Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Malware Detection Based on Image Conversion

    Due to different malware and their variants appear every year, it is difficult to identify the virus. In traditional malware analysis methods, both static analysis methods and dynamic analysis methods may be l...

    Wen-Chung Kuo, Yu-Ting Chen, Yu-Chih Huang in 2021 International Conference on Security … (2023)

  2. No Access

    Chapter and Conference Paper

    A Progressive Secret Image Sharing Scheme Based on GEMD Data Hiding

    With the development of the Internet, people spread digital information through the Internet. However, the Internet is a public channel. Avoiding digital information be tampered with to keep the security of da...

    Wen-Chung Kuo, Yi-Jiun Chen, Chun-Cheng Wang in Security with Intelligent Computing and Bi… (2020)

  3. No Access

    Chapter and Conference Paper

    Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding

    In 2017, Liu et al. proposed the high capacity GEMD scheme which increases the capacity of GEMD by divides n adjacent pixels into multiple groups. The dividing modes among the image are the same in their sche...

    Wen-Chung Kuo, Ren-Jun **ao, Chun-Cheng Wang in Security with Intelligent Computing and Bi… (2020)

  4. No Access

    Chapter and Conference Paper

    On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment

    Recently, Chiou et al. proposed a secure authentication scheme which not only ensures message confidentiality and patient anonymity but also provides real telemedicine system implementation. However, in this p...

    Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang in Information Science and Applications 2017 (2017)