dblp.uni-trier.dewww.uni-trier.de

Chwei-Shyong Tsai

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
16EEChung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang: A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software 81(1): 150-158 (2008)
15EEJen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu: Visual secret sharing for multiple secrets. Pattern Recognition 41(12): 3572-3581 (2008)
14EEChih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu: Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognition 41(6): 2097-2106 (2008)
2006
13EEHsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai: A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. ICCSA (3) 2006: 406-415
12EEYung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu: Robust Image Hiding Method. JCIS 2006
2005
11EEChwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang: Cryptanalysis of an authenticated encryption scheme using self-certified public keys. Applied Mathematics and Computation 166(1): 118-122 (2005)
10EEJen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu: A new multi-secret images sharing scheme using Largrange's interpolation. Journal of Systems and Software 76(3): 327-339 (2005)
2004
9EEMin-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai: On the Security of an Enhanced Authentication Key Exchange Protocol. AINA (2) 2004: 160-163
8 Wen-Ling Chan, Yen-Ping Chu, Yung-fu Chen, Chwei-Shyong Tsai, Jan-Gowth Chang: Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling. METMBS 2004: 271-275
2003
7EEChwei-Shyong Tsai, Chin-Chen Chang: An Improvement to Image Segment Based on Human Visual System for Object-based Coding. Fundam. Inform. 58(2): 167-178 (2003)
6EEChwei-Shyong Tsai, Chin-Chen Chang: A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. Fundam. Inform. 58(2): 179-188 (2003)
5EEChwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang: Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. Informatica, Lith. Acad. Sci. 14(3): 393-402 (2003)
2002
4EEChwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen: Sharing multiple secrets in digital images. Journal of Systems and Software 64(2): 163-170 (2002)
2001
3EEChwei-Shyong Tsai, Chin-Chen Chang: A Generalized Secret Image Sharing and Recovery Scheme. IEEE Pacific Rim Conference on Multimedia 2001: 963-968
2000
2EEChin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen: A New Scheme for Sharing Secret Color Images in Computer Network. ICPADS 2000: 21-27
1 Chin-Chen Chang, Chwei-Shyong Tsai: A Technique for Computing Watermarks from Digital Images. Informatica (Slovenia) 24(3): (2000)

Coauthor Index

1Wen-Ling Chan [8]
2Yung-Kuan Chan [12]
3Chin-Chen Chang [1] [2] [3] [4] [6] [7]
4Jan-Gowth Chang [8]
5Ting Yi Chang [9]
6Ya-Fen Chang [15]
7Tung-Shou Chen [2] [4]
8Yung-fu Chen [8]
9Yen-Ping Chu [8] [10] [12] [14] [15]
10Jen-Bang Feng [10] [15]
11Yu-An Ho [12]
12Min-Shiang Hwang [5] [9] [11] [16]
13Chih-Chiang Lee [14]
14Shu-Chen Lin [9] [11]
15Shiang-Feng Tzeng [5]
16Chung-Ming Wang [16]
17Hsien-Chu Wu [10] [13] [14] [15]
18Nan-I Wu [16]
19Chuan-Po Yeh [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)