, Department of Computer Science Information Engineering |
156 |
Information
Security |
1992.05.18 |
Ta Tung
Technological College of Commerce |
157 |
Group Secret
Strategies |
1992.06.15 |
Computer
Science and Engineering Research Center, National Sun Yat-sen University |
158 |
Group Secret
Techniques |
1992.10.02 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
159 |
Secret Sharing |
1992.10.06 |
Department of
Information and Computer Education, National Taiwan Normal University |
160 |
Generalized
Group Secret Cryptography |
1992.10.07 |
National
Security Bureau |
161 |
Methodology |
1992.10.22 |
Department of
Information Management, Ming Chuan College |
162 |
Methodology |
1992.10.28 |
Department of
Computer and Information Science, National Chiao Tung University |
163 |
The Design of Computer Password |
1992.11.18 |
Department of
Computer Science and Engineering, National Sun Yat-sen University |
164 |
On the Applications and Development |
1992.11.23 |
Department of
Mathematics, National Tsing Hua University |
165 |
Data
Compression |
1992.11.24 |
Provincial
Chang-Hua Senior School of Commerence |
166 |
Developments of
Contemporary Cryptology |
1992.12.01 |
Taichung Home
Economical and Commercial Senior Vocational School |
167 |
Career Planning
of Computer People |
1992.12.07 |
Department of
Computer Science and Information Engineering, National Chung Cheng University |
168 |
A Secured
Computer Center Management |
1993.01.07 |
Taichung Home
Economical and Commercial Senior Vocational School |
169 |
A Secured
Computer Center Management |
1993.01.14 |
Taichung Home
Economical and Commercial Senior Vocational School |
170 |
A Secured
Computer Center Management |
1993.02.04 |
Taichung Home
Economical and Commercial Senior Vocational School |
171 |
A Secured
Computer Center Management |
1993.02.11 |
Taichung Home
Economical and Commercial Senior Vocational School |
172 |
How to Get Ahead |
1993.03.04 |
Department of
Information Management, National Taiwan Institute of Technology |
173 |
Chinese
Retrieval and Searching |
1993.03.24 |
Provincial
Chang-Hua Senior School of Commerence |
174 |
An Image
Similar Retrieval Method Based on Modulo Arithmetics |
1993.04.23 |
Workshop on
Computer Applications Sponsored by National Chung Hsing University |
175 |
Information
Security |
1993.05.04 |
Department of
Information Science and Management, Providence University |
176 |
How to Get Ahead |
1993.05.24 |
Chia-Yi Home
Vocational School |
177 |
Information
Security |
1993.06.02 |
Department of
Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C. |
178 |
A Master Key
for an M3 Cryptoscheme |
1993.06.08 |
Department of
Electrical Engineering, National Defense University, Chung Cheng Institute of
Technology |
179 |
Introduction to
Computer Passwords |
1993.06.10 |
Taichung Home
Economical and Commercial Senior Vocational School |
180 |
Military
Information Security |
1993.09.07 |
National
Defense Management College |
181 |
Information
Searching Techniques |
1993.10.29 |
National Chung
Cheng University |
182 |
The Development of Computer Cryptography |
1993.11.18 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
183 |
Planning of Project Information Systems |
1993.11.23 |
Research,
Development, and Evaluation Commission, Taiwan Provincial Government |
184 |
Career Planning |
1993.11.25 |
College of
Engineering, National Chung Cheng University (for the students of Department
of Business Education, National Changhua University of Education) |
185 |
Information
Security |
1993.12.01 |
Provincial
Training Center of Taiwan Provincial Government |
186 |
Developments of
Computer Cryptography |
1993.12.08 |
National
Defense University, Chung Cheng Institute of Technology |
187 |
Information
Security |
1993.12.27 |
Provincial
Training Center of Taiwan Provincial Government |
188 |
Applications of
Instruction Network and Information Security |
1994.01.07 |
Szu-Yu Junior
High School |
189 |
Evaluation of
Computer-Aided Instruction (CAI) |
1994.01.17 |
Fooyin College
of Nursing |
190 |
Evolution of
Contemporary Cryptography |
1994.02.22 |
Chung-Shan
Institute of Science and Technology |
191 |
Planning of Project Information Systems |
1994.03.10 |
Research,
Development, and Evaluation Commission, Taiwan Province |
192 |
Group Secret
Technology |
1994.03.18 |
Department of
Computer Science. and Information Engineering, National Taiwan University |
193 |
Artificial
Intelligence |
1994.03.25 |
Tsau Ton
Commercial and Technical Vocational School |
194 |
Artificial
Intelligence |
1994.04.02 |
Center of
Automated Engineering, Da-Yeh University |
195 |
The Design of Computer Password |
1994.04.13 |
Wu Feng
Institute of Technology |
196 |
How to Get Ahead |
1994.04.14 |
Rotary Club of
Taichung East District |
197 |
The Design of Computer Password |
1994.04.30 |
National
Central University |
198 |
Introduction to
Cryptanalysis |
1994.05.06 |
Department of
Applied Mathematics, Feng Chia University |
199 |
Introduction to
Cryptanalysis |
1994.05.20 |
Department of
Industrial Education, National Taiwan Normal University |
200 |
Chinese
Database Management Systems |
1994.05.25 |
Training Center
for High School Teachers |
201 |
Efficient
Information Retrieval |
1994.08.03 |
Graduate
Institute of Computer Science, National Chung Hsing University |
202 |
Introduction to
Cryptanalysis |
1994.11.03 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
203 |
Information
Security |
1994.12.14 |
Department of
Information Management, Chaoyang Institute of Technology |
204 |
Information
Security |
1994.12.17 |
Computer and
Information Network Center, National Chung Hsing University |
205 |
Developments of
Contemporary Cryptography |
1995.03.03 |
Department of
Computer Science and Engineering, National Sun Yat-Sen University |
206 |
Towards an Information Society - Let Us Use the Computer Together |
1995.04.24 |
National Chung
Cheng University |
207 |
Image
Compression Technology |
1995.04.27 |
Department of
Information Science and Management, Providence University |
208 |
Technology and Life |
1995.07.27 |
National Chiayi
Senior Hight School |
209 |
Information
Security and Management |
1995.08.06 |
Taiwan Regional
Development Institute |
210 |
Information
Security |
1995.11.03 |
Provincial
Training Center of Taiwan Provincial Government |
211 |
The Present and
Prospect of Information Security |
1995.11.09 |
Department of
Applied Mathematics, National Chung Hsing University |
212 |
Developments of
Computer Cryptography |
1995.12.20 |
Department of
Computer Science and Information Engineering, National Dong Hwa University |
213 |
Developments of
Computer Cryptography |
1995.12.28 |
Department of
Computer and Information Science, National Chiao Tung University |
214 |
Information
Security |
1996.04.19 |
Refining &
Manufacturing Research Center of Chinese Petroleum Corp |
215 |
Contemporary
Cryptography |
1996.05.03 |
Department of
Computer Science and Information Engineering, National Cheng Kung University |
216 |
Information
Security |
1996.06.06 |
National
Changhua University of Education |
217 |
Information
Security |
1996.08.14 |
Department of
Computer Science and Engineering, National Sun Yat-Sen University |
218 |
How to Share a
Common Secret Document |
1996.12.03 |
Department of
Information Engineering, Feng Chia University |
219 |
Efficient Join
Operation of Time-domain Databases |
1996.12.19 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
220 |
The Road to Success |
1997.03.26 |
Department of
Information Management, Chaoyang University of Technology |
221 |
Efficient Join
Operation of Time-domain Databases |
1997.04.16 |
Department of
Computer Science, National Tsing Hua University |
222 |
Evolution of
Information Security Technology |
1997.05.07 |
National
Defense University, Chung Cheng Institute of Technology |
223 |
Information
Security |
1997.06.05 |
Department of
Mathematics, Chung Yuan Christian University |
224 |
Evolution of
Information Security Technology |
1997.07.11 |
National
Defense Management College |
225 |
The Present and
Prospect of Information Education of Universities in Taiwan |
1997.11.04 |
Beijing
University of Posts and Telecommunications, China |
226 |
Hot Issues of
International Information Security Research - Theory, Techniques, and Market
Trend |
1997.11.04 |
Beijing
University of Posts and Telecommunications, China |
227 |
Secret Sharing |
1997.11.05 |
Beijing
University of Posts and Telecommunications, China |
228 |
Fast
Computation of Modulo Exponents |
1997.11.05 |
Beijing
University of Posts and Telecommunications, China |
229 |
Digital
Signatures |
1997.11.06 |
Beijing
University of Posts and Telecommunications, China |
230 |
Image Hiding
Technology |
1997.11.06 |
Beijing
University of Posts and Telecommunications, China |
231 |
Applications of
Chinese Remainder Theorem |
1997.11.07 |
Beijing
University of Posts and Telecommunications, China |
232 |
Essential
The Qualities of a Successful Scientist |
1997.11.07 |
Beijing
University of Posts and Telecommunications, China |
233 |
Image Hiding
Technology |
1997.12.28 |
Tunghai
University(National Computer Symposium) |
234 |
Progressive
Image Transmission Using Edge Matching |
1998.02.24 |
Department of
Computer and Information Science, National Chiao Tung University |
235 |
Image Hiding
Technology |
1998.02.26 |
Department of
Information Science and Management, Providence University |
236 |
Progressive
Image Compression |
1998.02.26 |
Department of
Information Science and Management, Providence University |
237 |
Progressive
Image Transmission |
1998.03.13 |
Department of
Business Education, National Changhua University of Education |
238 |
Computer Crime
and Prevention |
1998.03.17 |
National Taiwan
Normal University |
239 |
A Binary Access
Control Method Using Prime Factorization |
1998.03.27 |
University of
Tokyo, Japan |
240 |
An Image Hiding
Scheme Based on Vector Quantization |
1998.03.27 |
University of
Tokyo, Japan |
241 |
Progressive
Image Transmission |
1998.04.23 |
Department of
Information Management, National Taiwan University of Science and Technology |
242 |
The Present and
Prospect of Information Security Developments |
1998.05.08 |
Tung Fang
Institute of Industry |
243 |
Techniques of
Designing Digital Watermarks |
1998.05.13 |
Workshop on
Network Security Technology Sponsored by Industrial Technology Research
Institute |
244 |
Key to Success
in Academic Research |
1998.05.21 |
Department of
Applied Mathematics, National Chung Hsing University |
245 |
Digital
Watermarking |
1998.07.03 |
Kyoto
University, Japan |
246 |
Applications of
Mathematics in Information Science |
1998.10.09 |
Ming-Dao High
school |
247 |
Digital
Watermarking |
1998.10.18 |
Chang Gung
University |
248 |
The Road to Success |
1998.11.07 |
Department of
Electrical Data Processing, National Taichung Institude of Commerce |
249 |
A Sheme for
Obtaining a Message from the Digital Multi-Signature |
1998.11.17 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
250 |
Chinese
Calligraphy Compression Using New S-tree Sructure |
1998.11.18 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
251 |
Key to Success
in Academic Research |
1998.12.15 |
Department of
Computer Science and Technology, Chung Cheng Institute of Technology,
National Defense University |
252 |
Image Hiding
Technology |
1999.02.25 |
National
Security Bureau, Republic of China |
253 |
Image Hiding |
1999.03.02 |
Department of
Computer Science and Information Management, Providence University |
254 |
Key to Success
in Academic Research |
1999.03.10 |
Department of
Industrial Education, National Taiwan Normal University |
255 |
Image Hiding |
1999.03.12 |
Department of
Information Management, Chaoyang University of Technology |
256 |
The Development of Information Education |
1999.03.17 |
Department of
Business Education, National Changhua University of Education |
257 |
How to Get Ahead |
1999.04.01 |
Chin-Yi
Institute of Technology and Commerce |
258 |
Image Hiding |
1999.04.14 |
Tunghai
University, Department of Computer Science Information Engineering |
259 |
How to Get Ahead |
1999.04.14 |
College of
Electrical and Information Engineering, I-Shou University |
260 |
Secret Sharing
of Image Data and Its Applications |
1999.04.29 |
Department of
Computer Science and Information Engineering, Tamkang University |
261 |
The Road to Success |
1999.05.03 |
Ming-Chuan
University |
262 |
Image Hiding |
1999.05.13 |
Department of
Computer Science and Information Engineering, National Chiao Tung University |
263 |
Watermarking
Using Visual Cryptography |
1999.05.15 |
Chaoyang University of Technology (National Information Security
Conference-Keynote Speech) |
264 |
Image Hiding |
1999.05.19 |
Hua-Fan
University |
265 |
Security Issues
and Strategies for Electronic Commerce (EC) |
1999.05.29 |
Chungtai
Institute of Health Science and Technology |
266 |
The Qualities of a Successful Technologist |
1999.06.02 |
College of
Science and Engineering, I-Shou University |
267 |
A Progressive
Codebook Training Algorithm for Image Vector Quantization |
1999.06.04 |
Central Police
University (The Tenth International Conference on Information Management) |
268 |
Information and E-commerce |
1999.06.24 |
Extension
Education Center of Chinese Culture University |
269 |
Progressive
Image Transmission Technology |
1999.07.14 |
Department of
Computer Science and Information Engineering, National Central University |
270 |
Progressive
Image Transmission Technology |
1999.07.19 |
Department of
Chemistry, National Taiwan Normal University |
271 |
A Technique for
Image Hiding |
1999.09.21 |
Graduate School
of Information System, Department of Computer Software, The University of
Aizu, Japan |
272 |
A New Scheme of
Progressive Image Transimssion Based on Bit-Plane Method |
1999.10.21 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
273 |
A Block Based
Digital Watermarks for Copy Protection of Images |
1999.10.21 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
274 |
Progressive
Image Transmission Technology |
1999.10.29 |
Department of
Computer Science and Information Engineering, National Cheng Kung University |
275 |
Progressive
Image Transimssion Based on Bit-Plane Method |
1999.11.02 |
Department of
Computer Science & Information Management, Providence University |
276 |
Mysterious Red Envelope |
1999.11.15 |
BCC- The Words
of Wisdom |
277 |
Digital
Watermark Technology |
1999.12.15 |
Department of
Business Education, National Changhua University of Education |
278 |
How to Write a Research Report |
2000.01.15 |
Department of
Information Management, National Taichung Institute of Technology |
279 |
Intellectual
Property Protection Techniques for Images |
2000.03.21 |
Van-Nung
Institute of Technology |
280 |
Present Situation and Prospect of Information Education |
2000.03.30 |
Pei-Men Senior
Vocational School of Agriculture and Industrial |
281 |
Key to Success
in Academic Research |
2000.04.01 |
Department of
Information Management, National Taichung Institute of Technology |
282 |
Key to Success
in Academic Research |
2000.04.18 |
Department of
Computer Science and Information Engineering, Tamkang University |
283 |
Digital
Watermark Technology |
2000.05.01 |
Department of
Information and Computer, National Taiwan Normal University |
284 |
Security Issues
and Strategies for Electronic Commerce (EC) |
2000.05.12 |
United World
Chinese Commercial Bank (at Hotel National Taichung) |
285 |
Security Issues
and Strategies for Electronic Commerce (EC) |
2000.05.15 |
Ta-Te
Industrial and Home Ecnomical Senior Vocational School |
286 |
Security Issues
and Strategies for Electronic Commerce (EC) |
2000.05.19 |
Rotary Club of
Taichung Pei-Tuen District (at Hotel National Taichung) |
287 |
Image Hiding
and Visual Cryptography |
2000.05.22 |
Graduate
Institute of Electrical Engineering, National Taiwan University |
288 |
Image Hiding |
2000.06.02 |
Department of
Computer Science and Information Engineering, National Chi Nan University |
289 |
Security Issues
and Strategies for Electronic Commerce (EC) |
2000.06.23 |
National
Taichung Institute of Technology |
290 |
A New Scheme
for Sharing Secret Color Images in Computer Network |
2000.07.06 |
2000 IEEE International Conference on Parallel and Distributed System(2000ICPADS) by Iwate Prefectureal University, Japan |
291 |
Some Techniques
of Digital Watermarking on Internet |
2000.09.28 |
The Institution
of Electrical Engineers, Hong Kong |
292 |
An Image
Protection Scheme Based on Discrete Cosine Transformation |
2000.09.28 |
Department of
Electronic Engineering, City University of Hong Kong |
293 |
Design of the Fast Chinese Indexing System with Boshiamy Input Method |
2000.10.13 |
Department of
Computer Science and Information Management, Providence University |
294 |
The Development
of Internet and Its Applications in Taiwan |
2000.10.17 |
Ewha Womans
University, South Korea |
295 |
Design of the Fast Chinese Indexing System with Boshiamy Input Method |
2000.10.31 |
Department of
Information Engineering and Computer Science, Feng Chia University |
296 |
Key to Success
in Academic Research |
2000.11.06 |
Department of
Computer Science and Information Engineering, National Chiayi University |
297 |
A Method for
Protection Digital Images from Being Copied Illegally |
2000.11.11 |
Chung-Chou
Institute of Technology |
298 |
Some
Watermarking Techniques on Internet |
2000.11.22 |
Department of
Computer Science and Engineering, National Sun Yat-Sen University |
299 |
Digital
Watermark Technology |
2000.12.22 |
Graduate School
of Applied Mathematics, National Chung Hsing University |
300 |
Some
Watermarking Techniques on Internet |
2000.12.26 |
National
Kaohsiung University of Applied Sciences |
301 |
Digital
Watermark Technology |
2001.01.02 |
Department of
Computer Science & Information Management, Providence University |
302 |
Digital
Watermark Technology |
2001.01.05 |
National
Taichung Institute of Technology |
303 |
Key to Success
in Academic Research |
2001.03.07 |
Graduate School
of Mechanical Engineering, National Chung Hsing University |
304 |
Hiding Images
Using Dynamic Bit-Replacement and Human Visual System |
2001.03.20 |
National Chi
Nan University (China-France Multimedia Conference Keynote Speech) |
305 |
Hiding Images
Using Dynamic Bit-Replacement and Human Visual System |
2001.04.03 |
Department of
Computer Science and Information Systems, the University of Hong Kong |
306 |
Visual
Cryptography |
2001.04.26 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
307 |
Color Image
Hiding |
2001.04.26 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
308 |
Image Hiding
Based on Color Difference |
2001.04.26 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
309 |
Hiding Images
Using Dynamic Bit-Replacement and Human Visual System |
2001.04.26 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
310 |
Hiding Binary
Images Using BFT Linear Quadtrees |
2001.04.26 |
Beijing
University of Posts and Telecommunications, People's Republic of China |
311 |
Security Issues
and Strategies for Electronic Commerce (EC) |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
312 |
Authentication
Mechanisms |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
313 |
Popular
Encryption Schemes |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
314 |
Digital
Signature Technology |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
315 |
Image Hiding
Technology |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
316 |
Visual
Cryptography |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
317 |
Digital
Watermark Technology |
2001.06.24 |
Extension
Education Center of Pacific Western University (at National Taiwan Normal
University) |
318 |
The Road to College |
2001.09.26 |
Taichung Second
Senior High School |
319 |
Key to Success
in Academic Research |
2001.10.08 |
Department of
Computer Science and Information Engineering, National Taiwan University of
Science and Technology |
320 |
Key to Success
in Academic Research |
2001.10.30 |
College of
Computer Engineering, Wuhan University |
321 |
Experiences in
Designing a Simple Database Management System |
2001.10.31 |
The State's Key
Laboratory of Software Engineering, Wuhan University, People's Republic of
China |
322 |
How to Get Ahead |
2001.11.06 |
Taichung
Healthcare and Management University |
323 |
Data Structure
and Chinese Remainder Theorem |
2001.11.09 |
Department of
Computer Science & Information Management, Providence University |
324 |
Introduction to
Cryptanalysis |
2001.11.30 |
Department of
Computer Science and Technology, Chung Cheng Institute of Technology,
National Defense University |
325 |
The Road to Success |
2001.12.26 |
Mingdao
Management College |
326 |
Efficient
Indexing of Chinese Words by Pinyin |
2002.01.08 |
Department of
Computer Science & Information Management, Providence University |
327 |
Issues on
Network Security and Crime7 |
2002.01.23 |
Jean-Nan
Primary School |
328 |
Data Structure
and Chinese Remainder Theorem |
2002.03.07 |
Department of
Computer Science and Information Engineering, Da-Yeh University |
329 |
The Road to Success |
2002.03.20 |
National Chung
Cheng University |
330 |
Information Hiding
Techniques |
2002.04.23 |
Department of
Computer Science and Information Engineering, Tamkang University |
331 |
Digital
Watermarking Techniques |
2002.04.24 |
Department of
Computer Science and Information Engineering, Tamkang University |
332 |
Digital Image
Authentication |
2002.04.25 |
Department of
Computer Science and Information Engineering, Tamkang University |
333 |
Application of
Mathematics in Computer Science |
2002.04.26 |
St. John's
& St. Mary's Institute of Technology |
334 |
Color Visual
Cryptography |
2002.05.10 |
Department of
Computer Science & Information Management, Providence University |
335 |
The Road to Success |
2002.10.31 |
Department of
Computer Science and Information Engineering, Tamkang University |
336 |
Image Hiding
Techniques |
2002.11.07 |
Tokyo Denki
University |
337 |
The Road to Success |
2002.11.26 |
Department of
Computer Science & Information Management, Providence University |
338 |
Mathematics
and Informational Engineering |
2002.12.03 |
Department of
Computer Science & Information Engineering, National Chung Cheng
University |
339 |
Visual Cryptography |
2002.12.10 |
Tsinghua
University, Beijing, People's Republic of China |
340 |
Digital Image Hiding |
2002.12.10 |
Tsinghua
University, Beijing, People's Republic of China |
341 |
Non-embedded Watermarking |
2002.12.11 |
Tsinghua
University, Beijing, People's Republic of China |
342 |
Embedded Watermarking |
2002.12.12 |
Tsinghua
University, Beijing, People's Republic of China |
343 |
Digital Image Authentication |
2002.12.12 |
Tsinghua
University, Beijing, People's Republic of China |
344 |
An Image Database Retrieval
Scheme Based upon Multivariate Analysis and Data Mining |
2002.12.20 |
2002 International Computer Symposium, National Dong Hwa University(Keynot Speech) |
345 |
The Road to Success |
2002.12.24 |
College of
Management, Chaoyang University of Technology |
346 |
Image Hiding
Technology |
2002.12.26 |
Department of
Information Engineering, National Chiao Tung University |
347 |
The Road to Success |
2003.03.06 |
National Huwei
Institute of Technology |
348 |
Image
Compression |
2003.03.18 |
Department of
Computer Science & Information Management, Providence University |
349 |
From Image Compression to
Digital Watermarking |
2003.03.21 |
Department of
Information Management, National Taichung Institute of Technology |
350 |
The
Recent Development of Information Security |
2003.04.11 |
Keynote
of General Education , National Chung Hsing University |
351 |
On research Methodology from Information Hiding |
2003.04.25 |
Department of
Computer Science and Information Engineering, National Dong Hwa University |
352 |
Information
Hiding Methodology |
2003.04.30 |
National Huwei
Institute of Technology |
353 |
On research Methodology from Information Hiding |
2003.05.23 |
Department of
Computer Science & Information Management, Providence University |
354 |
Digital
Watermark Technology |
2003.08.21 |
Industrial
Technology Research Institute of Taiwan, ROC |
355 |
Develop a Correct Academic Outlook |
2003.09.04 |
Department of
Computer Science and Information Engineering, National Chung Cheng University |
356 |
Develop a Correct Academic Outlook |
2003.11.07 |
Department of
Information Science and Management, Providence University |
357 |
Look at the Future through College |
2003.11.12 |
Department of Information
Management, National Huwei Institute of Technology |
358 |
The Road to Success |
2003.11.26 |
Chungtai Institute of Health
Sciences and Technology |
359 |
A Secret
Information Hiding Scheme Based on Switching Tree Coding |
2003.12.05 |
Institute of
Information Science, Academia Sinica |
360 |
Information Hiding -
Steganography |
2003.12.15 |
School
of Computer Science and Telecommunications Engineering, JiangSu
University |
361 |
A Technique that Takes Care of Image Compression and Information Hiding |
2003.12.15 |
School
of Computer Science and Telecommunications Engineering, JiangSu
University |
362 |
Rambling on about Research Methods |
2003.12.16 |
School
of Computer Science and Telecommunications Engineering, JiangSu
University |
363 |
Information Hiding Techniques-
Steganography |
2003.12.18 |
Tsinghua University, Beijing,
People's Republic of China |
364 |
A Technique that Takes Care of Image Compression and Information Hiding |
2003.12.18 |
Tsinghua University, Beijing,
People's Republic of China |
365 |
How to Fast Computation of
Exponents |
2003.12.19 |
Tsinghua University, Beijing,
People's Republic of China |
366 |
Key to Success in Academic
Research |
2003.12.23 |
Chaoyang University of
Technology |
367 |
The Road to Success |
2004.03.26 |
National Changhua University of
Education |
368 |
Information Hiding Techniques-
Steganography |
2004.04.02 |
Graduate Institute of Computer
Science, National Chung Hsing University |
369 |
Develop a Correct Academic Outlook |
2004.04.02 |
Graduate Institute of Computer
Science, National Chung Hsing University |
370 |
Security Techniques and
Applications for Electronic Commerce |
2004.05.06 |
Department of Information
Management, Tatung Institute of Commerce and Technology |
371 |
Information Hiding Techniques-
Steganography |
2004.05.19 |
Department of Computer Science,
National Tsing Hua University |
372 |
Information Hiding Techniques-
Steganography |
2004.05.28 |
Department of Computer Science
& Information Management, Providence University |
373 |
Information Security Techniques-
Steganography |
2004.05.29 |
Chang Gung University |
374 |
Develop a Correct Academic Outlook |
2004.06.04 |
College of Science &
Technology, National Chi Nan University |
375 |
Information Hiding Techniques |
2004.06.23 |
National Security Bureau |
376 |
Hiding a Secret Image in a Cover Image |
2004.07.12 |
Ewha Womans University, South
Korea |
377 |
Rambling on the Academic Career |
2004.08.11 |
Department
of Information Management, National Taichung Institute of Technology |
378 |
Introduction to Steganography
for Multimedia |
2004.09.24 |
Department
of Computer Science and Information Engineering, National Changhua University
of Education |
379 |
Digital Image Steganography |
2004.10.04 |
Department of Electronic
Engineering, National Taiwan University of Science and Technology |
380 |
Introduction to Image
Steganography |
2004.11.07 |
Computer science and Information
Management, Providence University |
381 |
Digital Signature and Its
Applications to Electronic Business |
2004.11.25 |
Department of Computer Science
and Information Engineering, National Taichung Institute of Technology |
382 |
Digital Image Steganography |
2004.12.06 |
Information Management, National
Kaohsiung University of Applied Science |
383 |
Digital Image Steganography |
2004.12.06 |
Department of Information and
Communication, Southern Taiwan University |
384 |
My Work Experience |
2004.12.07 |
Department of Computer Science
and Information Management, Providence University |
385 |
Digital Image Steganography |
2004.12.09 |
Department of Computer Science,
National Chiao Tung University |
386 |
Digital Image Steganography |
2004.12.14 |
Department of Computer Science,
National Chengchi University |
387 |
My Work Experience |
2004.12.29 |
National United University |
388 |
Key to Success in Academic
Research |
2005.01.19 |
China Medical University |
389 |
Digital Image Steganography |
2005.01.04 |
College of Informatics, Chaoyang
University of Technology |
390 |
Key to Success in Academic
Research |
2005.03.08 |
Feng Chia University |
391 |
Start a Bright Life |
2005.04.26 |
Department of Computer science
and Information Management, Providence University |
392 |
Start a Bright Life |
2005.05.06 |
Department of Computer science
and Information Management, Providence University |
393 |
Key to Success in Academic
Research |
2005.05.30 |
Department of Computer Science
and Information Engineering, Chung Hua University |
394 |
Introduction to Color Image
Steganography |
2005.09.05 |
Department
of Information Engineering and Computer Science, Feng Chia University |
395 |
Introduction to Image
Steganography |
2005.09.06 |
The Legislative Yuan of Republic
of China |
396 |
An Adaptive
Data Hiding Scheme for Palette Images |
2005.09.15 |
The first International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, Hilton on the Park-Melbourne of
Australia |
397 |
Key to Success in Academic
Research |
2005.09.22 |
School of Communication and
Information Engineering, Shanghai University |
398 |
Introduction to Color Image
Steganography |
2005.09.29 |
Department of Computer Science
and Information Engineering, National Chiayi University |
399 |
My Work Experience |
2005.10.13 |
Stella Matutina Girls¡¦ High
School |
400 |
Key to Success in Academic
Research |
2005.11.03 |
Department of Applied
Mathematics, National Chung Hsing University |
401 |
Graduate Study and Growth |
2005.11.08 |
The Graduate School of
Multimedia Design, National Taichung Institute of Technology |
402 |
De-clustering and Its
Applications to Steganography |
2005.11.14 |
Department of Electrical
Engineering, National Kaohsiung University of Applied Sciences |
403 |
Introduction to De-clustering
and Steganography |
2005.11.16 |
Department of Computer Science
and Information Technology, National Taichung Institute of Technology |
404 |
The Road to
Success |
2005.12.6 |
Feng Chia University |
405 |
De-clustering and Its
Applications to Steganography |
2005.12.08 |
Department of Information
Engineering and Computer Science, Feng Chia University |
406 |
Self-growth of Young Scholars |
2005.12.08 |
College of Information and
Electrical Engineering, Feng Chia University |
407 |
The Road to
Success |
2005.12.20 |
Department of Computer Science
and Information Management, Providence University |
408 |
Self-growth of Young Scholars |
2005.12.22 |
Department of Computer
Communication Engineering, Chienkuo Technology University |
409 |
Introduction to Image Hiding
Technique |
2006.03.01 |
Department of Computer Science
and Information Engineering, Asia University |
410 |
De-clustering and Its
Applications to Information Hiding |
2006.03.10 |
Department of Computer Science,
National Chung Hsing University |
411 |
Rambling on about Research Methods |
2006.03.15 |
Department of Computer Science
and Information Engineering, ChungChou Institute of Technology |
412 |
De-clustering and Its
Applications to Information Hiding |
2006.03.24 |
Department of Computer Science
and Information Management, Providence University |
413 |
De-clustering and Its
Applications to Information Hiding |
2006.04.05 |
School of Communication and
Information Engineering, Shanghai University |
414 |
Information Hiding Technology
Based on SMVQ |
2006.04.05 |
School of Communication and
Information Engineering, Shanghai University |
415 |
Introduction to Steganography |
2006.04.05 |
School of Communication and
Information Engineering, Shanghai University |
416 |
Self-growth of Young Scholars |
2006.04.19 |
Department of Information
Management, National Taichung Institite of Technology |
417 |
Introduction to the Security of
Electronic Business |
2006.04.19 |
Hotel National Taichung (Seminar
Sponsored by ARES International Corporation) |
418 |
Clustering and Its Applications
to Steganography |
2006.06.19 |
Shenzhen Graduate School, Harbin
Institute of Technology |
419 |
De-clustering and Its
Applications to Information Hiding |
2006.06.19 |
Shenzhen Graduate School, Harbin
Institute of Technology |
420 |
Rambling on about Research Methods |
2006.08.05 |
Information Security Technique
Research Center and Superintendent of Information Countermeasure Technique
Research Institute, Harbin Institute of Technology |
421 |
Information Hiding Tecnique
Based on De-clustering |
2006.08.07 |
Harbin Institute of
Technology(Keynote Speech at the 6th China Information Hiding and Multimedia
Security) |
422 |
Recent Researches and
Developments on Computer Science and Technology in Taiwan |
2006.08.12 |
Department of Computer Science
and Technology, Jilin University |
423 |
Information
Hiding and Its Applications |
2006.08.29 |
Beijing Jiaotong
University(Tutorial Speech at 2006 International Conference on Innovative
Computing, Information and Control) |
424 |
Rambling on about Research Methods |
2006.08.29 |
Department of Computer Science
and Information Technology, Beijing Jiaotong University |
425 |
Information Hiding Technology
Based on SMVQ |
2006.08.30 |
Information Security Research
Center, Beijing University of Posts and Telecommunication |
426 |
Clustering and Its Applications
to Steganography |
2006.09.02 |
The State's Key Laboratory of
Software Engineering, Wuhan University |
427 |
De-clustering and Its
Applications to Information Hiding |
2006.09.02 |
The State's Key Laboratory of
Software Engineering, Wuhan University |
428 |
Rambling on about Research Methods |
2006.09.02 |
The State's Key Laboratory of
Software Engineering, Wuhan University |
429 |
The Learning and Growth of Dectoral |
2006.09.21 |
College of Busuness, Feng Chia
University |
430 |
How to Be a Successful Graduate Student |
2006.10.04 |
Graduate Institute of
Information and Computer Education, National Kaohsiung Normal University |
431 |
How to Be a Successful Graduate Student |
2006.10.04 |
Department of Electronic
Engineering, National Kaohsiung University of Applied Sciences |
432 |
How to Be a Successful Graduate Student |
2006.10.13 |
Department of Computer Science
and Information Management, Providence University |
433 |
How to Be a Successful Graduate Student |
2006.10.17 |
College of Informatics, Chaoyang
University of Technology |
434 |
Information Hiding Tecnique
Based on De-clustering |
2006.10.19 |
College of Computer Science and
Technology, Huazhong University of Science and Technology |
435 |
Graduate Student Learning and Growth |
2006.10.19 |
College of Computer Science and
Technology, Huazhong University of Science and Technology |
436 |
Information
Hiding Techniques |
2006.10.20 |
Department
of Computing and Information Technology and Network and Information
Engineering Center, Fudan University |
437 |
Graduate Student Learning and Growth |
2006.10.20 |
Department
of Computing and Information Technology and Network and Information
Engineering Center, Fudan University |
438 |
Clustering and Its Applications
to Steganography |
2006.10.24 |
College of Communications
Engineering , Xidian University |
439 |
De-clustering and Its
Applications to Information Hiding |
2006.10.24 |
College of Communications
Engineering , Xidian University |
440 |
Information Hiding Technology
Based on SMVQ |
2006.10.26 |
College of Communications
Engineering , Xidian University |
441 |
Graduate Student Learning and Growth |
2006.10.26 |
College of Communications
Engineering , Xidian University |
442 |
Key to Be a Successful Graduate
Student |
2006.11.08 |
Computer Science and Information
Engineering, Tunghai University |
443 |
How to Write the Perfect Project |
2006.11.09 |
Department of Computer Science
and Information Engineering, Da-yeh University |
444 |
Information
Hiding Techniques |
2006.11.21 |
Nan Kai Institute of Technology
(Keynote Speech at 2006 International Conference on Information Industry) |
445 |
How to Be a Successful Graduate Student |
2006.12.11 |
Department of Computer Science
and Information Engineering, National Chung Cheng University |
446 |
How to Be a Successful Information Systems Manager |
2006.12.28 |
Department of Information
Management, National Chin-Yi University of Technology |
447 |
Information
Hiding Techniques |
2007.01.10 |
Nanyang Technological
University, Singapore |
448 |
Information
Hiding Techniques |
2007.01.12 |
National University of Singapore |
449 |
Hiding Secret
Information in a Color Palette Image with Hybrid Strategies |
2007.02.08 |
Sung
Kyun Kwan University(Keynote Speech at First International Conference on
Ubiquitous Information Management and Communication ) |
450 |
Graduate Student Learning and Growth |
2007.03.07 |
Leader University |
451 |
How to Be Successful Information Technology People |
2007.03.07 |
Kun Shan University |
452 |
How to Balance Teaching and
Research |
2007.03.09 |
National Kaohsiung Normal
University |
453 |
Introdiction to Lossless
Watermarking Technology |
2007.03.09 |
Department of Electronics
Engineering, National Kaohsiung University of Applied Sciences |
454 |
Introdiction to Lossless
Watermarking Technology |
2007.03.15 |
Department of Computer Science
and Information Engineering, Tamkang University |
455 |
Introduction to Color Image
Hiding Technology |
2007.04.06 |
College of Computer Science and
Technology,Zhe Jiang University |
456 |
Introduction to Color Image
Hiding Technology |
2007.04.09 |
College of Computer, Hangzhou
Dianzi University |
457 |
Introduction to Visual
Cryptography |
2007.04.09 |
College of Computer, Hangzhou
Dianzi University |
458 |
Introduction to Secret Image
Sharing Technology |
2007.04.09 |
College of Computer, Hangzhou
Dianzi University |
459 |
Digital Watermarking Technology |
2007.04.09 |
College of Computer, Hangzhou
Dianzi University |
460 |
Introduction to Color Image
Hiding Technology |
2007.04.10 |
School of Communication and
Information Engineering, Shanghai University |
461 |
Introduction to Color Image
Hiding Technology |
2007.04.12 |
Department of Information
Security, Jiangnan University |
462 |
Introduction to Visual
Cryptography |
2007.04.12 |
Department of Information
Security, Jiangnan University |
463 |
Introduction to Secret Image
Sharing Technology |
2007.04.12 |
Department of Information
Security, Jiangnan University |
464 |
Digital Watermark Technology |
2007.04.12 |
Department of Information
Security, Jiangnan University |
465 |
Self-growth of Young Scholars |
2007.04.12 |
Department of Information
Security, Jiangnan University |
466 |
Science and Technology Research Methodology |
2007.04.18 |
College of Engineering, National
Chin-Yi University of Technology |
467 |
The Recent Development of
Information Security |
2007.05.16 |
Central Taiwan University of
Science and Technology |
468 |
College Students' Learning Experience and Career Planning |
2007.06.04 |
Feng Chia University |
469 |
Self-growth of Young Scholars |
2007.06.12 |
College of Informatics, Chaoyang
University of Technology |
470 |
Hiding Secret
Information in Color Images |
2007.06.19 |
School of Information Science
and Technology, Sun Yat-Sen University, Guangdong, China |
471 |
Innovative
Steganography for Digital Media |
2007.06.19 |
School of Information Science
and Technology, Sun Yat-Sen University, Guangdong, China |
472 |
The Outlet for Undergraduates Majoring in Information Security |
2007.06.20 |
Department of Computer Science,
Sun Yat-Sen University, Guangdong, China |
473 |
An Information
Hiding Technique Based on De-clustering |
2007.06.21 |
International Web Intelligence
Consortium (WIC) Institute, Beijing University of Technology |
474 |
Information
Hiding Techniques |
2007.06.22 |
Department of Computer Science
and Technology, Beijing Tsinghua University |
475 |
Hiding Secret
Information in Color Images |
2007.06.22 |
School of Computer and
Information Technology, Beijing Jiaotong University |
476 |
Innovative
Steganography for Digital Media |
2007.06.22 |
School of Computer and
Information Technology, Beijing Jiaotong University |
477 |
Innovative
Steganography for Digital Media |
2007.06.24 |
Forum on Future Computing,
Beijing |
478 |
Information
Hiding Techniques |
2007.06.26 |
School of Computer Science,
Beihang University |
479 |
Rambling on About Research Methods |
2007.06.26 |
School of Computer Science,
Beihang University |
480 |
Information
Hiding Techniques |
2007.06.28 |
School of Electronics and
Information Engineering, Beijing Jiaotong University |
481 |
Rambling on About Research Methods |
2007.06.28 |
School of Electronics and
Information Engineering, Beijing Jiaotong University |
482 |
Hashing
Technology: Past, Now and Future |
2007.07.19 |
School of Computer Science and
Engineering, International University in Ho Chi Minh City, Vietnam |
483 |
Declustering
and Its Application to Information Hiding |
2007.07.20 |
School of Computer Science and
Engineering, International University in Ho Chi Minh City, Vietnam |
484 |
Hiding Secret
Information in Color Images |
2007.07.20 |
School of Computer Science and
Engineering, International University in Ho Chi Minh City, Vietnam |
485 |
The Development
of File Structures |
2007.07.23 |
School of Computer Science and
Engineering, International University in Ho Chi Minh City, Vietnam |
486 |
A Data Hiding
Scheme Based upon Block Truncation Coding |
2007.07.23 |
School of Information Technology, University of Natural
Sciences in Ho Chi Minh City, Vietnam |
487 |
A Robust and
Recoverable Tamper Proofing Technique for Image Authentication |
2007.07.23 |
School of Information Technology, University of Natural
Sciences in Ho Chi Minh City, Vietnam |
488 |
Image Hiding
Technology |
2007.09.21 |
Department of Information
Management Science, Chung Shan Medical University |
489 |
Image Hiding
Technology |
2007.09.28 |
Department of Computer Science
and Information Engineering, National Taichung University |
490 |
Introduction to Lossless
Watermarking Technology |
2007.10.01 |
Department of Computer Science
and Information Engineering, National Chung Cheng University |
491 |
Hashing Technology: Past, Now
and the Future |
2007.10.04 |
College of Computer Science,
Asia University |
492 |
Hashing Technology: Past, Now
and the Future |
2007.10.05 |
Department of
Computer Science & Information Management, Providence University |
493 |
College Students' Learning Experience and Career Planning |
2007.10.09 |
National Kaohsiung University |
494 |
A Low Bit Rate Vector
Quantization Encoding Scheme Using Neighboring Similarity and Dynamic
Subspace Rechecking |
2007.10.15 |
Shandong University, China
(Keynote Speech at the 3rd Joint Conference on Harmonious Human Machine
Environment) |
495 |
A Low Bit Rate Vector
Quantization Encoding Scheme Using Neighboring Similarity and Dynamic
Subspace Rechecking |
2007.10.17 |
School of Computer Science &
Technology, Anhui University, China |
496 |
Information Hiding Techniques |
2007.10.17 |
School of Computer Science &
Technology, Anhui University, China |
497 |
Reversible Data Hiding Scheme
Using Two Steganography Images |
2007.10.31 |
Taipei International Convention
Center (Invited Speech at IEEE TENCO 2007) |
498 |
Graduate Students' Learning and Growth |
2007.11.21 |
College of Engineering, National
Chin-Yi University of Technology |
499 |
How to Be Successful Information Technology People |
2007.11.22 |
Department of Computer Science
and Information Engineering, National Chin-Yi University of Technology |
500 |
Rambling on About Research Methods |
2007.11.26 |
Graduate Institute of
Information and Computer Education, National Kaohsiung Normal University |
501 |
Rambling on About Research Methods |
2007.11.29 |
Department of Information
Management, Dayeh University |
502 |
An Image Compression Scheme
Based on Locally Adaptive Coding |
2007.12.10 |
Asia University (Keynote Speech
at IEEE International Symposium on Multimedia) |
503 |
Using Nearest Cover Codes to
Embed Secret Information in Gray-scale Images |
2008.01.31 |
Sungkyunkwan University, Seoul,
Korea |
504 |
How to Be Successful Information Technology People |
2008.03.17 |
Department of Information
Management Science, Chung Shan Medical University |
505 |
How to Improve Research Efficiency and Skills |
2008.04.08 |
College of Informatics, Chaoyang
University of Technology |
506 |
Rambling on About Research Methods |
2008.04.09 |
Department of Computer Science
and Information Engineering, Tamkang University |
507 |
Rambling on About Research Methods |
2008.04.09 |
Department of Computer &
Information Science, Aletheia University |
508 |
Improving Research Efficiency: the Strategy and Skills |
2008.04.11 |
Taiwan
Assessment and Evaluation Association (National Taiwan University of Science
and Technology) |
509 |
Sharing Experience about The
Academic Achievements for Young Scholars |
2008.04.22 |
Department of Information
Engineering and Computer Science, Feng Chia University |
510 |
College Students' Learning Experience and Career Planning |
2008.05.21 |
College of Engineering, Da-Yeh
University |
511 |
Rambling on About Research Methods |
2008.06.11 |
Institute of Mechanical and
Electro-Mechanical Engineering, National Formosa University |
512 |
Rambling on About Research Methods |
2008.06.16 |
School of Computer Science and
Technology, Anhui University, China |
513 |
An Information Hiding Scheme Using Sudoku |
2008.06.18 |
Dalian, China (Plenary Speech at The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008)) |
514 |
Image Hiding Technology |
2008.06.18. |
School of Electronic and
Information Engineering, Dalian University of Technology |
515 |
Rambling on About Research Methods |
2008.07.15 |
School of Information Science
and Engineering, Lanzhou University, China |
516 |
Graduate Students' Learning and Growth |
2008.07.15 |
School of Information Science
and Engineering, Lanzhou University, China |
517 |
Innovative Information Hiding
for Digital Media |
2008.07.16 |
Lanzhou, China (Keynote Speech
at the First International Conference on Ubi-media) |
518 |
A High Payload Steganographic
Scheme Based on (7, 4) Hamming Codes for Digital Images |
2008.08.04 |
Guangzhou, China (Keynote Speech
at International Symposium on Electronic Commerce and Security) |
519 |
Some Novel Steganographic Methods for Digital Images |
2008.08.07 |
Shenzhen Graduate School, Harbin Institute of Technology |
520 |
Hiding Data in a Color Palette Image with Hybrid Strategies |
2008.09.16 |
Department of Information Management, Chang Gung University |
521 |
The Road to Success |
2008.09.19 |
Department of Management Information Systems, National Chung Hsing University |
522 |
Recent Development of Information Hiding Steganography |
2008.09.22 |
Jiaxing University |
523 |
Hiding Data in a Color Palette Image with Hybrid Strategies |
2008.09.24 |
Wuhan University |
524 |
Recent Developments on Image Steganography |
2008.09.24 |
Wuhan University |
525 |
An Innovative Steganographic Scheme Based on Vector Quantization |
2008.09.25 |
Yangtze University (Keynote Speech at the Second International Conference on Genetic and Evolutionary Computing) |
526 |
Recent Development of Information Hiding Steganography |
2008.10.14 |
Overseas Chinese Institute of Technology |
527 |
Rambling on About Research Methods |
2008.10.15 |
Yuan Ze University |
528 |
Hiding Data in a Color Palette Image with Hybrid Strategies |
2008.10.17 |
Department of Computer Science and Engineering, National Chung Hsing University |
529 |
Recent Development of Information Hiding Steganography |
2008.10.18 |
Department of Information Management, Chang Gung University |
530 |
Clustering and Its Applications to Steganography |
2008.10.18 |
Department of Information Management, Chang Gung University |
531 |
De-clustering and Its Applications to Steganography |
2008.10.18 |
Department of Information Management, Chang Gung University |
532 |
Rambling on About Research Methods |
2008.10.18 |
Department of Information Management, Chang Gung University |
533 |
Recent Development of Information Hiding Steganography |
2008.10.24 |
College of Computing and Informatics, Providence University |
534 |
Security and Privacy in Pervasive/Ubiquitous Computing Systems |
2008.11.01 |
Forum on Future Computing, Beijing |
535 |
Recent Development of Information Hiding Steganography |
2008.11.01 |
Forum on Future Computing, Beijing |
536 |
Hiding Data in a Color Palette Image with Hybrid Strategies |
2008.11.04 |
Department of Computer Science and Information Technology, Beijing Jiaotong University |
537 |
How to Be a Successful Graduate Student |
2008.11.04 |
School of Electronics and Information Engineering, Beijing Jiaotong University |
538 |
Recent Development of Information Hiding Steganography |
2008.11.04 |
School of Electronics and Information Engineering, Beijing Jiaotong University |
539 |
Recent Development of Information Hiding Steganography |
2008.11.04 |
Department of Computer Science and Information Technology, Beijing Jiaotong University |
540 |
Science and Technology Research Methodology |
2008.11.05 |
Renmin Unviversity of China |
541 |
Recent Development of Information Hiding Steganography |
2008.11.05 |
Renmin Unviversity of China |
542 |
Rambling on About Research Methods |
2008.11.06 |
Hefei University of Technology |
543 |
Recent Development of Information Hiding Steganography |
2008.11.06 |
Hefei University of Technology |
544 |
Key to Be a Successful Graduate Student |
2008.11.07 |
Anhui University |
545 |
Recent Development of Information Hiding Steganography |
2008.11.07 |
West Anhui University |
546 |
A Restricted Region-based Data-hiding Scheme |
2008.11.10 |
Hangzhou, China (Keynote Speech at the 11th International Conference on Communication Technologies) |
547 |
Steganographic Mechanisms with Reversibility and Irreversibility |
2008.11.17 |
Department of Computer Science and Information Engineering, National Chung Cheng University |
548 |
Self-growth of Young Scholars |
2008.11.17 |
Department of Computer Science and Information Engineering, National Chung Cheng University |
549 |
Secret Image Sharing with Reversible Steganography |
2008.12.19 |
Wuhan, China (Keynote Speech at the 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application) |
550 |
Lossless Compression Schemes of Vector Quantization Indices Using State Codebook |
2008.12.21 |
Shanghai, China (Keynote Speech at the 2008 International Symposium on Computer Science and Computational Technology) |
551 |
A High Capacity Reversible Data Hiding Scheme for Annotation |
2008.12.22 |
Shanghai, China (Keynote Speech at the 2008 IEEE International Symposium on Intelligent Information Technology Application) |
552 |
Recent Development of Information Hiding Steganography |
2008.12.22 |
School of Communication and Information Engineering, Shanghai University |
553 |
Recent Development of Information Hiding Steganography |
2008.12.23 |
Fudan University |
554 |
Recent Development of Information Hiding Steganography |
2008.12.23 |
University of Shanghai for Science and Technology |
555 |
Rambling on About Research Methods |
2008.12.23 |
University of Shanghai for Science and Technology |
556 |
The Design of E-Traveler's Check with Efficiency and Mutual Authentication |
2009.01.15 |
Sung Kyun Kwan University (Keynote Speech at the First International Conference on Ubiquitous Information Management and Communication) |
557 |
A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images |
2009.02.06 |
Nha Trang, Vietnam (Keynote Speech at the Second International Conference on Theories and Applications of Computer Science) |
558 |
Recent Development of Information Hiding Steganography |
2009.02.20 |
School of Information technology, Ming Chuan University |
559 |
Graduate Students' Learning and Growth |
2009.02.27 |
Department of Computer Science & Information Management, Providence University |
560 |
Recent Development of Information Hiding Steganography |
2009.03.11 |
National Chung Cheng University |
561 |
Recent Development of Information Hiding Steganography |
2009.03.18 |
Department of Information Management, Southern Taiwan University |
562 |
Recent Development of Information Hiding Steganography |
2009.03.20 |
Computer Science and Information Engineering University |
563 |
Graduate Students' Learning and Growth |
2009.03.27 |
The Department of Computer Science and Engineering, National Chung-Hsing University |
564 |
Hiding Data in a Color Palette Image with Hybrid Strategies |
2009.04.06 |
The Department of Electronic Engineering, National Kaohsiung University |
565 |
The New Developments in Information Hiding |
2009.04.16 |
Suzhou Institute for Advanced Study of University of Science and Technology of China, The 3rd Ph.D. Student Workshop ( invited speaker ) |
566 |
Cheating Resistence for Secret Sharing |
2009.04.21 |
College of Computer Science, Shanghai University |
567 |
Recent Development of Information Hiding Steganography |
2009.04.23 |
College of Computer Science, Yangtze University |
568 |
Cheating Resistence for Secret Sharing |
2009.04.25 |
Wuhan, China (Keynote Speech at International Conference on Networdks Security, Wireless Communications and Trusted Computing) |
569 |
A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images |
2009.05.15 |
Chengdu, China (Keynote Speech at the 2009 International Symposium on Intelligent Ubiquitous Computing and Education) |
570 |
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes |
2009.05.19 |
School of Computer and Information, Hefei University of Technology |
571 |
Learning and Growing Together for Young Scholars |
2009.05.19 |
School of Computer and Information, Hefei University of Technology |
572 |
Recent Development of Information Hiding Steganography |
2009.05.20 |
Fuyang Teachers College |
573 |
Self-growth of Young Scholars |
2009.05.21 |
School of Computer Science and Technology , Anhui University |
574 |
Hiding Information in Region-based Wet Images |
2009.05.22 |
Nanchang, China (Keynote Speech at International Symposium on Electronic Commerce and Security) |
575 |
A New Classification Mechanism for Retinal Images |
2009.05.24 |
Wuhan, China (Keynote Speech at the 2009 International Workshop on Intelligent Systems and Applications) |
576 |
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes |
2009.06.06 |
Wuhan, China (Keynote Speech at International Conference on Computational Intelligence and Natural Computing) |
577 |
Recent Development of Information Hiding Steganography |
2009.06.08 |
College of Software, Dalian University of Technology |
578 |
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes |
2009.06.08 |
College of Software, Dalian University of Technology |
579 |
A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images |
2009.06.09 |
College of Software, Dalian University of Technology |
580 |
Rambling on About Research Methods |
2009.06.09 |
College of Software, Dalian University of Technology |
581 |
A Quadratic-residue-based Fragile Watermarking Scheme |
2009.07.11 |
Zhangjiajie, China (Keynote Speech at 2009 IITA International Conference on Services Science, Management and Engineering) |
582 |
A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables |
2009.07.18 |
Shenzhen, China (Keynote Speech at Asia-Pacific Conference on Information Processing) |
583 |
Embedding Data in a Wet Digital Image Using Fully Exploiting Modification Directions |
2009.08.06 |
Kaohsiung, Taiwan (Keynote Speech at the 4th Joint Workshop on Information Security) |
584 |
A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data |
2009.08.07 |
Sanya, China (Keynote Speech at the 2009 ETP/IITA World Congress in Applied Computing,Computer Science, and Computer Engineering) |
585 |
An Image Authentication Scheme Using Magic Square |
2009.08.08 |
Beijing, China (Keynote Speech at the 2nd IEEE International Conference on Computer Science and Information Technology) |
586 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2009.08.12 |
Shenyang, China (Keynote Speech at the Ninth International Conference on Hybrid Intelligent System) |
587 |
Security Technologies on Communication Networks and Their Applications to Electronic Business |
2009.08.15 |
Forum on Future Computing, Nanjing |
588 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2009.08.18 |
Department of Computer Science and Technology, Shanghai Jiao Tong University |
589 |
Recent Development of Information Hiding Steganography |
2009.09.24 |
College of Computer Science, Asia University |
590 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2009.10.12 |
College of Software, Dalian University of Technology |
591 |
Scientific and Technological Paper Writing, Contributing, Publishing Essentials |
2009.10.12 |
College of Software, Dalian University of Technology |
592 |
An Ingenious Data Hiding Scheme for Color Retinal Images |
2009.10.12 |
College of Software, Dalian University of Technology |
593 |
An Ingenious Data Hiding Scheme for Color Retinal Images |
2009.10.14 |
Guilin, China (Keynote Speech at the 3rd International Conference on Genetic and Evolutionary Computing) |
594 |
Recent Development of Information Hiding Steganographysibility |
2009.10.14 |
Guilin University of Electronic Technology |
595 |
Recent Development of Information Hiding Steganographysibility |
2009.10.23 |
Department of Management Information Systems, National Chung Hsing University |
596 |
Recent Development of Information Hiding Steganography |
2009.10.28 |
College of Computer Engineering Institute,Qingdao Technological University |
597 |
Hiding Information in VQ Index Tables with Reversibility |
2009.10.29 |
Qingdao, China (Keynote Speech at the Second International Workshop on Computer Science and Engineering) |
598 |
Recent Development of Information Hiding Steganography |
2009.11.06 |
Taichung, Taiwan (Keynote Speech at 2009 Workshop on Consumer Electronics) |
599 |
Embedding Data in a Wet Digital Image |
2009.11.13 |
Department of Computer Science and Engineering, National Chung Hsing University |
600 |
Emoticon-Based Text Steganography in Online Chat tools |
2009.11.17 |
College of Software, Dalian University of Technology |
601 |
Learning and Growing for a Graduate Student |
2009.11.17 |
College of Software, Dalian University of Technology |
602 |
Hiding Data in a Color Palette Image with Hybrid Strategies |
2009.11.17 |
College of Software, Dalian University of Technology |
603 |
Recent Development of Information Hiding Steganography |
2009.11.19 |
College of Electrical Science and Technology, Anhui University |
604 |
A Wet Image Data Hiding Scheme Based on Coordinate Modifications |
2009.11.21 |
Nanchang, China (Keynote Speech at the 3rd International Conference on Intelligent Information Technology Application) |
605 |
Rambling on about Research Methods |
2009.11.21 |
Nanchang Hangkong University |
606 |
Emoticon-Based Text Steganography in Online Chat tools |
2009.11.23 |
Shenzhen Graduate School, Harbin Institute of Technology |
607 |
Emoticon-Based Text Steganography in Online Chat tools |
2009.11.24 |
Guangdong University of Business Studies |
608 |
Recent Development of Information Hiding Steganography |
2009.11.24 |
Guangdong University of Business Studies |
609 |
Rambling on about Research Methods |
2009.11.24 |
Guangdong University of Business Studies |
610 |
Recent Development of Information Hiding Steganography |
2009.11.26 |
College of Computer, Hangzhou Dianzi University |
611 |
Embedding Data in a Wet Digital Image |
2009.11.26 |
College of Computer, Hangzhou Dianzi University |
612 |
Emoticon-Based Text Steganography in Online Chat tools |
2009.11.26 |
College of Computer, Hangzhou Dianzi University |
613 |
Emoticon-Based Text Steganography in Online Chat tools |
2009.11.28 |
Wuhan, China (Keynote Speech at 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications) |
614 |
Emoticon-Based Text Steganography in Online Chat tools |
2009.11.28 |
Huanggang Normal University |
615 |
Steganographic Scheme Using Heuristic Codeword Assignment and Cascade-Shifting on VQ Image |
2009.12.04 |
Taipei, Taiwan (Keynote Speech at 2009 The 2nd IEEE International Conference on Ubi-media Computing) |
616 |
A Data Hiding Method for Text Documents Using Multiple-Base Encoding |
2009.12.12 |
Sanya, China (Keynote Speech at 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science) |
617 |
Recent Developments in Information Hiding |
2009.12.26 |
Huangshan, China (Keynote Speech at the 2nd International Symposium Computer Science and Computational Technology) |
618 |
Recent Developments in Text Stegnography |
2009.12.27 |
Shanghai, China (Keynote Speech at the Second International Symposium on Information Science and Engineering) |
619 |
A Technique of Embedding Digital Data in an Image Compression Code Reversibly |
2010.01.14 |
SKKU, Suwon, Korea (Keynote Speech at the 4th International Conference on Ubiquitous Information Management and Communication ) |
620 |
A Technique of Embedding Digital Data in an Image Compression Code Reversibly |
2010.01.22 |
Sanya, China (Keynote Speech at the 2nd International Conference on Computer Modeling and Simulation) |
621 |
De-clustering and Its Application to Steganography |
2010.01.30 |
Macao, China (Keynote Speech at 2010 International Conference on Information Technology for Manufacturing Systems) |
622 |
A Virtual Image Cryptosystem Based upon Vector Quantization |
2010.03.05 |
Wuhan, China (Keynote Speech at 2010 International Conference on Challenges in Environmental Science and Computer Engineering) |
623 |
A Technique of Embedding Digital Data in an Image Compression Code Reversibly |
2010.03.18 |
National Taichung Institute of Technology, Department of Information Management |
624 |
The Road to Success |
2010.04.02 |
Jinggangshan University |
625 |
Recent Developments in Visual Cryptography |
2010.04.03 |
Jinggangshan, China (Keynote Speech at 2010 Third International Symposium on Intelligent Information Technology and Security Informatics) |
626 |
Recent Developments in Information Hiding |
2010.04.17 |
Chengdu, China (Keynote Speech at 2010 The 2nd IEEE International Conference on Information Management and Engineering) |
627 |
Recent Developments in Text Steganography |
2010.04.18 |
Shenzhen, China (Keynote Speech at 2010 Asia-Pacific Conference on Wearable Computing Systems) |
628 |
Scientific and Technological Paper Writing, Contributing, Publishing Essentials |
2010.04.19 |
School of Electronics and Information Engineering, South China University of Technology |
629 |
Rambling on about Research Methods |
2010.04.19 |
School of Electronics and Information Engineering, South China University of Technology |
630 |
Rambling on about Research Methods |
2010.04.20 |
Shunde Polytechnic |
631 |
The Road to Success |
2010.04.21 |
School of Computer Science, Guangdong Polytechnic Normal University |
632 |
Self-growth of Young Scholars |
2010.04.22 |
The School Physics and Telecommunication Englineering, South China Normal University |
633 |
Information Steganography Using Magic Matrix |
2010.04.22 |
The School Physics and Telecommunication Englineering, South China Normal University |
634 |
Self-growth of Young Scholars |
2010.04.23 |
School of Computer, Wuhan University |
635 |
Recent Developments in Visual Cryptography |
2010.04.24 |
Wuhan, China (Keynote Speech at 2010 International Conference on Biomedical Engineering and Computer Science) |
636 |
De-clustering and Its Application to Information Hiding |
2010.04.25 |
Kaifeng, China (Keynote Speech at 2010 International Conference on Machine Vision and Human-Machine Interface) |
637 |
New Developments in Visual Crypography |
2010.04.27 |
School of Electronic and Information Engineering, Dalian University of Technology |
638 |
Rambling on about Research Methods |
2010.04.27 |
School of Electronic and Information Engineering, Dalian University of Technology |
639 |
Image Steganography Using Magic Matrix |
2010.05.06 |
Tainan, Taiwan (Keynote Speech at 2010 International Symposium on Computer, Communication, Control and Automation) |
640 |
Emoticon-Based Text Steganography in Online Chat tools |
2010.05.07 |
Taiwan (Keynote Speech at 2010 The Forum of Consumer Electronics) |
641 |
An Information Hiding Scheme Using Sudoku |
2010.05.10 |
Wuhan, China (Keynote Speech at 2010 The IIS 2nd International Conference on Signal Processing, Robotics and Automation) |
642 |
Recent Developments of Visual Cryptography |
2010.05.11 |
Guangdong University of Business Studies |
643 |
Visual Cryptography |
2010.05.15 |
Sanya, China (Keynote Speech at 2010 The 2nd International Conference on Modeling, Simulation and Visualization Methods) |
644 |
Recent Developments in Text Steganography |
2010.05.21 |
National Kinmen Institute of Technology |
645 |
Self-growth of Young Scholars |
2010.05.27 |
Asia University |
646 |
Embedding Information in Cover Digital Images Using Magic Matrices |
2010.05.30 |
Wuhan, China (Keynote Speech at 2010 International Conference on the Development of Educational Science and Computer Technology) |
647 |
The Road to Success |
2010.06.07 |
Kainan University |
648 |
Authenticatable Visual Secret Sharing |
2010.06.13 |
Chengdu, China (Keynote Speech at 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering) |
649 |
Scientific and Technological Paper Writing, Contributing, Publishing Essentials |
2010.06.21 |
Optical-Electrical and Computer Engineering, Unversity of Shanghai for Science and Technology |
650 |
Rambling on about Research Methods |
2010.06.22 |
Shanghai Ocean University |
651 |
An Information Hiding Scheme Using Sudoku |
2010.06.23 |
Shanghai, China (Keynote Speech at 2010 The 2nd International Conference on Education Technology and Computer) |
652 |
Recent Developments in Text Steganography |
2010.06.26 |
Qinhuangdao, China (Keynote Speech at 2010 The International Conference on Computer Design and Applications) |
653 |
De-clustering and Its Application to Steganography |
2010.06.30 |
Hongkong, China (Keynote Speech at 2010 The Second International Conference on Communication Systems, Networks and Applications) |
654 |
Authenticatable Visual Secret Sharing |
2010.07.05 |
Hangzhou Dianzi University |
655 |
Authenticatable Visual Secret Sharing |
2010.07.07 |
Zhejiang, China (Keynote Speech at 2010 TThe 3rd IEEE International Conference on Ubi-media Computing) |
656 |
Sharing Secrets Using Visual Cryptography |
2010.07.11 |
Dalian, China (Keynote Speech at 2010 The International Joint Conference on Artificial Intelligence) |
657 |
An Information Hiding Scheme Using Sudoku |
2010.07.21 |
Qingdao, China (Keynote Speech at 2010 The IITA International Conference on Nanotechnology and Computer Engineering) |
658 |
Visual Cryptography |
2010.07.29 |
Huangshan, China (Keynote Speech at 2010 The Third International Symposium on Electronic Commerce and Security) |
659 |
Visual Cryptography |
2010.08.02 |
Beijing, China (Keynote Speech at 2010 Second Pacific-Asia Conference on Circuits,Communications and System) |
660 |
Authenticatable Visual Secret Sharing |
2010.08.04 |
Taichung, Taiwan (Keynote Speech at 2010 The IET International Conference on Frontier Computing) |
661 |
Key to Be a Successful Graduate Student |
2010.08.09 |
Department of Information Management, National Taichung Institute of Technology |
662 |
Visual Cryptography |
2010.08.14 |
Jiaozuo, China (Keynote Speech at 2010 The Third International SymposiumComputer Science and Computational Technology) |
663 |
Authenticatable Visual Secret Sharing |
2010.08.21 |
Yangzhou China (Keynote Speech at 2010 International Colloquium on Computing, Communication, Control, and Management) |
664 |
Delivering Secret Messages Using Chat Tools |
2010.08.25 |
Changchun China (Keynote Speech at 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering) |
665 |
Key to Be a Successful Graduate Student |
2010.08.31 |
Department of Management Information Systems, National Chung Hsing University |
666 |
Authenticatable Visual Secret Sharing |
2010.09.17 |
Nanchang, China (Keynote Speech at The Second Asia-Pacific Conference on Information Processings) |
667 |
Authenticatable Visual Secret Sharing |
2010.09.18 |
Chongqing, China (Keynote Speech at 2010 International Conference on Educational and Information Technology) |
668 |
Recent Developments in Visual Cryptography |
2010.09.27 |
Taiyuan, China (Keynote Speech at 2010 International Conference on Computational Aspects of Social Networks) |
669 |
How to Create High Quality Research Papers |
2010.10.14 |
Department of Information Management, National Taichung Institite of Technology |
670 |
Teaching Experiences Sharing |
2010.10.14 |
Department of Information Management, National Taichung Institite of Technology |
671 |
The New Developments in Message Embedding |
2010.10.17 |
Wuhan, China (Keynote Speech at 2010 International Conference on Information,Communication and Edcuation Application) |
672 |
Delivering Secret Message Using Chat Tools |
2010.10.18 |
Kunming, China (Keynote Speech at The 2010 International Conference on Software and Computing Technology) |
673 |
Delivering Secret Message Using Chat Tools |
2010.10.19 |
Kunming, China (Keynote Speech at The 2010 International Conference on Management Science) |
674 |
Information Steganography Using Magic Matrix |
2010.10.22 |
Taiyuan University of Science and Technology |
675 |
Authenticatable Visual Secret Sharing |
2010.10.23 |
Taiyuan, China (Keynote Speech at The 2010 International Conference on Computer Application and System Modeling) |
676 |
A Survey of Linguistic Steganography |
2010.10.24 |
Huanggang, China (Keynote Speech at The 2010 International Symposium on Intelligence Information Processing and Trusted Computing) |
677 |
Recent Developments in Information Hiding |
2010.10.26 |
Xiamen, China (Keynote Speech at The 2010 International Conference on Bio-inspired Systems and Signal Processing) |
678 |
Information Steganography Using Magic Matrix |
2010.11.06 |
Qinhuangdao, China (Keynote Speech at The 4th International Conference on Intelligent Information Technology Application) |
679 |
Applying De-Clustering Concept to Information Hiding |
2010.11.10 |
Kaohsiung, Taiwan (Keynote Speech at The 2010 2nd International Conference on Computational Collective Intelligence) |
680 |
Embedding Secret Information in Digital Images |
2010.11.11 |
Guangzhou, China (Keynote Speech at The 2010 International Symposium on Information and Automation) |
681 |
Embedding Secret Information in Digital Images |
2010.11.13 |
Qingdao, China (Keynote Speech at The 2010 The Third International Symposium on Information Processing) |
682 |
Embedding Secret Information in Digital Images |
2010.11.13 |
Qingdao University of Science and Technology, College of Information Science and Technology |
683 |
How to Create High Quality Research Papers |
2010.11.15 |
College of Computer Science Of Chongqing University |
684 |
Visual Secret Sharing |
2010.11.15 |
College of Computer Science Of Chongqing University |
685 |
Emotion-based Text Steganography in Chat |
2010.11.17 |
Chengdu, China (Keynote Speech at The 2010 The 3rd International Conference on Computer and Electrical Engineering) |
686 |
Recent Developments in Visual Cryptography |
2010.11.18 |
Guilin, China (Keynote Speech at The 2010 Third Pacific-Asia Conference on Web Mining and Web-based Application) |
687 |
How to Create High Quality Research Papers |
2010.11.18 |
Guilin University of Technology, College of Information Science and Engineering |
688 |
Visual Secret Sharing |
2010.11.18 |
Guilin University of Technology, College of Information Science and Engineering |
689 |
College Students' Learning Experience and Career Planning |
2010.11.19 |
Guilin University of Technology |
690 |
Recent Developments in Visual Cryptography |
2010.11.20 |
Shenzhen Graduate School, Harbin Institute of Technology |
691 |
Applying De-Clustering Concept to Information Hiding |
2010.11.21 |
Shenzhen, China (Keynote Speech at The 2010 International Conference on Circuit and Signal Processing) |
692 |
How to Create High Quality Research Papers |
2010.11.25 |
Feng Chia University Libraries |
693 |
Authenticatable Visual Secret Sharing |
2010.11.26 |
Chiayi, Taiwan (Keynote Speech at The 2010 International Conference on Information Security Management) |
694 |
Information Steganography Using Magic Matrix |
2010.12.04 |
Wuhan, China (Keynote Speech at The 2010 3rd International Conference on Computational Intelligence and Industrial Application) |
695 |
Authenticatable Visual Secret Sharing |
2010.12.05 |
Hangzhou, China (Keynote Speech at The 2010 2nd International Conference on Information Science and Engineering) |
696 |
Applying De-Clustering Concept to Information Hiding |
2010.12.09 |
The College of Information Engineering on XiangTan University |
697 |
Visual Secret Sharing |
2010.12.09 |
The College of Information Engineering on XiangTan University |
698 |
Visual Cryptography |
2010.12.10 |
Sanya, China (Keynote Speech at The 2010 International Conference on Future Information Technology and Computing) |
699 |
An Information Hiding Scheme Using Sudoku |
2010.12.10 |
Nanning, China(Keynote Speech at The 2010 International Conference on Future Computer, Control and Communication) |
700 |
Authenticatable Visual Secret Sharing |
2010.12.13 |
Chongqing, China (Keynote Speech at The 2010 International Conference on Parallel and Distributed Computing and Networks) |
701 |
Visual Secret Sharing |
2010.12.17 |
Southwest Jiaotong University, School of Information Science and Technology |
702 |
Applying De-Clustering Concept to Information Hiding |
2010.12.18 |
Chengdu, China (Keynote Speech at The 2010 International Conference on Information Security and Artificial Intelligence) |
703 |
Visual Cryptography |
2010.12.26 |
Shanghai, China (Keynote Speech at The 2010 Second IITA International Joint Conference on Artificial Intelligence) |
704 |
Introduction to Visual Cryptography |
2011.01.14 |
Department of Computer Science and Engineering, National Chung-Hsing University |
705 |
Information Steganography Using Reference Matrices |
2011.02.21 |
Hong Kong, China (Keynote Speech at The 2011 International Conference on Fuzzy Systems and Neural Computing) |
706 |
Information Steganography Using Reference Matrices |
2011.03.02 |
National Central University, Department of Computer Science & Information Engineering |
707 |
Introduction to Visual Cryptography |
2011.03.04 |
Taichung, Taiwan (Keynote Speech at The 2011 Information Education and Technological Application Conference) |
708 |
Recent Developments in Visual Cryptography |
2011.03.06 |
Macao, China (Keynote Speech at The 2011 2nd International Conference on Innovative Computing and Communication and 2011 2nd Asia-Pacific Conference on Information Technology and Ocean Engineering) |
709 |
Visual Cryptography |
2011.03.12 |
Shanghai, China (Keynote Speech at The 2011 3rd International Conference on Computer Research and Development) |
710 |
How to Create High Quality Research Papers |
2011.03.23 |
I-Shou University |
711 |
Introduction to Visual Cryptography |
2011.04.11 |
Department of Computer Science and Information Engineering, National Chung Cheng University |
712 |
Information Steganography Using Magic Matrix |
2011.04.17 |
Xianning, China (Keynote Speech at The 2011 The International Conference on Consumer Electronics, Communications and Networks) |
713 |
Applying De-Clustering Concept to Information Hiding |
2011.04.19 |
Computer Science and Technology, Nanjing University of Information Science and Technology |
714 |
Transmission of Secret Messages Using Chat Tools |
2011.04.21 |
West Anhui University |
715 |
Authenticatable Visual Secret Sharing |
2011.04.21 |
School of Computer Science and Technology, Anhui University |
716 |
Information Hiding Scheme Using Sudoku |
2011.04.23 |
Wuhan, China (Keynote Speech at The 2011 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing) |
717 |
Embedding Secret Messages in Texts |
2011.05.01 |
Chengdu, China (Keynote Speech at The 2011 International Conference on Advanced Materials and Computer Science) |
718 |
Authenticatable Visual Secret Sharing |
2011.05.04 |
Northeastern University at Qinhuangdao(Institute of Internet of Things and Information Security) |
719 |
Embedding Secret Messages in Digital Images |
2011.05.05 |
Beijing, China (Keynote Speech at The 2011 The 1st International Conference on High Performance Structures and Materials Engineering) |
720 |
Secret Sharing Using Digital Image Shadows |
2011.05.07 |
Shanghai, China (Keynote Speech at The 2011 International Conference on Information Technology for Manufacturing Systems) |
721 |
An Information Hiding Scheme Using Sudoku |
2011.05.14 |
Guangzhou, China (Keynote Speech at The 2011 The International Conference on Business Management and Electronic Information) |
722 |
Walk the Two Sides to See the Academic Rise of the Mainland |
2011.05.19 |
Management Information Systems, National Chung-Hsing University |
723 |
Professor Chang's Sayings |
2011.05.19 |
Management Information Systems, National Chung-Hsing University |
724 |
Authenticatable Visual Secret Sharing |
2011.06.10 |
Chengdu, China (Keynote Speech at The 2011 4th IEEE International Conference on Computer Science and Information Technology) |
725 |
Embedding Secret Messages in Digital Images |
2011.06.18 |
Zhengzhou, China (Keynote Speech at The 2011 International Conference on Computer and Network Engineering) |
726 |
Information Steganography Using Magic Matrix |
2011.07.08 |
Xiamen, China (Keynote Speech at The 2011 International Conference on Intelligent Information Processing) |
727 |
Professor Chang's Sayings |
2011.07.21 |
College of Computer, Hangzhou Dianzi University |
728 |
Authenticatable Visual Secret Sharing |
2011.07.23 |
Huangshi, China (Keynote Speech at The 2011 The 3rd International Conference on Information Technology and Computer Science) |
729 |
How to Create High Qualituy Academic Papers |
2011.08.02 |
Lanzhou University |
730 |
Scientific and Technological Paper Writing, Contributing, Publishing Essentials |
2011.08.02 |
Lanzhou University |
731 |
Professor Chang's Sayings |
2011.08.02 |
Lanzhou University |
732 |
Rapid Development of University Academics in China |
2011.08.13 |
Department Computer Science and Information Engineering, National Taichung Institite of Technology |
733 |
Professor Chang's Sayings |
2011.08.13 |
Department Computer Science and Information Engineering, National Taichung Institite of Technology |
734 |
Information Steganography Using Magic Matrix |
2011.08.28 |
Yantai, China (Keynote Speech at The 2011 3rd International Conference on Signal Processing Systems) |
735 |
Applying De-Clustering Concept to Information Hiding |
2011.08.30 |
Dalian University of Technology |
736 |
Professor Chang's Sayings |
2011.08.30 |
Dalian University of Technology |
737 |
Professor Chang's Sayings |
2011.09.08 |
Beijing Jiaotong University |
738 |
Authenticatable Visual Secret Sharing |
2011.09.08 |
Beijing Jiaotong University |
739 |
An Information Hiding Scheme Using Sudoku |
2011.09.10 |
Tianjin, China (Keynote Speech at The 2011 2nd International Conference on electronics and Information Engineering) |
740 |
Recent Developments in Secret Image Sharing |
2011.09.17 |
Hong Kong, China (Keynote Speech at The 2011 International Conference on Internet Computing and Information Services) |
741 |
Information Steganography Using Magic Matrix |
2011.10.07 |
Intelligent Network Forum, Providence University |
742 |
Authenticatable Visual Secret Sharing |
2011.10.14 |
Dalian, China (Keynote Speech at The 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing) |
743 |
The Road to Success |
2011.10.18 |
Shandong Institute of Business and Technology |
744 |
Recent Developments in Information Hiding |
2011.10.18 |
Shandong Institute of Business and Technology |
745 |
Authenticatable Visual Secret Sharing |
2011.10.22 |
Wuhan, China (Keynote Speech at The 2011 International Symposium on Intelligence Information Processing and Trusted Computing) |
746 |
Introduction to Visual Cryptography |
2011.10.27 |
Department of Information Management, National United University |
747 |
Professor Chang's Sayings |
2011.10.27 |
Department of Information Management, National United University |
748 |
Secret Sharing Using Digital Image Shadows |
2011.11.03 |
Beijing, China (Keynote Speech at The 2011 SSITE International Conference on Computers and Advanced Technology in Education) |
749 |
An Information Hiding Scheme Using Sudoku |
2011.11.10 |
Management Information Systems, National Chung-Hsing University |
750 |
Secret Sharing Using Digital Image Shadows |
2011.11.11 |
Taichung, Taiwan (Keynote Speech at The 2011 Workshop on Consumer Electronics) |
751 |
Some Steganographic Methods Using Table Lookup Techniques |
2011.11.26 |
Chengdu, China (Keynote Speech at The 2011 International Conference on Networks and Information) |
752 |
Information Steganography Using Magic Matrix |
2011.12.09 |
Department of Computer Science and Engineering, National Sun Yat-Sen University |
753 |
A Genetic Algorithm for Density-Based Vector Quantization |
2011.12.27 |
Bangkok, Thailand (Keynote Speech at The 2011 2nd International Conference on Advances in Energy Engineering) |
754 |
Information Steganography Using Magic Matrix |
2012.01.04 |
Department of Information Management National Chin-Yi University of Technology |
755 |
Rambling on about Research Methods |
2012.01.06 |
School of Information Science & Technology Southwest JiaoTong University |
756 |
Information Steganography Using Magic Matrix |
2012.01.08 |
Chengdu, China (Keynote Speech at The 2012 International Conference on Innovation and Information Management) |
757 |
Steganographic Methods Using Table Lookup Techniques |
2012.02.18 |
Hong Kong, China (Keynote Speech at The 2012 International Conference on Information and Computer Applications) |
758 |
Steganographic Methods Using Table Lookup Techniques |
2012.02.22 |
Sanya, China (Keynote Speech at The 2012 International Conference on Future Electrical Power and Energy Systems) |
759 |
Authenticatable Visual Secret Sharing |
2012.02.27 |
Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Affective Computing and Intelligent Interaction) |
760 |
Secret Sharing Using Digital Image Shadows |
2012.03.02 |
Macao, China (Keynote Speech at The 2012 International Conference on Innovative Computing, Information and Automation) |
761 |
Secret Sharing Using Digital Image Shadows |
2012.03.11 |
Hong Kong, China (Keynote Speech at The 2012 International Conference on Security Science and Technology) |
762 |
Rambling on about Research Methods |
2012.03.14 |
National Central University, Department of Computer Science and Information Engineering |
763 |
Professor Chang's Sayings |
2012.03.14 |
National Central University, Department of Computer Science and Information Engineering |
764 |
Recent Developments in Information Steganography |
2012.03.15 |
Asia University, Taiwan (Keynote Speech at The 2012 Information Security Workshop) |
765 |
Information Steganography Using Magic Matrix |
2012.03.16 |
Department of Computer Science and Information Engineering, National Dong Hwa University |
766 |
Secret Image Sharing Systems |
2012.03.25 |
Shenzhen, China(Keynote Speech at The 2012 International Conference on Information and Industrial Electronics) |
767 |
Rambling on about Research Methods |
2012.03.26 |
Shenzhen Graduate School, Harbin Institute of Technology |
768 |
Secret Sharing Using Digital Image Shadows |
2012.04.28 |
Shanghai, China (Keynote Speech at The 2012 The 6th International Conference on Information Security and Assurance) |
769 |
Recent Developments in Hiding Information |
2012.05.06 |
Chengdu, China (Keynote Speech at The 2012 International Conference on Network and Computing Technology) |
770 |
Recent Developments in Information Hiding |
2012.05.07 |
Nanchang, China (Keynote Speech at The 2012 2nd International Conference on Materials, Mechatronics and Automation) |
771 |
Information Steganography Using Magic Matrix |
2012.05.09 |
Fujian Normal University(School of Mathematics and Computer Science) |
772 |
Information Steganography Using Magic Matrix |
2012.05.10 |
Fuqing Branch of Fujian Normal University(School of Mathematics and Computer Science) |
773 |
Visual Cryptography and Information Steganography |
2012.05.12 |
Guangzhou, China (Keynote Speech at The 2012 2nd International Conference on Business Management and Electronic Information) |
774 |
Information Steganography Using Magic Matrix |
2012.05.14 |
Guilin University of Technology, College of Information Science and Engineering |
775 |
Embedding Secret Messages in Texts |
2012.05.14 |
Guilin University of Technology, College of Information Science and Engineering |
776 |
Emoticon-Based Text Steganography in Online Chat tools |
2012.05.17 |
Department of Management Information Systems, National Chung Hsing University |
777 |
Emoticon-Based Text Steganography in Online Chat tools |
2012.05.24 |
Department Computer Science and Information Engineering, National Taichung University of Scienceand Technology |
778 |
Embedding Secret Messages in Texts |
2012.05.30 |
Cebu, Philippines (Keynote Speech at The 2012 International Conference on Information Science and Industrial Applications) |
779 |
Digital Watermarking and Its Applications |
2012.06.01 |
Shanghai, China (Keynote Speech at The 2012 2nd International Conference on Future Computers in Education) |
780 |
Digital Watermarking and Its Applications |
2012.06.03 |
Zhengzhou, China (Keynote Speech at The 2012 International Conference on Computer and Communication Devices) |
781 |
Emoticon-Based Text Steganography in Online Chat tools |
2012.06.03 |
Zhengzhou University of Light Industry |
782 |
The Design of Visual Cryptosystems |
2012.07.07 |
Taiyuan, China (Keynote Speech at The 2012 International Conference on Computing Measurement Control and Sensor Network) |
783 |
Visual Cryptography and Information Steganography |
2012.08.04 |
Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Signal, Image Processing and Applications) |
784 |
Hiding Secrets in a Digital Image |
2012.08.21 |
Seoul, Korea (Keynote Speech at The 2012 4th International Conference on Awareness Science and Technology) |
785 |
Rambling on about Research Methods |
2012.08.23 |
College of Computer, Hangzhou Dianzi University |
786 |
Recent Developments in Hiding Information |
2012.08.24 |
Hangzhou, China (Keynote Speech at The 2012 International Conference on Networking and Technology) |
787 |
Embedding Secrets Using Magic Matrices |
2012.08.25 |
Weihai, China (Keynote Speech at The 2012 3rd International Conference on Electronics and Information Engineering) |
788 |
Steganographic Systems for Secret Messages |
2012.08.26 |
Shanghai, China (Keynote Speech at The 2012 International Conference on Image, Vision and Computing) |
789 |
Hiding Information in a Digital Image |
2012.09.02 |
Phuket Island, Thailand (Keynote Speech at The 2012 International Conference on Computer Design and Engineering) |
790 |
Some Steganographic Methods for Delivering Secret Messages Using Cover Media |
2012.09.08 |
Qingdao, China (Keynote Speech at The 2012 3rd International Conference on Information Technology for Manufacturing Systems) |
791 |
Appilcations of CRT in Information Science |
2012.09.13 |
Beijing Jiaotong University |
792 |
Information Hiding Technology and Optimal Problem |
2012.09.15 |
Beijing University of Chemieal Technology, School of Management |
793 |
Table Look-up Methods for Storing and Retrieving Secret Messages |
2012.09.16 |
Beijing, China (Keynote Speech at The 2012 International Conference on Information and Computer Technology) |
794 |
Appilcations of CRT in Information Science |
2012.09.25 |
The College of Information Engineering on XiangTan University |
795 |
Embedding Messages in Digital Images |
2012.09.27 |
Beijing, China (Keynote Speech at The 2012 The 4th International Conference on Advanced Science and Technology) |
796 |
Embedding Secrets in Digital Images |
2012.10.05 |
Dalian, China (Keynote Speech at The 2012 International Conference on Applied Physics and Materials Science) |
797 |
Appilcations of CRT in Information Science |
2012.10.10 |
Anhui University |
798 |
Appilcations of CRT in Information Science |
2012.10.11 |
School of Information Science and Technology, University of Science and Technology of China |
799 |
Visual Cryptography |
2012.10.17 |
Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Advanced Materials and Information Technology Processing) |
800 |
Recent Developments in Information Hiding |
2012.10.20 |
Sanya, China (Keynote Speech at The 2012 International Conference on Information Management, Innovation Management and Industrial Engineering) |
801 |
Visual Cryptography and Information Steganography |
2012.10.24 |
Department of Computer Science Information Engineering, National Yunlin University of Science and Technology |
802 |
Professor Chang's Sayings |
2012.10.24 |
Department of Computer Science Information Engineering, National Yunlin University of Science and Technology |
803 |
Using Table Look-up Methods to Hide Secret Information |
2012.10.27 |
Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Information Communication and Management) |
804 |
Recent Developments in Information Steganography |
2012.11.02 |
School of Medical Informatics, Chung Shan Medical University |
805 |
Professor Chang's Sayings |
2012.11.02 |
School of Medical Informatics, Chung Shan Medical University |
806 |
Self-growth of Young Scholar |
2012.11.07 |
Department of Computer Science and Information Engineering, Hungkuang University |
807 |
Professor Chang's Sayings |
2012.11.07 |
Department of Computer Science and Information Engineering, Hungkuang University |
808 |
Appilcations of CRT in Information Science |
2012.11.12 |
Shenzhen Graduate School, Harbin Institute of Technology |
809 |
Embedding Secrets in Digital Images |
2012.11.13 |
GuangZhou University |
810 |
Appilcations of CRT in Information Science |
2012.11.14 |
GuangZhou Institutes of Advanced Technology, Chinese Academy of Sciences |
811 |
Appilcations of CRT in Information Science |
2012.11.15 |
Shenzhen University |
812 |
Appilcations of CRT in Information Science |
2012.11.20 |
Providence University, IET Distinguished Lecture Series |
813 |
Sharing Academic Work and Proposal Writing |
2012.11.22 |
College of Computer Science, Asia University |
814 |
Recent Developments in Information Hiding |
2012.11.25 |
Bangkok, Thailand (Keynote Speech at The 2012 International Conference on Networks and Information) |
815 |
Sharing Academic Work and Proposal Writing |
2012.12.13 |
2012 International Computer Symposium |
816 |
Hiding Information in a Digital Image |
2012.12.13 |
Department of Medical Informatics, TZU CHI University |
817 |
Hiding Information in a Digital Image |
2013.01.03 |
National Taichung University of Science and Technology, IET Distinguished Lecture Series |
818 |
Recent Developments in Information Hiding |
2013.01.20 |
Singapore (Keynote Speech at The 2013 International Conference on Innovation and Information Management) |
819 |
Digital Watermarking and Its Applications |
2013.03.13 |
Xiamen, China (Keynote Speech at The 2013 3rd International Conference on Advanced Measurement and Test) |
820 |
Embedding Secrets Using Magic Matrices |
2013.03.13 |
Software School of Xiamen University |
821 |
Appilcations of CRT in Information Science |
2013.03.18 |
Department of Management Information Systems, National Chung Hsing University |
822 |
Information Steganography Using Magic Matrix |
2013.04.17 |
School of Information Science & Technology Southwest JiaoTong University |
823 |
Recent Development of Information Hiding Steganography |
2013.04.18 |
School of Computer Science and Engineering, University of Electronic Science and Technology |
824 |
Recent Developments in Information Hiding |
2013.04.22 |
Beijing, China (Keynote Speech at The 2013 5th International Conference on Digital Image Processing) |
825 |
Sharing Academic Work and Proposal Writing |
2013.04.30 |
Feng Chia University Libraries |
826 |
Appilcations of CRT in Information Science |
2013.05.16 |
Department of Information Engineering and Computer Science, Feng Chia University |
827 |
Hiding Information in a Digital Image |
2013.05.22 |
Beijing, China (Keynote Speech at The 2013 International Conference on Electrical Engineering and Computer Sciences) |
828 |
Professor Chang's Sayings |
2013.05.24 |
School of Computer Science and Technology, Hangzhou Duanzi University |
829 |
Digital Watermarking and Its Applications |
2013.05.24 |
School of Media and Design, Hangzhou Duanzi University |
830 |
Professor Chang's Sayings |
2013.05.26 |
Internet of Things, Jiangnan University |
831 |
Rambling on about Research Methods |
2013.05.28 |
Internet of Things, Jiangsu University |
832 |
Professor Chang's Sayings |
2013.05.28 |
Internet of Things, Jiangsu University |
833 |
Embedding Secrets Using Magic Matrices |
2013.05.29 |
Internet of Things, Jiangsu University |
834 |
Appilcations of Chinese Remainder Theorem |
2013.05.29 |
Internet of Things, Jiangsu University |
835 |
Visual Cryptography and Information Steganography |
2013.07.07 |
Hong Kong, China (Keynote Speech at The 2013 4th International Conference on Signal and Information Processing) |
836 |
How to Create High Quality Research Papers |
2013.07.19 |
School of Information Science & Technology Southwest JiaoTong University |
837 |
Embedding Secrets in Digital Images |
2013.07.21 |
Chengdu, China (Keynote Speech at The 2013 2nd International Conference on Information and Knowledge Management) |
838 |
Emoticon-Based Text Steganography in Online Chat tools |
2013.07.23 |
Anhui University(School of Computer Scince and Technology) |
839 |
Embedding Secrets Using Magic Matrices |
2013.07.23 |
University of Science and Technology of China(School of Computer Scince and Technology) |
840 |
Embedding Secrets in Digital Images |
2013.07.25 |
Seoul, Korea (Keynote Speech at The 2013 8th Asia Joint Conference on Information Security) |
841 |
Information Steganography Using Magic Matrix |
2013.08.22 |
Department of Information Engineering and Computer Science, Feng Chia University |
842 |
Learning and Growing for a Graduate Student |
2013.09.05 |
Department of Information Engineering and Computer Science, Feng Chia University |
843 |
The Road to Success |
2013.09.12 |
Department of Information Engineering and Computer Science, Feng Chia University |
844 |
Rambling on about Research Methods |
2013.09.19 |
Department of Information Engineering and Computer Science, Feng Chia University |
845 |
Appilcations of CRT in Information Science |
2013.10.10 |
Fujian Normal University(School of Mathematics and Computer Science) |
846 |
Appilcations of CRT in Information Science |
2013.10.21 |
Taiyuan University of Science and Technology |
847 |
Rambling on about Research Methods |
2013.10.25 |
Shenzhen Graduate School, Harbin Institute of Technology |
848 |
Visual Cryptography |
2013.10.27 |
Hong Kong, China (Keynote Speech at The 2013 5th International Conference on Graphic and Image Processing) |
849 |
Hiding Information in a Digital Image |
2013.10.28 |
Guilin University of Electronic Technology(College of Mathematics & Computer Science) |
850 |
Recent Developments in Information Hiding |
2013.11.01 |
National Chung Hsing University-Information Security Seminar |
851 |
Information Steganography Using Magic Matrix |
2013.11.08 |
Central Police University |
852 |
The Design of Computer Password |
2013.11.19 |
Providence University |
853 |
Appilcations of CRT in Information Science |
2013.11.20 |
School of Computer Science and Technology, Hangzhou Duanzi University |
854 |
Information Steganography Using Magic Matrix |
2013.11.22 |
Chang'an University(School of Information Engineering) |
855 |
Authenticatable Visual Secret Sharing |
2013.11.23 |
Xidian, China (Keynote Speech at The 2013 International Conference on Information Management, Innovation Management and Industrial Engineering) |
856 |
Appilcations of CRT in Information Science |
2013.11.25 |
Northwestern Polytechnical University(School of Computer Science) |
857 |
Information Steganography Using Magic Matrix |
2013.11.25 |
College of Communications Engineering , Xidian University(School of Computer Science) |
858 |
Hiding Information in a Digital Image |
2013.12.02 |
Xidian, China (Keynote Speech at The 2013 5th International Conference on Information Management and Engineering) |
859 |
Authenticatable Visual Secret Sharing |
2013.12.03 |
University of Electronic Science and Technology of China |
860 |
Appilcations of CRT in Information Science |
2013.12.05 |
University of Electronic Science and Technology of China |
861 |
Information Steganography Using Magic Matrix |
2013.12.07 |
XiangTan University(The College of Information Engineering) |
862 |
Appilcations of CRT in Information Science |
2013.12.09 |
Hunan University of Technology(Young Computer Scientists & Engineers Forum) |
863 |
Appilcations of CRT in Information Science |
2013.12.11 |
Jishou University |
864 |
A Virtual Image Cryptosystem Based upon Vector Quantization |
2014.01.02 |
National Chung Hsing University-Information Security Seminar |
865 |
Authenticatable Visual Secret Sharing |
2014.01.02 |
Department of Management Information Systems, National Chung Hsing University |
866 |
Information Steganography Using Magic Matrix |
2014.03.10 |
Department of Computer Science and Information Engineering, National Chung Cheng University |
867 |
The Recent Developments in Visual Secret Sharing |
2014.03.21 |
Manila, Philippines (Keynote Speech at The 2014 International Conference on Circuits and Systems) |
868 |
Information Steganography Using Magic Matrix |
2014.04.12 |
Jeju Island, Korea (Keynote Speech at The 2014 3rd International Conference on Network and Computing Technology) |
869 |
Information Steganography Using Magic Matrix |
2014.05.14 |
HuangHuai University, Henan |
870 |
Rambling on about Research Methods |
2014.05.16 |
Taiyuan University of Science and Technology |
871 |
Decluster and Its Application to Steganography |
2014.05.19 |
Beijing Jiaotong University |
872 |
Information Steganography Using Magic Matrix |
2014.05.19 |
North China Institute of Aerospace Engineering |
873 |
Information Steganography Using Magic Matrix |
2014.05.20 |
State Key Laboratory Of Information Security, Chinese Academy of Sciences |
874 |
Information Steganography Using Magic Matrix |
2014.05.21 |
Beijing Tsinghua University |
875 |
How to Create High Quality Research Paper |
2014.05.22 |
Hangzhou Duanzi University |
876 |
Professor Chang's Sayings |
2014.05.22 |
Hangzhou Duanzi University |
877 |
Digital Watermarking and Its Applications |
2014.05.23 |
Zhejiang University of Media and Communications |
878 |
Authenticatable Visual Secret Sharing |
2014.06.09 |
Tiachung, Taiwan (Keynote Speech at The First International Conference on Trustworthy System) |
879 |
Authenticatable Visual Secret Sharing |
2014.06.15 |
Hong Kong, China (Keynote Speech at The 2014 International Conference on Knowledge Engineering and Applications) |
880 |
Key to High Quality Research |
2014.06.18 |
College of Computer Science and Technology, Huaqiao University |
881 |
Hiding Information in a Digital Image |
2014.06.18 |
College of Computer Science and Technology, Huaqiao University |
882 |
Quotations from Professor Chang |
2014.06.18 |
College of Computer Science and Technology, Huaqiao University |
883 |
Information Hiding Techniques |
2014.07.04 |
Jeju Island, Korea (Keynote Speech at The 3rd International Conference on Knowledge and Education Technology) |
884 |
Hiding Information in a Digital Image |
2014.07.29 |
Hong Kong, China (Keynote Speech at International Conference on Industrial and Applied Electronics) |
885 |
Recent Developments in Information Hiding |
2014.08.15 |
Lijiang, China (Keynote Speech at 2014 International Conference on Multimedia and Communication Technologies) |
886 |
Information Steganography Using Magic Matrix |
2014.09.05 |
School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China |
887 |
Some Techniques for Sharing Digital Secret Images |
2014.09.07 |
Chengdu, China (Keynote Speech at The 2014 International Conference on Information and Computer Technology) |
888 |
The Road to Success |
2014.09.30 |
National Chung Cheng University |
889 |
A Watermarking Scheme for Categorical Relational Databases |
2014.10.02 |
Taipei (Keynote Speech at 2014 The 13th International Workshop on Digital-forensics and Watermarking) |
890 |
Using Genetic Algorithm to Embed Important Information in an Image Compression File |
2014.10.18 |
Nanchang, China (Keynote Speech at The 8th International Conference on Genetic and Evolutionary Computing) |
891 |
Information Steganography Using Magic Matrix |
2014.10.22 |
Northwestern Polytechnical University |
892 |
Information Steganography Using Magic Matrix |
2014.10.23 |
Xi'an University of Architecture and Technology |
893 |
Using Genetic Algorithm to Embed Important Information in an Image Compression File |
2014.10.24 |
Chang'an University |
894 |
Using Genetic Algorithm to Embed Important Information in an Image Compression File |
2014.10.24 |
Northwestern Polytechnical University |
895 |
Turtle Shell Based Information Hiding Mechanism |
2014.10.25 |
Xi'an, China (Keynote Speech at 2014 7th International Conference on Information Management, Innovation Management and Industrial Engineering) |
896 |
Information Hiding Techniques Using Magic Matrix |
2014.11.03 |
Taiyuan, Vietnam (Keynote Speech at 2014 International Symposium on GIS and Advanced Technologies) |
897 |
Hiding Information in a Digital Image |
2014.11.10 |
Shenzhen, China (Keynote Speech at The 2014 International Conference on Computer Engineering) |
898 |
Turtle Shell Based Information Hiding Mechanism |
2014.11.12 |
Anhui University |
899 |
Visual Cryptography |
2014.11.14 |
Jiangsu University |
900 |
Using Genetic Algorithm to Embed Important Information in an Image Compression File |
2014.11.17 |
Hangzhou Duanzi University |
901 |
The Design of Computer Password |
2014.11.17 |
Zhejiang Gongshang University |
902 |
Information Steganography Using Magic Matrix |
2014.12.03 |
Department of Management Information Systems, National Pingtung University of Science and Technology |
903 |
The Design of Computer Password |
2014.12.05 |
Huizhou University |
904 |
Turtle Shell Based Information Hiding Mechanism |
2014.12.09 |
Shenzhen Graduate School, Harbin Institute of Technology |
905 |
Research Methodology for Science and Technology |
2014.12.13 |
2014 International Computer Symposium |
906 |
Turtle Shell Based Information Hiding Mechanism |
2015.03.04 |
Department of Computer Science and Information Engineering, National Taipei University |
907 |
Using Genetic Algorithm to Embed Important Information in an Image Compression File |
2015.03.13 |
Hong Kong, China (Keynote Speech at The 2015 2nd International Conference on Electrical Engineering and Information Technology) |
908 |
Rambling on about Research Methods |
2015.03.16 |
Peking University |
909 |
Information Steganography Using Magic Matrix |
2015.03.17 |
Shenzhen Graduate School, Harbin Institute of Technology |
910 |
Appilcations of CRT in Information Science |
2015.04.08 |
School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology |
911 |
Appilcations of CRT in Information Science |
2015.04.09 |
School of Telecommunication and Information Engineering, Shanghai University |
912 |
An Information Hiding Scheme Using SUDOKU |
2015.04.10 |
School of Electrical Information and Engineering, Shanghai Jiao Tong University |
913 |
An Information Hiding Scheme Using SUDOKU |
2015.04.13 |
School of Electrical and Information Engineering, Shanghai Tongji University |
914 |
An Information Hiding Scheme Using SUDOKU |
2015.04.16 |
School of Information, Zhejiang University of Finance & Economics |
915 |
Rambling on about Research Methods |
2015.04.22 |
Oriental Institute of Technology |
916 |
Information Steganography Using Magic Matrix |
2015.05.05 |
College of Computer and Information Engineering, Xiamen University of Technology |
917 |
Information Steganography Using Magic Matrix |
2015.06.04 |
Department of Management Information Systems, National Chung Hsing University |
918 |
Information Steganography Using Magic Matrix |
2015.07.07 |
Fujian University of Technology |
919 |
Rambling on about Research Methods |
2015.07.13 |
Guilin University of Electronic Technology |
920 |
Information Steganography Using Magic Matrix |
2015.07.16 |
Shenzhen Institutes of Advanced Technology, Chineses Academy of Sciences |
921 |
How to Publish IEEE Papers |
2015.09.23 |
Feng Chia University Library |
922 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2015.10.02 |
Providence University Department of Information Management |
923 |
The Road to Success |
2015.10.15 |
School of Management, University of Science and GTM |
924 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2015.10.20 |
China Hangzhou The 16th IEEE International Conference on Communication Technology (ICCT2015) special lecture |
925 |
How to Publish IEEE Papers |
2015.10.20 |
Hangzhou University of Electronic Science and Technology China |
926 |
How to Publish IEEE Papers |
2015.10.22 |
Southwest Jiaotong University in Chengdu, China |
927 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2015.10.23 |
Department of Electronic Engineering, University of Electronic Science and Technology, China |
928 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2015.10.26 |
Information Engineering, Chang'an University, China |
929 |
How to Publish IEEE Papers |
2015.10.26 |
Information Engineering, Chang'an University, China |
930 |
An Information Hiding Scheme Using Sudoku |
2015.10.27 |
School of Electronic and Information Engineering, Xi'an Jiaotong University, China |
931 |
How to Publish IEEE Papers |
2015.10.27 |
Software Northwestern Polytechnical University, China |
932 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2015.10.28 |
School of Computer Science, Northwestern Polytechnical University, China |
933 |
Authenticatable Visual Secret Sharing |
2015.10.31 |
Hangzhou, China (Keynote Speech at The 9th International Conference on Management of e-Commerce and e-Government (ICMeCG2015) |
934 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2015.11.13 |
Information Department of Medicine, Chung Shan Medical University |
935 |
The experience sharing of paper writting and proposal editing |
2015.11.24 |
Mingdao University |
936 |
A Steganographic Algorithm Based on ( 7,4) Hamming Code |
2016.02.25 |
Taichung, Feng Chia University (Keynote Speech at The First Workshop on Cryptography and Steganography) |
937 |
Turtle Shell Based Information Hiding Mechanism |
2016.03.10 |
Department of Information Science, National Chengchi University |
938 |
How to Create High Quality Research Papers |
2016.04.15 |
Optical-Electrical and Computer Engineering, Shanghai Polytechnic University |
939 |
Exentials of Scientific Paper |
2016.04.15 |
Optical-Electrical and Computer Engineering, Shanghai Polytechnic University |
940 |
Using Coding Techniques to Hide Secret Information |
2016.04.20 |
Electronic Engineering, Tsinghua University, Beijing |
941 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2016.04.22 |
Information Engineering, National Sun Yat-sen University |
942 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2016.04.29 |
National Dong Hwa University Information Engineering |
943 |
How to Create High Quality Research Papers |
2016.05.06 |
Chaoyang University of Technology Department of Information Management |
944 |
Exentials of Scientific Paper |
2016.05.06 |
Chaoyang University of Technology Department of Information Management |
945 |
Information Hiding Technology and Optimal Problem |
2016.05.16 |
Communication and Information Engineering, Xi'an University of Posts and Telecommunications, China |
946 |
Rambling on about Research Methods |
2016.05.18 |
Computer Science, Northwestern Polytechnical Universit, China |
947 |
Applying De-Clustering Concept to Information Hiding |
2016.05.18 |
Computer Science, Northwestern Polytechnical University, China |
948 |
Authenticatable Visual Secret Sharing |
2016.05.18 |
Computer Science, Northwestern Polytechnical University, China |
949 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2016.05.21 |
Chengdu, China, The 8th International Conference on Digital Image Processing (ICDIP 2016), Keynote speaker |
950 |
Information Hiding Technology and Optimal Problem |
2016.05.23 |
Chengdu University School of Computer Science and Information Engineering, China |
951 |
Applying De-Clustering Concept to Information Hiding |
2016.05.23 |
Chengdu Electronic Engineering, University of Electronic Science and Technology, China |
952 |
Exentials of Scientific Paper |
2016.05.23 |
Chengdu Electronic Engineering, University of Electronic Science and Technology, China |
953 |
Using Coding Techniques to Hide Secret Information |
2016.05.24 |
College of Information Science and Technology, Chengdu Southwest Jiaotong University, China |
954 |
Information Steganography Using Magic Matrix |
2016.05.30 |
Computer Science and Technology, Wuhan University of Technology, China |
955 |
How to Create High Quality Research Papers |
2016.05.30 |
School of Information Management, Huazhong Normal University, China |
956 |
Exentials of Scientific Paper |
2016.05.30 |
School of Information Management, Huazhong Normal University, China |
957 |
How to Create High Quality Research Papers |
2016.05.31 |
College of Computer Science, Jingzhou Yangtze University, China |
958 |
Exentials of Scientific Paper |
2016.05.31 |
College of Computer Science, Jingzhou Yangtze University, China |
959 |
Turtle Shell Based Information Hiding Mechanism |
2016.06.01 |
College of Computer Science, Jingzhou Yangtze University, China |
960 |
Information Steganography Using Magic Matrix |
2016.06.02 |
Computer and Information Science, Yichang Three Gorges University, China |
961 |
Information Steganography Using Magic Matrix |
2016.06.03 |
Long in the pulpit, Hubei University of Arts and Science, China |
962 |
Rambling on about Research Methods |
2016.06.06 |
Computer and Information Science, Chongqing Southwest University, China |
963 |
How to Be a Successful Graduate Student |
2016.07.06 |
School of Computer Science, Hangzhou Dianzi University, China |
964 |
A Novel Data Hiding Method to Conceal Secret Data |
2016.07.06 |
Hangzhou International Forum of Big Data and E-commerce Keynote Speaker, China |
965 |
Information Steganography Using Magic Matrix |
2016.07.07 |
College of Information Engineering, Zhejiang Agriculture and Forestry University, China |
966 |
Using Coding Techniques to Hide Secret Information |
2016.07.28 |
Department of Computer Science and Information Technology, Beijing Jiaotong University |
967 |
Turtle Shell Based Information Hiding Mechanism |
2016.07.29 |
Beijing, China, The 10th Cross Strait Conference on Information Science and Technology(CSCIST 2016), Keynote speaker |
968 |
De-clustering and Its Application to Steganography |
2016.08.12 |
Taiyuan University of Science and Technology |
969 |
Information Hiding Techniques Using Magic Matrix |
2016.08.14 |
Beijing, China, The 2016 IEEE International Conference on Signal and Image Processing (ICSIP 2016), Keynote speaker |
970 |
Embedding Secret Messages in Digital Images |
2016.09.04 |
New Taipei City, Taiwan, The 2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2016), Keynote speaker |
971 |
The Application of Chinese Remainder Theorem in Information Science |
2016.09.19 |
Beijing Information Science & Technology University |
972 |
The Application of Chinese Remainder Theorem in Information Science |
2016.09.23 |
Chung Shan Medical University |
973 |
The Application of Chinese Remainder Theorem in Information Science |
2016.11.14 |
Fujian University of Technology |
974 |
Applying De-clustering Concept to Information Hiding |
2016.11.15 |
Fujian Normal University |
975 |
Steganographic Technique Based on Magic Matrix |
2016.11.15 |
Fuzhou University |
976 |
Applying De-clustering Concept to Information Hiding |
2016.11.16 |
Fujian University of Technology |
977 |
Some Steganographic Methods for Delivering Secret Messages Using Cover Media |
2016.11.21 |
Kaohsiung, Taiwan, The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2016), Keynote speaker |
978 |
How to Write a Plan of Ministry of Science and Technology |
2016.11.25 |
Central Taiwan University of Science and Technology |
979 |
How to Publish IEEE Journal Papers |
2016.11.29 |
Chaoyang University of Technology |
980 |
Some Steganographic Methods for Delivering Secret Messages Using Cover Media |
2016.12.09 |
National Taichung University of Science and Technology |
981 |
Turtle Shell Based Information Hiding Mechanism |
2016.12.16 |
Chiayi, Taiwan, International Computer Symposium (ICS 2016), Keynote speaker |
982 |
Guide for Writing a Project Proposal and Key to Success in Academic Research |
2016.12.28 |
Tunku Abdul Rahman University, Malaysia |
983 |
Information Hiding Technology Current Research and Future Trend |
2016.12.28 |
Tunku Abdul Rahman University, Malaysia |
984 |
My Research Projects |
2016.12.28 |
Tunku Abdul Rahman University, Malaysia |
985 |
Turtle Shell Based Information Hiding Mechanism |
2016.12.29 |
The 4th International Conference on Information and Network Security Keynote Speaker |
986 |
A Novel Data Hiding Method to Conceal Secret Data |
2017.01.15 |
International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2017) Keynote Speaker |
987 |
Information Steganography Using Magic Matrix |
2017.01.16 |
China University of Geosciences |
988 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2017.03.03 |
Department of Medical Informatics, Tzu Chi University |
989 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2017.03.03 |
Department of Information Engineering, National Dong Hwa University |
990 |
Turtle Shell Based Information Hiding Mechanism |
2017.03.07 |
Department of Information Management, Chaoyang University of Technology |
991 |
Turtle Shell Based Information Hiding Mechanism |
2017.03.09 |
College of Computing and Informatics, Providence University |
992 |
Turtle Shell Based Information Hiding Mechanism |
2017.03.17 |
College of Computing and Informatics, Hubei University of Technology |
993 |
Information Hiding Mechanisms Based on Magic Matrices |
2017.03.18 |
Keynote Speaker at the International Conference on Multimedia and Image Processing (ICMIP 2017) |
994 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2017.03.20 |
University of Electronic Science and Technology |
995 |
Turtle Shell Based Information Hiding Mechanism |
2017.03.21 |
College of Computer Science, Sichuan University |
996 |
News of International Tourism |
2017.03.23 |
Department of Information Management, National Taichung University of Science and Technology |
997 |
Turtle Shell Based Information Hiding Mechanism |
2017.03.30 |
Department of Computer Science and Information Engineering, Tamkang University |
998 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2017.04.17 |
College of Computer Science and Technology, Huaqiao University |
999 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2017.04.19 |
Beijing Tsinghua University |
1000 |
Turtle Shell Based Information Hiding Mechanism |
2017.04.20 |
Beijing University of Technology |
1001 |
How to Be a Successful Graduate Student |
2017.04.24 |
Department of Computer Science and Information Engineering, National Chung Cheng University |
1002 |
Using Genetic Algorithm to Embed Important Information in an Image Compression File |
2017.05.19 |
Keynote Speech at the 34th Workshop on Combinatorial Mathematics and Computation Theory, Department of Information Engineering and Computer Science, Feng Chia University |
1003 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2017.05.19- 2017.05.22 |
Keynote Speech at the International Conference on Digital Image Processing (ICDIP 2017), Hong Kong |
1004 |
Applying De-Clustering Concept to Information Hiding |
2017.05.25 |
Keynote Speech at Cryptology and Information Security Conference 2017 (CISC 2017), I-Shou University |
1005 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2017.06.01 |
School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China |
1006 |
Embedding Important Information in Digital Images Using Magic Turtle Shells |
2017.06.02- 2017.06.04 |
Keynote Speech at the International Conference on Image, Vision and Computing (ICIVC 2017), Chengdu, China |
1007 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2017.06.03 |
School of Mathematical Sciences, Sichuan Normal University |
1008 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2017.06.04 |
School of Computer and Software Engineering, Chengdu, China |
1009 |
Turtle Shell Based Information Hiding Mechanism |
2017.08.11 |
Keynote Speech at the 10th International Conference on Advanced Computer Theory and Engineering (ICACTE 2017), Jeju Island, South Korea |
1010 |
Using Meaningful Digital Shadow Images to Recover a Secret Message |
2017.08.14 |
Keynote Speech at the 2nd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2017), Taichung |
1011 |
News of International Tourism |
2017.09.22 |
Department of Civil Engineering and Engineering Management, National Quemoy University |
1012 |
Visual Cryptography & Digital Signature Technology |
2017.10.13 |
Forensic industry information application theme salon, Ningpo, China |
1013 |
Information Hiding Technology : Current Research and Future Trend |
2017.10.14 |
School of Information & Electronic Engineering, Zhejiang Gongshang University |
1014 |
Turtle Shell Based Information Hiding Mechanism |
2017.10.14 |
Hangzhou Dianzi University, China |
1015 |
Authenticatable Visual Secret Sharing |
2017.10.15 |
School of Computer Science, Hangzhou Dianzi University, China |
1016 |
Authenticatable Visual Secret Sharing |
2017.10.17 |
School of Information, Zhejiang University of Finance & Economics |
1017 |
Authenticatable Visual Secret Sharing |
2017.10.18 |
Fujian University of Technology |
1018 |
Turtle Shell Based Information Hiding Mechanism |
2017.10.20 |
College of Computer and Information Sciences, Fujian Agriculture and Forestry University |
1019 |
Rambling on about Research Methods |
2017.10.20 |
College of Mathematics and Informatics, Fujian Normal University |
1020 |
Turtle Shell Based Information Hiding Mechanism |
2017.10.23 |
Huaqiao University |
1021 |
Rambling on about Research Methods |
2017.10.24 |
College of Computer Science and Technology, Huaqiao University |
1022 |
Information Security Professional Outlet |
2017.10.24 |
Undergraduate professional of Information Security, Huaqiao University |
1023 |
Rambling on about Research Methods |
2017.10.24 |
Computer Engineering College, Jimei University |
1024 |
Rambling on about Research Methods |
2017.10.31 |
Department of Information Management, Chaoyang University of Technology |
1025 |
Information Hiding Technology : Current Research and Future Trend |
2017.11.07- 2017.11.09 |
Keynote Speech at the 2nd International Conference on Communication and Information Systems (ICCIS 2017), Wuhan, China |
1026 |
Turtle Shell Based Information Hiding Mechanism |
2017.11.08 |
"Master party" salon, College Of Computer Science, South-Central University for Nationalities |
1027 |
Embedding Secrets Using Magic Matrices |
2017.11.22 |
Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology |
1028 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2017.12.08- 2017.12.10 |
Keynote Speech at the 6st International Conference on Network, Communication and Computing (ICNCC 2017), Kunming, China |
1029 |
Turtle Shell Based Information Hiding Mechanism |
2017.12.18 |
Keynote Speech at the 12th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2017), Providence University |
1030 |
The Way to Success |
2017.12.26 |
China Medical University |
1031 |
A Data Hiding Scheme Based on a Reference Matrix and a Location Table |
2017.12.28 |
Keynote Speech at the 2017 International Conference on Video and Image Processing (ICVIP 2017), Singapore |
1032 |
Extended Exploiting-Modification-Direction Data Hiding with High Embedding Capacity |
2018.01.13- 2018.01.15 |
Keynote Speech at the International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2018), Wuhan, China |
1033 |
Turtle Shell Based Information Hiding Mechanism |
2018.02.08 |
Feng Chia University, Department of Information Engineering and Computer Science |
1034 |
Current Research on Information Hiding |
2018.03.17 |
Keynote Speech at the 3rd International Conference on Multimedia and Image Processing (ICMIP 2018), Guiyang, China |
1035 |
Steganography Based on Turtle Shell |
2018.03.28 |
Jimei University |
1036 |
Information Hiding Technology Based on De-clustering Strategy |
2018.03.29 |
Huaqiao University |
1037 |
Using Meaningful Digital Shadow Images to Recover a Secret Message |
2018.03.29 |
Xiamen University of Technology, School of computer and Information Engineering |
1038 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2018.04.17 |
Hangzhou Dianzi University, Institute of image technology |
1039 |
An Information Hiding Scheme Using Turtle Shells |
2018.04.17 |
Hangzhou Dianzi University, School of Computer Science and Technology |
1040 |
News of International Tourism |
2018.04.17 |
Hangzhou Dianzi University, School of Computer Science and Technology |
1041 |
Steganography Based on Magic Matrix |
2018.04.18 |
Hangzhou Dianzi University, School of Computer Science and Technology |
1042 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2018.04.18 |
Zhejiang University of Finance & Economics, School of information management and Engineering |
1043 |
Steganography Based on Magic Matrix |
2018.04.22 |
Guangdong University of Technology |
1044 |
Applying De-clustering Concept to Information Hiding |
2018.04.28- 2018.04.30 |
Keynote Speech at the 3rd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2018), Shenzhen, China |
1045 |
Steganography Based on Turtle Shell |
2018.05.07 |
National QUEMOY University, Department of Information Engineering |
1046 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2018.05.12 |
Keynote Speech at the 10th International Conference on Digital Image Processing (ICDIP 2018), Shanghai, China |
1047 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2018.05.14 |
University of Shanghai for Science and Technology |
1048 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2018.05.15 |
Taiyuan University of Science and Technology, School of Electronic Information Engineering |
1049 |
A Digital Watermarking Scheme Based on VQ |
2018.05.15 |
Taiyuan University of Science and Technology, School of Electronic Information Engineering |
1050 |
Using Meaningful Digital Shadow Images to Recover a Secret Message |
2018.05.16 |
Taiyuan University of Science and Technology |
1051 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2018.05.23 |
FuJian University of Technology |
1052 |
Steganography Based on Magic Matrix |
2018.05.23 |
Fuqing branch of fujian normal university |
1053 |
Using Meaningful Digital Shadow Images to Recover a Secret Message |
2018.05.24 |
Fujian Normal University |
1054 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2018.05.24 |
Fujian Agriculture and Forestry University |
1055 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2018.06.25 |
Sichuan Normal University |
1056 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2018.06.26 |
Xihua University |
1057 |
Using Meaningful Digital Shadow Images to Recover a Secret Message |
2018.06.26 |
University of Electronic Science and Technology of China |
1058 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2018.06.28 |
Keynote Speech at the 3rd IEEE International Conference on Image, Vision and Computing (ICIVC 2018),Chongqing, China |
1059 |
Steganography Based on Turtle Shell |
2018.06.28 |
Chongqing University of Posts and Telecommunications, School of Cyberspace Security and Information Law |
1060 |
Applying De-clustering Concept to Information Hiding |
2018.07.27- 2018.07.29 |
Keynote Speech at the 2nd International Conference on Algorithms, Computing and Systems (ICACS 2018), Beijing, China |
1061 |
Turtle Shell Based Information Hiding Mechanism |
2018.07.30 |
University of Science & Technology Beijing |
1062 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2018.09.22 |
Keynote Speech at the International Symposium on Image Processing (ISIP 2018),Shanghai |
1063 |
Current Research on Information Hiding |
2018.09.29 |
Keynote Speech at the 2018 IEEE Conference on Information¡ACommunication and Engineering (ICICE 2018), Xiamen, China |
1064 |
Current Research on Information Hiding |
2018.10.04 |
Department of Information Engineering and Computer Science, Feng Chia University |
1065 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2018.10.09 |
Department of Information Management, Chaoyang University of Technology |
1066 |
How to Do Scientific Research and Write a High-quality Paper |
2018.10.10 |
Xiamen University of Technology |
1067 |
Current Research on Information Hiding |
2018.10.11 |
Software School of Xiamen University |
1068 |
Authenticatable Visual Secret Sharing |
2018.10.12 |
Computer Engineering College, Jimei University |
1069 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2018.10.17 |
Providence University, Department of Computer Science and Information Management |
1070 |
Current Research on Information Hiding |
2018.10.19 |
National Taitung University, Department of Information Engineering and Computer Science |
1071 |
Steganography based on magic matrix |
2018.10.24 |
Neusoft Institute Guangdong |
1072 |
Turtle Shell Based Information Hiding Mechanism |
2018.10.25 |
Shenzhen University, School of Information Engineering |
1073 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2018.10.25 |
Harbin Institute of Technology, Shenzhen |
1074 |
How to Conduct Scientific Research |
2018.10.26 |
Guangdong University of Technology |
1075 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2018.11.19 |
National QueMoy University |
1076 |
How to Conduct Scientific Research and Write a High-quality Paper |
2018.11.26 |
Minzu University of China |
1077 |
Steganography based on magic matrix |
2018.11.26 |
Minzu University of China |
1078 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2018.11.27 |
Beijing University of Technology |
1079 |
Information Hiding Technology£º Current Research and Future Trend |
2018.11.28-
2018.11.30 |
Keynote Speech at the International Conference on Signal Processing and Machine Learning, Shanghai, China |
1080 |
Turtle Shell Based Information Hiding Mechanism |
2018.11.30 |
East China Normal University |
1081 |
How to Conduct Scientific Research and Write a High-quality Paper |
2018.11.30 |
University of Shanghai for Science and Technology |
1082 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2018.12.17 |
Fujian Normal University |
1083 |
How to Conduct Scientific Research and Write a High-quality Paper |
2018.12.18 |
Fuqing branch of fujian normal university |
1084 |
How to stand out: sharing successful experiences for a young scholar |
2018.12.18 |
Fuqing branch of fujian normal university |
1085 |
How to Conduct Scientific Research and Write a High-quality Paper |
2018.12.19 |
Fujian University of Technology |
1086 |
How to Conduct Scientific Research and Write a High-quality Paper |
2018.12.20 |
Fujian Agriculture and Forestry University |
1087 |
Turtle Shell Based Information Hiding Mechanism |
2018.12.21 |
Putian University |
1088 |
Sharing Secrets Using Authenticatable Digital Images |
2018.12.29- 2018.12.31 |
Keynote Speech at the 2nd International Conference on Video and Image Processing(ICVIP 2018), Hongkong, China |
1089 |
How to be an Outstanding Young Scholar |
2019.01.08 |
College of Information and Electrical Engineering, Feng Chia University |
1090 |
How to be an Outstanding Young Scholar |
2019.01.10 |
School of Information Management, Central China Normal University |
1091 |
How to Conduct Scientific Research and Write a High-quality Paper |
2019.01.10 |
Wuhan University of Technology |
1092 |
Turtle Shell Based Information Hiding Mechanism |
2019.01.11 |
National Engineering Research Center for E-Learnning, Central China Normal University |
1093 |
Essentials of Research, Contribution and Publication for Papers |
2019.01.11 |
National Engineering Research Center for E-Learnning, Central China Normal University |
1094 |
How to Conduct Scientific Research and Write a High-quality Paper |
2019.01.11 |
College of Science, Hubei University of Technology |
1095 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.01.12 |
School of Computer Science, Hubei University of Technology |
1096 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2019.01.13 |
Keynote Speech at 2019 the 3rd International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2019) |
1097 |
How to Conduct Scientific Research and Write a High-quality Paper |
2019.01.14 |
School of Computer Science and Engineering, Wuhan University of Engineering |
1098 |
Sharing Secrets Using Authenticatable Digital Images |
2019.01.20 |
Keynote Speech at 2019 the 4th International Conference on Multimedia and Image Processing (ICMIP 2019), Kuala Lumpur, Malaysia |
1099 |
A Steganographic Algorithm Based on ( 7,4) Hamming Code |
2019.01.25-
2019.01.27 |
Keynote Speech at 2019 Asia Pacific Information Technology Conference (APIT 2019) Jeju Island, Korea |
1100 |
Turtle Shell Based Information Hiding Mechanism |
2019.03.14 |
Macau University of Science and Technology |
1101 |
How to Conduct Scientific Research and Write a High-quality Paper |
2019.03.18 |
Fujian Police College |
1102 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2019.03.19 |
Fuzhou University |
1103 |
Authenticatable Visual Secret Sharing |
2019.03.19 |
Fujian normal university |
1104 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.03.20 |
Fujian University of Technology |
1105 |
Steganography based on magic matrix |
2019.03.20 |
Minjiang University |
1106 |
Information Hiding Technology Based on Declustering Strategy |
2019.03.21 |
Fuqing branch of fujian normal university |
1107 |
The Application of Chinese Remainder Theorem in Information Science |
2019.03.22 |
Putian University |
1108 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2019.03.27 |
Department of computer science, Tunghai university |
1109 |
How to transmit information safely and effectively |
2019.04.12 |
Department of Computer Science & Communication Engineering, Providence university |
1110 |
The Application of Chinese Remainder Theorem in Information Science |
2019.04.22 |
National Quemoy university |
1111 |
The Application of Chinese Remainder Theorem in Information Science |
2019.04.24 |
Jimei university |
1112 |
A Self-Reference Watermarking Scheme based on Wet Paper Coding |
2019.04.24 |
Department of Computer Science, Huaqiao University |
1113 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2019.05.11 |
Guangdong University of Technology |
1114 |
Authenticatable Visual Secret Sharing |
2019.05.13 |
Taiyuan University of Science and Technology |
1115 |
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator |
2019.05.13 |
Taiyuan University of Science and Technology |
1116 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2019.05.15 |
Beijing University of Technology |
1117 |
Digital Image Recognition Technology |
2019.05.21 |
Central Police University |
1118 |
A steganographic method for hiding secret data using side match vector quantization |
2019.06.11 |
College of Information and Communication Engineering, University of Electronic Science and Technology |
1119 |
Information Hiding Technology Based on Declustering Strategy |
2019.06.11 |
Xihua University |
1120 |
Information Hiding Technology Based on Declustering Strategy |
2019.06.12 |
Sichuan Normal University |
1121 |
Experiences in Application for a Project and Writing a Paper |
2019.07.04 |
Jimei University |
1122 |
How to Do Scientific Research and Write a High-quality Paper |
2019.07.05 |
Xiamen University |
1123 |
Embedding Secret Information in Digital Images Using Magic Turtle Shells |
2019.07.06 |
Keynote Speech at 2019 4th International Conference on Image, Vision and Computing, Xiamen, China |
1124 |
Current Research on Information Hiding |
2019.07.08 |
Keynote Speech at International Electronics Communication Conference, Okinawa, Japan |
1125 |
How to Do Scientific Research and Write a High-quality Paper |
2019.08.15 |
Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology |
1126 |
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator |
2019.08.19 |
Shangyu Research Institute, Hangzhou University of Electronic Science and Technology |
1127 |
Cryptography and Its Application |
2019.08.20 |
Putian College |
1128 |
Appilcations of Chinese Remainder Theorem |
2019.08.21 |
Putian College |
1129 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.09.18 |
Department of Computer Science Information Engineering, National Yunlin University of Science and Technology |
1130 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.09.24 |
Fuzhou University |
1131 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2019.09.25 |
Fujian University of Technology |
1132 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.09.26 |
College of Computer and Information Sciences, Fujian Agriculture and Forestry University |
1133 |
The Recent Development of Information Security |
2019.09.26 |
Fujian Police College |
1134 |
The Recent Development of Information Security |
2019.09.27 |
Fuqing branch of fujian normal university |
1135 |
How to Be an Outstanding Young Scholar |
2019.09.28 |
Putian College |
1136 |
Cryptography and Its Applications |
2019.10.04 |
National QueMoy University |
1137 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.10.08 |
Department of Information Management, Chaoyang University of Technology |
1138 |
Information Hiding Techniques Using Magic Matrix |
2019.10.18 |
Wuhan Institute Of Technology |
1139 |
Information Hiding Techniques Using Magic Matrix |
2019.10.18 |
Huazhong University Of Science And Technology |
1140 |
A Steganographic Algorithm Based on (7, 4) Hamming Code |
2019.10.18- 2019.10.20 |
Keynote Speech at 2019 International Conference on Big-data Service and Intelligent Computation (BDSIC 2019), Wuhan, China |
1141 |
Information Hiding Techniques Using Magic Matrix |
2019.10.26- 2019.10.27 |
Keynote Speech at 2019 Twelfth International Symposium on Information Processing (ISIP 2019), Shanghai, China |
1142 |
The Development and Application of Information Security Technique |
2019.10.28 |
School of science and technology, Ningbo University |
1143 |
Information Hiding Techniques Using Magic Matrix |
2019.10.29 |
School of information engineering, Ningbo University |
1144 |
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
2019.10.29- 2019.10.31 |
Keynote Speech at 2019 International Conference on Video, Signal and Image Processing (VSIP 2019),Wuhan, China |
1145 |
Sharing Experience in Writing and Publishing a Research Paper |
2019.10.30 |
School of information management, Central China Normal University |
1146 |
Information Hiding Techniques Based on ( 7,4) Hamming Code |
2019.11.01 |
Zhejiang University of Finance and Economics |
1147 |
Applying De-clustering Concept to Information Hiding |
2019.11.04 |
Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology |
1148 |
Applying De-Clustering Concept to Information Hiding |
2019.11.04 |
Image Research Institute, Hangzhou University of Electronic Science and technology |
1149 |
Borrowing from Nature to Conceal Information |
2019.11.14 |
National QueMoy University |
1150 |
Borrowing from Nature to Conceal Information |
2019.11.14 |
School of computer science, Huaqiao University |
1151 |
Sharing Experience in Paper Writing and Paper Submission |
2019.11.15 |
School of computer science, Jimei University |
1152 |
Embedding Secret Information in Digital Images |
2019.11.15- 2019.11.17 |
Keynote Speech at 2019 the 9th International Conference on Communication and Network Security (ICCNS 2019),Chongqing, China |
1153 |
Borrowing from Nature to Conceal Information |
2019.11.27- 2019.11.29 |
Keynote Speech at 2019 2nd International Conference on Signal Processing and Machine Learning (SPML 2019), Hangzhou, China |
1154 |
Borrowing from Nature to Conceal Information |
2019.12.18 |
Jinan University |
1155 |
Borrowing from Nature to Conceal Information |
2019.12.20 |
Wenzhou University |
1156 |
How to Do Scientific Research |
2019.12.20 |
Wenzhou University |
1157 |
Borrowing from Nature to Conceal Information |
2019.12.21- 2019.12.23 |
Keynote Speech at 2019 IEEE 4th International Conference on Communication and Information Systems (ICCIS 2019&ICSCC), Wuhan, China |
1158 |
Borrowing from Nature to Conceal Information |
2019.12.24 |
Wuhan University |
1159 |
How to Do Scientific Research |
2019.12.24 |
Wuhan University |
1160 |
Borrowing from Nature to Conceal Information |
2019.12.26 |
Jiangsu University |
1161 |
Information Hiding Techniques Inspired by Nature |
2020.01.17- 2020.01.19 |
Keynote Speech at 2020 The 2nd Asia Pacific Information Technology Conference (APIT 2020), Bali, Indonesia |
1162 |
Nature-Inspired Information Hiding Techniques |
2020.05.13- 2020.05.15 |
Keynote Speech at 2020 Asia Service Sciences and Software Engineering Conference (ASSE 2020), Nagoya, Japan |
1163 |
Applying De-clustering Concept to Information Hiding |
2020.07.09 |
Keynote Speech atInternational Electronics Communication Conference (IECC), Singapore |
1164 |
Witness the academic development of Taiwan |
2020.08.28 |
CSROC |
1165 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2020.09.21 |
National QueMoy University |
1166 |
The Road to Success |
2020.09.22 |
National QueMoy University |
1167 |
Borrowing from Nature to Conceal Informatio |
2020.09.23 |
National Central University |
1168 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2020.09.30 |
Asia University |
1169 |
Embedding Secrets Using Magic Matrices |
2020.10.12 |
Tunghai University |
1170 |
Embedding Secrets Using Magic Matrices |
2020.10.12 |
National Taichung University of Education |
1171 |
Knowledge of International Tourism |
2020.10.15 |
National Chung Hsing University |
1172 |
The Way to Success |
2020.11.03 |
Feng Chia University |
1173 |
How to Do Scientific Research |
2020.12.02 |
Fuzhou University |
1174 |
Applying De-Clustering Concept to Information Hiding |
2020.12.03- 2020.12.05 |
Keynote Speech at 2020 2nd International Conference on Big-data Service and Intelligent Computation (BDSIC 2020), Xiamen, China |
1175 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2020.12.20 |
Harbin Institute of Technology |
1176 |
Information Hiding Schemes Based on Magic Matrices |
2020.02.02 |
Keynote Speech at 2021 2nd International Symposium on Future Information and Communication Technology (Future ICT 2021), Taichung, Taiwan |
1177 |
De-clustering concept to information hiding |
2021.02.25 |
Keynote Speech at the 2021 2nd Asia Service Sciences and Software Engineering Conference (ASSE 2021), Macau, China |
1178 |
International travel and my experience |
2021.03.09 |
Chaoyang University of Technology |
1179 |
Applying De-Clustering Concept to Information Hiding |
2021.03.15 |
National QueMoy University |
1180 |
Steganography of Image Compression Code |
2021.04.07 |
Putian University |
1181 |
Information Steganography Using Magic Matrix |
2021.04.27 |
National Pingtung University |
1182 |
Steganography of Image Compression Code |
2021.04.28 |
National Pingtung University |
1183 |
Borrowing from Nature to Conceal Information |
2021.05.04 |
National Taipei University of Education |
1184 |
Nature-Inspired Information Hiding Techniques |
2021.05.11 |
National Chin-Yi University of Technology |
1185 |
Steganography of Image Compression Code |
2021.05.28 |
Keynote Speech at the 2021 itaoi, QueMoy, Taiwan |
1186 |
Information Steganography Using Magic Matrix |
2021.06.11 |
Yuan Ze University |
1187 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2021.08.18-2021.08.20 |
Keynote Speech at the 2021 4th International Conference on Signal Processing and Machine Learning (SPML 2021), Beijing, China |
1188 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2021.09.23 |
National Chung Hsing University |
1189 |
Applying De-Clustering Concept to Information Hiding |
2021.10.29 |
Keynote Speech at 2021 The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2021), Kaohsiung, Taiwan |
1190 |
Visual Cryptography |
2021.11.01 |
National Quemoy University |
1191 |
Sharing Secret Message Using Meaningful Digital Images with Cheating Detection |
2021.11.10 |
Shanghai Maritime University |
1192 |
How to Do Scientific Research |
2021.11.10 |
Shanghai Maritime University |
1193 |
Borrowing from Nature to Conceal Information |
2021.11.19-2021.11.21 |
Keynote Speech at 2021 3rd International Conference
Big-data Service and Intelligent Computation£¨BDSIC 2021£©, Xiamen, China |
1194 |
The Way to Success |
2021.12.07 |
Chaoyang University of Technology |
1195 |
The Way to Success |
2021.12.08 |
Fu Jen Catholic University |
1196 |
Applying De-Clustering Concept to Information Hiding |
2022.01.17 |
Keynote Speech at 2022 The Third International Symposium on Future ICT (Future ICT 2022), Taichung, Taiwan |
1197 |
Authenticatable Visual Secret Sharing |
2022.02.25 |
Keynote Speech at 3rd Asia Service Sciences and Software Engineering Conference (ASSE 2022), Macau, China |
1198 |
Travel in Mainland China to Witness the Academic Development |
2022.03.01 |
Chaoyang University of Technology |
1199 |
Information Steganography Using Magic Matrix |
2022.03.07 |
Department of Computer Science and Information Engineering, National Chung Cheng University |
1200 |
Embedding Secrets Using Magic Matrices |
2022.03.18 |
Chung Shan Medical University |
1201 |
Borrowing from Nature to Conceal Information |
2022.03.25-2022.03.27 |
Keynote Speech at 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML 2022), Hangzhou, China |
1202 |
Travel in mainland China to witness the academic development |
2022.05.02 |
National QueMoy University |
1203 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2022.07.08-2022.07.10 |
Keynote Speech at 2022 4th International Electronics Communication Conference (IECC 2022), Tokyo, Japan |
1204 |
Nature-Inspired Information Hiding Techniques |
2022.08.04-2022.08.06 |
Keynote Speech at 2022 5th International Conference on Signal Processing and Machine Learning (SPML 2022), Dalian, China |
1205 |
Information Hiding Schemes Based on
Magic Matrices |
2022.09.23-2022.09.25 |
Keynote Speech at 2022 International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2022), Xi'an, China |
1206 |
The Core Technology of Accelerating Encryption and Decryption Operation of Cryptographer |
2022.09.26 |
National Quemoy University |
1207 |
Information Hiding Schemes Based on Magic Matrices |
2022.10.19 |
China University of Mining and Technology |
1208 |
Borrowing from nature to conceal information |
2022.11.10-2022.11.13 |
Keynote Speech at 2022 5th International Conference on Digital Medicine and Image Processing (DMIP 2022), Kyoto, Japan |
1209 |
Recent Developments of Information Hiding |
2022.11.18 |
National Development Management Institute, Bangkok, Thailand |
1210 |
Applying De-clustering Concept to Information Hiding |
2022.12.01 |
Keynote Speech at 2022 International Workshop on Bigdata Intelligence and Security, Wuhan, China |
1211 |
How to Do Scientific Research |
2022.12.02 |
National Changhua University of Education |
1212 |
Sharing Secret Message Using Meaningful Digital Images with Cheater Detection |
2022.12.08 |
Wuhan University of Technology |
1213 |
Information Hiding Schemes Based on Magic Matrices |
2022.12.09 |
National Central University |
1214 |
Some Interesting Methods of Cryptography and Steganography |
2022.12.12 |
National Chung Hsing University |
1215 |
A virtual image cryptosystem based upon vector quantization |
2023.02.10 |
Keynote Speech at 2023 5th Asia Pacific Information Technology Conference (APIT 2023), Ho Chi Minh City, Vietnam |
1216 |
Appilcations of CRT in Information Science |
2023.02.21 |
College of Informatics, Chaoyang University of Technology |
1217 |
Visual Cryptography |
2023.02.23 |
Department of Management Information Systems, National Chung Hsing University |
1218 |
The Design of Computer Password |
2023.02.24 |
School of Medical Informatics, Chung Shan Medical University |
1219 |
Lossless Compression Schemes of Vector Quantization Indices Using State Codebook |
2023.03.08 |
Department of Computer Science Information Engineering, National Yunlin University of Science and Technology |
1220 |
Appilcations of CRT in Information Science/Department of Computer Science and Information Engineering |
2023.03.13 |
National Chung Cheng University |
1221 |
Positive energy creates endless possibilities |
2023.03.14 |
National Chung Cheng University Honorary Doctor of Engineering Award Ceremony
|