Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    Reversible Data Hiding Based on Bidirectional Generalized Integer Transform

    This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based...

    **ao-Zhu **e, Chia-Chen Lin, Chin-Chen Chang in 2021 International Conference on Security … (2023)

  2. No Access

    Chapter and Conference Paper

    A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations

    With the popularity of the metaverse, researchers are turning to augmented reality and virtual reality to innovate their recent pain points, particularly healthcare issues during COVID-19. At the same time, so...

    Chutisant Kerdvibulvech, Chin-Chen Chang in Social Robotics (2022)

  3. No Access

    Chapter and Conference Paper

    Deep Neural Network Watermarking Based on Texture Analysis

    In recent years, deep neural network is active in the field of computer image vision. The existing digital watermarking technology based on deep neural network can resist image attacks, but image quality is no...

    Kuangshi Wang, Li Li, Ting Luo, Chin-Chen Chang in Artificial Intelligence and Security (2020)

  4. No Access

    Chapter and Conference Paper

    A Survey of Data Hiding Based on Vector Quantization

    With the development of computers and networks, digital data can be transmitted quickly to anywhere in the world. Information security has become the focus of research for several researchers as it is essentia...

    Chin-Feng Lee, Chin-Chen Chang in Advances in Intelligent Information Hiding… (2020)

  5. No Access

    Chapter and Conference Paper

    An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network

    Facial expression recognition remains a challenging problem and the small datasets further exacerbate the task. Most previous works realize facial expression by fine-tuning the network pre-trained on a related...

    Kai Huang, Jianjun Li, Shichao Cheng, Jie Yu, Wanyong Tian in MultiMedia Modeling (2020)

  6. No Access

    Chapter and Conference Paper

    Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern

    More and more people use mobile phones to buy goods through scanning the printed aesthetic QR code. QR code has become an important payment tool in today’s business. However, there is an inevitable risk in pa...

    Li Li, Min He, Jier Yu, Jianfeng Lu in Security with Intelligent Computing and Bi… (2020)

  7. No Access

    Chapter and Conference Paper

    A Novel Framework of Robust Video Watermarking Based on Statistical Model

    This paper is to investigate a novel framework of robust video watermarking based on the statistical model with robustness against multiple attacks. The main contribution is threefold. First, the Laplacian dis...

    Li Li, **n Li, Tong Qiao, **aoyu Xu, Shanqing Zhang in Cloud Computing and Security (2018)

  8. No Access

    Chapter and Conference Paper

    A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM

    Many aesthetic QR code algorithms have been proposed. In this paper, a new aesthetic QR code algorithm, based on salient region detection and Selectable Positive Basis Vector Matrix (SPBVM), is proposed. First...

    Li Li, Yanyun Li, Bing Wang, Jianfeng Lu in Security with Intelligent Computing and Bi… (2018)

  9. No Access

    Chapter and Conference Paper

    Face Detection in a Complex Background Using Cascaded Conventional Networks

    Although significant achievements have been achieved in the field of face detection recently, face detection under complex background is still a challenge issue. Especially, face detection has wide applicatio...

    Jianjun Li, Juxian Wang, Chin-Chen Chang in Security with Intelligent Computing and Bi… (2018)

  10. No Access

    Chapter and Conference Paper

    Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography

    With the growing application of quick response (QR) code on bike-share service, there is the possibility of tampering and replacing the QR code. Thus the security of the personal information and the property a...

    Li Li, Jier Yu, Bing Wang, Qili Zhou, Shanqing Zhang in Cloud Computing and Security (2018)

  11. No Access

    Chapter and Conference Paper

    VQ Compression Enhancer with Huffman Coding

    Vector quantization (VQ) is an effective and important compression technique with high compression efficiency and widely used in many multimedia applications. VQ compression is a fixed-length algorithm for ima...

    Chin-Feng Lee, Chin-Chen Chang, Qun-Feng Zeng in Genetic and Evolutionary Computing (2018)

  12. No Access

    Chapter and Conference Paper

    Parameter Selection for Denoising Algorithms Using NR-IQA with CNN

    In order to yield satisfied image after denosing processing, the process of error tracing is nearly necessary for parameter selection. In practice, usually the choice of such parameters is time consuming and e...

    Jianjun Li, Lanlan Xu, Haojie Li, Chin-chen Chang, Fuming Sun in MultiMedia Modeling (2018)

  13. No Access

    Chapter and Conference Paper

    A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors

    Reference-matrix-based data hiding is a way to embed secret data within cover images according to a secret reference matrix. Existing schemes such as exploiting-modification-direction-based method, Sudoku-base...

    Chin-Chen Chang, Jen-Chun Chang, Yun-Hong Chou in Digital Forensics and Watermarking (2017)

  14. No Access

    Chapter and Conference Paper

    A New Card Authentication Scheme Based on Image Watermarking and Encryption

    With smart card’s vast use, the security is becoming more and more important. Traditional password authentication can’t meet user requirements. Many user’s authentication schemes have been proposed, especially...

    **nxin Peng, Jianfeng Lu, Li Li, Chin-Chen Chang in Digital Forensics and Watermarking (2017)

  15. No Access

    Chapter and Conference Paper

    A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

    Steganography is a widely used approach to embed tremendous amount of secret message while maintaining satisfactory visual quality. Least-significant-bit (LSB) substitution is one of the famous techniques appl...

    Yanjun Liu, Chin-Chen Chang, Tzu-Yi Chien in Advances in Intelligent Information Hiding… (2017)

  16. No Access

    Chapter and Conference Paper

    The Reduction of VQ Index Table Size by Matching Side Pixels

    The vector quantization (VQ) technology is applied to compress an image based on a local optimal codebook, and as a result an index table will be generated. In this paper, we propose a novel matching side pixe...

    Ya-Feng Di, Zhi-Hui Wang, Chin-Feng Lee in Advances in Intelligent Information Hiding… (2017)

  17. No Access

    Chapter and Conference Paper

    Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography

    To enhance bike-share service authentication, we propose two novel schemes based on aesthetic QR code combining XOR-based visual cryptography scheme (XVCS). In Scheme I, aesthetic QR code based on error correc...

    Li Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu in Cloud Computing and Security (2017)

  18. No Access

    Chapter and Conference Paper

    A Secure Authentication Scheme for Telecare Medical Information Systems

    In 2012, Chen et al. proposed an ID based authentication scheme for Telecare Medical Information Systems. However it has some security weaknesses. Later **e et al. have proposed a new scheme to improve the sec...

    Chin-Chen Chang, Jung-San Lee, Yu-Ya Lo in Advances in Intelligent Information Hiding… (2017)

  19. Chapter and Conference Paper

    A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images

    In the digital multimedia era, data hiding in the compression domain becomes increasingly popular in the need for speeding up the transmission process and reducing bandwidth. Recently, VQ-based watermarking te...

    Junlan Bai, Chin-Chen Chang, Ce Zhu in Image and Graphics (2015)

  20. No Access

    Chapter and Conference Paper

    Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack

    Traditional digital image watermarking schemes have the inherent conflicts between imperceptibility and robustness because the insertion of watermarks into the host image inevitably introduces some perceptible...

    Jianfeng Lu, Qianru Huang, Meng Wang, Li Li in Digital-Forensics and Watermarking (2015)

previous disabled Page of 5