Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    On the bitmap compression for joint coding and data hiding of AMBTC compressed images

    The compressed code of Absolute Moment Block Truncation Coding (AMBTC) consists of quantized values (QVs) and bitmaps. The QVs exhibit greater predictability, and the bitmaps themselves carry more randomness. ...

    Wien Hong, Guan-Zhong Su, Tung-Shou Chen, Jeanne Chen in Multimedia Tools and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    An Egg Sorting System Combining Egg Recognition Model and Smart Egg Tray

    Modern agriculture is at the forefront of technological transformation. Smart agricultural technology and mechanical automation are bringing unprecedented opportunities and challenges to the field. This study ...

    Jung-An Liu, Wei-Ling Lin, Wei-Cheng Hong in Technologies and Applications of Artificia… (2024)

  3. No Access

    Article

    An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique

    This paper proposes an efficient data hiding method for absolute moment block truncation coding (AMBTC) images with the recoverability of compressed code. The existing methods sacrifice some embedding capacity...

    **aoyu Zhou, Guangsong Yang, Wien Hong, Kia Sheng Chen in Multimedia Tools and Applications (2023)

  4. No Access

    Article

    Personalized live streaming channel recommendation based on most similar neighbors

    With the rapid development of mobile network technology, an increasing number of viewers are watching channels through live streaming platforms, and thousands upon thousands of channels are broadcasting on the...

    Chen-Yi Lin, Tung-Shou Chen, Jeanne Chen, Chih-Yu Chen in Multimedia Tools and Applications (2021)

  5. No Access

    Chapter and Conference Paper

    Research on Remote Control of Self-propelled Lawn Mower

    Current lawn mower in the market is mainly driven by fuel engines, and users need to operate them at close range. Problems such as noise, dust and foreign object splashes generated when the machine is running ...

    Wan-Rong Chen, Tung-Shou Chen, Jeanne Chen, Fang Rong Hsu in Frontier Computing (2021)

  6. No Access

    Article

    Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness

    Although k-anonymity is a good way of publishing microdata for research purposes, it cannot resist several common attacks, such as attribute disclosure and the similarity attack. To resist these attacks, many ref...

    Rong Wang, Yan Zhu, Tung-Shou Chen in Journal of Computer Science and Technology (2018)

  7. No Access

    Article

    A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator

    Due to a rapid increase in copyright infringement, protecting secret information during transmission on the Internet is very important. More and more researchers have proposed solutions such as steganography, ...

    Chin-Chen Chang, Tung-Shou Chen, Yu-Kai Wang in Multimedia Tools and Applications (2018)

  8. No Access

    Article

    An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching

    The existing image authentication methods for absolute moment block truncation coding (AMBTC) modify the bits of quantitation levels or bitmaps to embed the authentication code (AC). However, the modification ...

    Wien Hong, Mei** Chen, Tung Shou Chen in Multimedia Tools and Applications (2018)

  9. No Access

    Chapter and Conference Paper

    Reversible Data Hiding in Partially-Encrypted Images

    This paper presents a novel reversible data hiding method for medical images with privacy protection in only partial of the image areas. Specifically, only those areas with privacy protection requirement are e...

    Haishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen in Cloud Computing and Security (2018)

  10. No Access

    Article

    An efficient reversible data hiding method for AMBTC compressed images

    Analyzing multimedia data in mobile devices is often constrained by limited computing capacity and power storage. Therefore, more and more studies are trying to investigate methods with algorithm efficiency. S...

    Wien Hong, Yuan-Bo Ma, Hung-Che Wu, Tung-Shou Chen in Multimedia Tools and Applications (2017)

  11. No Access

    Article

    Data hiding in AMBTC images using quantization level modification and perturbation technique

    A novel data hiding method for Absolute Moment Block Truncation Coding (AMBTC) compressed image based on quantization level modification is proposed. Blocks of AMBTC-compressed image are classified into two ca...

    Wien Hong, Tung Shou Chen, Zhaoxia Yin, Bin Luo in Multimedia Tools and Applications (2017)

  12. No Access

    Article

    Data Perturbation Method Based on Contrast Map** for Reversible Privacy-preserving Data Mining

    Data mining has become an important service in cloud computing. Privacy-preserving schemes must be applied to the original data before data owners provide data publicly or send the data to remote servers for m...

    Yuan-Hung Kao, Wei-Bin Lee, Tien-Yu Hsu in Journal of Medical and Biological Engineer… (2015)

  13. No Access

    Article

    A Novel Anti-classification Approach for Knowledge Protection

    Classification is the problem of identifying a set of categories where new data belong, on the basis of a set of training data whose category membership is known. Its application is wide-spread, such as the me...

    Chen-Yi Lin, Tung-Shou Chen, Hui-Fang Tsai, Wei-Bin Lee in Journal of Medical Systems (2015)

  14. No Access

    Article

    Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving

    Privacy Preserving Data Mining (PPDM) can prevent private data from disclosure in data mining. However, the current PPDM methods damaged the values of original data where knowledge from the mined data cannot b...

    Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao in The Journal of Supercomputing (2013)

  15. No Access

    Chapter and Conference Paper

    Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flip**

    In this paper, we propose a reversible data hiding technique to improve Zhang and Hong et al.’s methods on cartoon images. Zhang and Hong et al. exploit the block complexity for data extraction and image recov...

    Wien Hong, Tung-Shou Chen, Jeanne Chen, Yu-Hsin Kao in Advances in Swarm Intelligence (2013)

  16. No Access

    Chapter and Conference Paper

    Using MapReduce Framework for Mining Association Rules

    Data mining in knowledge discovery helps people discover unknown patterns from the collected data. PIETM (Principle of Inclusion–Exclusion and Transaction Map**) algorithmis a novel frequent item sets mining...

    Shih-Ying Chen, Jia-Hong Li, Ke-Chung Lin in Information Technology Convergence (2013)

  17. No Access

    Chapter and Conference Paper

    A Study Using Genetic Algorithm and Support Vector Machine to Find Out How the Attitude of Training Personnel Affects the Performance of the Introduction of Taiwan TrainQuali System in an Enterprise

    After entering knowledge economy era, human resource has become one of the most important manufacturing elements of an enterprise, hence, human resource incubation has become one of the important jobs of enter...

    Tung-Shou Chen, Yih-Yeong Lin, Jeanne Chen in Information and Business Intelligence (2012)

  18. No Access

    Chapter and Conference Paper

    Using Sequential Pattern Mining to Analyze the Behavior on the WELS

    Sequential pattern mining is an important data-mining method for determining time-related behavior in sequence database. This study used the methods of Sequential Pattern Mining to design a system, which was t...

    Yi-Lin Wang, Ling-Yu Melody Wen, Tung-Shou Chen in Information and Business Intelligence (2012)

  19. No Access

    Chapter and Conference Paper

    Exploring Teachers’ Involvement by Using Fuzzy Theory

    With the improvement of the Internet bandwidth and techniques, e-learning environments have been more convenient than ever; they are beyond the limits of time and space, accessible at anytime and anywhere. Eve...

    Yi-Lin Wang, Ling-Yu Melody Wen, Rong-Chang Chen in Information and Business Intelligence (2012)

  20. No Access

    Chapter

    A High Quality Data Embedding Method Using Modified Saturated Pixel Embedment Strategy

    Zhang and Wang proposed an efficient data embedding method by exploring the modification of embedding directions. In their method, pixels in the cover image are segmented into groups of n pixels, and each grou...

    Wien Hong, Mei-Chen Wu, Jeanne Chen in Future Communication, Computing, Control a… (2012)

previous disabled Page of 2