Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding

    The prosperity of cloud services stimulates the study of reversible data hiding in encrypted images, for which researchers dedicate to find better methods to adopt the new assumption that the ones who provide ...

    Li-Chiun Lin, Cheng-Ta Huang in 2021 International Conference on Security … (2023)

  2. No Access

    Article

    A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks

    With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue...

    Cheng-Ta Huang, Li-Chiun Lin, De-En Sun in Multimedia Tools and Applications (2019)

  3. No Access

    Article

    VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements

    Internet of things (IoT) realizes the concept of bringing things connected together. Data are exchanged and controlled within one or more IoT networks. Sensitive data transferred between different IoT networks...

    Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang in The Journal of Supercomputing (2018)

  4. No Access

    Article

    Mutual authentications to parties with QR-code applications in mobile systems

    User authentication over the Internet has long been an issue for Internet service providers and users. A good authentication protocol must provide high security and mutual authentication on both sides. In addi...

    Cheng-Ta Huang, Yu-Hong Zhang, Li-Chiun Lin in International Journal of Information Secur… (2017)