default search action
Chwei-Shyong Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Chwei-Shyong Tsai, Hsien-Chu Wu, Wei-Ting Chen, Josh Jia-Ching Ying:
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification. Multim. Tools Appl. 83(12): 36797-36822 (2024) - 2022
- [j33]Chwei-Shyong Tsai, Yung-Sung Zhang, Chi-Yao Weng:
Separable reversible data hiding in encrypted images based on Paillier cryptosystem. Multim. Tools Appl. 81(13): 18807-18827 (2022) - [j32]Hsien-Chu Wu, Wen-Li Fan, Chwei-Shyong Tsai, Josh Jia-Ching Ying:
An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multim. Tools Appl. 81(14): 19351-19375 (2022) - 2021
- [j31]Chwei-Shyong Tsai, Hsin-Liang Chen, Hsien-Chu Wu, Josh Jia-Ching Ying:
A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code. Symmetry 13(10): 1896 (2021) - [j30]Chwei-Shyong Tsai, Hsien-Chu Wu, Yu-Wen Li, Josh Jia-Ching Ying:
Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques. Symmetry 13(12): 2438 (2021)
2010 – 2019
- 2019
- [c11]Chwei-Shyong Tsai, Qi-Xian Huang, Tsung-Hung Lin, Tian-Fu Lee:
Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems. ICMHI 2019: 167-171 - 2015
- [c10]Jeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen, Chwei-Shyong Tsai:
A KL Divergence Function for Randomized Secret Shares. IIH-MSP 2015: 231-234 - 2014
- [j29]Po-Ying Chen, Chi-Chang Chen, Wen-Kuan Yeh, Yukan Chang, Der-Chen Huang, Shyr-Shen Yu, Chwei-Shyong Tsai, Yu-Jung Huang, Wei-Cheng Lin, Shao-I Chu, Chung-Long Pan, Tsung-Hung Lin, Shyh-Chang Liu:
Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface. J. Sensors 2014: 238350:1-238350:7 (2014) - [j28]Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu, Guo-Wei Chen, Chwei-Shyong Tsai:
A new visual cryptography with multi-level encoding. J. Vis. Lang. Comput. 25(3): 243-250 (2014) - 2013
- [j27]Chiu-Mei Chen, Chiao-Min Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images. J. Syst. Softw. 86(1): 38-46 (2013) - 2012
- [j26]Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai:
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Secur. Commun. Networks 5(12): 1375-1378 (2012) - 2011
- [j25]Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32(3): 118-134 (2011) - [j24]Hsien-Chu Wu, Hao-Cheng Wang, Chung-Ming Wang, Chwei-Shyong Tsai:
Coloured visual cryptography using fixed size meaningful share. Int. J. Comput. Math. 88(6): 1239-1255 (2011) - 2010
- [j23]Tsung-Hung Lin, Cheng-Chi Lee, Chwei-Shyong Tsai, Shin-Dong Guo:
A tabular steganography scheme for graphical password authentication. Comput. Sci. Inf. Syst. 7(4): 823-841 (2010) - [j22]Hsien-Chu Wu, Hao-Cheng Wang, Chwei-Shyong Tsai, Chung-Ming Wang:
Reversible image steganographic scheme via predictive coding. Displays 31(1): 35-43 (2010) - [j21]Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, Chwei-Shyong Tsai:
A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Softw. 83(7): 1236-1248 (2010) - [c9]Chun-Yu Wang, Ni-Shan Shiao, Hong-Hao Chen, Chwei-Shyong Tsai:
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. ICUIMC 2010: 15
2000 – 2009
- 2009
- [j20]Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai:
A new authenticated group key agreement in a mobile environment. Ann. des Télécommunications 64(11-12): 735-744 (2009) - [j19]Yung-Kuan Chan, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method. J. Syst. Softw. 82(3): 411-421 (2009) - [j18]Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:
A high capacity reversible data hiding scheme with edge prediction and difference expansion. J. Syst. Softw. 82(12): 1966-1973 (2009) - [c8]Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. ICIS 2009: 155-160 - 2008
- [j17]Chwei-Shyong Tsai, Mu-Yen Chen:
Using adaptive resonance theory and data-mining techniques for materials recommendation based on the e-library environment. Electron. Libr. 26(3): 287-302 (2008) - [j16]Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang:
A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1): 150-158 (2008) - [j15]Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognit. 41(6): 2097-2106 (2008) - [j14]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu:
Visual secret sharing for multiple secrets. Pattern Recognit. 41(12): 3572-3581 (2008) - [c7]Hsien-Chu Wu, Yu-Chi Liu, Kuo-Ching Liu, Chwei-Shyong Tsai:
A Block-Based Authentication Watermarking Technique for Binary Images. ISDA (3) 2008: 513-518 - 2006
- [j13]Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, Yen-Ping Chu:
Reversible Watermarking: Current Status and Key Issues. Int. J. Netw. Secur. 2(3): 161-170 (2006) - [j12]Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:
Password Authentication Schemes: Current Status and Key Issues. Int. J. Netw. Secur. 3(2): 101-115 (2006) - [c6]Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai:
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. ICCSA (3) 2006: 406-415 - [c5]Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
Robust Image Hiding Method. JCIS 2006 - 2005
- [j11]Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang:
Cryptanalysis of an authenticated encryption scheme using self-certified public keys. Appl. Math. Comput. 166(1): 118-122 (2005) - [j10]Ching-Wen Chen, Ming-Chin Chuang, Chwei-Shyong Tsai:
An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet. Int. J. Netw. Secur. 1(1): 14-23 (2005) - [j9]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
A new multi-secret images sharing scheme using Largrange's interpolation. J. Syst. Softw. 76(3): 327-339 (2005) - 2004
- [j8]Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai:
Generalization of proxy signature based on elliptic curves. Comput. Stand. Interfaces 26(2): 73-84 (2004) - [j7]Chwei-Shyong Tsai, Chin-Chen Chang:
A New Repeating Color Watermarking Scheme Based on Human Visual Model. EURASIP J. Adv. Signal Process. 2004(13): 1965-1972 (2004) - [j6]Chwei-Shyong Tsai, Chin-Chen Chang:
A Pattern Mapping Based Digital Image Watermarking. Informatica (Slovenia) 28(2): 181-188 (2004) - [c4]Min-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai:
On the Security of an Enhanced Authentication Key Exchange Protocol. AINA (2) 2004: 160-163 - [c3]Wen-Ling Chan, Yen-Ping Chu, Yung-fu Chen, Chwei-Shyong Tsai, Jan-Gowth Chang:
Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling. METMBS 2004: 271-275 - 2003
- [j5]Chwei-Shyong Tsai, Chin-Chen Chang:
An Improvement to Image Segment Based on Human Visual System for Object-based Coding. Fundam. Informaticae 58(2): 167-178 (2003) - [j4]Chwei-Shyong Tsai, Chin-Chen Chang:
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. Fundam. Informaticae 58(2): 179-188 (2003) - [j3]Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang:
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(3): 393-402 (2003) - 2002
- [j2]Chwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen:
Sharing multiple secrets in digital images. J. Syst. Softw. 64(2): 163-170 (2002) - 2001
- [c2]Chwei-Shyong Tsai, Chin-Chen Chang:
A Generalized Secret Image Sharing and Recovery Scheme. IEEE Pacific Rim Conference on Multimedia 2001: 963-968 - 2000
- [j1]Chin-Chen Chang, Chwei-Shyong Tsai:
A Technique for Computing Watermarks from Digital Images. Informatica (Slovenia) 24(3) (2000) - [c1]Chin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen:
A New Scheme for Sharing Secret Color Images in Computer Network. ICPADS 2000: 21-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint