[ Ph. D. (graduate) ] [ Ph. D. (in school)] [ Research Assistant ] [ Exchange Student ] [ Master (graduate) ] [ Master
(in school) ]
|
01. Lin, Chu-Hsing |
Tung Hai University Department of Information Engineering and Computer Science <Professor> E-Mail:chlin@thu.edu.tw |
|
02. Wu, Tsung-Cheng
|
National Taiwan University of Science and Technology Department of Information Management <Professor> E-Mail:tcwu@cs.ntust.edu.tw |
|
03. Shih, Chien-Chin |
Luminary Buddhist Institute <Teacher> E-Mail:jenjin@mail.educities.edu.tw |
|
04. Chen, Chih-Ying |
Feng Chia University Department of Communications Engineering <Professor> E-Mail:chihchen@fcu.edu.tw Web:http://www.ce.fcu.edu.tw/people/faculty/chihchen/chihchen.html |
|
05. Huang, Hsin-Chia |
Tam Kang University Department of Information Engineering and Computer Science <Associate Professor> E-Mail:sjhwang@mail.tku.edu.tw |
|
06. Chen, Chien-Yuan |
National University of Kaohsiung Department of Information Engineering and Computer Science <Professor> E-Mail:cychen07@nuk.edu.tw |
|
07. Lou, Te-Chuan |
Chang Gung University Department of Information Engineering and Computer Science <Professor> E-Mail:dclouprof@gmail.com Web:http://www.ccit.ndu.edu.tw/html/elec/Component/teacherhome/Der-Chyuan%20Lou/index1.htm |
|
08. Lee, Wei-Bin |
Hon Hai Research Institute Department of Information Technology <Commissioner> E-Mail:wblee@fcu.edu.tw Web:http://www.iecs.fcu.edu.tw/wSite/ct?xItem=4e0a8ffc45dec87f&ctNode=34621&mp=370201&submit=個人資料 |
|
09. Huang,
Jen-Chun |
Tam Kang University Department of Information Engineering and Computer Science <Professor> E-Mail:junhwang@ms35.hinet.net Web:N/A |
|
10. Li, Chin-Feng |
Chao Yang University of Technology Department of Information Management <Professor> E-Mail:lcf@cyut.edu.tw |
|
11. Hu, Yu-Cheng Completion Date: Decmeber 1999 |
Providence University Department of Information Management <Professor> E-Mail:ychu@pu.edu.tw |
|
12. Chiang, Chi-Han Completion Date: December 1999 |
National Formosa University Department of Information Engineering and Computer Science <Associate Professor> E-Mail:jhjiang@nfu.edu.tw |
|
13. Wang, Ching-Te |
National Chin Yi University of Technology Department of Information Management <Professor> E-Mail:ctwang@ncut.edu.tw Web:http://blog.ncut.edu.tw/meworksv2a/meworks/page.aspx?no=2590 |
|
14. Chan, Yung-Kuan |
National Chung Hsing University Department of Information Management <Professor> E-Mail:ykchan@nchu.edu.tw |
|
15. Hung, Kuo-Lung |
Chao Yang University of Technology Department of Information Management <Assistant Professor> E-Mail:klhung@cyut.edu.tw |
|
16. Tsai, Chui-Hsiung |
National Chung Hsing University Department of Information Management <Professor> E-Mail:tsaics@nchu.edu.tw |
|
17. Wu, Hsien-Chu |
National Taichung University of Science and Technology College of Information and Distribution Science <Dean> E-Mail:wuhc@nutc.edu.tw |
|
18. Huang, Kuo-Feng |
National Taichung Institute of Technology Department of Multimedia Design <Assistant Professor> E-Mail:kfhwang@ntit.edu.tw |
|
19. Tsai, Pi-Yu |
National United University Department of Information Engineering and Computer Science <Professor> E-Mail:pytsai@nuu.edu.tw Web:N/A |
|
20. Lin, Yung-Chang |
National Chung Hsing University Department of Information Management <Professor> E-Mail:iclin@nchu.edu.tw |
|
21. Lai, Yi-Pong |
National Defense University, Chung Cheng Insituite of Technology Department of Computer Science <Professor> E-Mail:yopolai@gmail.com Web:http://www.ccit.ndu.edu.tw/html/cs/html/teacherhome/lai/ |
|
22. Chuang, Jun-Chou |
Providence University Department of Computer Science and Communication Engineering <Associate Professor> E-Mail:lzchung@pu.edu.tw Web:N/A |
|
23. Yu, Yuan-Hui |
Chien Hsin University of Science and Technology Department of Computer Science and Information Engineering <Associate Professor> E-Mail:yhyu@mail.stut.edu.tw |
|
24. Tseng, Hsien-Wen |
Chao Yang University of Technology Department of Information Management <Associate Professor> E-Mail:hwtseng@cyut.edu.tw |
|
25. Chan, Chao-Wen |
National Taichung Institute of Technology Department of Computer Science and Information Technology <Associate Professor> E-Mail:ccwen@ntit.edu.tw Web:N/A |
|
26. Huang, Hui-Feng |
National Taichung University of Science and Technology Department of Computer Science and Information Engineering <Professor> E-Mail:phoenix@ntit.edu.tw |
27. Lu, Tzu-Chun |
Chao Yang University of Technology Department of Information Management <Associate Professor> E-Mail:tclu@cyut.edu.tw |
|
28. Chang, Ya-Fen |
National Taichung University of Science and Technology Department of Computer Science and Information Engineering <Professor> E-Mail:cyf@cs.ccu.edu.tw Web:N/A |
|
29. Chan, Chi-Hsiang |
Asia University Department of Computer Science and Applications <Professor> E-Mail:cch@cs.ccu.edu.tw |
|
30. Lin, Chih-Yang |
Chang Gung University Department of Information Management <Associate Professor> E-Mail:andrewlin@asia.edu.tw Web:http://dns2.asia.edu.tw/~andrewlin/homepage/Cintroduction.html |
|
31. Lee, Yu-Chiang |
Southern Taiwan University Department of Information Engineering and Computer Science <Assistant Professor> E-Mail:lyc@cs.ccu.edu.tw |
|
32. Wu, Wen-Chuan |
National Ilan University Department of Information Engineering and Computer Science <Assistant Professor> E-Mail:au4387@email.au.edu.tw |
|
33. Wu, Ming-Ni |
National Taichung University of Science and Technology Department of Infromation Management <Associate Professor> E-Mail:mnwu@nutc.edu.tw Web:N/A |
|
34. Lee, Jung-San |
Feng Chia University Department of Information Engineering and Computer Science <Associate Professor> E-Mail:ljs@cs.ccu.edu.tw Web:http://myiecs.iecs.fcu.edu.tw/_visitor/teacher/teacher_pro.php?fdno=T97074 |
|
35. Chou, Yung-Chen |
Asia University Department of Information Engineering and Computer Science <Associate Professor> E-Mail:yungchen@gmail.com |
|
36. Tai, Wei-Liang |
Chinese Culture University Department of Information & Communications <Assistant Professor> E-Mail:taiwl@cs.ccu.edu.tw Web:N/A |
|
37. Yang, Jen-Ho |
Tamkang University Department of Artificial Intelligence <Associate Professor> E-Mail:jenhoyang@mail.knu.edu.tw Web:http://www.ec.knu.edu.tw/ecnew/program/faculty.php?id=38 |
|
38. Lin, Pei-Yu |
Yuan Ze University Department of Information Communication <Associate Professor> E-Mail:lpy91@cs.ccu.edu.tw Web:N/A |
|
39. Chen, Yi-Hui |
Asia University Department of Information Science and Applications <Associate Professor> E-Mail:chenyh@cs.ccu.edu.tw Web:N/A |
|
40. Hsieh, Yi-Pei |
Tzu Chi College of Technology Computer Center <Director> E-Mail:iei04@ems.tccn.edu.tw Web:N/A |
|
41. Kieu, The Duc |
The University of the West Indies, Trinidad Department of Computing and Information Technology <Assistant Professor> E-Mail:ktduc0323@gmail.com Web:N/A |
|
42. Wang, Chung-Chuan |
Chung Chou Institute of Technology <Associate Professor> E-Mail:ccwang@dragon.ccut.edu.tw Web:N/A |
|
|
43. Wang, Zhi-Hui |
Dalian University of Technology <Professor> E-Mail:wangzhihui1017@gmail.com Web:N/A |
44. Chen, Chang-Chu |
Central Taiwan University of Science and Technology Management Information Systems <Associate Professor> E-Mail:ccz@cs.ccu.edu.tw Web:N/A |
|
45. Tsai, Hao-Chuan |
Tzu Chi College of Technology Department of Information Engineering and Informatics <Assistant Professor> E-Mail:ss241@ems.tccn.edu.tw Web:N/A |
|
46. Lee, Chia-Yin |
Lionic Corporation Senior Engineer E-Mail:cylee@url.com.tw Web:N/A |
|
47. Wu, Chia-Chi |
Staff of J6, MND, Taiwan (R.O.C.) E-Mail:davidwu120@gmail.com Web:N/A |
|
48. Pai,
Pei-Yan |
Genesys Logic <Senior Engineer> E-Mail:d938338@oz.nthu.edu.tw Web:N/A |
|
49. Chen, Kuo-Nan |
ASUS <Senior Engineer> E-Mail:kuonan.chen@gmail.com Web:N/A |
|
50. Chang, Shih-Chang |
Silicon Motion Project Leder Engineer E-Mail:chang.coby@gmail.com Web:N/A |
|
51. Cheng, Ting-Fang |
TAIWAN-CA INC. (TWCA) Senior Engineer E-Mail:nthu.tiffany@gmail.com Web:N/A |
|
52. Wang, Xing-Tian |
Unemployed E-Mail:wxt6582295@163.com Web:N/A |
|
53. Nguyen, Thai-Son |
Dean of School of Engineering and Technology, Tra Vinh University E-Mail:thaison@tvu.edu.vn Web:N/A |
|
54. Huynh, Ngoc-Tu |
Lecturer of College of Information Technology, Da Nang University E-Mail:ngoctu84vn@gmail.com Web:N/A |
|
55. Huang, Ying-Hsuan |
National Chung-Shan Institute of Science & Technology, Research and Development Substitute Services E-Mail:ying.hsuan0909@gmail.com Web:N/A |
|
56. Le Hai Duong |
Lecturer of School of Computer Science & Engineering, International University - Vietnam National University HCMC E-Mail:duonghaile@gmail.com Web:N/A |
|
57. Wu, Hsiao-Ling |
Department of information management, Chaoyang University of technology E-Mail:b590590@gmail.com Web:N/A |
|
58. Nguyen Ngoc Tu |
Lecturer of Faculty of Technology and Natural Science, Tay Nguyen University E-Mail:nntu@ttn.edu.vn Web:N/A |
|
|
59. Zhuang Xu (Southwest Jiaotong University) |
Web:N/A |
|
60. Liu, Li (Northwest Polytechnic University) |
Associate professor of Taiyuan University of science and technology Web:N/A |
61. Huang, Peng-Cheng |
Lecturer of Xiamen University of Technology Web:N/A |
|
62. Xie, Xiao-Zhu |
Lecturer of Xiamen University of Technology Web:N/A |
|
|
62. Wang, Rong (Southwest Jiaotong University) |
Web:N/A |
|
63. Meng, Ke-Ju (University of Science and Technology of China) |
Web:N/A |
65. Su, Guo-Dong |
Lecturer of Fujian Polytechnic Normal University Web:N/A |
|
66. Wang, Xu |
Lecturer of University of Jinan Web:N/A |
|
||
Lin, Jiang-Yi |
Cui, Chen |
Li, Lin |
|
|
|
Chen, Si-Sheng |
Bai, Rui |
Xu, Shu-Ying |
|
|
|
Chi, Heng-Xiao |
Gao, Kai |
Bai, Yu |
|
|
|
Wang, Xian-Ming |
Jui-Chuan Liu |
|
Chen, Pei-Lun |
|
|
|
Jochen Penne (Dresden University of Technology, Germany) |
Jing Li (Renmin University of China) |
Dawei Wang (Renmin University of China) |
Master Students (graduated)
No. |
Name |
Thesis Title |
Completion Date |
1. |
Shen, Jau-Ji |
Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System |
5/1984 |
2. |
Su, D. H. |
Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries |
5/1984 |
3. |
Lian, L. S. |
Toward the Strict Optimality Study on Concurrent Disk Accessing |
5/1984 |
4. |
Liang, J. |
Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions |
5/1984 |
5. |
Yuan, S. T. |
A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems |
5/1985 |
6. |
Tsai, W. H. |
A Branch and Bound Algorithm for Allocating Multi-attribute File Systems |
5/1985 |
7. |
Shieh, J. C. |
On the Design of Letter Oriented Minimal Perfect Hashing Functions |
5/1985 |
8. |
Hung, M. F. |
An Access Control Mechanism for Information Protection System |
5/1986 |
9. |
Chen, C. P. |
A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem |
5/1986 |
10. |
Chen, H. Y. |
Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems |
5/1986 |
11. |
Hsiao, M. D. |
The Study of File Allocation Strategies for Concurrent Retrieval |
5/1986 |
12. |
Lee, Y. P. |
A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing |
5/1986 |
13. |
Lin, C. H. |
A Strategy of Information Secure Broadcasting |
5/1986 |
14. |
Cheng, W. Y. |
The Study of a User-Hierarchy Mechanism for Computer System Resources |
5/1987 |
15 |
Chang, C. H. |
A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem |
5/1987 |
16 |
Chen, C. H. |
The Study of Data Missing and Data Integrity |
5/1987 |
17 |
Wu, H.C. |
The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System |
5/1987 |
18 |
Wang, C. T. |
The Development of a Computer Assisted Instruction System for Structure Assembly Languages |
5/1987 |
19 |
Mong, I. H. |
A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm |
5/1988 |
20 |
Chang, S. S. |
Optimal Properties of Binary Cartesian Product File System |
5/1988 |
21 |
Chen, C. H. |
Organizing Distributed Data Based for Parallel Searching |
5/1988 |
22 |
Hsiao, J. Y. |
Strings Near-Matching Techniques for Large Textual Files |
5/1988 |
23 |
Leu, D. F. |
Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely |
5/1988 |
24 |
Chou, A. Y. H. |
The Study of File Systems Suitable for Queries |
5/1989 |
25 |
Chow, L. C. |
The Study of Visual Form Transformation System |
5/1989 |
26 |
Wu, T. C. |
The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry |
5/1989 |
27 |
Liao, H. T. |
A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control |
5/1989 |
28 |
Wu, L. H. |
An Arithmetic Coding Oriented Single Key Access Control Scheme |
5/1989 |
29 |
Wu, C. H. |
The Study of Security Technologies for Broadcasted Network Systems |
5/1989 |
30 |
Lin, J. C. |
A Fast Spatial Match Accessing Scheme for Symbolic Pictures |
5/1990 |
31 |
Dai, J. Y. |
Sharing a Circular Storage for Multiple Stacks |
5/1990 |
32 |
Chen, D. C. |
A Modified Arithmetic Coding Scheme Suitable for Binary Search |
5/1990 |
33 |
Hwang, S. M. |
A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid |
5/1990 |
34 |
Lin, J. F. |
A Chinese Syllables Compression Scheme Based Upon Perfect Hashing |
5/1990 |
35 |
Wang, S. J. |
A Dynamic Key-Lock-Pair Access Control Scheme |
5/1991 |
36 |
Hwang, R. J. |
Controlling Access in Hierarchical Structures Using Cryptographic Keys |
11/1991 |
37 |
Hwang, S. J. |
Sharing a Dynamic Secret |
11/1991 |
38 |
Lee, H.C. |
A Solution to Generalized Group Oriented Cryptography |
5/1992 |
39 |
Chen, C. Y. |
A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method |
5/1992 |
40 |
Chen, Y. W. |
A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis |
5/1992 |
41 |
Kowng, H. C. |
A Digital Signature Scheme Based Upon Theory of Quadratic Residues |
5/1992 |
42 |
Lee, W. B. |
On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses |
5/1993 |
43 |
Liou, F. Y. |
A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme |
5/1993 |
44 |
Wang, C. H. |
A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters |
5/1993 |
45 |
Liao, W. Y. |
A Remote password authentication scheme based upon ElGamal's signature scheme |
5/1993 |
46 |
Lin, T. H. |
A Secure Group-Oriented Secret Sharing Scheme |
5/1993 |
47 |
Lee, C. F. |
A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems |
5/1994 |
48 |
Tsu, S. M. |
An Improvement on a Probabilistic Encryption Scheme and Its Applications |
5/1994 |
49 |
Jiang, J. H. |
A Spatial Filter for Similarity Retrieval |
5/1994 |
50 |
Wu, W. B. |
A Secure Voting System on a Public Network |
5/1994 |
51 |
Horng, W. J. |
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm |
5/1994 |
52 |
Lin, D. C. |
Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters |
5/1995 |
53 |
Li, W. T. |
A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique |
5/1995 |
54 |
Leu, JJyh-Jong |
The Performance Analysis of Bloom and Random Filters |
5/1995 |
55 |
Kuo, C. L. |
Fast Codeword Search Techniques for Vector Quantization |
6/1996 |
56 |
Chou, J. S. |
An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook |
6/1996 |
57 |
Sung, C. H. |
Locally Adaptive Schemes for Data Compression Using Multilist Structure |
6/1997 |
58 |
Chen, L. L. |
Some Searching Techniques for Block Motion Estimation for Video Compression |
6/1997 |
59 |
Jau, J. J. |
Image Compression and Transmission Using Vector Quantization and S-tree |
6/1998 |
60 |
Hwang, P. C. |
Accessing Shared Secrets in a Hierarchy |
6/1998 |
61 |
Shine, F. C. |
Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane |
6/1998 |
62 |
Chen, Kuo-Lun |
Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme |
6/1999 |
63 |
Kuo, Y. T. |
Fast Algorithm for Some Meta-Operations in Cryptographic Systems |
6/1999 |
64 |
Chung, P. F. |
Two Copyright Protection Scheme for Digital Images |
6/2000 |
65 |
Xiao, G. X. |
Two Prediction Methods for Image Compression and Progressive Image Transmission |
6/2000 |
66 |
Lin, Y. |
Image Compression and Copyright Protection Using Edge Detection Methods |
6/2000 |
67 |
Hsia, H.C. |
Two Hiding Techniques for Data Security and Image Copyright Protection |
6/2000 |
68 |
Chuang, J. C. |
The Study of Image Tampering Detection |
6/2000 |
69 |
Hsieh, C. P. |
The Study of Denoising Technique for Digital Images |
6/2001 |
70 |
Lu, P. W. |
The Application of Vector Quantization Techniques to Digital Image Tamper Proofing |
6/2001 |
71 |
Jiang,J. L. |
The Design of Some Filter for Image Denoising |
6/2001 |
72 |
Yeh, J. C. |
The Study of Copyright Protection Schemes for Digital Images |
6/2001 |
73 |
Chan, C. S. |
Some Data Hiding Techniques for Digital Images |
6/2001 |
74 |
Yu, T. X. |
The Study of Digital Image Ciphering and Hiding Mechanisms |
6/2002 |
75 |
Pan,Y. P. |
The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy |
6/2002 |
76 |
Chung, C. Y. |
Some Protocols for Passing Messages Securely and Protecting Rightful Ownership |
6/2002 |
77 |
Chen, G. I. |
TheStudy of Lossless Image Compression an Image Magnification |
6/2002 |
78 |
Su, Y. Y. |
Two Color Image Quantization Schemes for Non-true-color Display |
6/2002 |
79 |
Lee, C. F. |
Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees |
6/2003 |
80 |
Wu, Wen-Juan |
Data Hiding and Content Retrieval in Digital Image Database |
6/2003 |
81 |
Chen, G. M. |
Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding |
6/2003 |
82 |
Liao, C. T. |
Some Image Compression and Data Protection Techniques Using Support Vector Machines |
6/2003 |
83 |
Chou, H. C. |
Some Studies on Digital Image Steganographic and Watermarking Techniques |
7/2003 |
84 |
Hu, Y. H. |
Retrieving Digital Images from Frequency Domain Transformed Databases |
6/2004 |
85 |
Tai, Wei-Liang |
Hiding a Digital Image into Two Cover Images |
6/2004 |
86 |
Liu, Y. L. |
The Techniques of Digital Image Transmission and Authentication |
6/2004 |
87 |
Lin, P. Y. |
Two Data Hiding Schemes for Grayscale Images and Image Compression Codes |
6/2004 |
88 |
Tseng, C. S. |
Various Secret Embedding Schemes for Binary and Gray Level Techniques |
6/2005 |
89 |
Wang, Y. Z. |
Some Image Steganography Schemes with High Embedding Capacity |
6/2005 |
90 |
Yeh, J. B. |
Hiding Secrets in Data Compression Codes |
6/2005 |
91 |
Kao, C. L. |
On Authentication Protocols for Communication Networks |
6/2005 |
92 |
Kuo, J. Y. |
Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures |
6/2005 |
93 |
Lin, K. C. |
Some Efficient Techniques for Secure Peer-to-Peer Networking |
6/2005 |
94 |
Chang, P. Y. |
Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol |
6/2006 |
95 |
Shue, Y. W. |
Some Key Management Protocols for Insecure Networks |
6/2006 |
96 |
Cheng, Y. F. |
Some Information Security Applications using Symmetric and Asymmetric Crypto Schemes |
6/2006 |
97 |
Fan, Y. H. |
The Design and Analysis of Information Hiding and Secret Image Sharing Schemes |
6/2006 |
98 |
Chang, S. C. |
A Mutual Authentication Scheme and Its Application to Electronics Traveler Checks |
6/2007 |
99 |
Cheng, T. F. |
An IC-Card-Based Remote Login Mechanism and a Proxy Raffle System in Computer Networks |
6/2007 |
100 |
Lin, C. H. |
Some Visual Cryptoschemes for Secret Images |
6/2007 |
101 |
Chiu, Y. C. |
Some Authentication Schemes and Their Applications to Internet and Wireless Environments |
6/2007 |
102 |
Chang, K. J. |
Authentication Mechanisms and a Payment Protocol for Wireless Environment |
6/2007 |
103 |
Li, K. M. |
A Predictive SMVQ Scheme and Data Embedding for Digital Images |
6/2007 |
104 |
Lin, S. Y. |
Key Establishment and Agreement Protocols and Their Application to Internet and Wireless Environments |
6/2007 |
105 |
Yah, C. M. |
Reversible Data Hiding Schemes for Large Payload and Low Distortion |
6/2008 |
106 |
Yang, S. R. |
Scalable Key Assignment Protocols in Internet |
6/2008 |
107 |
Wang, G. H. |
The Study of High Quality Stego-image for Large Payload |
6/2008 |
108 |
Huang, W. H. |
Two Efficient Demosaicking Algorithms for Color Filter Array |
6/2008 |
109 |
Chuang, Lin-Yi |
The Optimal Solution and Improvement of Exploiting Modification Direction Embedding Method |
6/2008 |
110 |
Wang, Yi-Ran |
The Study of Data Hiding Based on Modification Direction Embedding Method |
6/2008 |
111 |
Liu, L. J. |
The Detection of Visual Secret Shadow Cheating and Digital Image Tampering |
6/2008 |
112 |
Le, T. H. N. |
Secret Sharing Using Multiple Shadow Images |
2/2009 |
113 |
Lai, Y. W. |
Message Broadcasting and Electronic Voting Schemes Based on Elliptic Curve Cryptosystem |
6/2009 |
114 |
Wu, Y. C. |
Authenticated Communication Systems for E-mail Protocal and Vehicular Ad Hoc Networks |
6/2009 |
115 |
Chen, C. H. |
Illumination-Balance Techniques for Text-photo Images |
6/2009 |
116 |
Chen, Y. C. |
Segmentation and Classification Techniques for Retinal Images |
6/2009 |
117 |
Wang, H. C. |
Embedding Secret Information in a Condenced Image and Multiple Image Files |
6/2009 |
118 |
Liao, C. C. |
The Study of Visually Sharing Secret Images |
6/2009 |
119 |
Li, Q. |
A Study on Reversible Watermarking |
4/2010 |
120 |
Lin, H. C. |
Some Secret Embedding Schemes for Different Entities |
6/2010 |
121 |
Huang, Y. C. |
Mobile Conference Mechanism for Wireless Communication Users |
6/2010 |
122 |
Hsieh, M. H. |
Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication Watermarking |
6/2010 |
123 |
Huynh, N. T. |
Visual Cryptography for Users Verification |
6/2010 |
124 |
Liu, T. C. |
The Study of Digital Images Embedding Techniques and Visual Secret Sharing Schemes |
6/2010 |
125 |
Tsai, M. C. |
Digital Copyright Protection and Image Authentication Using Watermarking Strategy |
6/2010 |
126 |
Wu, C. Y. |
Reversible Data Hiding Schemes Using Repeatedly Embedding Strategy with High Capacity |
6/2010 |
127 |
Yin, Z. X. |
Hiding Information in Digital Images |
6/2010 |
128 |
Tseng, W. T. |
Authentication Protocols for Heterogeneous Communication Network Environment |
6/2011 |
129 |
Chen, P. Y. |
Reversible High-payload Information Hiding Scheme for Digital Cover Images and VQ Index Tables |
6/2011 |
130 |
Chen, Y. W. |
User Authentication and Key Agreement Protocols for Wireless Network Environment |
6/2011 |
131 |
Liu, C. M. |
Non-Reversible and Reversible Data Hiding Based on Module Operation |
6/2011 |
132 |
Tsou, P. L. |
Perceptual Robust Image Hashing Scheme Based on Halftone Mechanism and Non-Uniform Sampling |
6/2011 |
133 |
Nguyen Thai Son |
Reversible Data Hiding Techniques for VQ-compressed Domain |
6/2011 |
134 |
Vo Phuoc Hung |
Sharing Secret Messages Using Meaningful Digital Shadow images |
6/2011 |
135 |
Marcos Pizzolatti |
The study of some reversible secret sharing schemes |
12/2011 |
136 |
Cui, S. Y. |
Image Data Hiding Based on Voronoi Diagram |
12/2011 |
137 |
Yue, S. |
Image Data Hiding Scheme Based on Graph Coloring |
12/2011 |
138 |
Lin, T. Y. |
Information Hiding Techniques for Script Files and Image Files |
06/2012 |
139 |
Chiu, Y. P. |
The study of Distortion and Distortion free Visual Secret Sharing Scheme |
06/2012 |
140 |
Liao, L. T. |
Two Steganographic Schemes for Embedding Large Secret Information |
06/2012 |
141 |
Wang, S. T. |
Novel Reversible Data Hiding Schemes for Secret Images and Traditional Chinese Text Files |
06/2012 |
142 |
Lin, C. C. |
Information Hiding and Visual Secret Sharing Based on Exploiting Modification Direction |
06/2012 |
143 |
Chang, C. H. |
Some Smart Card Oriented Authentication Protocols for Mobile Communication |
06/2012 |
144 |
Tsai, H. Y. |
Pixel Unexpanded Visual Cryptography Techniques Based on Meaningful Shadows |
06/2012 |
145 |
Sun, C. Y. |
Secure and Efficient Authentication Schemes for Wireless Communications |
06/2013 |
146 |
Chen, Y. C. |
Reversible Data Embedding Schemes for VQ-Compressed Images |
06/2013 |
147 |
Chen, W. Y. |
Authentication Protocols for Some E-commerce Applications |
06/2013 |
148 |
Hsu, T. J. |
Some Data Hiding Techniques and Their Applications |
06/2013 |
149 |
Jia, X. D. |
Research on Privacy-preserving Identity Authentication Protocols in Vehicular Ad Hoc Networks |
06/2014 |
150 |
Yang, H. R. |
Study on Data Hiding Algorithms Based on Compression Codes |
06/2014 |
151 |
Lin, M. C. |
Embedding Secret Information in VQ Index Tables |
06/2014 |
152 |
Chung, T. F. |
Authentication and Data Hiding Schemes for Digital Images |
06/2014 |
153 |
Chou, Y. C. |
A Study of Group Authentication and Data Protection |
06/2014 |
154 |
Hsueh, W. Y. |
Multi-Server Remote User Authentication Mechanisms Using Smart Card |
06/2014 |
155 |
Li, F. |
Reversible Image Hiding Algorithms based on Wavelet Transformation |
12/2014 |
156 |
Yang, X. Q. |
Semi-fragile Watermarking Algorithms for Tamper Detection and Image Authentication |
06/2015 |
157 |
Shih, T. H. |
The Study of Reversible Authentication Techniques for Digital Images |
06/2015 |
158 |
Hsueh, H. S. |
Data Hiding Schemes for Still Images and Videos |
06/2015 |
159 |
Chang, W. C. |
Reversible Data Hiding for Encrypted and Compressed Digital Image |
06/2015 |
160 |
Bai, J. l. |
Some Techniques for Information Hiding in Images(Chengdu University of Electronic Science and Technology) |
05/2016 |
161 |
Xia, B. B. |
Reversible data hiding based on vector quantization(Taiyuan University of Science and Technology) |
06/2016 |
162 |
Jin, Q. |
Research on optimized block truncation coding and data hiding algorithm based on compressed images(Taiyuan University of Science and Technology) |
06/2016 |
163 | Hsu, C. I. | Research on Effective Color Image Retrieval Technology Based on Block Truncation Coding | 06/2016 |
164 | Wang, C. M. | Research on Reversible Data Hiding Technology of ABTC-EQ Compression Codes and AMBTC Decompression Images | 06/2016 |
165 | Wang, Y. K. | Embedded Information in the Absence of Distortion Data Compression Code, Compressed Images and Encrypted Image of the Study | 06/2016 |
166 | Chien, T. I. | Based on Image Sharpening and Image Compression and Encryption | 06/2016 |
167 | Lo, Y. Y. | Research on Key Agreement Authentication Method and Telemedicine Information System Authentication Method Based on Passing Code | 06/2016 |
168 | Wu, C. H. | Certificateless Authentication Method on Wireless Body Area Network | 06/2016 |
169 | Chang, K. L. | QR Code Landscaping Algorithm and Security Mechanism Research (Hangzhou Dianzi University) | 12/2016 |
170 | Peng, H. H. | Research on Credit Card Authentication Algorithm Based on Secret Sharing and Image Watermarking (Hangzhou Dianzi University) | 12/2016 |
171 | Kao, H | Research on the Application of Digital Watermarking in Privacy in Cloud Environment (Northwestern Polytechnical University) | 04/2017 |
172 | Kuo, P | Research on Multi-Feature Data Routing Strategy in Deduplication (Northwestern Polytechnical University) | 04/2017 |
173 | Kuo, I | Research on Information Hiding Technology for Cloud Computing Security Application (Northwestern Polytechnical University) | 04/2017 |
174 | Hsu, W. L. | Research on Key Technology of Information Hiding Based on Image Space Domain (Anhui University) | 04/2017 |
175 | Mao, K. | Research on Image Information Hiding Technology Based on Hamming Code (Anhui University) | 04/2017 |
176 | Wu, Y. H. | Research of Reversible Data Hiding Algorithm Based on Image (Hangzhou Dianzi University) | 07/2017 |
177 | Di, Y. F. | Research on Removable and High Robust Watermarking Scheme Based on Transform Domain (Dalian University of Technology) | 07/2017 |
178 | Sun, M. H. | The Reserach of Robust Hash Algorithm for Color Images (University of Shanghai for Science and Technology,) | 07/2017 |
179 | Tan, J. F. | Integrating Cost-Sensitive and Deep Learning for Image Classification (Southwest Jiaotong University) | 05/2018 |
180 | Lin, J. | Research of Classification Detecion Method for Highly Imbalanced Data of Web Spam (Southwest Jiaotong University) | 05/2018 |
181 | Wang, J. Q. | Feature Selection and Detection Performance Improvement for Mining Fraud Web (Southwest Jiaotong Universityy) | 05/2018 |
182 | Zhu, Z. H. | Steganography Based on Guitar Music (Huaqiao University) | 05/2018 |
183 | Tang, R. | Reserach of Block Based High Capacity Image Data Hiding Schemes (Anhui University) | 05/2018 |
184 | Zeng, Q. F. | Adaptive Information Hiding with High Embedding Capacity Using Modification of Pixel Prediction Errors (National Chung Cheng University) | 06/2018 |
185 | Yu, J. E. | Research and Application of QR Code Security Authentication (Hangzhou Dianzi University) | 03/2019 |
186 | Li, X. S. | Research on Image Information Hiding Technology Based on Turtle Shell Matrix (Xihua University) | 07/2019 |
187 | Zhuag, R. H. | Research of Searchable Encryption Scheme of Uncertain Data (Dalian University of Technology) | 07/2019 |
188 | Hu, H. D. | Design of Secret Sharing Schemes and Its Application in Data Backup (Fujian Normal University) | 07/2019 |
189 | He, S. L. | An Image Authentication Scheme Based on Compessed AMBTC with Restoration | 07/2019 |
190 | He, M. | Research on Data Hiding Algorithm Based on Absolute Moment Block Truncation Coding (Hangzhou Dianzi University) | 06/2020 |
191 | He, M. Z. | Research and Application on Data Hiding in Image (Xihua University) | 06/2020 |
192 | Sun, M. | Research on Copyright Protection Algorithm for Game Character Concept Design (Hangzhou Dianzi University) | 06/2020 |
193 | Zheng, Y. Z. | Several Authentication Schemes with Anonymity for Open Network Environment | 07/2020 |
194 | Li, G. L. | Several Data Hiding Schemes for AMBTC Compressed Codes | 07/2020 |
195 | Shih, C. S. | An Improvement on VQ Compression Method and Hiding Information in VQ Decompressed Images | 07/2020 |
196 | Kao, W. J. | The Data Hiding Mechanisms for VQ-Compressed Images and Cover Images Using some Innovative Techniques | 12/2021 |
197 | Jhang, R. F. | A Data Hiding Scheme for JPEG Images and Tamper Detection for Medical Images | 12/2021 |
198 | Kang, H. Y. | Data Hiding Based on Overlapped (7,4) Hamming Code and Shamir Threshold for Secret Sharing (Nanchang Hangkong University) | 06/2022 |
199 | Wang, Z. W. | Research on Multilevel Halftone Image Generation and Copyright Protection of Ceramic Tile (Hangzhou Dianzi University) | 06/2022 |
200 | Gu, J. J. | Research on Robust Watermarking Algorithm Against Screen Shooting Attack Based on CNN (Hangzhou Dianzi University) | 06/2022 |
|
|
|
Gao, Xu-Dong |
Wang, Jun-Yu |
Zhang, Yu-Rong |
|
|
|
Zhang, Zhu-Xi |
Feng, Quan |
Wu, Mei-Hong |
|
|
|
Zhan, Cai |
Lu, Hao-Wei |
Yuan, Long-Fei |
|
|
|
Lin, Yi-Jie |
Chen, En-ru |
|