Subject Date Location
1 A Design of an Efficient Hashing Function 1982.01.07 Institute of Computer and Decision Sciences, National Tsing Hua University
2 Compiler Construction Techniques 1982.03.11 National Chung Hsing University, Department of Applied Math
3 Design of an Optimal Multi-key File System 1982.06.19 Institute for Information Industry
4 Data Recovery Automation 1982.12.11 National Chung Hsing University, Department of Applied Math
5 A Design of a Multi-key File System 1982.12.18 Feng Chia University, Department of Applied Math
6 Recent Developments of of Perfect Hash Functions 1983.04.29 National Taiwan University, Department of Computer Science and Information Engineering
7 Application of Database Management Systems 1983.11.26 Tax Administratration of Taichung Government
8 Recent Developments of Multi-key Hashing File Systems 1984.02.29 National Taiwan University, Department of Electrical Engineering
9 Constructing an Optimal Information Retrieval Method 1984.05.11 Feng Chia University, Department of Information Engineering
10 Experiences in Designing a Database Management System 1984.09.22 Institude for Information Industry
11 Designing a Minimal Perfect Hash Function 1984.10.08 Institute of Computer and Decision Sciences, National Tsing Hua University
12 Recent Development of Text Retrieval 1984.10.19 National Taiwan University, Department of Computer Science and Information Engineering
13 Data Structure and Information Security - from the Perspective of Sun-Tzu Theorem 1984.11.28 Department of Electrical Data Processing, National Taichung Institude of Commerce
14 Experiences in Designing an Interactive Database Management System 1984.12.21 Providence College of Arts and Sciences for Women, Department of Information Science
15 Recent Developments of Key-Lock Pair Access Control Mechanism 1985.03.15 National Taiwan University, Department of Computer Science and Information Engineering
16 Methodology of Computer Software Engineering 1985.03.27 Providence College of Arts and Sciences for Women, Department of Information Science
17 Information Management Techniques 1985.04.18 Taichung First Senior High School
18 Constructing a Symbolic Database and Information Security System 1985.04.20 National Cheng Kung University, Department of Electrical Engineering
19 On Design of a Symbolic Database - from the Perspective of Theory of Numbers 1985.05.02 National Chiao Tung University, Department of Computer Science and Information Engineering, and Department of Computer Information and Science
20 Computer Security Technology 1985.06.07 Feng Chia University, Department of Information Engineering
21 How to Design a Symbolic Database 1985.08.02 CDC Computer Company: Workshop on Maintenance and Application of the User System
22 How to Manage Enterprise Databases 1985.09.10 YMCA-IMC Workshop on Computer Research and Study
23 On Developments of Theory and Techniques 1985.10.14 Feng Chia University, Department of Civil Engineering
24 Computer and Information Management 1985.10.20/10.26 Tunghai University, International Bussiness Administration
25 Information Protection Systems 1986.01.23 Academia Sinica, Institute of Information Science
26 Information Security Systems 1986.01.24 Aeronautics Developement Center
27 Recent Developments of Data Structures and Information Security 1986.03.06 Chung-Shan Institute of Science and Technology
28 Recent Developments of Searching Techniques 1986.03.13 Providence College of Arts and Sciences for Women, Department of Information Science
29 A Chinese Form-oriented Visual Programming System 1986.03.18 National Chung Hsing University
30 Recent Developments of Data Structure Techniques 1986.03.24 National Taiwan Institute of Technology, Department of Electronic Technology
31 How to Construct a Symbolic Database 1986.03.25 Institute of Computer and Decision Sciences, National Tsing Hua University
32 An Efficient Data Searching Technique 1986.03.31 Chung Yuan Christian University, Department of Information and Computer Engineering
33 Computer Communications Security System 1986.04.17 National Chiao Tung University, Department of Computer Science and Information Engineering
34 Computers and Data Processing 1986.05.04 Tunghai University, International Bussiness Administration
35 Public-Key Cryptography 1986.06.12 Taiwan Province Government, Electrical Data Processing Center
36 Advanced GPSS/S 1986.06.16/06.17 Workshop on Software Packages and Application Systems, sponsored by Ministry of Education
37 Searching Techniques for Static Data 1986.08.20 Aeronautics Developement Center
38 Computers and Data Processing 1986.09.13 Tunghai University, International Bussiness Administration
39 Visual Programming 1986.09.20 Institude for Information Industry
40 Computers and Passwords 1986.10.05 Taiwan Provincial Taichung Libarary
41 Visual Programming 1986.10.06 National Chung Hsing University, Computer and Information Network Center
42 Office Automation 1986.10.18 Tunghai University, International Bussiness Administration
43 Visual Programming 1986.10.21 Department of Electrical Data Processing, National Taichung Institude of Technology
44 Information Security 1986.10.29 National Chung Hsing University, Computer and Information Network Center
45 Data Encryption Techniques 1986.11.14 World Technology Consultant Industry
46 Information Access Control Techniques 1986.11.14 World Technology Consultant Industry
47 Secure Secret Broadcasting 1986.11.15 World Technology Consultant Industry
48 Recent Developments of Data Structures and Searching Techniques 1986.11.19 National Central University, Department of Computer Science and Information Engineering
49 Information Access Control Techniques 1986.12.03 National Tsing Hua University, Department of Industrial Engineering
50 Computers and Communications 1986.12.12 National Taiwan Normal University, Department of Industrial Education
51 Computers and Communications 1986.12.13 Taichung County, Ching-Shui Junior High School
52 The Past, Present, and Future of Information Technology 1986.12.22 National Chin-Yi Institute of Technology
53 Making Skill of Course Question Bank for Information Course 1986.12.23 Taichung Home Economical and Commercial Senior Vocational School
54 Information Era 1987.01.15 Victory High School
55 Recent Developments of Data Structures and Searching Techniques 1987.02.24 National/ Panasonic Taiwan
56 Sun-Tzu as a Computer Scientist 1987.03.15 Taiwan Provincial Taichung Libarary
57 Advanced GPSS/S 1987.03.17/03.18 Workshop on Software Packages and Application Systems, sponsored by Ministry of Education
58 Computers and Information 1987.03.21 Chia-Yi YMCA
59 Computers and Information 1987.03.22 Tunghai University, International Bussiness Administration
60 The Developments of Information Retrieval Techniques 1987.03.24 Tatung Institute of Technology, Department of Computer Science and Engineering
61 A Design of Secure Computer Passwords 1987.03.26 National Cheng Kung University, Department of Engineering Science
62 Database Design - from the Perspective of Data Analysis 1987.04.14 Computer Society of the Republic of China
63 Data Retrieval and Information Security 1987.04.20 National Chung Hsing University, Computer and Information Network Center
64 Information Science - from the Perspective of Data Analysis 1987.04.21 National Chung Hsing University, Computer and Information Network Center
65 Information Science - from the Perspective of Data Analysis 1987.04.23 Aeronautics Developement Center
66 Information Science - from the Perspective of Dicrete Mathematics 1987.04.28 Tunghai University, Department of Computer Science Information Engineering
67 Key to the Treasury of Life 1987.05.11 Taichung Second Senior High School
68 Advanced GPSS/S 1987.05.26/05.27 Workshop on Software Packages and Application Systems, sponsored by Ministry of Education
69 Information Era 1987.06.23/07.07 Ming Dao High School
70 Visual Programming - FORMOSA 1987.07.09 World Technology Consultant Industry
71 A Database Management System - System-Bee 1987.07.10 World Technology Consultant Industry
72 Information Security 1987.07.23 Aeronautics Developement Center
73 Workshop on Data Structures and Data Analyses 1987.08.24/08.26 World Technology Consultant Industry
74 Workshop on Information Systems and Information Auditing 1987.08.27/08.28 Harvard Management Services
75 Workshop on Information Engineering Technology 1987.09.21/09.23 Chin-Peng Management Consulting Company
76 Information Access Control Techniques 1987.10.28 National Tsing Hua University, Department of Industrial Engineering 
77 Designing an Information Query System 1987.11.02 Institute of Computer and Decision Sciences, National Tsing Hua University
78 Design Principles of an Information Query System 1987.11.04 Tunghai University, Department of Computer Science Information Engineering
79 System Simulation 1987.11.10 Institute of Harbor and Marine Technology
80 Clustering Analysis and Its Applications 1987.11.26 Department of Computer Engineering, National Chiao Tung University
81 Workshop on Compilers 1987.11.30/12.02 World Technology Consultant Industry
82 Clustering Analysis and Its Applications 1987.12.08 Department of Computer Science and Information Engineering, National Cheng Kung University
83 A Step to Information Society - Using Computers 1987.12.12 Feng-Yuan Junior High School, Feng Yuan
84 A Step to Information Society - Using Computers 1987.12.15 Chang-Ann Junior High School, Chang-Hua
85 Data Compression 1987.12.16 Computer and Information Network Center, National Chung Hsing University
86 Decentraliged Database Design  1988.03.14 Department of Computer Science and Engineering, Tatung Institute of Technology
87 Visual Programming 1988.03.28 Department of Industrial Engineering and Enterprise Information, Tunghai University
88 On Developments of Theory and Techniques 1988.04.11 Tunghai University, Department of Computer Science Information Engineering
89 Visual Programming 1988.04.13 Aeronautic Development Center
90 Electronic Data Compression 1988.04.14 Department of Electrical Data Processing, National Taichung Institude of Commerce
91 Database Management Systems and Office Automation 1988.04.18 Yung-Jing Industrial Vocational Senior School
92 Database Management System and Office Automation 1988.04.20 Taichung Home Economical and Commercial Senior Vocational School
93 Information Era 1988.08.15 Taichung Home Economical and Commercial Senior Vocational School
94 Information Era 19888.08.18 Taichung Agricultural Vocational Senior High School
95 Database Management Systems 1988.10.05 Aeronautic Development Center
96 Chinese String Searching 1988.10.12 Department of Computer Science and Information Engineering/Electrical Engineering, National Central University
97 Approximate String Searching 1988.11.01 Department of Computer Science and Information Engineering, National Chiao Tung University
98 A User Identification Scheme on Computer Networks 1988.11.10 Academia Sinica
99 Workshop on Information System Technology 1988.11.24/11.26 World Technology Consultant Industry
100 Recent Developments of Information Security Technology 1988.12.01 Department of Computer Science and Information Engineering, National Chiao Tung University
101 Towards Information Society - Universal Information Education for A11 1988.12.08 Taichung First Senior High School
102 Towards Information Society - Universal Information Education for A11 1988.12.10 Taichung Girls' Senior High School
103 Introduction to Computer Passwords 1989.03.15 Department of Electrical Data Processing, National Taichung Institude of Commerce
104 Public-Key Encryption 1989.04.24 Aeronautics Developement Center
105 An Experience in Designing a Database Management System 1989.04.26 Computer Society of the Republic of China
106 Data Analysis Technology and Its Applications 1989.04.28 Department of Computer Science and Information Engineering, National Taiwan University
107 Data Analysis Technology and Its Applications 1989.05.10 Department of Industrial Education, National Taiwan Normal University
108 Information and Computers 1989.06.07 National Chung Hsing University
109 On Developments of Theory and Techniques 1989.06.09 Department of Computer Science and Information Engineering, National Chiao Tung University
110 Information Security 1989.06.14 National Chung Hsing University
111 Workshop on Data Engineering Technology 1989.08.28/08.30 Center of Public and Business Administration Education, National Chengchi University
112 Data Compression 1989.10.05 Department of Engineering Science, National Cheng Kung University
113 Computer Crime and Computer Viruses 1989.10.15 Taiwan Provincial Taichung Library
114 Computer Crime and Countermeasures 1989.11.01 Tunghai University, Department of Computer Science Information Engineering
115 Clustering Analysis and Its Applications 1989.12.08 Institute of Information Science, Academia Sinica
116 Information Security 1989.12.11 Department of Mathematics and Science Education, National Chiayi Teachers College
117 Information and Computers 1990.02.06 Taichung Agricultural Vocational Senior High School
118 Introduction to the Design of Computer Password 1990.03.01 Department of Computer Science and Information Engineering, National Chiao Tung University
119 Computer Cryptology 1990.03.02 Department of Information Engineering, Feng Chia University
120 Data Encryption 1990.03.08 Department of Electrical Engineering, Tatung Institute of Technology
121 Information Security 1990.03.09 Department of Electronical Data Processing, Ming Chuan College
122 Data Encryption 1990.03.28 Application Mathematics Department, Chinese Culture University
123 Design of a Chinese String Searching Machine 1990.03.30 Department of Electrical Data Processing, National Taichung Institude of Commerce
124 Data Encryption 1990.04.12 Taichung Home Economical and Commercial Senior Vocational School
125 Information Security 1990.04.12 Taichung Home Economical and Commercial Senior Vocational School
126 Data Compression 1990.04.14 Taichung Home Economical and Commercial Senior Vocational School
127 Computer Security 1990.04.18 College of Medicine, National Cheng Kung University
128 Computer Crime and Computer Viruses 1990.05.17 Taichung Museum of Art
129 Information Management and Applications 1990.06.04 Chia-Yi City Government
130 Information Management and Applications 1990.06.22 Chia-Yi City Government
131 Management Computerization 1990.07.11 National Yunlin Institute of Industry
132 Information Access and Control 1990.09.27 Department of Applied Mathematics, National Chung Hsing University
133 Strategies for Chinese Compression 1990.10.18 Department of Computer Science and Information Engineering, National Chiao Tung University
134 Computer Crime and Countermeasures 1990.10.18 Department of Computer Science and Information Engineering, National Chiao Tung University
135 Computer Crime and Countermeasures 1990.10.30 National Chung Cheng University
136 Compression-Based Perfect Hashing Strategies 1990.11.26 Department of Computer Science, National Tsing Hua University
137 Countermesures against Computer Crime and Computer Viruses 1990.11.27 Taiwan Cooperative Bank
138 Data Engineering Technology 1990.11.28 National Defense Management College
139 The Design of Computer Password 1990.12.12 Department of Electrical Engineering, National Yunlin Institute of Industry
140 Applications of Clustering Technology in Information Science 1990.12.20 Department of Electrical Engineering, National Cheng Kung University
141 Information Security 1991.01.22 YMCA, Chia-Yi
142 Design of a Minimal Perfect Hashing Function 1991.02.11 Department of Computer Science and Engineering, The Chinese University of Hong Kong
143 Office Automation 1991.03.06 Computer Center, National Chung Cheng University
144 Computer Crime and Prevention 1991.04.20 Exhibition Center of Computer Science, National Science Council
145 Computers and Passwords 1991.06.14 Department of Electronic Engineering, National Taipei Institute of Technology
146 On File Systems 1991.09.21 Department of Computer Science and Information Engineering, National Cheng Kung University
147 The Application of Cryptography to Computer Security 1991.11.09 Department of Computer Science and Information Engineering, National Cheng Kung University
148 The Road to Success 1991.11.27 Tunghai University, Department of Computer Science Information Engineering
149 Design of Image Databases 1991.12.04 Department of Electrical Data Processing, National Taichung Institude of Commerce
150 Dynamic Secret Sharing 1992.01.10 Department of Applied Mathematics, National Sun Yat-sen University
151 Introduction to Computer Passwords 1992.02.21 Sieh-Chih  Industrial and Commercial Senior Vocational School
152 How to Get Ahead 1992.03.11 Taiwan Provincial Wen-Hua Senior High School
153 Information Security 1992.04.14 Provincial Chang-Hua Senior School of Commerence
154 The Past, Present, and Future Trend of Science and Technology Education 1992.04.16 National Chung Cheng University
155 Methodology 1992.05.14 Tunghai University, Department of Computer Science Information Engineering
156 Information Security 1992.05.18 Ta Tung Technological College of Commerce
157 Group Secret Strategies 1992.06.15 Computer Science and Engineering Research Center, National Sun Yat-sen University
158 Group Secret Techniques 1992.10.02 Department of Electrical Data Processing, National Taichung Institude of Commerce
159 Secret Sharing 1992.10.06 Department of Information and Computer Education, National Taiwan Normal University
160 Generalized Group Secret Cryptography 1992.10.07 National Security Bureau
161 Methodology 1992.10.22 Department of Information Management, Ming Chuan College
162 Methodology 1992.10.28 Department of Computer and Information Science, National Chiao Tung University
163 The Design of Computer Password 1992.11.18 Department of Computer Science and Engineering, National Sun Yat-sen University
164 On the Applications and Development 1992.11.23 Department of Mathematics, National Tsing Hua University
165 Data Compression 1992.11.24 Provincial Chang-Hua Senior School of Commerence
166 Developments of Contemporary Cryptology 1992.12.01 Taichung Home Economical and Commercial Senior Vocational School
167 Career Planning of Computer People 1992.12.07 Department of Computer Science and Information Engineering, National Chung Cheng University
168 A Secured Computer Center Management 1993.01.07 Taichung Home Economical and Commercial Senior Vocational School
169 A Secured Computer Center Management 1993.01.14 Taichung Home Economical and Commercial Senior Vocational School
170 A Secured Computer Center Management 1993.02.04 Taichung Home Economical and Commercial Senior Vocational School
171 A Secured Computer Center Management 1993.02.11 Taichung Home Economical and Commercial Senior Vocational School
172 How to Get Ahead 1993.03.04 Department of Information Management, National Taiwan Institute of Technology
173 Chinese Retrieval and Searching 1993.03.24 Provincial Chang-Hua Senior School of Commerence
174 An Image Similar Retrieval Method Based on Modulo Arithmetics 1993.04.23 Workshop on Computer Applications Sponsored by National Chung Hsing University
175 Information Security 1993.05.04 Department of Information Science and Management, Providence University
176 How to Get Ahead 1993.05.24 Chia-Yi Home Vocational School
177 Information Security 1993.06.02 Department of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C.
178 A Master Key for an M3 Cryptoscheme 1993.06.08 Department of Electrical Engineering, National Defense University, Chung Cheng Institute of Technology
179 Introduction to Computer Passwords 1993.06.10 Taichung Home Economical and Commercial Senior Vocational School
180 Military Information Security 1993.09.07 National Defense Management College
181 Information Searching Techniques 1993.10.29 National Chung Cheng University
182 The Development of Computer Cryptography 1993.11.18 Department of Computer Science and Information Engineering, National Chiao Tung University
183 Planning of Project Information Systems 1993.11.23 Research, Development, and Evaluation Commission, Taiwan Provincial Government
184 Career Planning 1993.11.25 College of Engineering, National Chung Cheng University (for the students of Department of Business Education, National Changhua University of Education)
185 Information Security 1993.12.01 Provincial Training Center of Taiwan Provincial Government
186 Developments of Computer Cryptography 1993.12.08 National Defense University, Chung Cheng Institute of Technology
187 Information Security 1993.12.27 Provincial Training Center of Taiwan Provincial Government
188 Applications of Instruction Network and Information Security 1994.01.07 Szu-Yu Junior High School
189 Evaluation of Computer-Aided Instruction (CAI) 1994.01.17 Fooyin College of Nursing
190 Evolution of Contemporary Cryptography 1994.02.22 Chung-Shan Institute of Science and Technology
191 Planning of Project Information Systems 1994.03.10 Research, Development, and Evaluation Commission, Taiwan Province
192 Group Secret Technology 1994.03.18 Department of Computer Science. and Information Engineering, National Taiwan University
193 Artificial Intelligence 1994.03.25 Tsau Ton Commercial and Technical Vocational School
194 Artificial Intelligence 1994.04.02 Center of Automated Engineering, Da-Yeh University
195 The Design of Computer Password 1994.04.13 Wu Feng Institute of Technology
196 How to Get Ahead 1994.04.14 Rotary Club of Taichung East District
197 The Design of Computer Password 1994.04.30 National Central University
198 Introduction to Cryptanalysis 1994.05.06 Department of Applied Mathematics, Feng Chia University
199 Introduction to Cryptanalysis 1994.05.20 Department of Industrial Education, National Taiwan Normal University
200 Chinese Database Management Systems 1994.05.25 Training Center for High School Teachers
201 Efficient Information Retrieval 1994.08.03 Graduate Institute of Computer Science, National Chung Hsing University
202 Introduction to Cryptanalysis 1994.11.03 Department of Computer Science and Information Engineering, National Chiao Tung University
203 Information Security 1994.12.14 Department of Information Management, Chaoyang Institute of Technology
204 Information Security 1994.12.17 Computer and Information Network Center, National Chung Hsing University
205 Developments of Contemporary Cryptography 1995.03.03 Department of Computer Science and Engineering, National Sun Yat-Sen University
206 Towards an Information Society - Let Us Use the Computer Together 1995.04.24 National Chung Cheng University
207 Image Compression Technology 1995.04.27 Department of Information Science and Management, Providence University
208 Technology and Life 1995.07.27 National Chiayi Senior Hight School
209 Information Security and Management 1995.08.06 Taiwan Regional Development Institute
210 Information Security 1995.11.03 Provincial Training Center of Taiwan Provincial Government
211 The Present and Prospect of Information Security 1995.11.09 Department of Applied Mathematics, National Chung Hsing University
212 Developments of Computer Cryptography 1995.12.20 Department of Computer Science and Information Engineering, National Dong Hwa University
213 Developments of Computer Cryptography 1995.12.28 Department of Computer and Information Science, National Chiao Tung University
214 Information Security 1996.04.19 Refining & Manufacturing Research Center of Chinese Petroleum Corp
215 Contemporary Cryptography 1996.05.03 Department of Computer Science and Information Engineering, National Cheng Kung University
216 Information Security 1996.06.06 National Changhua University of Education
217 Information Security 1996.08.14 Department of Computer Science and Engineering, National Sun Yat-Sen University
218 How to Share a Common Secret Document 1996.12.03 Department of Information Engineering, Feng Chia University
219 Efficient Join Operation of Time-domain Databases 1996.12.19 Department of Computer Science and Information Engineering, National Chiao Tung University
220 The Road to Success 1997.03.26 Department of Information Management, Chaoyang University of Technology
221 Efficient Join Operation of Time-domain Databases 1997.04.16 Department of Computer Science, National Tsing Hua University
222 Evolution of Information Security Technology 1997.05.07 National Defense University, Chung Cheng Institute of Technology
223 Information Security 1997.06.05 Department of Mathematics, Chung Yuan Christian University
224 Evolution of Information Security Technology 1997.07.11 National Defense Management College
225 The Present and Prospect of Information Education of Universities in Taiwan 1997.11.04 Beijing University of Posts and Telecommunications, China
226 Hot Issues of International Information Security Research - Theory, Techniques, and Market Trend 1997.11.04 Beijing University of Posts and Telecommunications, China
227 Secret Sharing 1997.11.05 Beijing University of Posts and Telecommunications, China
228 Fast Computation of Modulo Exponents 1997.11.05 Beijing University of Posts and Telecommunications, China
229 Digital Signatures 1997.11.06 Beijing University of Posts and Telecommunications, China
230 Image Hiding Technology 1997.11.06 Beijing University of Posts and Telecommunications, China
231 Applications of Chinese Remainder Theorem 1997.11.07 Beijing University of Posts and Telecommunications, China
232 Essential The Qualities of a Successful Scientist 1997.11.07 Beijing University of Posts and Telecommunications, China
233 Image Hiding Technology 1997.12.28 Tunghai University(National Computer Symposium)
234 Progressive Image Transmission Using Edge Matching 1998.02.24 Department of Computer and Information Science, National Chiao Tung University
235 Image Hiding Technology 1998.02.26 Department of Information Science and Management, Providence University
236 Progressive Image Compression 1998.02.26 Department of Information Science and Management, Providence University
237 Progressive Image Transmission 1998.03.13 Department of Business Education, National Changhua University of Education
238 Computer Crime and Prevention 1998.03.17 National Taiwan Normal University
239 A Binary Access Control Method Using Prime Factorization 1998.03.27 University of Tokyo, Japan
240 An Image Hiding Scheme Based on Vector Quantization 1998.03.27 University of Tokyo, Japan
241 Progressive Image Transmission 1998.04.23 Department of Information Management, National Taiwan University of Science and Technology
242 The Present and Prospect of Information Security Developments 1998.05.08 Tung Fang Institute of Industry
243 Techniques of Designing Digital Watermarks 1998.05.13 Workshop on Network Security Technology Sponsored by Industrial Technology Research Institute
244 Key to Success in Academic Research 1998.05.21 Department of Applied Mathematics, National Chung Hsing University
245 Digital Watermarking 1998.07.03 Kyoto University, Japan
246 Applications of Mathematics in Information Science 1998.10.09 Ming-Dao High school
247 Digital Watermarking 1998.10.18 Chang Gung University
248 The Road to Success 1998.11.07 Department of Electrical Data Processing, National Taichung Institude of Commerce
249 A Sheme for Obtaining a Message from the Digital Multi-Signature 1998.11.17 Beijing University of Posts and Telecommunications, People's Republic of China
250 Chinese Calligraphy Compression Using New S-tree Sructure 1998.11.18 Beijing University of Posts and Telecommunications, People's Republic of China
251 Key to Success in Academic Research 1998.12.15 Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University
252 Image Hiding Technology 1999.02.25 National Security Bureau, Republic of China
253 Image Hiding 1999.03.02 Department of Computer Science and Information Management, Providence University
254 Key to Success in Academic Research 1999.03.10 Department of Industrial Education, National Taiwan Normal University
255 Image Hiding 1999.03.12 Department of Information Management, Chaoyang University of Technology
256 The Development of Information Education 1999.03.17 Department of Business Education, National Changhua University of Education
257 How to Get Ahead 1999.04.01 Chin-Yi Institute of Technology and Commerce
258 Image Hiding 1999.04.14 Tunghai University, Department of Computer Science Information Engineering
259 How to Get Ahead 1999.04.14 College of Electrical and Information Engineering, I-Shou University
260 Secret Sharing of Image Data and Its Applications 1999.04.29 Department of Computer Science and Information Engineering, Tamkang University
261 The Road to Success 1999.05.03 Ming-Chuan University
262 Image Hiding 1999.05.13 Department of Computer Science and Information Engineering, National Chiao Tung University
263 Watermarking Using Visual Cryptography 1999.05.15 Chaoyang University of Technology (National Information Security Conference-Keynote Speech)  
264 Image Hiding 1999.05.19 Hua-Fan University
265 Security Issues and Strategies for Electronic Commerce (EC) 1999.05.29 Chungtai Institute of Health Science and Technology
266 The Qualities of a Successful Technologist 1999.06.02 College of Science and Engineering, I-Shou University
267 A Progressive Codebook Training Algorithm for Image Vector Quantization 1999.06.04 Central Police University (The Tenth International Conference on Information Management)
268 Information and E-commerce 1999.06.24 Extension Education Center of Chinese Culture University
269 Progressive Image Transmission Technology 1999.07.14 Department of Computer Science and Information Engineering, National Central University
270 Progressive Image Transmission Technology 1999.07.19 Department of Chemistry, National Taiwan Normal University
271 A Technique for Image Hiding 1999.09.21 Graduate School of Information System, Department of Computer Software, The University of Aizu, Japan
272 A New Scheme of Progressive Image Transimssion Based on Bit-Plane Method 1999.10.21 Beijing University of Posts and Telecommunications, People's Republic of China
273 A Block Based Digital Watermarks for Copy Protection of Images 1999.10.21 Beijing University of Posts and Telecommunications, People's Republic of China
274 Progressive Image Transmission Technology 1999.10.29 Department of Computer Science and Information Engineering, National Cheng Kung University
275 Progressive Image Transimssion Based on Bit-Plane Method 1999.11.02 Department of Computer Science & Information Management, Providence University
276 Mysterious Red Envelope 1999.11.15 BCC- The Words of Wisdom
277 Digital Watermark Technology 1999.12.15 Department of Business Education, National Changhua University of Education
278 How to Write a Research Report 2000.01.15 Department of Information Management, National Taichung Institute of Technology
279 Intellectual Property Protection Techniques for Images 2000.03.21 Van-Nung Institute of Technology
280 Present Situation and Prospect of Information Education 2000.03.30 Pei-Men Senior Vocational School of Agriculture and Industrial
281 Key to Success in Academic Research 2000.04.01 Department of Information Management, National Taichung Institute of Technology
282 Key to Success in Academic Research 2000.04.18 Department of Computer Science and Information Engineering, Tamkang University
283 Digital Watermark Technology 2000.05.01 Department of Information and Computer, National Taiwan Normal University
284 Security Issues and Strategies for Electronic Commerce (EC) 2000.05.12 United World Chinese Commercial Bank (at Hotel National Taichung)
285 Security Issues and Strategies for Electronic Commerce (EC) 2000.05.15 Ta-Te Industrial and Home Ecnomical Senior Vocational School
286 Security Issues and Strategies for Electronic Commerce (EC) 2000.05.19 Rotary Club of Taichung Pei-Tuen District (at Hotel National Taichung)
287 Image Hiding and Visual Cryptography 2000.05.22 Graduate Institute of Electrical Engineering, National Taiwan University
288 Image Hiding 2000.06.02 Department of Computer Science and Information Engineering, National Chi Nan University
289 Security Issues and Strategies for Electronic Commerce (EC) 2000.06.23 National Taichung Institute of Technology
290 A New Scheme for Sharing Secret Color Images in Computer Network 2000.07.06 2000 IEEE International Conference on Parallel and Distributed System(2000ICPADS) by Iwate Prefectureal University, Japan
291 Some Techniques of Digital Watermarking on Internet 2000.09.28 The Institution of Electrical Engineers, Hong Kong
292 An Image Protection Scheme Based on Discrete Cosine Transformation 2000.09.28 Department of Electronic Engineering, City University of Hong Kong
293 Design of the Fast Chinese Indexing System with Boshiamy Input Method 2000.10.13 Department of Computer Science and Information Management, Providence University
294 The Development of Internet and Its Applications in Taiwan 2000.10.17 Ewha Womans University, South Korea
295 Design of the Fast Chinese Indexing System with Boshiamy Input Method 2000.10.31 Department of Information Engineering and Computer Science, Feng Chia University
296 Key to Success in Academic Research 2000.11.06 Department of Computer Science and Information Engineering, National Chiayi University
297 A Method for Protection Digital Images from Being Copied Illegally 2000.11.11 Chung-Chou Institute of Technology
298 Some Watermarking Techniques on Internet 2000.11.22 Department of Computer Science and Engineering, National Sun Yat-Sen University
299 Digital Watermark Technology 2000.12.22 Graduate School of Applied Mathematics, National Chung Hsing University
300 Some Watermarking Techniques on Internet 2000.12.26 National Kaohsiung University of Applied Sciences
301 Digital Watermark Technology 2001.01.02 Department of Computer Science & Information Management, Providence University
302 Digital Watermark Technology 2001.01.05 National Taichung Institute of Technology
303 Key to Success in Academic Research 2001.03.07 Graduate School of Mechanical Engineering, National Chung Hsing University
304 Hiding Images Using Dynamic Bit-Replacement and Human Visual System 2001.03.20 National Chi Nan University (China-France Multimedia Conference Keynote Speech)
305 Hiding Images Using Dynamic Bit-Replacement and Human Visual System 2001.04.03 Department of Computer Science and Information Systems, the University of Hong Kong
306 Visual Cryptography 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
307 Color Image Hiding 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
308 Image Hiding Based on Color Difference 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
309 Hiding Images Using Dynamic Bit-Replacement and Human Visual System 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
310 Hiding Binary Images Using BFT Linear Quadtrees 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
311 Security Issues and Strategies for Electronic Commerce (EC) 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
312 Authentication Mechanisms 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
313 Popular Encryption Schemes 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
314 Digital Signature Technology 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
315 Image Hiding Technology 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
316 Visual Cryptography 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
317 Digital Watermark Technology 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
318 The Road to College 2001.09.26 Taichung Second Senior High School
319 Key to Success in Academic Research 2001.10.08 Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology
320 Key to Success in Academic Research 2001.10.30 College of Computer Engineering, Wuhan University
321 Experiences in Designing a Simple Database Management System 2001.10.31 The State's Key Laboratory of Software Engineering, Wuhan University, People's Republic of China
322 How to Get Ahead 2001.11.06 Taichung Healthcare and Management University
323 Data Structure and Chinese Remainder Theorem 2001.11.09 Department of Computer Science & Information Management, Providence University
324 Introduction to Cryptanalysis 2001.11.30 Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University
325 The Road to Success 2001.12.26 Mingdao Management College
326 Efficient Indexing of Chinese Words by Pinyin 2002.01.08 Department of Computer Science & Information Management, Providence University
327 Issues on Network Security and Crime7 2002.01.23 Jean-Nan Primary School
328 Data Structure and Chinese Remainder Theorem 2002.03.07 Department of Computer Science and Information Engineering, Da-Yeh University
329 The Road to Success 2002.03.20 National Chung Cheng University
330 Information Hiding Techniques  2002.04.23 Department of Computer Science and Information Engineering, Tamkang University
331 Digital Watermarking Techniques 2002.04.24 Department of Computer Science and Information Engineering, Tamkang University
332 Digital Image Authentication 2002.04.25 Department of Computer Science and Information Engineering, Tamkang University
333 Application of Mathematics in Computer Science 2002.04.26 St. John's & St. Mary's Institute of Technology
334 Color Visual Cryptography 2002.05.10 Department of Computer Science & Information Management, Providence University
335 The Road to Success 2002.10.31 Department of Computer Science and Information Engineering, Tamkang University
336 Image Hiding Techniques 2002.11.07 Tokyo Denki University
337 The Road to Success 2002.11.26 Department of Computer Science & Information Management, Providence University
338 Mathematics and Informational Engineering  2002.12.03 Department of Computer Science & Information Engineering, National Chung Cheng University
339 Visual Cryptography 2002.12.10 Tsinghua University, Beijing, People's Republic of China
340 Digital Image Hiding 2002.12.10 Tsinghua University, Beijing, People's Republic of China
341 Non-embedded Watermarking 2002.12.11 Tsinghua University, Beijing, People's Republic of China
342 Embedded Watermarking 2002.12.12 Tsinghua University, Beijing, People's Republic of China
343 Digital Image Authentication 2002.12.12 Tsinghua University, Beijing, People's Republic of China
344 An Image Database Retrieval Scheme Based upon Multivariate Analysis and Data Mining 2002.12.20 2002 International Computer Symposium, National Dong Hwa University(Keynot Speech)
345 The Road to Success 2002.12.24 College of Management, Chaoyang University of Technology
346 Image Hiding Technology 2002.12.26 Department of Information Engineering, National Chiao Tung University
347 The Road to Success 2003.03.06 National Huwei Institute of Technology
348 Image Compression 2003.03.18 Department of Computer Science & Information Management, Providence University
349 From Image Compression to Digital Watermarking 2003.03.21 Department of Information Management, National Taichung Institute of Technology
350 The Recent Development of Information Security  2003.04.11 Keynote of  General Education , National Chung Hsing University
351 On research Methodology from Information Hiding 2003.04.25 Department of Computer Science and Information Engineering, National Dong Hwa University
352 Information Hiding Methodology 2003.04.30 National Huwei Institute of Technology
353 On research Methodology from Information Hiding 2003.05.23 Department of Computer Science & Information Management, Providence University
354 Digital Watermark Technology 2003.08.21 Industrial Technology Research Institute of Taiwan, ROC
355 Develop a Correct Academic Outlook 2003.09.04 Department of Computer Science and Information Engineering, National Chung Cheng University
356 Develop a Correct Academic Outlook 2003.11.07 Department of Information Science and Management, Providence University
357 Look at the Future through College 2003.11.12 Department of Information Management, National Huwei Institute of Technology
358 The Road to Success 2003.11.26 Chungtai Institute of Health Sciences and Technology
359 A Secret Information Hiding Scheme Based on Switching Tree Coding 2003.12.05 Institute of Information Science, Academia Sinica
360 Information Hiding - Steganography 2003.12.15 School of Computer Science and Telecommunications Engineering, JiangSu University 
361 A Technique that Takes Care of Image Compression and Information Hiding 2003.12.15 School of Computer Science and Telecommunications Engineering, JiangSu University 
362 Rambling on about Research Methods 2003.12.16 School of Computer Science and Telecommunications Engineering, JiangSu University 
363 Information Hiding Techniques- Steganography 2003.12.18 Tsinghua University, Beijing, People's Republic of China
364 A Technique that Takes Care of Image Compression and Information Hiding 2003.12.18 Tsinghua University, Beijing, People's Republic of China
365 How to Fast Computation of Exponents 2003.12.19 Tsinghua University, Beijing, People's Republic of China
366 Key to Success in Academic Research 2003.12.23 Chaoyang University of Technology
367 The Road to Success 2004.03.26 National Changhua University of Education
368 Information Hiding Techniques- Steganography 2004.04.02 Graduate Institute of Computer Science, National Chung Hsing University
369 Develop a Correct Academic Outlook 2004.04.02 Graduate Institute of Computer Science, National Chung Hsing University
370 Security Techniques and Applications for Electronic Commerce 2004.05.06 Department of Information Management, Tatung Institute of Commerce and Technology
371 Information Hiding Techniques- Steganography 2004.05.19 Department of Computer Science, National Tsing Hua University
372 Information Hiding Techniques- Steganography 2004.05.28 Department of Computer Science & Information Management, Providence University
373 Information Security Techniques- Steganography 2004.05.29 Chang Gung University
374 Develop a Correct Academic Outlook 2004.06.04 College of Science & Technology, National Chi Nan University
375 Information Hiding Techniques 2004.06.23 National Security Bureau
376 Hiding a Secret Image  in a Cover Image 2004.07.12 Ewha Womans University, South Korea
377 Rambling on the Academic Career 2004.08.11 Department of Information Management, National Taichung Institute of Technology 
378 Introduction to Steganography for Multimedia 2004.09.24 Department of Computer Science and Information Engineering, National Changhua University of Education 
379 Digital Image Steganography 2004.10.04 Department of Electronic Engineering, National Taiwan University of Science and Technology
380 Introduction to Image Steganography 2004.11.07 Computer science and Information Management, Providence University
381 Digital Signature and Its Applications to Electronic Business 2004.11.25 Department of Computer Science and Information Engineering, National Taichung Institute of Technology
382 Digital Image Steganography 2004.12.06 Information Management, National Kaohsiung University of Applied Science
383 Digital Image Steganography 2004.12.06 Department of Information and Communication, Southern Taiwan University
384 My Work Experience 2004.12.07 Department of Computer Science and Information Management, Providence University
385 Digital Image Steganography 2004.12.09 Department of Computer Science, National Chiao Tung University
386 Digital Image Steganography 2004.12.14 Department of Computer Science, National Chengchi University
387 My Work Experience 2004.12.29 National United University
388 Key to Success in Academic Research 2005.01.19 China Medical University
389 Digital Image Steganography 2005.01.04 College of Informatics, Chaoyang University of Technology
390 Key to Success in Academic Research 2005.03.08 Feng Chia University
391 Start a Bright Life 2005.04.26 Department of Computer science and Information Management, Providence University
392 Start a Bright Life 2005.05.06 Department of Computer science and Information Management, Providence University
393 Key to Success in Academic Research 2005.05.30 Department of Computer Science and Information Engineering, Chung Hua University
394 Introduction to Color Image Steganography 2005.09.05 Department of Information Engineering and Computer Science, Feng Chia University 
395 Introduction to Image Steganography 2005.09.06 The Legislative Yuan of Republic of China
396 An Adaptive Data Hiding Scheme for Palette Images 2005.09.15 The first International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, Hilton on the Park-Melbourne of Australia
397 Key to Success in Academic Research 2005.09.22 School of Communication and Information Engineering, Shanghai University
398 Introduction to Color Image Steganography 2005.09.29 Department of Computer Science and Information Engineering, National Chiayi University
399 My Work Experience 2005.10.13 Stella Matutina Girls¡¦ High School
400 Key to Success in Academic Research 2005.11.03 Department of Applied Mathematics, National Chung Hsing University
401 Graduate Study and Growth 2005.11.08 The Graduate School of Multimedia Design, National Taichung Institute of Technology
402 De-clustering and Its Applications to Steganography 2005.11.14 Department of Electrical Engineering, National Kaohsiung University of Applied Sciences
403 Introduction to De-clustering and Steganography 2005.11.16 Department of Computer Science and Information Technology, National Taichung Institute of Technology
404 The Road to Success 2005.12.6 Feng Chia University
405 De-clustering and Its Applications to Steganography 2005.12.08 Department of Information Engineering and Computer Science, Feng Chia University
406 Self-growth of Young Scholars 2005.12.08 College of Information and Electrical Engineering, Feng Chia University
407 The Road to Success 2005.12.20 Department of Computer Science and Information Management, Providence University
408 Self-growth of Young Scholars 2005.12.22 Department of Computer Communication Engineering, Chienkuo Technology University
409 Introduction to Image Hiding Technique 2006.03.01 Department of Computer Science and Information Engineering, Asia University
410 De-clustering and Its Applications to Information Hiding 2006.03.10 Department of Computer Science, National Chung Hsing University
411 Rambling on about Research Methods 2006.03.15 Department of Computer Science and Information Engineering, ChungChou Institute of Technology
412 De-clustering and Its Applications to Information Hiding 2006.03.24 Department of Computer Science and Information Management, Providence University
413 De-clustering and Its Applications to Information Hiding 2006.04.05 School of Communication and Information Engineering, Shanghai University
414 Information Hiding Technology Based on SMVQ 2006.04.05 School of Communication and Information Engineering, Shanghai University
415 Introduction to Steganography 2006.04.05 School of Communication and Information Engineering, Shanghai University
416 Self-growth of Young Scholars 2006.04.19 Department of Information Management, National Taichung Institite of Technology
417 Introduction to the Security of Electronic Business 2006.04.19 Hotel National Taichung (Seminar Sponsored by ARES International Corporation)
418 Clustering and Its Applications to Steganography 2006.06.19 Shenzhen Graduate School, Harbin Institute of Technology
419 De-clustering and Its Applications to Information Hiding 2006.06.19 Shenzhen Graduate School, Harbin Institute of Technology
420 Rambling on about Research Methods 2006.08.05 Information Security Technique Research Center and Superintendent of Information Countermeasure Technique Research Institute, Harbin Institute of Technology
421 Information Hiding Tecnique Based on De-clustering 2006.08.07 Harbin Institute of Technology(Keynote Speech at the 6th China  Information Hiding and Multimedia Security)
422 Recent Researches and Developments on Computer Science and Technology in Taiwan 2006.08.12 Department of Computer Science and Technology, Jilin University
423 Information Hiding and Its Applications 2006.08.29 Beijing Jiaotong University(Tutorial Speech at 2006 International Conference on Innovative Computing, Information and Control)
424 Rambling on about Research Methods 2006.08.29 Department of Computer Science and Information Technology, Beijing Jiaotong University
425 Information Hiding Technology Based on SMVQ 2006.08.30 Information Security Research Center, Beijing University of Posts and Telecommunication
426 Clustering and Its Applications to Steganography 2006.09.02 The State's Key Laboratory of Software Engineering, Wuhan University
427 De-clustering and Its Applications to Information Hiding 2006.09.02 The State's Key Laboratory of Software Engineering, Wuhan University
428 Rambling on about Research Methods 2006.09.02 The State's Key Laboratory of Software Engineering, Wuhan University
429 The Learning and Growth of Dectoral 2006.09.21 College of Busuness, Feng Chia University
430 How to Be a Successful Graduate Student 2006.10.04 Graduate Institute of Information and Computer Education, National Kaohsiung Normal University
431 How to Be a Successful Graduate Student 2006.10.04 Department of Electronic Engineering, National Kaohsiung University of Applied Sciences
432 How to Be a Successful Graduate Student 2006.10.13 Department of Computer Science and Information Management, Providence University
433 How to Be a Successful Graduate Student 2006.10.17 College of Informatics, Chaoyang University of Technology
434 Information Hiding Tecnique Based on De-clustering 2006.10.19 College of Computer Science and Technology, Huazhong University of Science and Technology
435 Graduate Student Learning and Growth 2006.10.19 College of Computer Science and Technology, Huazhong University of Science and Technology
436 Information Hiding Techniques 2006.10.20 Department of Computing and Information Technology and Network and Information Engineering Center, Fudan University 
437 Graduate Student Learning and Growth 2006.10.20 Department of Computing and Information Technology and Network and Information Engineering Center, Fudan University 
438 Clustering and Its Applications to Steganography 2006.10.24 College of Communications Engineering , Xidian University
439 De-clustering and Its Applications to Information Hiding 2006.10.24 College of Communications Engineering , Xidian University
440 Information Hiding Technology Based on SMVQ 2006.10.26 College of Communications Engineering , Xidian University
441 Graduate Student Learning and Growth 2006.10.26 College of Communications Engineering , Xidian University
442 Key to Be a Successful Graduate Student 2006.11.08 Computer Science and Information Engineering, Tunghai University
443 How to Write the Perfect Project 2006.11.09 Department of Computer Science and Information Engineering, Da-yeh University
444 Information Hiding Techniques 2006.11.21 Nan Kai Institute of Technology (Keynote Speech at 2006 International Conference on Information Industry)
445 How to Be a Successful Graduate Student 2006.12.11 Department of Computer Science and Information Engineering, National Chung Cheng University
446 How to Be a Successful Information Systems Manager 2006.12.28 Department of Information Management, National Chin-Yi University of Technology
447 Information Hiding Techniques 2007.01.10 Nanyang Technological University, Singapore
448 Information Hiding Techniques 2007.01.12 National University of Singapore
449 Hiding Secret Information in a Color Palette Image with Hybrid Strategies 2007.02.08 Sung Kyun Kwan University(Keynote Speech at First International Conference on Ubiquitous Information Management and Communication ) 
450 Graduate Student Learning and Growth 2007.03.07 Leader University
451 How to Be Successful Information Technology People 2007.03.07 Kun Shan University
452 How to Balance Teaching and Research 2007.03.09 National Kaohsiung Normal University
453 Introdiction to Lossless Watermarking Technology 2007.03.09 Department of Electronics Engineering, National Kaohsiung University of Applied Sciences
454 Introdiction to Lossless Watermarking Technology 2007.03.15 Department of Computer Science and Information Engineering, Tamkang University
455 Introduction to Color Image Hiding Technology 2007.04.06 College of Computer Science and Technology,Zhe Jiang University
456 Introduction to Color Image Hiding Technology 2007.04.09 College of Computer, Hangzhou Dianzi University
457 Introduction to Visual Cryptography 2007.04.09 College of Computer, Hangzhou Dianzi University
458 Introduction to Secret Image Sharing Technology 2007.04.09 College of Computer, Hangzhou Dianzi University
459 Digital Watermarking Technology 2007.04.09 College of Computer, Hangzhou Dianzi University
460 Introduction to Color Image Hiding Technology 2007.04.10 School of Communication and Information Engineering, Shanghai University
461 Introduction to Color Image Hiding Technology 2007.04.12 Department of Information Security, Jiangnan University
462 Introduction to Visual Cryptography 2007.04.12 Department of Information Security, Jiangnan University
463 Introduction to Secret Image Sharing Technology 2007.04.12 Department of Information Security, Jiangnan University
464 Digital Watermark Technology 2007.04.12 Department of Information Security, Jiangnan University
465 Self-growth of Young Scholars 2007.04.12 Department of Information Security, Jiangnan University
466 Science and Technology Research Methodology 2007.04.18 College of Engineering, National Chin-Yi University of Technology
467 The Recent Development of Information Security 2007.05.16 Central Taiwan University of Science and Technology
468 College Students' Learning Experience and Career Planning 2007.06.04 Feng Chia University
469 Self-growth of Young Scholars 2007.06.12 College of Informatics, Chaoyang University of Technology
470 Hiding Secret Information in Color Images 2007.06.19 School of Information Science and Technology, Sun Yat-Sen University, Guangdong, China
471 Innovative Steganography for Digital Media 2007.06.19 School of Information Science and Technology, Sun Yat-Sen University, Guangdong, China
472 The Outlet for Undergraduates Majoring in Information Security 2007.06.20 Department of Computer Science, Sun Yat-Sen University, Guangdong, China
473 An Information Hiding Technique Based on De-clustering 2007.06.21 International Web Intelligence Consortium (WIC) Institute, Beijing University of Technology
474 Information Hiding Techniques 2007.06.22 Department of Computer Science and Technology, Beijing Tsinghua University
475 Hiding Secret Information in Color Images 2007.06.22 School of Computer and Information Technology, Beijing Jiaotong University
476 Innovative Steganography for Digital Media 2007.06.22 School of Computer and Information Technology, Beijing Jiaotong University
477 Innovative Steganography for Digital Media 2007.06.24 Forum on Future Computing, Beijing
478 Information Hiding Techniques 2007.06.26 School of Computer Science, Beihang University
479 Rambling on About Research Methods 2007.06.26 School of Computer Science, Beihang University
480 Information Hiding Techniques 2007.06.28 School of Electronics and Information Engineering, Beijing Jiaotong University
481 Rambling on About Research Methods 2007.06.28 School of Electronics and Information Engineering, Beijing Jiaotong University
482 Hashing Technology: Past, Now and Future 2007.07.19 School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam
483 Declustering and Its Application to Information Hiding 2007.07.20 School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam
484 Hiding Secret Information in Color Images 2007.07.20 School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam
485 The Development of File Structures 2007.07.23 School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam
486 A Data Hiding Scheme Based upon Block Truncation Coding 2007.07.23 School of Information  Technology, University of Natural Sciences in Ho Chi Minh City, Vietnam
487 A Robust and Recoverable Tamper Proofing Technique for Image Authentication 2007.07.23 School of Information  Technology, University of Natural Sciences in Ho Chi Minh City, Vietnam
488 Image Hiding Technology 2007.09.21 Department of Information Management Science, Chung Shan Medical University
489 Image Hiding Technology 2007.09.28 Department of Computer Science and Information Engineering, National Taichung  University
490 Introduction to Lossless Watermarking Technology 2007.10.01 Department of Computer Science and Information Engineering, National Chung Cheng University
491 Hashing Technology: Past, Now and the Future 2007.10.04 College of Computer Science, Asia University
492 Hashing Technology: Past, Now and the Future 2007.10.05 Department of Computer Science & Information Management, Providence University
493 College Students' Learning Experience and Career Planning 2007.10.09 National Kaohsiung University
494 A Low Bit Rate Vector Quantization Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking 2007.10.15 Shandong University, China (Keynote Speech at the 3rd Joint Conference on Harmonious Human Machine Environment)
495 A Low Bit Rate Vector Quantization Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking 2007.10.17 School of Computer Science & Technology, Anhui University, China
496 Information Hiding Techniques 2007.10.17 School of Computer Science & Technology, Anhui University, China
497 Reversible Data Hiding Scheme Using Two Steganography Images 2007.10.31 Taipei International Convention Center (Invited Speech at IEEE TENCO 2007)
498 Graduate Students' Learning and Growth 2007.11.21 College of Engineering, National Chin-Yi University of Technology
499 How to Be Successful Information Technology People 2007.11.22 Department of Computer Science and Information Engineering, National Chin-Yi University of Technology
500 Rambling on About Research Methods 2007.11.26 Graduate Institute of Information and Computer Education, National Kaohsiung Normal University
501 Rambling on About Research Methods 2007.11.29 Department of Information Management, Dayeh University
502 An Image Compression Scheme Based on Locally Adaptive Coding 2007.12.10 Asia University (Keynote Speech at IEEE International Symposium on Multimedia)
503 Using Nearest Cover Codes to Embed Secret Information in Gray-scale Images 2008.01.31 Sungkyunkwan University, Seoul, Korea
504 How to Be Successful Information Technology People 2008.03.17 Department of Information Management Science, Chung Shan Medical University
505 How to Improve Research Efficiency and Skills 2008.04.08 College of Informatics, Chaoyang University of Technology
506 Rambling on About Research Methods 2008.04.09 Department of Computer Science and Information Engineering, Tamkang University
507 Rambling on About Research Methods 2008.04.09 Department of Computer & Information Science, Aletheia University
508 Improving Research Efficiency: the Strategy and Skills 2008.04.11 Taiwan Assessment and Evaluation Association (National Taiwan University of Science and Technology)
509 Sharing Experience about The Academic Achievements for Young Scholars 2008.04.22 Department of Information Engineering and Computer Science, Feng Chia University
510 College Students' Learning Experience and Career Planning 2008.05.21 College of Engineering, Da-Yeh University
511 Rambling on About Research Methods 2008.06.11 Institute of Mechanical and Electro-Mechanical Engineering, National Formosa University
512 Rambling on About Research Methods 2008.06.16 School of Computer Science and Technology, Anhui University, China
513 An Information Hiding Scheme Using Sudoku 2008.06.18 Dalian, China (Plenary Speech at The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008))
514 Image Hiding Technology 2008.06.18. School of Electronic and Information Engineering, Dalian University of Technology
515 Rambling on About Research Methods 2008.07.15 School of Information Science and Engineering, Lanzhou University, China
516 Graduate Students' Learning and Growth 2008.07.15 School of Information Science and Engineering, Lanzhou University, China
517 Innovative Information Hiding for Digital Media 2008.07.16 Lanzhou, China (Keynote Speech at the First International Conference on Ubi-media)
518 A High Payload Steganographic Scheme Based on (7, 4) Hamming Codes for Digital Images 2008.08.04 Guangzhou, China (Keynote Speech at International Symposium on Electronic Commerce and Security)
519 Some Novel Steganographic Methods for Digital Images 2008.08.07 Shenzhen Graduate School, Harbin Institute of Technology
520 Hiding Data in a Color Palette Image with Hybrid Strategies 2008.09.16 Department of Information Management, Chang Gung University
521 The Road to Success 2008.09.19 Department of Management Information Systems, National Chung Hsing University
522 Recent Development of Information Hiding Steganography 2008.09.22 Jiaxing University
523 Hiding Data in a Color Palette Image with Hybrid Strategies 2008.09.24 Wuhan University
524 Recent Developments on Image Steganography 2008.09.24 Wuhan University
525 An Innovative Steganographic Scheme Based on Vector Quantization 2008.09.25 Yangtze University (Keynote Speech at the Second International Conference on Genetic and Evolutionary Computing)
526 Recent Development of Information Hiding Steganography 2008.10.14 Overseas Chinese Institute of Technology
527 Rambling on About Research Methods 2008.10.15 Yuan Ze University
528 Hiding Data in a Color Palette Image with Hybrid Strategies 2008.10.17 Department of Computer Science and Engineering, National Chung Hsing University
529 Recent Development of Information Hiding Steganography 2008.10.18 Department of Information Management, Chang Gung University
530 Clustering and Its Applications to Steganography 2008.10.18 Department of Information Management, Chang Gung University
531 De-clustering and Its Applications to Steganography 2008.10.18 Department of Information Management, Chang Gung University
532 Rambling on About Research Methods 2008.10.18 Department of Information Management, Chang Gung University
533 Recent Development of Information Hiding Steganography 2008.10.24 College of Computing and Informatics, Providence University
534 Security and Privacy in Pervasive/Ubiquitous Computing Systems 2008.11.01 Forum on Future Computing, Beijing
535 Recent Development of Information Hiding Steganography 2008.11.01 Forum on Future Computing, Beijing
536 Hiding Data in a Color Palette Image with Hybrid Strategies 2008.11.04 Department of Computer Science and Information Technology, Beijing Jiaotong University
537 How to Be a Successful Graduate Student 2008.11.04 School of Electronics and Information Engineering, Beijing Jiaotong University
538 Recent Development of Information Hiding Steganography 2008.11.04 School of Electronics and Information Engineering, Beijing Jiaotong University
539 Recent Development of Information Hiding Steganography 2008.11.04 Department of Computer Science and Information Technology, Beijing Jiaotong University
540 Science and Technology Research Methodology 2008.11.05 Renmin Unviversity of China
541 Recent Development of Information Hiding Steganography 2008.11.05 Renmin Unviversity of China
542 Rambling on About Research Methods 2008.11.06 Hefei University of Technology
543 Recent Development of Information Hiding Steganography 2008.11.06 Hefei University of Technology
544 Key to Be a Successful Graduate Student 2008.11.07 Anhui University
545 Recent Development of Information Hiding Steganography 2008.11.07 West Anhui University
546 A Restricted Region-based Data-hiding Scheme 2008.11.10 Hangzhou, China (Keynote Speech at the 11th International Conference on Communication Technologies)
547 Steganographic Mechanisms with Reversibility and Irreversibility 2008.11.17 Department of Computer Science and Information Engineering, National Chung Cheng University
548 Self-growth of Young Scholars 2008.11.17 Department of Computer Science and Information Engineering, National Chung Cheng University
549 Secret Image Sharing with Reversible Steganography 2008.12.19 Wuhan, China (Keynote Speech at the 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application)
550 Lossless Compression Schemes of Vector Quantization Indices Using State Codebook 2008.12.21 Shanghai, China (Keynote Speech at the 2008 International Symposium on Computer Science and Computational Technology)
551 A High Capacity Reversible Data Hiding Scheme for Annotation 2008.12.22 Shanghai, China (Keynote Speech at the 2008 IEEE International Symposium on Intelligent Information Technology Application)
552 Recent Development of Information Hiding Steganography 2008.12.22 School of Communication and Information Engineering, Shanghai University
553 Recent Development of Information Hiding Steganography 2008.12.23 Fudan University
554 Recent Development of Information Hiding Steganography 2008.12.23 University of Shanghai for Science and Technology
555 Rambling on About Research Methods 2008.12.23 University of Shanghai for Science and Technology
556 The Design of E-Traveler's Check with Efficiency and Mutual Authentication 2009.01.15 Sung Kyun Kwan University (Keynote Speech at the First International Conference on Ubiquitous Information Management and Communication)
557 A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images 2009.02.06 Nha Trang, Vietnam (Keynote Speech at the Second International Conference on Theories and Applications of Computer Science)
558 Recent Development of Information Hiding Steganography 2009.02.20 School of Information technology, Ming Chuan University
559 Graduate Students' Learning and Growth 2009.02.27 Department of Computer Science & Information Management, Providence University
560 Recent Development of Information Hiding Steganography 2009.03.11 National Chung Cheng University
561 Recent Development of Information Hiding Steganography 2009.03.18 Department of Information Management, Southern Taiwan University
562 Recent Development of Information Hiding Steganography 2009.03.20 Computer Science and Information Engineering University
563 Graduate Students' Learning and Growth 2009.03.27 The Department of Computer Science and Engineering, National Chung-Hsing University
564 Hiding Data in a Color Palette Image with Hybrid Strategies 2009.04.06 The Department of Electronic Engineering, National Kaohsiung University
565 The New Developments in Information Hiding 2009.04.16 Suzhou Institute for Advanced Study of University of Science and Technology of China, The 3rd Ph.D. Student Workshop ( invited speaker )
566 Cheating Resistence for Secret Sharing 2009.04.21 College of Computer Science, Shanghai University
567 Recent Development of Information Hiding Steganography 2009.04.23 College of Computer Science, Yangtze University
568 Cheating Resistence for Secret Sharing 2009.04.25 Wuhan, China (Keynote Speech at International Conference on Networdks Security, Wireless Communications and Trusted Computing)
569 A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images 2009.05.15 Chengdu, China (Keynote Speech at the 2009 International Symposium on Intelligent Ubiquitous Computing and Education)
570 A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes 2009.05.19 School of Computer and Information, Hefei University of Technology
571 Learning and Growing Together for Young Scholars 2009.05.19 School of Computer and Information, Hefei University of Technology
572 Recent Development of Information Hiding Steganography 2009.05.20 Fuyang Teachers College
573 Self-growth of Young Scholars 2009.05.21 School of Computer Science and Technology , Anhui University
574 Hiding Information in Region-based Wet Images 2009.05.22 Nanchang, China (Keynote Speech at International Symposium on Electronic Commerce and Security)
575 A New Classification Mechanism for Retinal Images 2009.05.24 Wuhan, China (Keynote Speech at the 2009 International Workshop on Intelligent Systems and Applications)
576 A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes 2009.06.06 Wuhan, China (Keynote Speech at International Conference on Computational Intelligence and Natural Computing)
577 Recent Development of Information Hiding Steganography 2009.06.08 College of Software, Dalian University of Technology
578 A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes 2009.06.08 College of Software, Dalian University of Technology
579 A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images 2009.06.09 College of Software, Dalian University of Technology
580 Rambling on About Research Methods 2009.06.09 College of Software, Dalian University of Technology
581 A Quadratic-residue-based Fragile Watermarking Scheme 2009.07.11 Zhangjiajie, China (Keynote Speech at 2009 IITA International Conference on Services Science, Management and Engineering)
582 A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables 2009.07.18 Shenzhen, China (Keynote Speech at Asia-Pacific Conference on Information Processing)
583 Embedding Data in a Wet Digital Image Using Fully Exploiting Modification Directions 2009.08.06 Kaohsiung, Taiwan (Keynote Speech at the 4th Joint Workshop on Information Security)
584 A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data 2009.08.07 Sanya, China (Keynote Speech at the 2009 ETP/IITA World Congress in Applied Computing,Computer Science, and Computer Engineering)
585 An Image Authentication Scheme Using Magic Square 2009.08.08 Beijing, China (Keynote Speech at the 2nd IEEE International Conference on Computer Science and Information Technology)
586 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2009.08.12 Shenyang, China (Keynote Speech at the Ninth International Conference on Hybrid Intelligent System)
587 Security Technologies on Communication Networks and Their Applications to Electronic Business 2009.08.15 Forum on Future Computing, Nanjing
588 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2009.08.18 Department of Computer Science and Technology, Shanghai Jiao Tong University
589 Recent Development of Information Hiding Steganography 2009.09.24 College of Computer Science, Asia University
590 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2009.10.12 College of Software, Dalian University of Technology
591 Scientific and Technological Paper Writing, Contributing, Publishing Essentials 2009.10.12 College of Software, Dalian University of Technology
592 An Ingenious Data Hiding Scheme for Color Retinal Images 2009.10.12 College of Software, Dalian University of Technology
593 An Ingenious Data Hiding Scheme for Color Retinal Images 2009.10.14 Guilin, China (Keynote Speech at the 3rd International Conference on Genetic and Evolutionary Computing)
594 Recent Development of Information Hiding Steganographysibility 2009.10.14 Guilin University of Electronic Technology
595 Recent Development of Information Hiding Steganographysibility 2009.10.23 Department of Management Information Systems, National Chung Hsing University
596 Recent Development of Information Hiding Steganography 2009.10.28 College of Computer Engineering Institute,Qingdao Technological University
597 Hiding Information in VQ Index Tables with Reversibility 2009.10.29 Qingdao, China (Keynote Speech at the Second International Workshop on Computer Science and Engineering)
598 Recent Development of Information Hiding Steganography 2009.11.06 Taichung, Taiwan (Keynote Speech at 2009 Workshop on Consumer Electronics)
599 Embedding Data in a Wet Digital Image 2009.11.13 Department of Computer Science and Engineering, National Chung Hsing University
600 Emoticon-Based Text Steganography in Online Chat tools 2009.11.17 College of Software, Dalian University of Technology
601 Learning and Growing for a Graduate Student 2009.11.17 College of Software, Dalian University of Technology
602 Hiding Data in a Color Palette Image with Hybrid Strategies 2009.11.17 College of Software, Dalian University of Technology
603 Recent Development of Information Hiding Steganography 2009.11.19 College of Electrical Science and Technology, Anhui University
604 A Wet Image Data Hiding Scheme Based on Coordinate Modifications 2009.11.21 Nanchang, China (Keynote Speech at the 3rd International Conference on Intelligent Information Technology Application)
605 Rambling on about Research Methods 2009.11.21 Nanchang Hangkong University
606 Emoticon-Based Text Steganography in Online Chat tools 2009.11.23 Shenzhen Graduate School, Harbin Institute of Technology
607 Emoticon-Based Text Steganography in Online Chat tools 2009.11.24 Guangdong University of Business Studies
608 Recent Development of Information Hiding Steganography 2009.11.24 Guangdong University of Business Studies
609 Rambling on about Research Methods 2009.11.24 Guangdong University of Business Studies
610 Recent Development of Information Hiding Steganography 2009.11.26 College of Computer, Hangzhou Dianzi University
611 Embedding Data in a Wet Digital Image 2009.11.26 College of Computer, Hangzhou Dianzi University
612 Emoticon-Based Text Steganography in Online Chat tools 2009.11.26 College of Computer, Hangzhou Dianzi University
613 Emoticon-Based Text Steganography in Online Chat tools 2009.11.28 Wuhan, China (Keynote Speech at 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications)
614 Emoticon-Based Text Steganography in Online Chat tools 2009.11.28 Huanggang Normal University
615 Steganographic Scheme Using Heuristic Codeword Assignment and Cascade-Shifting on VQ Image 2009.12.04 Taipei, Taiwan (Keynote Speech at 2009 The 2nd IEEE International Conference on Ubi-media Computing)
616 A Data Hiding Method for Text Documents Using Multiple-Base Encoding 2009.12.12 Sanya, China (Keynote Speech at 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science)
617 Recent Developments in Information Hiding 2009.12.26 Huangshan, China (Keynote Speech at the 2nd International Symposium Computer Science and Computational Technology)
618 Recent Developments in Text Stegnography 2009.12.27 Shanghai, China (Keynote Speech at the Second International Symposium on Information Science and Engineering)
619 A Technique of Embedding Digital Data in an Image Compression Code Reversibly 2010.01.14 SKKU, Suwon, Korea (Keynote Speech at the 4th International Conference on Ubiquitous Information Management and Communication )
620 A Technique of Embedding Digital Data in an Image Compression Code Reversibly 2010.01.22 Sanya, China (Keynote Speech at the 2nd International Conference on Computer Modeling and Simulation)
621 De-clustering and Its Application to Steganography 2010.01.30 Macao, China (Keynote Speech at 2010 International Conference on Information Technology for Manufacturing Systems)
622 A Virtual Image Cryptosystem Based upon Vector Quantization 2010.03.05 Wuhan, China (Keynote Speech at 2010 International Conference on Challenges in Environmental Science and Computer Engineering)
623 A Technique of Embedding Digital Data in an Image Compression Code Reversibly 2010.03.18 National Taichung Institute of Technology, Department of Information Management
624 The Road to Success 2010.04.02 Jinggangshan University
625 Recent Developments in Visual Cryptography 2010.04.03 Jinggangshan, China (Keynote Speech at 2010 Third International Symposium on Intelligent Information Technology and Security Informatics)
626 Recent Developments in Information Hiding 2010.04.17 Chengdu, China (Keynote Speech at 2010 The 2nd IEEE International Conference on Information Management and Engineering)
627 Recent Developments in Text Steganography 2010.04.18 Shenzhen, China (Keynote Speech at 2010 Asia-Pacific Conference on Wearable Computing Systems)
628 Scientific and Technological Paper Writing, Contributing, Publishing Essentials 2010.04.19 School of Electronics and Information Engineering, South China University of Technology
629 Rambling on about Research Methods 2010.04.19 School of Electronics and Information Engineering, South China University of Technology
630 Rambling on about Research Methods 2010.04.20 Shunde Polytechnic
631 The Road to Success 2010.04.21 School of Computer Science, Guangdong Polytechnic Normal University
632 Self-growth of Young Scholars 2010.04.22 The School Physics and Telecommunication Englineering, South China Normal University
633 Information Steganography Using Magic Matrix 2010.04.22 The School Physics and Telecommunication Englineering, South China Normal University
634 Self-growth of Young Scholars 2010.04.23 School of Computer, Wuhan University
635 Recent Developments in Visual Cryptography 2010.04.24 Wuhan, China (Keynote Speech at 2010 International Conference on Biomedical Engineering and Computer Science)
636 De-clustering and Its Application to Information Hiding 2010.04.25 Kaifeng, China (Keynote Speech at 2010 International Conference on Machine Vision and Human-Machine Interface)
637 New Developments in Visual Crypography 2010.04.27 School of Electronic and Information Engineering, Dalian University of Technology
638 Rambling on about Research Methods 2010.04.27 School of Electronic and Information Engineering, Dalian University of Technology
639 Image Steganography Using Magic Matrix 2010.05.06 Tainan, Taiwan (Keynote Speech at 2010 International Symposium on Computer, Communication, Control and Automation)
640 Emoticon-Based Text Steganography in Online Chat tools 2010.05.07 Taiwan (Keynote Speech at 2010 The Forum of Consumer Electronics)
641 An Information Hiding Scheme Using Sudoku 2010.05.10 Wuhan, China (Keynote Speech at 2010 The IIS 2nd International Conference on Signal Processing, Robotics and Automation)
642 Recent Developments of Visual Cryptography 2010.05.11 Guangdong University of Business Studies
643 Visual Cryptography 2010.05.15 Sanya, China (Keynote Speech at 2010 The 2nd International Conference on Modeling, Simulation and Visualization Methods)
644 Recent Developments in Text Steganography 2010.05.21 National Kinmen Institute of Technology
645 Self-growth of Young Scholars 2010.05.27 Asia University
646 Embedding Information in Cover Digital Images Using Magic Matrices 2010.05.30 Wuhan, China (Keynote Speech at 2010 International Conference on the Development of Educational Science and Computer Technology)
647 The Road to Success 2010.06.07 Kainan University
648 Authenticatable Visual Secret Sharing 2010.06.13 Chengdu, China (Keynote Speech at 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering)
649 Scientific and Technological Paper Writing, Contributing, Publishing Essentials 2010.06.21 Optical-Electrical and Computer Engineering, Unversity of Shanghai for Science and Technology
650 Rambling on about Research Methods 2010.06.22 Shanghai Ocean University
651 An Information Hiding Scheme Using Sudoku 2010.06.23 Shanghai, China (Keynote Speech at 2010 The 2nd International Conference on Education Technology and Computer)
652 Recent Developments in Text Steganography 2010.06.26 Qinhuangdao, China (Keynote Speech at 2010 The International Conference on Computer Design and Applications)
653 De-clustering and Its Application to Steganography 2010.06.30 Hongkong, China (Keynote Speech at 2010 The Second International Conference on Communication Systems, Networks and Applications)
654 Authenticatable Visual Secret Sharing 2010.07.05 Hangzhou Dianzi University
655 Authenticatable Visual Secret Sharing 2010.07.07 Zhejiang, China (Keynote Speech at 2010 TThe 3rd IEEE International Conference on Ubi-media Computing)
656 Sharing Secrets Using Visual Cryptography 2010.07.11 Dalian, China (Keynote Speech at 2010 The International Joint Conference on Artificial Intelligence)
657 An Information Hiding Scheme Using Sudoku 2010.07.21 Qingdao, China (Keynote Speech at 2010 The IITA International Conference on Nanotechnology and Computer Engineering)
658 Visual Cryptography 2010.07.29 Huangshan, China (Keynote Speech at 2010 The Third International Symposium on Electronic Commerce and Security)
659 Visual Cryptography 2010.08.02 Beijing, China (Keynote Speech at 2010 Second Pacific-Asia Conference on Circuits,Communications and System)
660 Authenticatable Visual Secret Sharing 2010.08.04 Taichung, Taiwan (Keynote Speech at 2010 The IET International Conference on Frontier Computing)
661 Key to Be a Successful Graduate Student 2010.08.09 Department of Information Management, National Taichung Institute of Technology
662 Visual Cryptography 2010.08.14 Jiaozuo, China (Keynote Speech at 2010 The Third International SymposiumComputer Science and Computational Technology)
663 Authenticatable Visual Secret Sharing 2010.08.21 Yangzhou China (Keynote Speech at 2010 International Colloquium on Computing, Communication, Control, and Management)
664 Delivering Secret Messages Using Chat Tools 2010.08.25 Changchun China (Keynote Speech at 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering)
665 Key to Be a Successful Graduate Student 2010.08.31 Department of Management Information Systems, National Chung Hsing University
666 Authenticatable Visual Secret Sharing 2010.09.17 Nanchang, China (Keynote Speech at The Second Asia-Pacific Conference on Information Processings)
667 Authenticatable Visual Secret Sharing 2010.09.18 Chongqing, China (Keynote Speech at 2010 International Conference on Educational and Information Technology)
668 Recent Developments in Visual Cryptography 2010.09.27 Taiyuan, China (Keynote Speech at 2010 International Conference on Computational Aspects of Social Networks)
669 How to Create High Quality Research Papers 2010.10.14 Department of Information Management, National Taichung Institite of Technology
670 Teaching Experiences Sharing 2010.10.14 Department of Information Management, National Taichung Institite of Technology
671 The New Developments in Message Embedding 2010.10.17 Wuhan, China (Keynote Speech at 2010 International Conference on Information,Communication and Edcuation Application)
672 Delivering Secret Message Using Chat Tools 2010.10.18 Kunming, China (Keynote Speech at The 2010 International Conference on Software and Computing Technology)
673 Delivering Secret Message Using Chat Tools 2010.10.19 Kunming, China (Keynote Speech at The 2010 International Conference on Management Science)
674 Information Steganography Using Magic Matrix 2010.10.22 Taiyuan University of Science and Technology
675 Authenticatable Visual Secret Sharing 2010.10.23 Taiyuan, China (Keynote Speech at The 2010 International Conference on Computer Application and System Modeling)
676 A Survey of Linguistic Steganography 2010.10.24 Huanggang, China (Keynote Speech at The 2010 International Symposium on Intelligence Information Processing and Trusted Computing)
677 Recent Developments in Information Hiding 2010.10.26 Xiamen, China (Keynote Speech at The 2010 International Conference on Bio-inspired Systems and Signal Processing)
678 Information Steganography Using Magic Matrix 2010.11.06 Qinhuangdao, China (Keynote Speech at The 4th International Conference on Intelligent Information Technology Application)
679 Applying De-Clustering Concept to Information Hiding 2010.11.10 Kaohsiung, Taiwan (Keynote Speech at The 2010 2nd International Conference on Computational Collective Intelligence)
680 Embedding Secret Information in Digital Images 2010.11.11 Guangzhou, China (Keynote Speech at The 2010 International Symposium on Information and Automation)
681 Embedding Secret Information in Digital Images 2010.11.13 Qingdao, China (Keynote Speech at The 2010 The Third International Symposium on Information Processing)
682 Embedding Secret Information in Digital Images 2010.11.13 Qingdao University of Science and Technology, College of Information Science and Technology
683 How to Create High Quality Research Papers 2010.11.15 College of Computer Science Of Chongqing University
684 Visual Secret Sharing 2010.11.15 College of Computer Science Of Chongqing University
685 Emotion-based Text Steganography in Chat 2010.11.17 Chengdu, China (Keynote Speech at The 2010 The 3rd International Conference on Computer and Electrical Engineering)
686 Recent Developments in Visual Cryptography 2010.11.18 Guilin, China (Keynote Speech at The 2010 Third Pacific-Asia Conference on Web Mining and Web-based Application)
687 How to Create High Quality Research Papers 2010.11.18 Guilin University of Technology, College of Information Science and Engineering
688 Visual Secret Sharing 2010.11.18 Guilin University of Technology, College of Information Science and Engineering
689 College Students' Learning Experience and Career Planning 2010.11.19 Guilin University of Technology
690 Recent Developments in Visual Cryptography 2010.11.20 Shenzhen Graduate School, Harbin Institute of Technology
691 Applying De-Clustering Concept to Information Hiding 2010.11.21 Shenzhen, China (Keynote Speech at The 2010 International Conference on Circuit and Signal Processing)
692 How to Create High Quality Research Papers 2010.11.25 Feng Chia University Libraries
693 Authenticatable Visual Secret Sharing 2010.11.26 Chiayi, Taiwan (Keynote Speech at The 2010 International Conference on Information Security Management)
694 Information Steganography Using Magic Matrix 2010.12.04 Wuhan, China (Keynote Speech at The 2010 3rd International Conference on Computational Intelligence and Industrial Application)
695 Authenticatable Visual Secret Sharing 2010.12.05 Hangzhou, China (Keynote Speech at The 2010 2nd International Conference on Information Science and Engineering)
696 Applying De-Clustering Concept to Information Hiding 2010.12.09 The College of Information Engineering on XiangTan University
697 Visual Secret Sharing 2010.12.09 The College of Information Engineering on XiangTan University
698 Visual Cryptography 2010.12.10 Sanya, China (Keynote Speech at The 2010 International Conference on Future Information Technology and Computing)
699 An Information Hiding Scheme Using Sudoku 2010.12.10 Nanning, China(Keynote Speech at The 2010 International Conference on Future Computer, Control and Communication)
700 Authenticatable Visual Secret Sharing 2010.12.13 Chongqing, China (Keynote Speech at The 2010 International Conference on Parallel and Distributed Computing and Networks)
701 Visual Secret Sharing 2010.12.17 Southwest Jiaotong University, School of Information Science and Technology
702 Applying De-Clustering Concept to Information Hiding 2010.12.18 Chengdu, China (Keynote Speech at The 2010 International Conference on Information Security and Artificial Intelligence)
703 Visual Cryptography 2010.12.26 Shanghai, China (Keynote Speech at The 2010 Second IITA International Joint Conference on Artificial Intelligence)
704 Introduction to Visual Cryptography 2011.01.14 Department of Computer Science and Engineering, National Chung-Hsing University
705 Information Steganography Using Reference Matrices 2011.02.21 Hong Kong, China (Keynote Speech at The 2011 International Conference on Fuzzy Systems and Neural Computing)
706 Information Steganography Using Reference Matrices 2011.03.02 National Central University, Department of Computer Science & Information Engineering
707 Introduction to Visual Cryptography 2011.03.04 Taichung, Taiwan (Keynote Speech at The 2011 Information Education and Technological Application Conference)
708 Recent Developments in Visual Cryptography 2011.03.06 Macao, China (Keynote Speech at The 2011 2nd International Conference on Innovative Computing and Communication and 2011 2nd Asia-Pacific Conference on Information Technology and Ocean Engineering)
709 Visual Cryptography 2011.03.12 Shanghai, China (Keynote Speech at The 2011 3rd International Conference on Computer Research and Development)
710 How to Create High Quality Research Papers 2011.03.23 I-Shou University
711 Introduction to Visual Cryptography 2011.04.11 Department of Computer Science and Information Engineering, National Chung Cheng University
712 Information Steganography Using Magic Matrix 2011.04.17 Xianning, China (Keynote Speech at The 2011 The International Conference on Consumer Electronics, Communications and Networks)
713 Applying De-Clustering Concept to Information Hiding 2011.04.19 Computer Science and Technology, Nanjing University of Information Science and Technology
714 Transmission of Secret Messages Using Chat Tools 2011.04.21 West Anhui University
715 Authenticatable Visual Secret Sharing 2011.04.21 School of Computer Science and Technology, Anhui University
716 Information Hiding Scheme Using Sudoku 2011.04.23 Wuhan, China (Keynote Speech at The 2011 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing)
717 Embedding Secret Messages in Texts 2011.05.01 Chengdu, China (Keynote Speech at The 2011 International Conference on Advanced Materials and Computer Science)
718 Authenticatable Visual Secret Sharing 2011.05.04 Northeastern University at Qinhuangdao(Institute of Internet of Things and Information Security)
719 Embedding Secret Messages in Digital Images 2011.05.05 Beijing, China (Keynote Speech at The 2011 The 1st International Conference on High Performance Structures and Materials Engineering)
720 Secret Sharing Using Digital Image Shadows 2011.05.07 Shanghai, China (Keynote Speech at The 2011 International Conference on Information Technology for Manufacturing Systems)
721 An Information Hiding Scheme Using Sudoku 2011.05.14 Guangzhou, China (Keynote Speech at The 2011 The International Conference on Business Management and Electronic Information)
722 Walk the Two Sides to See the Academic Rise of the Mainland 2011.05.19 Management Information Systems, National Chung-Hsing University
723 Professor Chang's Sayings 2011.05.19 Management Information Systems, National Chung-Hsing University
724 Authenticatable Visual Secret Sharing 2011.06.10 Chengdu, China (Keynote Speech at The 2011 4th IEEE International Conference on Computer Science and Information Technology)
725 Embedding Secret Messages in Digital Images 2011.06.18 Zhengzhou, China (Keynote Speech at The 2011 International Conference on Computer and Network Engineering)
726 Information Steganography Using Magic Matrix 2011.07.08 Xiamen, China (Keynote Speech at The 2011 International Conference on Intelligent Information Processing)
727 Professor Chang's Sayings 2011.07.21 College of Computer, Hangzhou Dianzi University
728 Authenticatable Visual Secret Sharing 2011.07.23 Huangshi, China (Keynote Speech at The 2011 The 3rd International Conference on Information Technology and Computer Science)
729 How to Create High Qualituy Academic Papers 2011.08.02 Lanzhou University
730 Scientific and Technological Paper Writing, Contributing, Publishing Essentials 2011.08.02 Lanzhou University
731 Professor Chang's Sayings 2011.08.02 Lanzhou University
732 Rapid Development of University Academics in China 2011.08.13 Department Computer Science and Information Engineering, National Taichung Institite of Technology
733 Professor Chang's Sayings 2011.08.13 Department Computer Science and Information Engineering, National Taichung Institite of Technology
734 Information Steganography Using Magic Matrix 2011.08.28 Yantai, China (Keynote Speech at The 2011 3rd International Conference on Signal Processing Systems)
735 Applying De-Clustering Concept to Information Hiding 2011.08.30 Dalian University of Technology
736 Professor Chang's Sayings 2011.08.30 Dalian University of Technology
737 Professor Chang's Sayings 2011.09.08 Beijing Jiaotong University
738 Authenticatable Visual Secret Sharing 2011.09.08 Beijing Jiaotong University
739 An Information Hiding Scheme Using Sudoku 2011.09.10 Tianjin, China (Keynote Speech at The 2011 2nd International Conference on electronics and Information Engineering)
740 Recent Developments in Secret Image Sharing 2011.09.17 Hong Kong, China (Keynote Speech at The 2011 International Conference on Internet Computing and Information Services)
741 Information Steganography Using Magic Matrix 2011.10.07 Intelligent Network Forum, Providence University
742 Authenticatable Visual Secret Sharing 2011.10.14 Dalian, China (Keynote Speech at The 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing)
743 The Road to Success 2011.10.18 Shandong Institute of Business and Technology
744 Recent Developments in Information Hiding 2011.10.18 Shandong Institute of Business and Technology
745 Authenticatable Visual Secret Sharing 2011.10.22 Wuhan, China (Keynote Speech at The 2011 International Symposium on Intelligence Information Processing and Trusted Computing)
746 Introduction to Visual Cryptography 2011.10.27 Department of Information Management, National United University
747 Professor Chang's Sayings 2011.10.27 Department of Information Management, National United University
748 Secret Sharing Using Digital Image Shadows 2011.11.03 Beijing, China (Keynote Speech at The 2011 SSITE International Conference on Computers and Advanced Technology in Education)
749 An Information Hiding Scheme Using Sudoku 2011.11.10 Management Information Systems, National Chung-Hsing University
750 Secret Sharing Using Digital Image Shadows 2011.11.11 Taichung, Taiwan (Keynote Speech at The 2011 Workshop on Consumer Electronics)
751 Some Steganographic Methods Using Table Lookup Techniques 2011.11.26 Chengdu, China (Keynote Speech at The 2011 International Conference on Networks and Information)
752 Information Steganography Using Magic Matrix 2011.12.09 Department of Computer Science and Engineering, National Sun Yat-Sen University
753 A Genetic Algorithm for Density-Based Vector Quantization 2011.12.27 Bangkok, Thailand (Keynote Speech at The 2011 2nd International Conference on Advances in Energy Engineering)
754 Information Steganography Using Magic Matrix 2012.01.04 Department of Information Management National Chin-Yi University of Technology
755 Rambling on about Research Methods 2012.01.06 School of Information Science & Technology Southwest JiaoTong University
756 Information Steganography Using Magic Matrix 2012.01.08 Chengdu, China (Keynote Speech at The 2012 International Conference on Innovation and Information Management)
757 Steganographic Methods Using Table Lookup Techniques 2012.02.18 Hong Kong, China (Keynote Speech at The 2012 International Conference on Information and Computer Applications)
758 Steganographic Methods Using Table Lookup Techniques 2012.02.22 Sanya, China (Keynote Speech at The 2012 International Conference on Future Electrical Power and Energy Systems)
759 Authenticatable Visual Secret Sharing 2012.02.27 Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Affective Computing and Intelligent Interaction)
760 Secret Sharing Using Digital Image Shadows 2012.03.02 Macao, China (Keynote Speech at The 2012 International Conference on Innovative Computing, Information and Automation)
761 Secret Sharing Using Digital Image Shadows 2012.03.11 Hong Kong, China (Keynote Speech at The 2012 International Conference on Security Science and Technology)
762 Rambling on about Research Methods 2012.03.14 National Central University, Department of Computer Science and Information Engineering
763 Professor Chang's Sayings 2012.03.14 National Central University, Department of Computer Science and Information Engineering
764 Recent Developments in Information Steganography 2012.03.15 Asia University, Taiwan (Keynote Speech at The 2012 Information Security Workshop)
765 Information Steganography Using Magic Matrix 2012.03.16 Department of Computer Science and Information Engineering, National Dong Hwa University
766 Secret Image Sharing Systems 2012.03.25 Shenzhen, China(Keynote Speech at The 2012 International Conference on Information and Industrial Electronics)
767 Rambling on about Research Methods 2012.03.26 Shenzhen Graduate School, Harbin Institute of Technology
768 Secret Sharing Using Digital Image Shadows 2012.04.28 Shanghai, China (Keynote Speech at The 2012 The 6th International Conference on Information Security and Assurance)
769 Recent Developments in Hiding Information 2012.05.06 Chengdu, China (Keynote Speech at The 2012 International Conference on Network and Computing Technology)
770 Recent Developments in Information Hiding 2012.05.07 Nanchang, China (Keynote Speech at The 2012 2nd International Conference on Materials, Mechatronics and Automation)
771 Information Steganography Using Magic Matrix 2012.05.09 Fujian Normal University(School of Mathematics and Computer Science)
772 Information Steganography Using Magic Matrix 2012.05.10 Fuqing Branch of Fujian Normal University(School of Mathematics and Computer Science)
773 Visual Cryptography and Information Steganography 2012.05.12 Guangzhou, China (Keynote Speech at The 2012 2nd International Conference on Business Management and Electronic Information)
774 Information Steganography Using Magic Matrix 2012.05.14 Guilin University of Technology, College of Information Science and Engineering
775 Embedding Secret Messages in Texts 2012.05.14 Guilin University of Technology, College of Information Science and Engineering
776 Emoticon-Based Text Steganography in Online Chat tools 2012.05.17 Department of Management Information Systems, National Chung Hsing University
777 Emoticon-Based Text Steganography in Online Chat tools 2012.05.24 Department Computer Science and Information Engineering, National Taichung University of Scienceand Technology
778 Embedding Secret Messages in Texts 2012.05.30 Cebu, Philippines (Keynote Speech at The 2012 International Conference on Information Science and Industrial Applications)
779 Digital Watermarking and Its Applications 2012.06.01 Shanghai, China (Keynote Speech at The 2012 2nd International Conference on Future Computers in Education)
780 Digital Watermarking and Its Applications 2012.06.03 Zhengzhou, China (Keynote Speech at The 2012 International Conference on Computer and Communication Devices)
781 Emoticon-Based Text Steganography in Online Chat tools 2012.06.03 Zhengzhou University of Light Industry
782 The Design of Visual Cryptosystems 2012.07.07 Taiyuan, China (Keynote Speech at The 2012 International Conference on Computing Measurement Control and Sensor Network)
783 Visual Cryptography and Information Steganography 2012.08.04 Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Signal, Image Processing and Applications)
784 Hiding Secrets in a Digital Image 2012.08.21 Seoul, Korea (Keynote Speech at The 2012 4th International Conference on Awareness Science and Technology)
785 Rambling on about Research Methods 2012.08.23 College of Computer, Hangzhou Dianzi University
786 Recent Developments in Hiding Information 2012.08.24 Hangzhou, China (Keynote Speech at The 2012 International Conference on Networking and Technology)
787 Embedding Secrets Using Magic Matrices 2012.08.25 Weihai, China (Keynote Speech at The 2012 3rd International Conference on Electronics and Information Engineering)
788 Steganographic Systems for Secret Messages 2012.08.26 Shanghai, China (Keynote Speech at The 2012 International Conference on Image, Vision and Computing)
789 Hiding Information in a Digital Image 2012.09.02 Phuket Island, Thailand (Keynote Speech at The 2012 International Conference on Computer Design and Engineering)
790 Some Steganographic Methods for Delivering Secret Messages Using Cover Media 2012.09.08 Qingdao, China (Keynote Speech at The 2012 3rd International Conference on Information Technology for Manufacturing Systems)
791 Appilcations of CRT in Information Science 2012.09.13 Beijing Jiaotong University
792 Information Hiding Technology and Optimal Problem 2012.09.15 Beijing University of Chemieal Technology, School of Management
793 Table Look-up Methods for Storing and Retrieving Secret Messages 2012.09.16 Beijing, China (Keynote Speech at The 2012 International Conference on Information and Computer Technology)
794 Appilcations of CRT in Information Science 2012.09.25 The College of Information Engineering on XiangTan University
795 Embedding Messages in Digital Images 2012.09.27 Beijing, China (Keynote Speech at The 2012 The 4th International Conference on Advanced Science and Technology)
796 Embedding Secrets in Digital Images 2012.10.05 Dalian, China (Keynote Speech at The 2012 International Conference on Applied Physics and Materials Science)
797 Appilcations of CRT in Information Science 2012.10.10 Anhui University
798 Appilcations of CRT in Information Science 2012.10.11 School of Information Science and Technology, University of Science and Technology of China
799 Visual Cryptography 2012.10.17 Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Advanced Materials and Information Technology Processing)
800 Recent Developments in Information Hiding 2012.10.20 Sanya, China (Keynote Speech at The 2012 International Conference on Information Management, Innovation Management and Industrial Engineering)
801 Visual Cryptography and Information Steganography 2012.10.24 Department of Computer Science Information Engineering, National Yunlin University of Science and Technology
802 Professor Chang's Sayings 2012.10.24 Department of Computer Science Information Engineering, National Yunlin University of Science and Technology
803 Using Table Look-up Methods to Hide Secret Information 2012.10.27 Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Information Communication and Management)
804 Recent Developments in Information Steganography 2012.11.02 School of Medical Informatics, Chung Shan Medical University
805 Professor Chang's Sayings 2012.11.02 School of Medical Informatics, Chung Shan Medical University
806 Self-growth of Young Scholar 2012.11.07 Department of Computer Science and Information Engineering, Hungkuang University
807 Professor Chang's Sayings 2012.11.07 Department of Computer Science and Information Engineering, Hungkuang University
808 Appilcations of CRT in Information Science 2012.11.12 Shenzhen Graduate School, Harbin Institute of Technology
809 Embedding Secrets in Digital Images 2012.11.13 GuangZhou University
810 Appilcations of CRT in Information Science 2012.11.14 GuangZhou Institutes of Advanced Technology, Chinese Academy of Sciences
811 Appilcations of CRT in Information Science 2012.11.15 Shenzhen University
812 Appilcations of CRT in Information Science 2012.11.20 Providence University, IET Distinguished Lecture Series
813 Sharing Academic Work and Proposal Writing 2012.11.22 College of Computer Science, Asia University
814 Recent Developments in Information Hiding 2012.11.25 Bangkok, Thailand (Keynote Speech at The 2012 International Conference on Networks and Information)
815 Sharing Academic Work and Proposal Writing 2012.12.13 2012 International Computer Symposium
816 Hiding Information in a Digital Image 2012.12.13 Department of Medical Informatics, TZU CHI University
817 Hiding Information in a Digital Image 2013.01.03 National Taichung University of Science and Technology, IET Distinguished Lecture Series
818 Recent Developments in Information Hiding 2013.01.20 Singapore (Keynote Speech at The 2013 International Conference on Innovation and Information Management)
819 Digital Watermarking and Its Applications 2013.03.13 Xiamen, China (Keynote Speech at The 2013 3rd International Conference on Advanced Measurement and Test)
820 Embedding Secrets Using Magic Matrices 2013.03.13 Software School of Xiamen University
821 Appilcations of CRT in Information Science 2013.03.18 Department of Management Information Systems, National Chung Hsing University
822 Information Steganography Using Magic Matrix 2013.04.17 School of Information Science & Technology Southwest JiaoTong University
823 Recent Development of Information Hiding Steganography 2013.04.18 School of Computer Science and Engineering, University of Electronic Science and Technology
824 Recent Developments in Information Hiding 2013.04.22 Beijing, China (Keynote Speech at The 2013 5th International Conference on Digital Image Processing)
825 Sharing Academic Work and Proposal Writing 2013.04.30 Feng Chia University Libraries
826 Appilcations of CRT in Information Science 2013.05.16 Department of Information Engineering and Computer Science, Feng Chia University
827 Hiding Information in a Digital Image 2013.05.22 Beijing, China (Keynote Speech at The 2013 International Conference on Electrical Engineering and Computer Sciences)
828 Professor Chang's Sayings 2013.05.24 School of Computer Science and Technology, Hangzhou Duanzi University
829 Digital Watermarking and Its Applications 2013.05.24 School of Media and Design, Hangzhou Duanzi University
830 Professor Chang's Sayings 2013.05.26 Internet of Things, Jiangnan University
831 Rambling on about Research Methods 2013.05.28 Internet of Things, Jiangsu University
832 Professor Chang's Sayings 2013.05.28 Internet of Things, Jiangsu University
833 Embedding Secrets Using Magic Matrices 2013.05.29 Internet of Things, Jiangsu University
834 Appilcations of Chinese Remainder Theorem 2013.05.29 Internet of Things, Jiangsu University
835 Visual Cryptography and Information Steganography 2013.07.07 Hong Kong, China (Keynote Speech at The 2013 4th International Conference on Signal and Information Processing)
836 How to Create High Quality Research Papers 2013.07.19 School of Information Science & Technology Southwest JiaoTong University
837 Embedding Secrets in Digital Images 2013.07.21 Chengdu, China (Keynote Speech at The 2013 2nd International Conference on Information and Knowledge Management)
838 Emoticon-Based Text Steganography in Online Chat tools 2013.07.23 Anhui University(School of Computer Scince and Technology)
839 Embedding Secrets Using Magic Matrices 2013.07.23 University of Science and Technology of China(School of Computer Scince and Technology)
840 Embedding Secrets in Digital Images 2013.07.25 Seoul, Korea (Keynote Speech at The 2013 8th Asia Joint Conference on Information Security)
841 Information Steganography Using Magic Matrix 2013.08.22 Department of Information Engineering and Computer Science, Feng Chia University
842 Learning and Growing for a Graduate Student 2013.09.05 Department of Information Engineering and Computer Science, Feng Chia University
843 The Road to Success 2013.09.12 Department of Information Engineering and Computer Science, Feng Chia University
844 Rambling on about Research Methods 2013.09.19 Department of Information Engineering and Computer Science, Feng Chia University
845 Appilcations of CRT in Information Science 2013.10.10 Fujian Normal University(School of Mathematics and Computer Science)
846 Appilcations of CRT in Information Science 2013.10.21 Taiyuan University of Science and Technology
847 Rambling on about Research Methods 2013.10.25 Shenzhen Graduate School, Harbin Institute of Technology
848 Visual Cryptography 2013.10.27 Hong Kong, China (Keynote Speech at The 2013 5th International Conference on Graphic and Image Processing)
849 Hiding Information in a Digital Image 2013.10.28 Guilin University of Electronic Technology(College of Mathematics & Computer Science)
850 Recent Developments in Information Hiding 2013.11.01 National Chung Hsing University-Information Security Seminar
851 Information Steganography Using Magic Matrix 2013.11.08 Central Police University
852 The Design of Computer Password 2013.11.19 Providence University
853 Appilcations of CRT in Information Science 2013.11.20 School of Computer Science and Technology, Hangzhou Duanzi University
854 Information Steganography Using Magic Matrix 2013.11.22 Chang'an University(School of Information Engineering)
855 Authenticatable Visual Secret Sharing 2013.11.23 Xidian, China (Keynote Speech at The 2013 International Conference on Information Management, Innovation Management and Industrial Engineering)
856 Appilcations of CRT in Information Science 2013.11.25 Northwestern Polytechnical University(School of Computer Science)
857 Information Steganography Using Magic Matrix 2013.11.25 College of Communications Engineering , Xidian University(School of Computer Science)
858 Hiding Information in a Digital Image 2013.12.02 Xidian, China (Keynote Speech at The 2013 5th International Conference on Information Management and Engineering)
859 Authenticatable Visual Secret Sharing 2013.12.03 University of Electronic Science and Technology of China
860 Appilcations of CRT in Information Science 2013.12.05 University of Electronic Science and Technology of China
861 Information Steganography Using Magic Matrix 2013.12.07 XiangTan University(The College of Information Engineering)
862 Appilcations of CRT in Information Science 2013.12.09 Hunan University of Technology(Young Computer Scientists & Engineers Forum)
863 Appilcations of CRT in Information Science 2013.12.11 Jishou University
864 A Virtual Image Cryptosystem Based upon Vector Quantization 2014.01.02 National Chung Hsing University-Information Security Seminar
865 Authenticatable Visual Secret Sharing 2014.01.02 Department of Management Information Systems, National Chung Hsing University
866 Information Steganography Using Magic Matrix 2014.03.10 Department of Computer Science and Information Engineering, National Chung Cheng University
867 The Recent Developments in Visual Secret Sharing 2014.03.21 Manila, Philippines (Keynote Speech at The 2014 International Conference on Circuits and Systems)
868 Information Steganography Using Magic Matrix 2014.04.12 Jeju Island, Korea (Keynote Speech at The 2014 3rd International Conference on Network and Computing Technology)
869 Information Steganography Using Magic Matrix 2014.05.14 HuangHuai University, Henan
870 Rambling on about Research Methods 2014.05.16 Taiyuan University of Science and Technology
871 Decluster and Its Application to Steganography 2014.05.19 Beijing Jiaotong University
872 Information Steganography Using Magic Matrix 2014.05.19 North China Institute of Aerospace Engineering
873 Information Steganography Using Magic Matrix 2014.05.20 State Key Laboratory Of Information Security, Chinese Academy of Sciences
874 Information Steganography Using Magic Matrix 2014.05.21 Beijing Tsinghua University
875 How to Create High Quality Research Paper 2014.05.22 Hangzhou Duanzi University
876 Professor Chang's Sayings 2014.05.22 Hangzhou Duanzi University
877 Digital Watermarking and Its Applications 2014.05.23 Zhejiang University of Media and Communications
878 Authenticatable Visual Secret Sharing 2014.06.09 Tiachung, Taiwan (Keynote Speech at The First International Conference on Trustworthy System)
879 Authenticatable Visual Secret Sharing 2014.06.15 Hong Kong, China (Keynote Speech at The 2014 International Conference on Knowledge Engineering and Applications)
880 Key to High Quality Research 2014.06.18 College of Computer Science and Technology, Huaqiao University
881 Hiding Information in a Digital Image 2014.06.18 College of Computer Science and Technology, Huaqiao University
882 Quotations from Professor Chang 2014.06.18 College of Computer Science and Technology, Huaqiao University
883 Information Hiding Techniques 2014.07.04 Jeju Island, Korea (Keynote Speech at The 3rd International Conference on Knowledge and Education Technology)
884 Hiding Information in a Digital Image 2014.07.29 Hong Kong, China (Keynote Speech at International Conference on Industrial and Applied Electronics)
885 Recent Developments in Information Hiding 2014.08.15 Lijiang, China (Keynote Speech at 2014 International Conference on Multimedia and Communication Technologies)
886 Information Steganography Using Magic Matrix 2014.09.05 School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China
887 Some Techniques for Sharing Digital Secret Images 2014.09.07 Chengdu, China (Keynote Speech at The 2014 International Conference on Information and Computer Technology)
888 The Road to Success 2014.09.30 National Chung Cheng University
889 A Watermarking Scheme for Categorical Relational Databases 2014.10.02 Taipei (Keynote Speech at 2014 The 13th International Workshop on Digital-forensics and Watermarking)
890 Using Genetic Algorithm to Embed Important Information in an Image Compression File 2014.10.18 Nanchang, China (Keynote Speech at The 8th International Conference on Genetic and Evolutionary Computing)
891 Information Steganography Using Magic Matrix 2014.10.22 Northwestern Polytechnical University
892 Information Steganography Using Magic Matrix 2014.10.23 Xi'an University of Architecture and Technology
893 Using Genetic Algorithm to Embed Important Information in an Image Compression File 2014.10.24 Chang'an University
894 Using Genetic Algorithm to Embed Important Information in an Image Compression File 2014.10.24 Northwestern Polytechnical University
895 Turtle Shell Based Information Hiding Mechanism 2014.10.25 Xi'an, China (Keynote Speech at 2014 7th International Conference on Information Management, Innovation Management and Industrial Engineering)
896 Information Hiding Techniques Using Magic Matrix 2014.11.03 Taiyuan, Vietnam (Keynote Speech at 2014 International Symposium on GIS and Advanced Technologies)
897 Hiding Information in a Digital Image 2014.11.10 Shenzhen, China (Keynote Speech at The 2014 International Conference on Computer Engineering)
898 Turtle Shell Based Information Hiding Mechanism 2014.11.12 Anhui University
899 Visual Cryptography 2014.11.14 Jiangsu University
900 Using Genetic Algorithm to Embed Important Information in an Image Compression File 2014.11.17 Hangzhou Duanzi University
901 The Design of Computer Password 2014.11.17 Zhejiang Gongshang University
902 Information Steganography Using Magic Matrix 2014.12.03 Department of Management Information Systems, National Pingtung University of Science and Technology
903 The Design of Computer Password 2014.12.05 Huizhou University
904 Turtle Shell Based Information Hiding Mechanism 2014.12.09 Shenzhen Graduate School, Harbin Institute of Technology
905 Research Methodology for Science and Technology 2014.12.13 2014 International Computer Symposium
906 Turtle Shell Based Information Hiding Mechanism 2015.03.04 Department of Computer Science and Information Engineering, National Taipei University
907 Using Genetic Algorithm to Embed Important Information in an Image Compression File 2015.03.13 Hong Kong, China (Keynote Speech at The 2015 2nd International Conference on Electrical Engineering and Information Technology)
908 Rambling on about Research Methods 2015.03.16 Peking University
909 Information Steganography Using Magic Matrix 2015.03.17 Shenzhen Graduate School, Harbin Institute of Technology
910 Appilcations of CRT in Information Science 2015.04.08 School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology
911 Appilcations of CRT in Information Science 2015.04.09 School of Telecommunication and Information Engineering, Shanghai University
912 An Information Hiding Scheme Using SUDOKU 2015.04.10 School of Electrical Information and Engineering, Shanghai Jiao Tong University
913 An Information Hiding Scheme Using SUDOKU 2015.04.13 School of Electrical and Information Engineering, Shanghai Tongji University
914 An Information Hiding Scheme Using SUDOKU 2015.04.16 School of Information, Zhejiang University of Finance & Economics
915 Rambling on about Research Methods 2015.04.22 Oriental Institute of Technology
916 Information Steganography Using Magic Matrix 2015.05.05 College of Computer and Information Engineering, Xiamen University of Technology
917 Information Steganography Using Magic Matrix 2015.06.04 Department of Management Information Systems, National Chung Hsing University
918 Information Steganography Using Magic Matrix 2015.07.07 Fujian University of Technology
919 Rambling on about Research Methods 2015.07.13 Guilin University of Electronic Technology
920 Information Steganography Using Magic Matrix 2015.07.16 Shenzhen Institutes of Advanced Technology, Chineses Academy of Sciences
921 How to Publish IEEE Papers 2015.09.23 Feng Chia University Library
922 Information Hiding Techniques Based on ( 7,4) Hamming Code 2015.10.02 Providence University Department of Information Management
923 The Road to Success 2015.10.15 School of Management, University of Science and GTM
924 Information Hiding Techniques Based on ( 7,4) Hamming Code 2015.10.20 China Hangzhou The 16th IEEE International Conference on Communication Technology (ICCT2015) special lecture
925 How to Publish IEEE Papers 2015.10.20 Hangzhou University of Electronic Science and Technology China
926 How to Publish IEEE Papers 2015.10.22 Southwest Jiaotong University in Chengdu, China
927 Information Hiding Techniques Based on ( 7,4) Hamming Code 2015.10.23 Department of Electronic Engineering, University of Electronic Science and Technology, China
928 Information Hiding Techniques Based on ( 7,4) Hamming Code 2015.10.26 Information Engineering, Chang'an University, China
929 How to Publish IEEE Papers 2015.10.26 Information Engineering, Chang'an University, China
930 An Information Hiding Scheme Using Sudoku 2015.10.27 School of Electronic and Information Engineering, Xi'an Jiaotong University, China
931 How to Publish IEEE Papers 2015.10.27 Software Northwestern Polytechnical University, China
932 Information Hiding Techniques Based on ( 7,4) Hamming Code 2015.10.28 School of Computer Science, Northwestern Polytechnical University, China
933 Authenticatable Visual Secret Sharing 2015.10.31 Hangzhou, China (Keynote Speech at The 9th International Conference on Management of e-Commerce and e-Government (ICMeCG2015)
934 Information Hiding Techniques Based on ( 7,4) Hamming Code 2015.11.13 Information Department of Medicine, Chung Shan Medical University
935 The experience sharing of paper writting and proposal editing 2015.11.24 Mingdao University
936 A Steganographic Algorithm Based on ( 7,4) Hamming Code 2016.02.25 Taichung, Feng Chia University (Keynote Speech at The First Workshop on Cryptography and Steganography)
937 Turtle Shell Based Information Hiding Mechanism 2016.03.10 Department of Information Science, National Chengchi University
938 How to Create High Quality Research Papers 2016.04.15 Optical-Electrical and Computer Engineering, Shanghai Polytechnic University
939 Exentials of Scientific Paper 2016.04.15 Optical-Electrical and Computer Engineering, Shanghai Polytechnic University
940 Using Coding Techniques to Hide Secret Information 2016.04.20 Electronic Engineering, Tsinghua University, Beijing
941 Information Hiding Techniques Based on ( 7,4) Hamming Code 2016.04.22 Information Engineering, National Sun Yat-sen University
942 Information Hiding Techniques Based on ( 7,4) Hamming Code 2016.04.29 National Dong Hwa University Information Engineering
943 How to Create High Quality Research Papers 2016.05.06 Chaoyang University of Technology Department of Information Management
944 Exentials of Scientific Paper 2016.05.06 Chaoyang University of Technology Department of Information Management
945 Information Hiding Technology and Optimal Problem 2016.05.16 Communication and Information Engineering, Xi'an University of Posts and Telecommunications, China
946 Rambling on about Research Methods 2016.05.18 Computer Science, Northwestern Polytechnical Universit, China
947 Applying De-Clustering Concept to Information Hiding 2016.05.18 Computer Science, Northwestern Polytechnical University, China
948 Authenticatable Visual Secret Sharing 2016.05.18 Computer Science, Northwestern Polytechnical University, China
949 Information Hiding Techniques Based on ( 7,4) Hamming Code 2016.05.21 Chengdu, China, The 8th International Conference on Digital Image Processing (ICDIP 2016), Keynote speaker
950 Information Hiding Technology and Optimal Problem 2016.05.23 Chengdu University School of Computer Science and Information Engineering, China
951 Applying De-Clustering Concept to Information Hiding 2016.05.23 Chengdu Electronic Engineering, University of Electronic Science and Technology, China
952 Exentials of Scientific Paper 2016.05.23 Chengdu Electronic Engineering, University of Electronic Science and Technology, China
953 Using Coding Techniques to Hide Secret Information 2016.05.24 College of Information Science and Technology, Chengdu Southwest Jiaotong University, China
954 Information Steganography Using Magic Matrix 2016.05.30 Computer Science and Technology, Wuhan University of Technology, China
955 How to Create High Quality Research Papers 2016.05.30 School of Information Management, Huazhong Normal University, China
956 Exentials of Scientific Paper 2016.05.30 School of Information Management, Huazhong Normal University, China
957 How to Create High Quality Research Papers 2016.05.31 College of Computer Science, Jingzhou Yangtze University, China
958 Exentials of Scientific Paper 2016.05.31 College of Computer Science, Jingzhou Yangtze University, China
959 Turtle Shell Based Information Hiding Mechanism 2016.06.01 College of Computer Science, Jingzhou Yangtze University, China
960 Information Steganography Using Magic Matrix 2016.06.02 Computer and Information Science, Yichang Three Gorges University, China
961 Information Steganography Using Magic Matrix 2016.06.03 Long in the pulpit, Hubei University of Arts and Science, China
962 Rambling on about Research Methods 2016.06.06 Computer and Information Science, Chongqing Southwest University, China
963 How to Be a Successful Graduate Student 2016.07.06 School of Computer Science, Hangzhou Dianzi University, China
964 A Novel Data Hiding Method to Conceal Secret Data 2016.07.06 Hangzhou International Forum of Big Data and E-commerce Keynote Speaker, China
965 Information Steganography Using Magic Matrix 2016.07.07 College of Information Engineering, Zhejiang Agriculture and Forestry University, China
966 Using Coding Techniques to Hide Secret Information 2016.07.28 Department of Computer Science and Information Technology, Beijing Jiaotong University
967 Turtle Shell Based Information Hiding Mechanism 2016.07.29 Beijing, China, The 10th Cross Strait Conference on Information Science and Technology(CSCIST 2016), Keynote speaker
968 De-clustering and Its Application to Steganography 2016.08.12 Taiyuan University of Science and Technology
969 Information Hiding Techniques Using Magic Matrix 2016.08.14 Beijing, China, The 2016 IEEE International Conference on Signal and Image Processing (ICSIP 2016), Keynote speaker
970 Embedding Secret Messages in Digital Images 2016.09.04 New Taipei City, Taiwan, The 2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2016), Keynote speaker
971 The Application of Chinese Remainder Theorem in Information Science 2016.09.19 Beijing Information Science & Technology University
972 The Application of Chinese Remainder Theorem in Information Science 2016.09.23 Chung Shan Medical University
973 The Application of Chinese Remainder Theorem in Information Science 2016.11.14 Fujian University of Technology
974 Applying De-clustering Concept to Information Hiding 2016.11.15 Fujian Normal University
975 Steganographic Technique Based on Magic Matrix 2016.11.15 Fuzhou University
976 Applying De-clustering Concept to Information Hiding 2016.11.16 Fujian University of Technology
977 Some Steganographic Methods for Delivering Secret Messages Using Cover Media 2016.11.21 Kaohsiung, Taiwan, The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2016), Keynote speaker
978 How to Write a Plan of Ministry of Science and Technology 2016.11.25 Central Taiwan University of Science and Technology
979 How to Publish IEEE Journal Papers 2016.11.29 Chaoyang University of Technology
980 Some Steganographic Methods for Delivering Secret Messages Using Cover Media 2016.12.09 National Taichung University of Science and Technology
981 Turtle Shell Based Information Hiding Mechanism 2016.12.16 Chiayi, Taiwan, International Computer Symposium (ICS 2016), Keynote speaker
982 Guide for Writing a Project Proposal and Key to Success in Academic Research 2016.12.28 Tunku Abdul Rahman University, Malaysia
983 Information Hiding Technology Current Research and Future Trend 2016.12.28 Tunku Abdul Rahman University, Malaysia
984 My Research Projects 2016.12.28 Tunku Abdul Rahman University, Malaysia
985 Turtle Shell Based Information Hiding Mechanism 2016.12.29 The 4th International Conference on Information and Network Security Keynote Speaker
986 A Novel Data Hiding Method to Conceal Secret Data 2017.01.15 International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2017) Keynote Speaker
987 Information Steganography Using Magic Matrix 2017.01.16 China University of Geosciences
988 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2017.03.03 Department of Medical Informatics, Tzu Chi University
989 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2017.03.03 Department of Information Engineering, National Dong Hwa University
990 Turtle Shell Based Information Hiding Mechanism 2017.03.07 Department of Information Management, Chaoyang University of Technology
991 Turtle Shell Based Information Hiding Mechanism 2017.03.09 College of Computing and Informatics, Providence University
992 Turtle Shell Based Information Hiding Mechanism 2017.03.17 College of Computing and Informatics, Hubei University of Technology
993 Information Hiding Mechanisms Based on Magic Matrices 2017.03.18 Keynote Speaker at the International Conference on Multimedia and Image Processing (ICMIP 2017)
994 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2017.03.20 University of Electronic Science and Technology
995 Turtle Shell Based Information Hiding Mechanism 2017.03.21 College of Computer Science, Sichuan University
996 News of International Tourism 2017.03.23 Department of Information Management, National Taichung University of Science and Technology
997 Turtle Shell Based Information Hiding Mechanism 2017.03.30 Department of Computer Science and Information Engineering, Tamkang University
998 Information Hiding Techniques Based on ( 7,4) Hamming Code 2017.04.17 College of Computer Science and Technology, Huaqiao University
999 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2017.04.19 Beijing Tsinghua University
1000 Turtle Shell Based Information Hiding Mechanism 2017.04.20 Beijing University of Technology
1001 How to Be a Successful Graduate Student 2017.04.24 Department of Computer Science and Information Engineering, National Chung Cheng University
1002 Using Genetic Algorithm to Embed Important Information in an Image Compression File 2017.05.19 Keynote Speech at the 34th Workshop on Combinatorial Mathematics and Computation Theory, Department of Information Engineering and Computer Science, Feng Chia University
1003 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2017.05.19-
2017.05.22
Keynote Speech at the International Conference on Digital Image Processing (ICDIP 2017), Hong Kong
1004 Applying De-Clustering Concept to Information Hiding 2017.05.25 Keynote Speech at Cryptology and Information Security Conference 2017 (CISC 2017), I-Shou University
1005 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2017.06.01 School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China
1006 Embedding Important Information in Digital Images Using Magic Turtle Shells 2017.06.02-
2017.06.04
Keynote Speech at the International Conference on Image, Vision and Computing (ICIVC 2017), Chengdu, China
1007 Information Hiding Techniques Based on ( 7,4) Hamming Code 2017.06.03 School of Mathematical Sciences, Sichuan Normal University
1008 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2017.06.04 School of Computer and Software Engineering, Chengdu, China
1009 Turtle Shell Based Information Hiding Mechanism 2017.08.11 Keynote Speech at the 10th International Conference on Advanced Computer Theory and Engineering (ICACTE 2017), Jeju Island, South Korea
1010 Using Meaningful Digital Shadow Images to Recover a Secret Message 2017.08.14 Keynote Speech at the 2nd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2017), Taichung
1011 News of International Tourism 2017.09.22 Department of Civil Engineering and Engineering Management, National Quemoy University
1012 Visual Cryptography & Digital Signature Technology 2017.10.13 Forensic industry information application theme salon, Ningpo, China
1013 Information Hiding Technology : Current Research and Future Trend 2017.10.14 School of Information & Electronic Engineering, Zhejiang Gongshang University
1014 Turtle Shell Based Information Hiding Mechanism 2017.10.14 Hangzhou Dianzi University, China
1015 Authenticatable Visual Secret Sharing 2017.10.15 School of Computer Science, Hangzhou Dianzi University, China
1016 Authenticatable Visual Secret Sharing 2017.10.17 School of Information, Zhejiang University of Finance & Economics
1017 Authenticatable Visual Secret Sharing 2017.10.18 Fujian University of Technology
1018 Turtle Shell Based Information Hiding Mechanism 2017.10.20 College of Computer and Information Sciences, Fujian Agriculture and Forestry University
1019 Rambling on about Research Methods 2017.10.20 College of Mathematics and Informatics, Fujian Normal University
1020 Turtle Shell Based Information Hiding Mechanism 2017.10.23 Huaqiao University
1021 Rambling on about Research Methods 2017.10.24 College of Computer Science and Technology, Huaqiao University
1022 Information Security Professional Outlet 2017.10.24 Undergraduate professional of Information Security, Huaqiao University
1023 Rambling on about Research Methods 2017.10.24 Computer Engineering College, Jimei University
1024 Rambling on about Research Methods 2017.10.31 Department of Information Management, Chaoyang University of Technology
1025 Information Hiding Technology : Current Research and Future Trend 2017.11.07-
2017.11.09
Keynote Speech at the 2nd International Conference on Communication and Information Systems (ICCIS 2017), Wuhan, China
1026 Turtle Shell Based Information Hiding Mechanism 2017.11.08 "Master party" salon, College Of Computer Science, South-Central University for Nationalities
1027 Embedding Secrets Using Magic Matrices 2017.11.22 Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology
1028 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2017.12.08-
2017.12.10
Keynote Speech at the 6st International Conference on Network, Communication and Computing (ICNCC 2017), Kunming, China
1029 Turtle Shell Based Information Hiding Mechanism 2017.12.18 Keynote Speech at the 12th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2017), Providence University
1030 The Way to Success 2017.12.26 China Medical University
1031 A Data Hiding Scheme Based on a Reference Matrix and a Location Table 2017.12.28 Keynote Speech at the 2017 International Conference on Video and Image Processing (ICVIP 2017), Singapore
1032 Extended Exploiting-Modification-Direction Data Hiding with High Embedding Capacity 2018.01.13-
2018.01.15
Keynote Speech at the International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2018), Wuhan, China
1033 Turtle Shell Based Information Hiding Mechanism 2018.02.08 Feng Chia University, Department of Information Engineering and Computer Science
1034 Current Research on Information Hiding 2018.03.17 Keynote Speech at the 3rd International Conference on Multimedia and Image Processing (ICMIP 2018), Guiyang, China
1035 Steganography Based on Turtle Shell 2018.03.28 Jimei University
1036 Information Hiding Technology Based on De-clustering Strategy 2018.03.29 Huaqiao University
1037 Using Meaningful Digital Shadow Images to Recover a Secret Message 2018.03.29 Xiamen University of Technology, School of computer and Information Engineering
1038 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2018.04.17 Hangzhou Dianzi University, Institute of image technology
1039 An Information Hiding Scheme Using Turtle Shells 2018.04.17 Hangzhou Dianzi University, School of Computer Science and Technology
1040 News of International Tourism 2018.04.17 Hangzhou Dianzi University, School of Computer Science and Technology
1041 Steganography Based on Magic Matrix 2018.04.18 Hangzhou Dianzi University, School of Computer Science and Technology
1042 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2018.04.18 Zhejiang University of Finance & Economics, School of information management and Engineering
1043 Steganography Based on Magic Matrix 2018.04.22 Guangdong University of Technology
1044 Applying De-clustering Concept to Information Hiding 2018.04.28-
2018.04.30
Keynote Speech at the 3rd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2018), Shenzhen, China
1045 Steganography Based on Turtle Shell 2018.05.07 National QUEMOY University, Department of Information Engineering
1046 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2018.05.12 Keynote Speech at the 10th International Conference on Digital Image Processing (ICDIP 2018), Shanghai, China
1047 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2018.05.14 University of Shanghai for Science and Technology
1048 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2018.05.15 Taiyuan University of Science and Technology, School of Electronic Information Engineering
1049 A Digital Watermarking Scheme Based on VQ 2018.05.15 Taiyuan University of Science and Technology, School of Electronic Information Engineering
1050 Using Meaningful Digital Shadow Images to Recover a Secret Message 2018.05.16 Taiyuan University of Science and Technology
1051 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2018.05.23 FuJian University of Technology
1052 Steganography Based on Magic Matrix 2018.05.23 Fuqing branch of fujian normal university
1053 Using Meaningful Digital Shadow Images to Recover a Secret Message 2018.05.24 Fujian Normal University
1054 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2018.05.24 Fujian Agriculture and Forestry University
1055 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2018.06.25 Sichuan Normal University
1056 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2018.06.26 Xihua University
1057 Using Meaningful Digital Shadow Images to Recover a Secret Message 2018.06.26 University of Electronic Science and Technology of China
1058 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2018.06.28 Keynote Speech at the 3rd IEEE International Conference on Image, Vision and Computing (ICIVC 2018),Chongqing, China
1059 Steganography Based on Turtle Shell 2018.06.28 Chongqing University of Posts and Telecommunications, School of Cyberspace Security and Information Law
1060 Applying De-clustering Concept to Information Hiding 2018.07.27-
2018.07.29
Keynote Speech at the 2nd International Conference on Algorithms, Computing and Systems (ICACS 2018), Beijing, China
1061 Turtle Shell Based Information Hiding Mechanism 2018.07.30 University of Science & Technology Beijing
1062 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2018.09.22 Keynote Speech at the International Symposium on Image Processing (ISIP 2018),Shanghai
1063 Current Research on Information Hiding 2018.09.29 Keynote Speech at the 2018 IEEE Conference on Information¡ACommunication and Engineering (ICICE 2018), Xiamen, China
1064 Current Research on Information Hiding 2018.10.04 Department of Information Engineering and Computer Science, Feng Chia University
1065 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2018.10.09 Department of Information Management, Chaoyang University of Technology
1066 How to Do Scientific Research and Write a High-quality Paper 2018.10.10 Xiamen University of Technology
1067 Current Research on Information Hiding 2018.10.11 Software School of Xiamen University
1068 Authenticatable Visual Secret Sharing 2018.10.12 Computer Engineering College, Jimei University
1069 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2018.10.17 Providence University, Department of Computer Science and Information Management
1070 Current Research on Information Hiding 2018.10.19 National Taitung University, Department of Information Engineering and Computer Science
1071 Steganography based on magic matrix 2018.10.24 Neusoft Institute Guangdong
1072 Turtle Shell Based Information Hiding Mechanism 2018.10.25 Shenzhen University, School of Information Engineering
1073 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2018.10.25 Harbin Institute of Technology, Shenzhen
1074 How to Conduct Scientific Research 2018.10.26 Guangdong University of Technology
1075 Information Hiding Techniques Based on ( 7,4) Hamming Code 2018.11.19 National QueMoy University
1076 How to Conduct Scientific Research and Write a High-quality Paper 2018.11.26 Minzu University of China
1077 Steganography based on magic matrix 2018.11.26 Minzu University of China
1078 Information Hiding Techniques Based on ( 7,4) Hamming Code 2018.11.27 Beijing University of Technology
1079 Information Hiding Technology£º Current Research and Future Trend 2018.11.28- 2018.11.30 Keynote Speech at the International Conference on Signal Processing and Machine Learning, Shanghai, China
1080 Turtle Shell Based Information Hiding Mechanism 2018.11.30 East China Normal University
1081 How to Conduct Scientific Research and Write a High-quality Paper 2018.11.30 University of Shanghai for Science and Technology
1082 Information Hiding Techniques Based on ( 7,4) Hamming Code 2018.12.17 Fujian Normal University
1083 How to Conduct Scientific Research and Write a High-quality Paper 2018.12.18 Fuqing branch of fujian normal university
1084 How to stand out: sharing successful experiences for a young scholar 2018.12.18 Fuqing branch of fujian normal university
1085 How to Conduct Scientific Research and Write a High-quality Paper 2018.12.19 Fujian University of Technology
1086 How to Conduct Scientific Research and Write a High-quality Paper 2018.12.20 Fujian Agriculture and Forestry University
1087 Turtle Shell Based Information Hiding Mechanism 2018.12.21 Putian University
1088 Sharing Secrets Using Authenticatable Digital Images 2018.12.29- 2018.12.31 Keynote Speech at the 2nd International Conference on Video and Image Processing(ICVIP 2018), Hongkong, China
1089 How to be an Outstanding Young Scholar 2019.01.08 College of Information and Electrical Engineering, Feng Chia University
1090 How to be an Outstanding Young Scholar 2019.01.10 School of Information Management, Central China Normal University
1091 How to Conduct Scientific Research and Write a High-quality Paper 2019.01.10 Wuhan University of Technology
1092 Turtle Shell Based Information Hiding Mechanism 2019.01.11 National Engineering Research Center for E-Learnning, Central China Normal University
1093 Essentials of Research, Contribution and Publication for Papers 2019.01.11 National Engineering Research Center for E-Learnning, Central China Normal University
1094 How to Conduct Scientific Research and Write a High-quality Paper 2019.01.11 College of Science, Hubei University of Technology
1095 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.01.12 School of Computer Science, Hubei University of Technology
1096 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2019.01.13 Keynote Speech at 2019 the 3rd International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2019)
1097 How to Conduct Scientific Research and Write a High-quality Paper 2019.01.14 School of Computer Science and Engineering, Wuhan University of Engineering
1098 Sharing Secrets Using Authenticatable Digital Images 2019.01.20 Keynote Speech at 2019 the 4th International Conference on Multimedia and Image Processing (ICMIP 2019), Kuala Lumpur, Malaysia
1099 A Steganographic Algorithm Based on ( 7,4) Hamming Code 2019.01.25- 2019.01.27 Keynote Speech at 2019 Asia Pacific Information Technology Conference (APIT 2019) Jeju Island, Korea
1100 Turtle Shell Based Information Hiding Mechanism 2019.03.14 Macau University of Science and Technology
1101 How to Conduct Scientific Research and Write a High-quality Paper 2019.03.18 Fujian Police College
1102 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2019.03.19 Fuzhou University
1103 Authenticatable Visual Secret Sharing 2019.03.19 Fujian normal university
1104 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.03.20 Fujian University of Technology
1105 Steganography based on magic matrix 2019.03.20 Minjiang University
1106 Information Hiding Technology Based on Declustering Strategy 2019.03.21 Fuqing branch of fujian normal university
1107 The Application of Chinese Remainder Theorem in Information Science 2019.03.22 Putian University
1108 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2019.03.27 Department of computer science, Tunghai university
1109 How to transmit information safely and effectively 2019.04.12 Department of Computer Science & Communication Engineering, Providence university
1110 The Application of Chinese Remainder Theorem in Information Science 2019.04.22 National Quemoy university
1111 The Application of Chinese Remainder Theorem in Information Science 2019.04.24 Jimei university
1112 A Self-Reference Watermarking Scheme based on Wet Paper Coding 2019.04.24 Department of Computer Science, Huaqiao University
1113 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2019.05.11 Guangdong University of Technology
1114 Authenticatable Visual Secret Sharing 2019.05.13 Taiyuan University of Science and Technology
1115 A Color Image Hiding Scheme Based on SMVQ and Modulo Operator 2019.05.13 Taiyuan University of Science and Technology
1116 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2019.05.15 Beijing University of Technology
1117 Digital Image Recognition Technology 2019.05.21 Central Police University
1118 A steganographic method for hiding secret data using side match vector quantization 2019.06.11 College of Information and Communication Engineering, University of Electronic Science and Technology
1119 Information Hiding Technology Based on Declustering Strategy 2019.06.11 Xihua University
1120 Information Hiding Technology Based on Declustering Strategy 2019.06.12 Sichuan Normal University
1121 Experiences in Application for a Project and Writing a Paper 2019.07.04 Jimei University
1122 How to Do Scientific Research and Write a High-quality Paper 2019.07.05 Xiamen University
1123 Embedding Secret Information in Digital Images Using Magic Turtle Shells 2019.07.06 Keynote Speech at 2019 4th International Conference on Image, Vision and Computing, Xiamen, China
1124 Current Research on Information Hiding 2019.07.08 Keynote Speech at International Electronics Communication Conference, Okinawa, Japan
1125 How to Do Scientific Research and Write a High-quality Paper 2019.08.15 Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology
1126 A Color Image Hiding Scheme Based on SMVQ and Modulo Operator 2019.08.19 Shangyu Research Institute, Hangzhou University of Electronic Science and Technology
1127 Cryptography and Its Application 2019.08.20 Putian College
1128 Appilcations of Chinese Remainder Theorem 2019.08.21 Putian College
1129 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.09.18 Department of Computer Science Information Engineering, National Yunlin University of Science and Technology
1130 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.09.24 Fuzhou University
1131 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2019.09.25 Fujian University of Technology
1132 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.09.26 College of Computer and Information Sciences, Fujian Agriculture and Forestry University
1133 The Recent Development of Information Security 2019.09.26 Fujian Police College
1134 The Recent Development of Information Security 2019.09.27 Fuqing branch of fujian normal university
1135 How to Be an Outstanding Young Scholar 2019.09.28 Putian College
1136 Cryptography and Its Applications 2019.10.04 National QueMoy University
1137 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.10.08 Department of Information Management, Chaoyang University of Technology
1138 Information Hiding Techniques Using Magic Matrix 2019.10.18 Wuhan Institute Of Technology
1139 Information Hiding Techniques Using Magic Matrix 2019.10.18 Huazhong University Of Science And Technology
1140 A Steganographic Algorithm Based on (7, 4) Hamming Code 2019.10.18-
2019.10.20
Keynote Speech at 2019 International Conference on Big-data Service and Intelligent Computation (BDSIC 2019), Wuhan, China
1141 Information Hiding Techniques Using Magic Matrix 2019.10.26-
2019.10.27
Keynote Speech at 2019 Twelfth International Symposium on Information Processing (ISIP 2019), Shanghai, China
1142 The Development and Application of Information Security Technique 2019.10.28 School of science and technology, Ningbo University
1143 Information Hiding Techniques Using Magic Matrix 2019.10.29 School of information engineering, Ningbo University
1144 A Self-Reference Watermarking Scheme Based on Wet Paper Coding 2019.10.29-
2019.10.31
Keynote Speech at 2019 International Conference on Video, Signal and Image Processing (VSIP 2019),Wuhan, China
1145 Sharing Experience in Writing and Publishing a Research Paper 2019.10.30 School of information management, Central China Normal University
1146 Information Hiding Techniques Based on ( 7,4) Hamming Code 2019.11.01 Zhejiang University of Finance and Economics
1147 Applying De-clustering Concept to Information Hiding 2019.11.04 Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology
1148 Applying De-Clustering Concept to Information Hiding 2019.11.04 Image Research Institute, Hangzhou University of Electronic Science and technology
1149 Borrowing from Nature to Conceal Information 2019.11.14 National QueMoy University
1150 Borrowing from Nature to Conceal Information 2019.11.14 School of computer science, Huaqiao University
1151 Sharing Experience in Paper Writing and Paper Submission 2019.11.15 School of computer science, Jimei University
1152 Embedding Secret Information in Digital Images 2019.11.15-
2019.11.17
Keynote Speech at 2019 the 9th International Conference on Communication and Network Security (ICCNS 2019),Chongqing, China
1153 Borrowing from Nature to Conceal Information 2019.11.27-
2019.11.29
Keynote Speech at 2019 2nd International Conference on Signal Processing and Machine Learning (SPML 2019), Hangzhou, China
1154 Borrowing from Nature to Conceal Information 2019.12.18 Jinan University
1155 Borrowing from Nature to Conceal Information 2019.12.20 Wenzhou University
1156 How to Do Scientific Research 2019.12.20 Wenzhou University
1157 Borrowing from Nature to Conceal Information 2019.12.21-
2019.12.23
Keynote Speech at 2019 IEEE 4th International Conference on Communication and Information Systems (ICCIS 2019&ICSCC), Wuhan, China
1158 Borrowing from Nature to Conceal Information 2019.12.24 Wuhan University
1159 How to Do Scientific Research 2019.12.24 Wuhan University
1160 Borrowing from Nature to Conceal Information 2019.12.26 Jiangsu University
1161 Information Hiding Techniques Inspired by Nature 2020.01.17-
2020.01.19
Keynote Speech at 2020 The 2nd Asia Pacific Information Technology Conference (APIT 2020), Bali, Indonesia
1162 Nature-Inspired Information Hiding Techniques 2020.05.13-
2020.05.15
Keynote Speech at 2020 Asia Service Sciences and Software Engineering Conference (ASSE 2020), Nagoya, Japan
1163 Applying De-clustering Concept to Information Hiding 2020.07.09 Keynote Speech atInternational Electronics Communication Conference (IECC), Singapore
1164 Witness the academic development of Taiwan 2020.08.28 CSROC
1165 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2020.09.21 National QueMoy University
1166 The Road to Success 2020.09.22 National QueMoy University
1167 Borrowing from Nature to Conceal Informatio 2020.09.23 National Central University
1168 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2020.09.30 Asia University
1169 Embedding Secrets Using Magic Matrices 2020.10.12 Tunghai University
1170 Embedding Secrets Using Magic Matrices 2020.10.12 National Taichung University of Education
1171 Knowledge of International Tourism 2020.10.15 National Chung Hsing University
1172 The Way to Success 2020.11.03 Feng Chia University
1173 How to Do Scientific Research 2020.12.02 Fuzhou University
1174 Applying De-Clustering Concept to Information Hiding 2020.12.03-
2020.12.05
Keynote Speech at 2020 2nd International Conference on Big-data Service and Intelligent Computation (BDSIC 2020), Xiamen, China
1175 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2020.12.20 Harbin Institute of Technology
1176 Information Hiding Schemes Based on Magic Matrices 2020.02.02 Keynote Speech at 2021 2nd International Symposium on Future Information and Communication Technology (Future ICT 2021), Taichung, Taiwan
1177 De-clustering concept to information hiding 2021.02.25 Keynote Speech at the 2021 2nd Asia Service Sciences and Software Engineering Conference (ASSE 2021), Macau, China
1178 International travel and my experience 2021.03.09 Chaoyang University of Technology
1179 Applying De-Clustering Concept to Information Hiding 2021.03.15 National QueMoy University
1180 Steganography of Image Compression Code 2021.04.07 Putian University
1181 Information Steganography Using Magic Matrix 2021.04.27 National Pingtung University
1182 Steganography of Image Compression Code 2021.04.28 National Pingtung University
1183 Borrowing from Nature to Conceal Information 2021.05.04 National Taipei University of Education
1184 Nature-Inspired Information Hiding Techniques 2021.05.11 National Chin-Yi University of Technology
1185 Steganography of Image Compression Code 2021.05.28 Keynote Speech at the 2021 itaoi, QueMoy, Taiwan
1186 Information Steganography Using Magic Matrix 2021.06.11 Yuan Ze University
1187 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2021.08.18-2021.08.20 Keynote Speech at the 2021 4th International Conference on Signal Processing and Machine Learning (SPML 2021), Beijing, China
1188 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2021.09.23 National Chung Hsing University
1189 Applying De-Clustering Concept to Information Hiding 2021.10.29 Keynote Speech at 2021 The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2021), Kaohsiung, Taiwan
1190 Visual Cryptography 2021.11.01 National Quemoy University
1191 Sharing Secret Message Using Meaningful Digital Images with Cheating Detection 2021.11.10 Shanghai Maritime University
1192 How to Do Scientific Research 2021.11.10 Shanghai Maritime University
1193 Borrowing from Nature to Conceal Information 2021.11.19-2021.11.21 Keynote Speech at 2021 3rd International Conference Big-data Service and Intelligent Computation£¨BDSIC 2021£©, Xiamen, China
1194 The Way to Success 2021.12.07 Chaoyang University of Technology
1195 The Way to Success 2021.12.08 Fu Jen Catholic University
1196 Applying De-Clustering Concept to Information Hiding 2022.01.17 Keynote Speech at 2022 The Third International Symposium on Future ICT (Future ICT 2022), Taichung, Taiwan
1197 Authenticatable Visual Secret Sharing 2022.02.25 Keynote Speech at 3rd Asia Service Sciences and Software Engineering Conference (ASSE 2022), Macau, China
1198 Travel in Mainland China to Witness the Academic Development 2022.03.01 Chaoyang University of Technology
1199 Information Steganography Using Magic Matrix 2022.03.07 Department of Computer Science and Information Engineering, National Chung Cheng University
1200 Embedding Secrets Using Magic Matrices 2022.03.18 Chung Shan Medical University
1201 Borrowing from Nature to Conceal Information 2022.03.25-2022.03.27 Keynote Speech at 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML 2022), Hangzhou, China
1202 Travel in mainland China to witness the academic development 2022.05.02 National QueMoy University
1203 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2022.07.08-2022.07.10 Keynote Speech at 2022 4th International Electronics Communication Conference (IECC 2022), Tokyo, Japan
1204 Nature-Inspired Information Hiding Techniques 2022.08.04-2022.08.06 Keynote Speech at 2022 5th International Conference on Signal Processing and Machine Learning (SPML 2022), Dalian, China
1205 Information Hiding Schemes Based on Magic Matrices 2022.09.23-2022.09.25 Keynote Speech at 2022 International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2022), Xi'an, China
1206 The Core Technology of Accelerating Encryption and Decryption Operation of Cryptographer 2022.09.26 National Quemoy University
1207 Information Hiding Schemes Based on Magic Matrices 2022.10.19 China University of Mining and Technology
1208 Borrowing from nature to conceal information 2022.11.10-2022.11.13 Keynote Speech at 2022 5th International Conference on Digital Medicine and Image Processing (DMIP 2022), Kyoto, Japan
1209 Recent Developments of Information Hiding 2022.11.18 National Development Management Institute, Bangkok, Thailand
1210 Applying De-clustering Concept to Information Hiding 2022.12.01 Keynote Speech at 2022 International Workshop on Bigdata Intelligence and Security, Wuhan, China
1211 How to Do Scientific Research 2022.12.02 National Changhua University of Education
1212 Sharing Secret Message Using Meaningful Digital Images with Cheater Detection 2022.12.08 Wuhan University of Technology
1213 Information Hiding Schemes Based on Magic Matrices 2022.12.09 National Central University
1214 Some Interesting Methods of Cryptography and Steganography 2022.12.12 National Chung Hsing University
1215 A virtual image cryptosystem based upon vector quantization 2023.02.10 Keynote Speech at 2023 5th Asia Pacific Information Technology Conference (APIT 2023), Ho Chi Minh City, Vietnam
1216 Appilcations of CRT in Information Science 2023.02.21 College of Informatics, Chaoyang University of Technology
1217 Visual Cryptography 2023.02.23 Department of Management Information Systems, National Chung Hsing University
1218 The Design of Computer Password 2023.02.24 School of Medical Informatics, Chung Shan Medical University
1219 Lossless Compression Schemes of Vector Quantization Indices Using State Codebook 2023.03.08 Department of Computer Science Information Engineering, National Yunlin University of Science and Technology
1220 Appilcations of CRT in Information Science/Department of Computer Science and Information Engineering 2023.03.13 National Chung Cheng University
1221 Positive energy creates endless possibilities 2023.03.14 National Chung Cheng University Honorary Doctor of Engineering Award Ceremony