2008 |
13 | EE | Jen-Bang Feng,
Hsien-Chu Wu,
Chwei-Shyong Tsai,
Ya-Fen Chang,
Yen-Ping Chu:
Visual secret sharing for multiple secrets.
Pattern Recognition 41(12): 3572-3581 (2008) |
12 | EE | Chih-Chiang Lee,
Hsien-Chu Wu,
Chwei-Shyong Tsai,
Yen-Ping Chu:
Adaptive lossless steganographic scheme with centralized difference expansion.
Pattern Recognition 41(6): 2097-2106 (2008) |
2007 |
11 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Inform. 76(4): 481-493 (2007) |
2006 |
10 | EE | Hsien-Chu Wu,
Chuan-Po Yeh,
Chwei-Shyong Tsai:
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.
ICCSA (3) 2006: 406-415 |
9 | EE | Hsien-Chu Wu,
Chin-Chen Chang,
Ting-Wei Yu:
A DCT-based Recoverable Image Authentication.
JCIS 2006 |
8 | EE | Hsien-Chu Wu,
Hui-Chuan Lin,
Chin-Chen Chang:
Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
JCIS 2006 |
2005 |
7 | | Yung-Kuan Chan,
Yu-An Ho,
Hsien-Chu Wu,
Yen-Ping Chu:
A Duplicate Chinese Document Image Retrieval System.
Encyclopedia of Information Science and Technology (I) 2005: 1-6 |
6 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
A novel digital image watermarking scheme based on the vector quantization technique.
Computers & Security 24(6): 460-471 (2005) |
5 | EE | Hsien-Chu Wu,
Min-Shiang Hwang,
Chia-Hsin Liu:
A Secure Strong-Password Authentication Protocol.
Fundam. Inform. 68(4): 399-406 (2005) |
4 | EE | Jen-Bang Feng,
Hsien-Chu Wu,
Chwei-Shyong Tsai,
Yen-Ping Chu:
A new multi-secret images sharing scheme using Largrange's interpolation.
Journal of Systems and Software 76(3): 327-339 (2005) |
2004 |
3 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Inform. 63(1): 89-106 (2004) |
2003 |
2 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Inform. 58(2): 189-202 (2003) |
2002 |
1 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
Detection and restoration of tampered JPEG compressed images.
Journal of Systems and Software 64(2): 151-161 (2002) |