Skip to main content

previous disabled Page of 11
and
  1. No Access

    Article

    A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility

    Owing to life style changes during COVID, communication channels were forced to change. Online services ramped up to replace traditional services. It became daily practice for most of us that documents, files,...

    Jui-Chuan Liu, Yijie Lin, Ching-Chun Chang in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Joint learning of fuzzy embedded clustering and non-negative spectral clustering

    Fuzzy k-means clustering is widely acknowledged for its remarkable performance in data clustering. However, its effectiveness must improve when dealing with high-dimensional data characterized by complex distr...

    Wujian Ye, Jiada Wang, Yongda Cai, Yijun Liu in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Reversible data hiding in encrypted images with block-based bit-plane reallocation

    As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible data hiding in encrypted images (RDHEI) is an effective method...

    Li Liu, Chaofan Chen, Yingchun Wu, Chin-Chen Chang in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    Recent progress in unraveling cardiovascular complications associated with primary aldosteronism: a succinct review

    This comprehensive review offers a thorough exploration of recent advancements in our understanding of the intricate cardiovascular complications associated with Primary Aldosteronism (PA). PA encompasses a sp...

    Wei-Ting Wang, Tsung-Hui Wu, Leay-Kiaw Er, Chien-Wei Huang in Hypertension Research (2024)

  5. No Access

    Article

    Reversible data hiding scheme using prediction neural network and adaptive modulation map**

    Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation map**. This p...

    Si-sheng Chen, Chin-Chen Chang, Ji-hwei Horng in Multimedia Tools and Applications (2024)

  6. No Access

    Article

    Data hiding with thumbnail-preserving encryption for cloud medical images

    To serve a convenient healthcare network, storing medical images and diagnosis records in the cloud is a straightforward solution. Encrypting the medical images before uploading them to the cloud is a trivial ...

    Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    Aldosteronism is associated with more severe cerebral small vessel disease in hypertensive intracerebral hemorrhage

    Primary aldosteronism is associated with various types of cardiovascular and cerebrovascular damage independently of hypertension. Although chronic hypertension and related cerebral arteriosclerosis are the ma...

    Bo-Ching Lee, Hsin-Hsi Tsai, Zheng-Wei Chen, Chin-Chen Chang in Hypertension Research (2024)

  8. No Access

    Article

    An effective compressed image authentication scheme based on N-variant AMBTC

    Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation co...

    Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin in Multimedia Tools and Applications (2024)

  9. No Access

    Article

    Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation

    The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preserva...

    Guo-Dong Su, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang in The Visual Computer (2023)

  10. Article

    Open Access

    Optimizing adrenal vein sampling in primary aldosteronism subty** through LC–MS/MS and secretion ratios of aldosterone, 18-oxocortisol, and 18-hydroxycortisol

    Adrenal venous sampling (AVS) is the gold standard for identifying curable unilateral aldosterone excess in primary aldosteronism (PA). Studies have demonstrated the value of steroid profiling through liquid c...

    Yu-Ling Chang, Guan-Yuan Chen, Bo-Ching Lee, Po-Ting Chen in Hypertension Research (2023)

  11. No Access

    Article

    Overlapped (7,4) hamming code for large-capacity and low-loss data hiding

    A novel data hiding method based on overlapped (7,4) Hamming code is proposed in this paper. 11-bit codewords are constructed from two overlapped (7,4) Hamming codes, and then a look-up table of 11-bit codewor...

    Haoyang Kang, Lu Leng, Chin-Chen Chang in Multimedia Tools and Applications (2023)

  12. No Access

    Article

    Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Mobile Networks and Applications (2023)

  13. No Access

    Chapter and Conference Paper

    Reversible Data Hiding Based on Bidirectional Generalized Integer Transform

    This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based...

    **ao-Zhu **e, Chia-Chen Lin, Chin-Chen Chang in 2021 International Conference on Security … (2023)

  14. Article

    Open Access

    Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder

    Fog computing, as a new distributed computing framework, extends the tasks originally done in the cloud data center to the edge of the network and brings more serious security challenges while providing conven...

    **ang Lv, Dezhi Han, Dun Li, Lijun **ao in EURASIP Journal on Wireless Communications… (2022)

  15. Article

    Open Access

    SKDStream: a dynamic clustering algorithm on time-decaying data stream

    Data stream is a type of data that continue to grow over time. For example, network security data stream will constantly be generated in the field of data security, and encrypted data stream will be generated ...

    Hui Liu, Aihua Wu, Mingkang Wei in EURASIP Journal on Wireless Communications… (2022)

  16. Article

    Open Access

    ABOS: an attention-based one-stage framework for person search

    Person search is of great significance to public safety research, such as crime surveillance, video surveillance and security. Person search is a method of locating and identifying the queried person from a co...

    Yuqi Chen, Dezhi Han, Mingming Cui in EURASIP Journal on Wireless Communications… (2022)

  17. No Access

    Article

    Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding

    With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing data hiding methods for encrypted images mainly focus on impr...

    Sisheng Chen, Chin-Chen Chang in Multimedia Tools and Applications (2022)

  18. No Access

    Article

    CSST-Net: an arbitrary image style transfer network of coverless steganography

    A traditional image steganography embeds secret information into a cover image to generate a secret-embedded image. The modification traces imposed on the cover image can be easily detected by steganalysis too...

    Shanqing Zhang, Shengqi Su, Li Li, Jianfeng Lu, Qili Zhou in The Visual Computer (2022)

  19. Article

    Open Access

    Radiomics utilization to differentiate nonfunctional adenoma in essential hypertension and functional adenoma in primary aldosteronism

    We performed the present study to investigate the role of computed tomography (CT) radiomics in differentiating nonfunctional adenoma and aldosterone-producing adenoma (APA) and outcome prediction in patients ...

    Po-Ting Chen, Dawei Chang, Kao-Lang Liu, Wei-Chih Liao, Weichung Wang in Scientific Reports (2022)

  20. No Access

    Article

    A reversible and authenticable secret sharing scheme using dual images

    Reversible data hiding (RDH) is a steganographic method that can restore the cover medium after extracting the embedded secret data. This work proposes a novel RDH scheme based on turtle shell (TS) reference m...

    Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang in Multimedia Tools and Applications (2022)

previous disabled Page of 11