Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Mobile Networks and Applications (2023)

  2. No Access

    Chapter and Conference Paper

    Reversible Data Hiding Based on Bidirectional Generalized Integer Transform

    This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based...

    **ao-Zhu **e, Chia-Chen Lin, Chin-Chen Chang in 2021 International Conference on Security … (2023)

  3. Article

    Open Access

    Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder

    Fog computing, as a new distributed computing framework, extends the tasks originally done in the cloud data center to the edge of the network and brings more serious security challenges while providing conven...

    **ang Lv, Dezhi Han, Dun Li, Lijun **ao in EURASIP Journal on Wireless Communications… (2022)

  4. Article

    Open Access

    SKDStream: a dynamic clustering algorithm on time-decaying data stream

    Data stream is a type of data that continue to grow over time. For example, network security data stream will constantly be generated in the field of data security, and encrypted data stream will be generated ...

    Hui Liu, Aihua Wu, Mingkang Wei in EURASIP Journal on Wireless Communications… (2022)

  5. Article

    Open Access

    ABOS: an attention-based one-stage framework for person search

    Person search is of great significance to public safety research, such as crime surveillance, video surveillance and security. Person search is a method of locating and identifying the queried person from a co...

    Yuqi Chen, Dezhi Han, Mingming Cui in EURASIP Journal on Wireless Communications… (2022)

  6. Article

    Open Access

    MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture

    Network intrusion detection, which takes the extraction and analysis of network traffic features as the main method, plays a vital role in network security protection. The current network traffic feature extra...

    Ming Li, Dezhi Han, Dun Li, Han Liu in EURASIP Journal on Wireless Communications… (2022)

  7. Article

    Open Access

    A blockchain-based secure storage scheme for medical information

    Medical data involves a large amount of personal information and is highly privacy sensitive. In the age of big data, the increasing informatization of healthcare makes it vital that medical information is sto...

    Zhijie Sun, Dezhi Han, Dun Li in EURASIP Journal on Wireless Communications… (2022)

  8. Article

    Open Access

    A two-stage detection method of copy-move forgery based on parallel feature fusion

    The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy ...

    Wujian Ye, Qingyuan Zeng, Yihang Peng in EURASIP Journal on Wireless Communications… (2022)

  9. No Access

    Article

    Public auditing of log integrity for shared cloud storage systems via blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Wireless Networks (2020)

  10. No Access

    Chapter and Conference Paper

    A Survey of Data Hiding Based on Vector Quantization

    With the development of computers and networks, digital data can be transmitted quickly to anywhere in the world. Information security has become the focus of research for several researchers as it is essentia...

    Chin-Feng Lee, Chin-Chen Chang in Advances in Intelligent Information Hiding… (2020)

  11. No Access

    Chapter and Conference Paper

    Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern

    More and more people use mobile phones to buy goods through scanning the printed aesthetic QR code. QR code has become an important payment tool in today’s business. However, there is an inevitable risk in pa...

    Li Li, Min He, Jier Yu, Jianfeng Lu in Security with Intelligent Computing and Bi… (2020)

  12. No Access

    Article

    A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks

    Satellite systems have been integrating into worldwide networks to improve the quality of services, including mobility, reliability, and coverage. Such systems offer tremendous advantages to end users at any t...

    Ngoc-Tu Nguyen, Chin-Chen Chang in Wireless Personal Communications (2019)

  13. No Access

    Article

    Public audit for operation behavior logs with error locating in cloud storage

    To ensure the creditability of audit for operation behaviors in cloud storage scenarios, it is indispensable to verify the integrity of log files prior to forensic analysis. Thus, in this paper, we mainly focu...

    Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang in Soft Computing (2019)

  14. No Access

    Article

    Untraceable biometric-based three-party authenticated key exchange for dynamic systems

    An authenticated key exchange (AKE) between two end-users is a crucial procedure to ensure data integrity and confidentiality while they communicate through a public channel. The existing three-party AKE schem...

    Ngoc-Tu Nguyen, Chin-Chen Chang in Peer-to-Peer Networking and Applications (2018)

  15. No Access

    Chapter and Conference Paper

    A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM

    Many aesthetic QR code algorithms have been proposed. In this paper, a new aesthetic QR code algorithm, based on salient region detection and Selectable Positive Basis Vector Matrix (SPBVM), is proposed. First...

    Li Li, Yanyun Li, Bing Wang, Jianfeng Lu in Security with Intelligent Computing and Bi… (2018)

  16. No Access

    Chapter and Conference Paper

    Face Detection in a Complex Background Using Cascaded Conventional Networks

    Although significant achievements have been achieved in the field of face detection recently, face detection under complex background is still a challenge issue. Especially, face detection has wide applicatio...

    Jianjun Li, Juxian Wang, Chin-Chen Chang in Security with Intelligent Computing and Bi… (2018)

  17. No Access

    Chapter and Conference Paper

    VQ Compression Enhancer with Huffman Coding

    Vector quantization (VQ) is an effective and important compression technique with high compression efficiency and widely used in many multimedia applications. VQ compression is a fixed-length algorithm for ima...

    Chin-Feng Lee, Chin-Chen Chang, Qun-Feng Zeng in Genetic and Evolutionary Computing (2018)

  18. No Access

    Article

    Security Issues in Ultralightweight RFID Authentication Protocols

    Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicab...

    Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng in Wireless Personal Communications (2018)

  19. No Access

    Article

    Enabling public auditability for operation behaviors in cloud storage

    In this paper, we focus on auditing for users’ operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first ...

    Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi in Soft Computing (2017)

  20. No Access

    Chapter and Conference Paper

    A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

    Steganography is a widely used approach to embed tremendous amount of secret message while maintaining satisfactory visual quality. Least-significant-bit (LSB) substitution is one of the famous techniques appl...

    Yanjun Liu, Chin-Chen Chang, Tzu-Yi Chien in Advances in Intelligent Information Hiding… (2017)

previous disabled Page of 3