BibTeX records: Ching-Nung Yang

download as .bib file

@article{DBLP:journals/csi/YangHK17,
  author    = {Ching{-}Nung Yang and
               Shen{-}Chieh Hsu and
               Cheonshik Kim},
  title     = {Improving stego image quality in image interpolation based data hiding},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {50},
  pages     = {209--215},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.csi.2016.10.005},
  doi       = {10.1016/j.csi.2016.10.005},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/csi/YangHK17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/YangWYWK17,
  author    = {Ching{-}Nung Yang and
               Chihi{-}Han Wu and
               Zong{-}Xuan Yeh and
               Daoshun Wang and
               Cheonshik Kim},
  title     = {A new sharing digital image scheme with clearer shadow images},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {51},
  pages     = {118--131},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.csi.2016.11.015},
  doi       = {10.1016/j.csi.2016.11.015},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/csi/YangWYWK17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/YangLW17,
  author    = {Ching{-}Nung Yang and
               Jung{-}Kuo Liao and
               Daoshun Wang},
  title     = {New privilege-based visual cryptography with arbitrary privilege levels},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {42},
  pages     = {121--131},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jvcir.2016.10.014},
  doi       = {10.1016/j.jvcir.2016.10.014},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/YangLW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/YangWCF17,
  author    = {Ching{-}Nung Yang and
               Xiaotian Wu and
               Yung{-}Chien Chou and
               Zhangjie Fu},
  title     = {Constructions of general (k, n) reversible AMBTC-based visual cryptography
               with two decryption options},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {48},
  pages     = {182--194},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jvcir.2017.06.012},
  doi       = {10.1016/j.jvcir.2017.06.012},
  timestamp = {Fri, 25 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/YangWCF17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/spic/LiuY17,
  author    = {Yan{-}Xiao Liu and
               Ching{-}Nung Yang},
  title     = {Scalable secret image sharing scheme with essential shadows},
  journal   = {Sig. Proc.: Image Comm.},
  volume    = {58},
  pages     = {49--55},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.image.2017.06.011},
  doi       = {10.1016/j.image.2017.06.011},
  timestamp = {Fri, 06 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/spic/LiuY17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tifs/ZhouWWYS17,
  author    = {Zhili Zhou and
               Yunlong Wang and
               Q. M. Jonathan Wu and
               Ching{-}Nung Yang and
               Xingming Sun},
  title     = {Effective and Efficient Global Context Verification for Image Copy
               Detection},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {12},
  number    = {1},
  pages     = {48--63},
  year      = {2017},
  url       = {https://doi.org/10.1109/TIFS.2016.2601065},
  doi       = {10.1109/TIFS.2016.2601065},
  timestamp = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tifs/ZhouWWYS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dsp/LiYZ16,
  author    = {Peng Li and
               Ching{-}Nung Yang and
               Zhili Zhou},
  title     = {Essential secret image sharing scheme with the same size of shadows},
  journal   = {Digital Signal Processing},
  volume    = {50},
  pages     = {51--60},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.dsp.2015.12.004},
  doi       = {10.1016/j.dsp.2015.12.004},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dsp/LiYZ16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/ZhouYCSLW16,
  author    = {Zhili Zhou and
               Ching{-}Nung Yang and
               Beijing Chen and
               Xingming Sun and
               Qi Liu and
               Q. M. Jonathan Wu},
  title     = {Effective and Efficient Image Copy Detection with Resistance to Arbitrary
               Rotation},
  journal   = {{IEICE} Transactions},
  volume    = {99-D},
  number    = {6},
  pages     = {1531--1540},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-d_6_1531},
  timestamp = {Sat, 11 Jun 2016 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/ZhouYCSLW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijdsn/KimSSY16,
  author    = {Cheonshik Kim and
               Dongkyoo Shin and
               Dongil Shin and
               Ching{-}Nung Yang},
  title     = {Secure protection of video recorder video in smart car},
  journal   = {{IJDSN}},
  volume    = {12},
  number    = {12},
  year      = {2016},
  url       = {https://doi.org/10.1177/1550147716681792},
  doi       = {10.1177/1550147716681792},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijdsn/KimSSY16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jrtip/YangSYK16,
  author    = {Ching{-}Nung Yang and
               Li{-}Zhe Sun and
               Xuehu Yan and
               Cheonshik Kim},
  title     = {Design a new visual cryptography for human-verifiable authentication
               in accessing a database},
  journal   = {J. Real-Time Image Processing},
  volume    = {12},
  number    = {2},
  pages     = {483--494},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11554-015-0511-9},
  doi       = {10.1007/s11554-015-0511-9},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jrtip/YangSYK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jss/YangCC16,
  author    = {Ching{-}Nung Yang and
               Cheng{-}Hua Chen and
               Song{-}Ruei Cai},
  title     = {Enhanced Boolean-based multi secret image sharing scheme},
  journal   = {Journal of Systems and Software},
  volume    = {116},
  pages     = {22--34},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.jss.2015.01.031},
  doi       = {10.1016/j.jss.2015.01.031},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jss/YangCC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/mta/KimY16a,
  author    = {Cheonshik Kim and
               Ching{-}Nung Yang},
  title     = {Data hiding based on overlapped pixels using hamming code},
  journal   = {Multimedia Tools Appl.},
  volume    = {75},
  number    = {23},
  pages     = {15651--15663},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11042-014-2355-x},
  doi       = {10.1007/s11042-014-2355-x},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/mta/KimY16a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/scn/HuangFSY16,
  author    = {Fengxiao Huang and
               Zhangjie Fu and
               Xingming Sun and
               Ching{-}Nung Yang},
  title     = {Privacy-preserving outsourced gene data search in encryption domain},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {18},
  pages     = {5178--5186},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1687},
  doi       = {10.1002/sec.1687},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/scn/HuangFSY16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/YangSC16,
  author    = {Ching{-}Nung Yang and
               Li{-}Zhe Sun and
               Song{-}Ruei Cai},
  title     = {Extended color visual cryptography for black and white secret image},
  journal   = {Theor. Comput. Sci.},
  volume    = {609},
  pages     = {143--161},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.tcs.2015.09.016},
  doi       = {10.1016/j.tcs.2015.09.016},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tcs/YangSC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhouMZWY16,
  author    = {Zhili Zhou and
               Yan Mu and
               Ningsheng Zhao and
               Q. M. Jonathan Wu and
               Ching{-}Nung Yang},
  title     = {Coverless Information Hiding Method Based on Multi-keywords},
  booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  pages     = {39--47},
  year      = {2016},
  crossref  = {DBLP:conf/icccsec/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-48671-0_4},
  doi       = {10.1007/978-3-319-48671-0_4},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icccsec/ZhouMZWY16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/CimatoDMY16,
  author    = {Stelvio Cimato and
               Ernesto Damiani and
               Silvia Mella and
               Ching{-}Nung Yang},
  title     = {Key Recovery in Public Clouds: {A} Survey on Cross-VM Side Channel
               Attacks},
  booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  pages     = {456--467},
  year      = {2016},
  crossref  = {DBLP:conf/icccsec/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-48671-0_40},
  doi       = {10.1007/978-3-319-48671-0_40},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icccsec/CimatoDMY16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YangCWC16,
  author    = {Ching{-}Nung Yang and
               Stelvio Cimato and
               Jihi{-}Han Wu and
               Song{-}Ruei Cai},
  title     = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
  booktitle = {Proceedings of the 2nd International Conference on Information Systems
               Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
               2016.},
  pages     = {400--406},
  year      = {2016},
  crossref  = {DBLP:conf/icissp/2016},
  url       = {https://doi.org/10.5220/0005740504000406},
  doi       = {10.5220/0005740504000406},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icissp/YangCWC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cit/YangLF15,
  author    = {Ching{-}Nung Yang and
               Jia{-}Bin Lai and
               Zhangjie Fu},
  title     = {Protecting User Privacy for Cloud Computing by Bivariate Polynomial
               Based Secret Sharing},
  journal   = {{CIT}},
  volume    = {23},
  number    = {4},
  pages     = {341--355},
  year      = {2015},
  url       = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2593},
  timestamp = {Sat, 02 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/cit/YangLF15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dsp/YanWNY15,
  author    = {Xuehu Yan and
               Shen Wang and
               Xiamu Niu and
               Ching{-}Nung Yang},
  title     = {Halftone visual cryptography with minimum auxiliary black pixels and
               uniform image quality},
  journal   = {Digital Signal Processing},
  volume    = {38},
  pages     = {53--65},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.dsp.2014.12.002},
  doi       = {10.1016/j.dsp.2014.12.002},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dsp/YanWNY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/isci/YangL15,
  author    = {Ching{-}Nung Yang and
               Che{-}Yu Lin},
  title     = {Almost-aspect-ratio-invariant visual cryptography without adding extra
               subpixels},
  journal   = {Inf. Sci.},
  volume    = {312},
  pages     = {131--151},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.ins.2015.03.024},
  doi       = {10.1016/j.ins.2015.03.024},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/isci/YangL15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/YanWNY15,
  author    = {Xuehu Yan and
               Shen Wang and
               Xiamu Niu and
               Ching{-}Nung Yang},
  title     = {Random grid-based visual secret sharing with multiple decryptions},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {26},
  pages     = {94--104},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.jvcir.2014.11.003},
  doi       = {10.1016/j.jvcir.2014.11.003},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/YanWNY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/mta/KimY15a,
  author    = {Cheonshik Kim and
               Ching{-}Nung Yang},
  title     = {Watermark with {DSA} signature using predictive coding},
  journal   = {Multimedia Tools Appl.},
  volume    = {74},
  number    = {14},
  pages     = {5189--5203},
  year      = {2015},
  url       = {https://doi.org/10.1007/s11042-013-1667-6},
  doi       = {10.1007/s11042-013-1667-6},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/mta/KimY15a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigpro/YanWNY15,
  author    = {Xuehu Yan and
               Shen Wang and
               Xiamu Niu and
               Ching{-}Nung Yang},
  title     = {Generalized random grids-based threshold visual cryptography with
               meaningful shares},
  journal   = {Signal Processing},
  volume    = {109},
  pages     = {317--333},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.sigpro.2014.12.002},
  doi       = {10.1016/j.sigpro.2014.12.002},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/sigpro/YanWNY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/spic/YangLWC15,
  author    = {Ching{-}Nung Yang and
               Peng Li and
               Chih{-}Cheng Wu and
               Song{-}Ruei Cai},
  title     = {Reducing shadow size in essential secret image sharing by conjunctive
               hierarchical approach},
  journal   = {Sig. Proc.: Image Comm.},
  volume    = {31},
  pages     = {1--9},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.image.2014.11.003},
  doi       = {10.1016/j.image.2014.11.003},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/spic/YangLWC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/YangLP15,
  author    = {Ching{-}Nung Yang and
               Zih{-}Yang Lin and
               Sheng{-}Lung Peng},
  title     = {Reducing Code Length of Second-Order Spectral-Null Code},
  journal   = {{IEEE} Trans. Computers},
  volume    = {64},
  number    = {2},
  pages     = {492--503},
  year      = {2015},
  url       = {https://doi.org/10.1109/TC.2013.231},
  doi       = {10.1109/TC.2013.231},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/YangLP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/vjcs/HoaTKY15,
  author    = {Le Quang Hoa and
               Nguyen Huy Truong and
               Cheonshik Kim and
               Ching{-}Nung Yang},
  title     = {(1, 7, 4) Data hiding scheme for searching in hidden text with automata},
  journal   = {Vietnam J. Computer Science},
  volume    = {2},
  number    = {4},
  pages     = {257--265},
  year      = {2015},
  url       = {https://doi.org/10.1007/s40595-015-0050-0},
  doi       = {10.1007/s40595-015-0050-0},
  timestamp = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/vjcs/HoaTKY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/smartcity/YangWTK15,
  author    = {Ching{-}Nung Yang and
               Fu{-}Heng Wu and
               Sin{-}Yen Tsai and
               Wen{-}Chung Kuo},
  title     = {E-Health Services for Elderly Care Based on Google Cloud Messaging},
  booktitle = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom
               2015, Chengdu, China, December 19-21, 2015},
  pages     = {9--12},
  year      = {2015},
  crossref  = {DBLP:conf/smartcity/2015},
  url       = {https://doi.org/10.1109/SmartCity.2015.39},
  doi       = {10.1109/SmartCity.2015.39},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/smartcity/YangWTK15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2014,
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Ching{-}Nung Yang},
  title     = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9023},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-19321-2},
  doi       = {10.1007/978-3-319-19321-2},
  isbn      = {978-3-319-19320-5},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/isci/YangY14,
  author    = {Ching{-}Nung Yang and
               Yao{-}Yu Yang},
  title     = {New extended visual cryptography schemes with clearer shadow images},
  journal   = {Inf. Sci.},
  volume    = {271},
  pages     = {246--263},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ins.2014.02.099},
  doi       = {10.1016/j.ins.2014.02.099},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/isci/YangY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/isci/YangWW14,
  author    = {Ching{-}Nung Yang and
               Chih{-}Cheng Wu and
               Daoshun Wang},
  title     = {A discussion on the relationship between probabilistic visual cryptography
               and random grid},
  journal   = {Inf. Sci.},
  volume    = {278},
  pages     = {141--173},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ins.2014.03.033},
  doi       = {10.1016/j.ins.2014.03.033},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/isci/YangWW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jim/KimSSTY14,
  author    = {Cheonshik Kim and
               Dongkyoo Shin and
               Dongil Shin and
               Raylin Tso and
               Ching{-}Nung Yang},
  title     = {A secret sharing scheme for {EBTC} using steganography},
  journal   = {J. Intelligent Manufacturing},
  volume    = {25},
  number    = {2},
  pages     = {241--249},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10845-012-0660-7},
  doi       = {10.1007/s10845-012-0660-7},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jim/KimSSTY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/scn/LiuYY14,
  author    = {Yan{-}Xiao Liu and
               Ching{-}Nung Yang and
               Po{-}Han Yeh},
  title     = {Reducing shadow size in smooth scalable secret image sharing},
  journal   = {Security and Communication Networks},
  volume    = {7},
  number    = {12},
  pages     = {2237--2244},
  year      = {2014},
  url       = {https://doi.org/10.1002/sec.930},
  doi       = {10.1002/sec.930},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/scn/LiuYY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcsv/YangW14,
  author    = {Ching{-}Nung Yang and
               Daoshun Wang},
  title     = {Property Analysis of XOR-Based Visual Cryptography},
  journal   = {{IEEE} Trans. Circuits Syst. Video Techn.},
  volume    = {24},
  number    = {2},
  pages     = {189--197},
  year      = {2014},
  url       = {https://doi.org/10.1109/TCSVT.2013.2276708},
  doi       = {10.1109/TCSVT.2013.2276708},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tcsv/YangW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tdhms/LiuGWY14,
  author    = {Feng Liu and
               Teng Guo and
               Chuan Kun Wu and
               Ching{-}Nung Yang},
  title     = {Flexible Visual Cryptography Scheme and Its Application},
  journal   = {Trans. Data Hiding and Multimedia Security},
  volume    = {9},
  pages     = {110--130},
  year      = {2014},
  crossref  = {DBLP:journals/tdhms/2014-9},
  url       = {https://doi.org/10.1007/978-3-642-55046-1_7},
  doi       = {10.1007/978-3-642-55046-1_7},
  timestamp = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tdhms/LiuGWY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangKY14,
  author    = {Yu{-}Chih Huang and
               Wen{-}Chung Kuo and
               Ching{-}Nung Yang},
  title     = {Data Hiding Based on Radix-2},
  booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
               Wuhan, China, September 3-5, 2014},
  pages     = {170--174},
  year      = {2014},
  crossref  = {DBLP:conf/asiajcis/2014},
  url       = {https://doi.org/10.1109/AsiaJCIS.2014.22},
  doi       = {10.1109/AsiaJCIS.2014.22},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiajcis/HuangKY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iconip/YanWNY14,
  author    = {Xuehu Yan and
               Shen Wang and
               Xiamu Niu and
               Ching{-}Nung Yang},
  title     = {Essential Visual Cryptographic Scheme with Different Importance of
               Shares},
  booktitle = {Neural Information Processing - 21st International Conference, {ICONIP}
               2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {III}},
  pages     = {636--643},
  year      = {2014},
  crossref  = {DBLP:conf/iconip/2014-3},
  url       = {https://doi.org/10.1007/978-3-319-12643-2_77},
  doi       = {10.1007/978-3-319-12643-2_77},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iconip/YanWNY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiYK14,
  author    = {Peng Li and
               Ching{-}Nung Yang and
               Qian Kong},
  title     = {Two-in-One Image Secret Sharing Scheme Based on Boolean Operations},
  booktitle = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  pages     = {305--318},
  year      = {2014},
  crossref  = {DBLP:conf/iwdw/2014},
  url       = {https://doi.org/10.1007/978-3-319-19321-2_23},
  doi       = {10.1007/978-3-319-19321-2_23},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/LiYK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YanCYC14,
  author    = {Xuehu Yan and
               Guohui Chen and
               Ching{-}Nung Yang and
               Song{-}Ruei Cai},
  title     = {Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast
               by Boolean Operations},
  booktitle = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  pages     = {319--332},
  year      = {2014},
  crossref  = {DBLP:conf/iwdw/2014},
  url       = {https://doi.org/10.1007/978-3-319-19321-2_24},
  doi       = {10.1007/978-3-319-19321-2_24},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/YanCYC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangYY14,
  author    = {Daoshun Wang and
               Feng Yi and
               Ching{-}Nung Yang},
  title     = {Visual Cryptography Scheme with Autostereogram},
  booktitle = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  pages     = {364--375},
  year      = {2014},
  crossref  = {DBLP:conf/iwdw/2014},
  url       = {https://doi.org/10.1007/978-3-319-19321-2_27},
  doi       = {10.1007/978-3-319-19321-2_27},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/WangYY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimY14,
  author    = {Cheonshik Kim and
               Ching{-}Nung Yang},
  title     = {Steganography Based on Grayscale Images Using (5, 3) Hamming Code},
  booktitle = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  pages     = {588--598},
  year      = {2014},
  crossref  = {DBLP:conf/iwdw/2014},
  url       = {https://doi.org/10.1007/978-3-319-19321-2_45},
  doi       = {10.1007/978-3-319-19321-2_45},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/KimY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/itiis/HuyTKY13,
  author    = {Phan Trung Huy and
               Nguyen Hai Thanh and
               Cheonshik Kim and
               Ching{-}Nung Yang},
  title     = {Data-Hiding for Halftone Images Using an Improved {CPT} scheme},
  journal   = {{TIIS}},
  volume    = {7},
  number    = {2},
  pages     = {405--424},
  year      = {2013},
  url       = {https://doi.org/10.3837/tiis.2013.02.013},
  doi       = {10.3837/tiis.2013.02.013},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/itiis/HuyTKY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/LinYLL13,
  author    = {Hsiao{-}Ching Lin and
               Ching{-}Nung Yang and
               Chi{-}Sung Laih and
               Hui{-}Tang Lin},
  title     = {Natural language letter based visual cryptography scheme},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {24},
  number    = {3},
  pages     = {318--331},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jvcir.2013.01.003},
  doi       = {10.1016/j.jvcir.2013.01.003},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/LinYLL13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/LiYWKM13,
  author    = {Peng Li and
               Ching{-}Nung Yang and
               Chih{-}Cheng Wu and
               Qian Kong and
               Yanpeng Ma},
  title     = {Essential secret image sharing scheme with different importance of
               shadows},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {24},
  number    = {7},
  pages     = {1106--1114},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jvcir.2013.07.005},
  doi       = {10.1016/j.jvcir.2013.07.005},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/LiYWKM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/LiYKML13,
  author    = {Peng Li and
               Ching{-}Nung Yang and
               Qian Kong and
               Yanpeng Ma and
               Zheng Liu},
  title     = {Sharing more information in gray visual cryptography scheme},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {24},
  number    = {8},
  pages     = {1380--1393},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jvcir.2013.09.010},
  doi       = {10.1016/j.jvcir.2013.09.010},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/LiYKML13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/mcm/YangW13,
  author    = {Ching{-}Nung Yang and
               Chih{-}Cheng Wu},
  title     = {{MSRC:} (M)icropayment (S)cheme with ability to (R)eturn (C)hanges},
  journal   = {Mathematical and Computer Modelling},
  volume    = {58},
  number    = {1-2},
  pages     = {96--107},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.mcm.2012.07.010},
  doi       = {10.1016/j.mcm.2012.07.010},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/mcm/YangW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/puc/YangCSK13,
  author    = {Ching{-}Nung Yang and
               Pin{-}Wei Chen and
               Hsiang{-}Wen Shih and
               Cheonshik Kim},
  title     = {Aspect ratio invariant visual cryptography by image filtering and
               resizing},
  journal   = {Personal and Ubiquitous Computing},
  volume    = {17},
  number    = {5},
  pages     = {843--850},
  year      = {2013},
  url       = {https://doi.org/10.1007/s00779-012-0535-0},
  doi       = {10.1007/s00779-012-0535-0},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/puc/YangCSK13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tifs/WangSDY13,
  author    = {Daoshun Wang and
               Tao Song and
               Lin Dong and
               Ching{-}Nung Yang},
  title     = {Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {12},
  pages     = {2059--2072},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2013.2281108},
  doi       = {10.1109/TIFS.2013.2281108},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tifs/WangSDY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/gpc/HuyKAHY13,
  author    = {Phan Trung Huy and
               Cheonshik Kim and
               Nguyen Tuan Anh and
               Le Quang Hoa and
               Ching{-}Nung Yang},
  title     = {Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules},
  booktitle = {Grid and Pervasive Computing - 8th International Conference, {GPC}
               2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  pages     = {649--658},
  year      = {2013},
  crossref  = {DBLP:conf/gpc/2013},
  url       = {https://doi.org/10.1007/978-3-642-38027-3_70},
  doi       = {10.1007/978-3-642-38027-3_70},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/gpc/HuyKAHY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icics/GuoLWYWR13,
  author    = {Teng Guo and
               Feng Liu and
               Chuan Kun Wu and
               Ching{-}Nung Yang and
               Wen Wang and
               YaWei Ren},
  title     = {Threshold Secret Image Sharing},
  booktitle = {Information and Communications Security - 15th International Conference,
               {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  pages     = {404--412},
  year      = {2013},
  crossref  = {DBLP:conf/icics/2013},
  url       = {https://doi.org/10.1007/978-3-319-02726-5_29},
  doi       = {10.1007/978-3-319-02726-5_29},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icics/GuoLWYWR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XuWLY13,
  author    = {Xing{-}Fu Xu and
               Daoshun Wang and
               Shundong Li and
               Ching{-}Nung Yang},
  title     = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes},
  booktitle = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  pages     = {369--372},
  year      = {2013},
  crossref  = {DBLP:conf/iih-msp/2013},
  url       = {https://doi.org/10.1109/IIH-MSP.2013.99},
  doi       = {10.1109/IIH-MSP.2013.99},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/XuWLY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YangWC13,
  author    = {Ching{-}Nung Yang and
               Chih{-}Cheng Wu and
               Chih{-}Wei Chou},
  title     = {A Comment on "Sharing Secret Images Using Blakley's Concept"},
  booktitle = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  pages     = {383--386},
  year      = {2013},
  crossref  = {DBLP:conf/iih-msp/2013},
  url       = {https://doi.org/10.1109/IIH-MSP.2013.102},
  doi       = {10.1109/IIH-MSP.2013.102},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/YangWC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YangL13,
  author    = {Ching{-}Nung Yang and
               Jia{-}Bin Lai},
  title     = {Protecting Data Privacy and Security for Cloud Computing Based on
               Secret Sharing},
  booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST}
               2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages     = {259--266},
  year      = {2013},
  crossref  = {DBLP:conf/isbast/2013},
  url       = {https://doi.org/10.1109/ISBAST.2013.46},
  doi       = {10.1109/ISBAST.2013.46},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isbast/YangL13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLW13,
  author    = {Ching{-}Nung Yang and
               Yi{-}Chin Lin and
               Chih{-}Cheng Wu},
  title     = {Cheating Immune Block-Based Progressive Visual Cryptography},
  booktitle = {Digital-Forensics and Watermarking - 12th International Workshop,
               {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
               Papers},
  pages     = {95--108},
  year      = {2013},
  crossref  = {DBLP:conf/iwdw/2013},
  url       = {https://doi.org/10.1007/978-3-662-43886-2_7},
  doi       = {10.1007/978-3-662-43886-2_7},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/YangLW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GuoLWYWR13,
  author    = {Teng Guo and
               Feng Liu and
               Chuan Kun Wu and
               Ching{-}Nung Yang and
               Wen Wang and
               YaWei Ren},
  title     = {Threshold Secret Image Sharing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {524},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/524},
  timestamp = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GuoLWYWR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icl/YangHL12,
  author    = {Ching{-}Nung Yang and
               Li{-}Jen Hu and
               Jia{-}Bin Lai},
  title     = {Query Tree Algorithm for {RFID} Tag with Binary-Coded Decimal {EPC}},
  journal   = {{IEEE} Communications Letters},
  volume    = {16},
  number    = {10},
  pages     = {1616--1619},
  year      = {2012},
  url       = {https://doi.org/10.1109/LCOMM.2012.090312.121213},
  doi       = {10.1109/LCOMM.2012.090312.121213},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/icl/YangHL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jss/LiuHYZ12,
  author    = {Yan{-}Xiao Liu and
               Lein Harn and
               Ching{-}Nung Yang and
               Yuqing Zhang},
  title     = {Efficient (n, t, n) secret sharing schemes},
  journal   = {Journal of Systems and Software},
  volume    = {85},
  number    = {6},
  pages     = {1325--1332},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jss.2012.01.027},
  doi       = {10.1016/j.jss.2012.01.027},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jss/LiuHYZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jvcir/LiMSY12,
  author    = {Peng Li and
               Peijun Ma and
               Xiaohong Su and
               Ching{-}Nung Yang},
  title     = {Improvements of a two-in-one image secret sharing scheme based on
               gray mixing model},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {23},
  number    = {3},
  pages     = {441--453},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jvcir.2012.01.003},
  doi       = {10.1016/j.jvcir.2012.01.003},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jvcir/LiMSY12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/spl/YangWLK12,
  author    = {Ching{-}Nung Yang and
               Chih{-}Cheng Wu and
               Yi{-}Chin Lin and
               Cheonshik Kim},
  title     = {Enhanced Matrix-Based Secret Image Sharing Scheme},
  journal   = {{IEEE} Signal Process. Lett.},
  volume    = {19},
  number    = {12},
  pages     = {789--792},
  year      = {2012},
  url       = {https://doi.org/10.1109/LSP.2012.2220348},
  doi       = {10.1109/LSP.2012.2220348},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/spl/YangWLK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcsv/YangSWH12,
  author    = {Ching{-}Nung Yang and
               Hsiang{-}Wen Shih and
               Chih{-}Cheng Wu and
               Lein Harn},
  title     = {{\textdollar}k{\textdollar} Out of {\textdollar}n{\textdollar} Region
               Incrementing Scheme in Visual Cryptography},
  journal   = {{IEEE} Trans. Circuits Syst. Video Techn.},
  volume    = {22},
  number    = {5},
  pages     = {799--810},
  year      = {2012},
  url       = {https://doi.org/10.1109/TCSVT.2011.2180952},
  doi       = {10.1109/TCSVT.2011.2180952},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tcsv/YangSWH12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KimSSY12,
  author    = {Cheonshik Kim and
               Dongkyoo Shin and
               Dongil Shin and
               Ching{-}Nung Yang},
  title     = {A (2, 2) Secret Sharing Scheme Based on Hamming Code and {AMBTC}},
  booktitle = {Intelligent Information and Database Systems - 4th Asian Conference,
               {ACIIDS} 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings,
               Part {II}},
  pages     = {129--139},
  year      = {2012},
  crossref  = {DBLP:conf/aciids/2012-2},
  url       = {https://doi.org/10.1007/978-3-642-28490-8_14},
  doi       = {10.1007/978-3-642-28490-8_14},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/aciids/KimSSY12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CimatoYW12,
  author    = {Stelvio Cimato and
               Ching{-}Nung Yang and
               Chih{-}Cheng Wu},
  title     = {Visual Cryptography Based Watermarking: Definition and Meaning},
  booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
               2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
               Papers},
  pages     = {435--448},
  year      = {2012},
  crossref  = {DBLP:conf/iwdw/2012},
  url       = {https://doi.org/10.1007/978-3-642-40099-5_36},
  doi       = {10.1007/978-3-642-40099-5_36},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/CimatoYW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLW12,
  author    = {Ching{-}Nung Yang and
               Yi{-}Chin Lin and
               Chih{-}Cheng Wu},
  title     = {Region-in-Region Incrementing Visual Cryptography Scheme},
  booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
               2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
               Papers},
  pages     = {449--463},
  year      = {2012},
  crossref  = {DBLP:conf/iwdw/2012},
  url       = {https://doi.org/10.1007/978-3-642-40099-5_37},
  doi       = {10.1007/978-3-642-40099-5_37},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/YangLW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-6123,
  author    = {Daoshun Wang and
               Tao Song and
               Lin Dong and
               Ching{-}Nung Yang},
  title     = {Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing},
  journal   = {CoRR},
  volume    = {abs/1210.6123},
  year      = {2012},
  url       = {http://arxiv.org/abs/1210.6123},
  archivePrefix = {arXiv},
  eprint    = {1210.6123},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1210-6123},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icl/YangH11,
  author    = {Ching{-}Nung Yang and
               Jyun{-}Yan He},
  title     = {An Effective 16-bit Random Number Aided Query Tree Algorithm for {RFID}
               Tag Anti-Collision},
  journal   = {{IEEE} Communications Letters},
  volume    = {15},
  number    = {5},
  pages     = {539--541},
  year      = {2011},
  url       = {https://doi.org/10.1109/LCOMM.2011.031411.110213},
  doi       = {10.1109/LCOMM.2011.031411.110213},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/icl/YangH11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/itiis/YangYK11,
  author    = {Ching{-}Nung Yang and
               Guo{-}Cin Ye and
               Cheonshik Kim},
  title     = {Data Hiding in Halftone Images by {XOR} Block-Wise Operation with
               Difference Minimization},
  journal   = {{TIIS}},
  volume    = {5},
  number    = {2},
  pages     = {457--476},
  year      = {2011},
  url       = {https://doi.org/10.3837/tiis.2011.02.013},
  doi       = {10.3837/tiis.2011.02.013},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/itiis/YangYK11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jss/YangC11,
  author    = {Ching{-}Nung Yang and
               Yu{-}Ying Chu},
  title     = {A general (k, n) scalable secret image sharing scheme with the smooth
               scalability},
  journal   = {Journal of Systems and Software},
  volume    = {84},
  number    = {10},
  pages     = {1726--1733},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.jss.2011.05.008},
  doi       = {10.1016/j.jss.2011.05.008},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jss/YangC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/YangCW11,
  author    = {Ching{-}Nung Yang and
               Chih{-}Yang Chiu and
               Gen{-}Cheng Wu},
  title     = {Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by
               Reducing Random Walks},
  journal   = {{IEEE} Trans. Computers},
  volume    = {60},
  number    = {10},
  pages     = {1503--1510},
  year      = {2011},
  url       = {https://doi.org/10.1109/TC.2010.242},
  doi       = {10.1109/TC.2010.242},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/YangCW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuGWY11,
  author    = {Feng Liu and
               Teng Guo and
               Chuan Kun Wu and
               Ching{-}Nung Yang},
  title     = {Flexible Visual Cryptography Scheme without Distortion},
  booktitle = {Digital Forensics and Watermarking - 10th International Workshop,
               {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
               Selected Papers},
  pages     = {211--227},
  year      = {2011},
  crossref  = {DBLP:conf/iwdw/2011},
  url       = {https://doi.org/10.1007/978-3-642-32205-1_18},
  doi       = {10.1007/978-3-642-32205-1_18},
  timestamp = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/LiuGWY11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ivc/YangC10,
  author    = {Ching{-}Nung Yang and
               Chuei{-}Bang Ciou},
  title     = {Image secret sharing method with two-decoding-options: Lossless recovery
               and previewing capability},
  journal   = {Image Vision Comput.},
  volume    = {28},
  number    = {12},
  pages     = {1600--1610},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.imavis.2010.04.003},
  doi       = {10.1016/j.imavis.2010.04.003},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ivc/YangC10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jise/YangL09,
  author    = {Ching{-}Nung Yang and
               Bing{-}Ling Lu},
  title     = {Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure
               Fingerprinting Codes},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {25},
  number    = {1},
  pages     = {1--10},
  year      = {2009},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2009/200901_01.html},
  timestamp = {Mon, 09 Mar 2009 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/jise/YangL09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pr/YangC09,
  author    = {Ching{-}Nung Yang and
               Chuei{-}Bang Ciou},
  title     = {A comment on "Sharing secrets in stegoimages with authentication"},
  journal   = {Pattern Recognition},
  volume    = {42},
  number    = {7},
  pages     = {1615--1619},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.patcog.2009.01.024},
  doi       = {10.1016/j.patcog.2009.01.024},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/pr/YangC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigpro/YangPC09,
  author    = {Ching{-}Nung Yang and
               An{-}Guo Peng and
               Tse{-}Shih Chen},
  title     = {{MTVSS:} (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on
               resolving alignment difficulty},
  journal   = {Signal Processing},
  volume    = {89},
  number    = {8},
  pages     = {1602--1624},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.sigpro.2009.02.014},
  doi       = {10.1016/j.sigpro.2009.02.014},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/sigpro/YangPC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/YangWCCL09,
  author    = {Ching{-}Nung Yang and
               Chih{-}Cheng Wu and
               Chih{-}Yang Chiu and
               Shin{-}Yan Chiou and
               Wen{-}Chiuan Liao},
  title     = {Micropayment schemes with ability to return changes},
  booktitle = {iiWAS'2009 - The Eleventh International Conference on Information
               Integration and Web-based Applications and Services, 14-16 December
               2009, Kuala Lumpur, Malaysia},
  pages     = {356--363},
  year      = {2009},
  crossref  = {DBLP:conf/iiwas/2009},
  url       = {http://doi.acm.org/10.1145/1806338.1806403},
  doi       = {10.1145/1806338.1806403},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iiwas/YangWCCL09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ispa/YangCCWW09,
  author    = {Ching{-}Nung Yang and
               Jie{-}Ru Chen and
               Chih{-}Yang Chiu and
               Gen{-}Chin Wu and
               Chih{-}Cheng Wu},
  title     = {Enhancing Privacy and Security in RFID-Enabled Banknotes},
  booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing
               with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
               2009},
  pages     = {439--444},
  year      = {2009},
  crossref  = {DBLP:conf/ispa/2009},
  url       = {https://doi.org/10.1109/ISPA.2009.77},
  doi       = {10.1109/ISPA.2009.77},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ispa/YangCCWW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cj/YangWC08,
  author    = {Ching{-}Nung Yang and
               Chung{-}Chun Wang and
               Tse{-}Shih Chen},
  title     = {Visual Cryptography Schemes with Reversing},
  journal   = {Comput. J.},
  volume    = {51},
  number    = {6},
  pages     = {710--722},
  year      = {2008},
  url       = {https://doi.org/10.1093/comjnl/bxm118},
  doi       = {10.1093/comjnl/bxm118},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cj/YangWC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cryptologia/YangC08,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Security Analysis of Authentication of Images Using Recursive Visual
               Cryptography},
  journal   = {Cryptologia},
  volume    = {32},
  number    = {2},
  pages     = {131--136},
  year      = {2008},
  url       = {https://doi.org/10.1080/01611190701869669},
  doi       = {10.1080/01611190701869669},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cryptologia/YangC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pr/YangC08,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Colored visual cryptography scheme based on additive color mixing},
  journal   = {Pattern Recognition},
  volume    = {41},
  number    = {10},
  pages     = {3114--3129},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.patcog.2008.03.031},
  doi       = {10.1016/j.patcog.2008.03.031},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/pr/YangC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/Yang08,
  author    = {Ching{-}Nung Yang},
  title     = {Efficient Encoding Algorithm for Second-Order Spectral-Null Codes
               Using Cyclic Bit Shift},
  journal   = {{IEEE} Trans. Computers},
  volume    = {57},
  number    = {7},
  pages     = {876--888},
  year      = {2008},
  url       = {https://doi.org/10.1109/TC.2007.70849},
  doi       = {10.1109/TC.2007.70849},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/Yang08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YangYCY08,
  author    = {Ching{-}Nung Yang and
               Yao{-}Yu Yang and
               Tse{-}Shih Chen and
               Guo{-}Cin Ye},
  title     = {New Steganography Scheme in Halftone Images},
  booktitle = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  pages     = {1520--1523},
  year      = {2008},
  crossref  = {DBLP:conf/iih-msp/2008},
  url       = {https://doi.org/10.1109/IIH-MSP.2008.265},
  doi       = {10.1109/IIH-MSP.2008.265},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/YangYCY08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/mm/LukacPY08,
  author    = {Rastislav Lukac and
               Konstantinos N. Plataniotis and
               Ching{-}Nung Yang},
  title     = {Image Secret Sharing},
  booktitle = {Encyclopedia of Multimedia, 2nd Ed.},
  pages     = {338--343},
  year      = {2008},
  crossref  = {DBLP:reference/mm/2008},
  url       = {https://doi.org/10.1007/978-0-387-78414-4_82},
  doi       = {10.1007/978-0-387-78414-4_82},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/mm/LukacPY08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijprai/YangC07,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Extended Visual Secret Sharing Schemes: Improving the Shadow Image
               Quality},
  journal   = {{IJPRAI}},
  volume    = {21},
  number    = {5},
  pages     = {879--898},
  year      = {2007},
  url       = {https://doi.org/10.1142/S0218001407005740},
  doi       = {10.1142/S0218001407005740},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijprai/YangC07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/imst/YangYL07,
  author    = {Ching{-}Nung Yang and
               Kun{-}Hsuan Yu and
               Rastislav Lukac},
  title     = {User-friendly image sharing using polynomials with different primes},
  journal   = {Int. J. Imaging Systems and Technology},
  volume    = {17},
  number    = {1},
  pages     = {40--47},
  year      = {2007},
  url       = {https://doi.org/10.1002/ima.20096},
  doi       = {10.1002/ima.20096},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/imst/YangYL07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jss/YangCYW07,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen and
               Kun{-}Hsuan Yu and
               Chung{-}Chun Wang},
  title     = {Improvements of image sharing with steganography and authentication},
  journal   = {Journal of Systems and Software},
  volume    = {80},
  number    = {7},
  pages     = {1070--1076},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.jss.2006.11.022},
  doi       = {10.1016/j.jss.2006.11.022},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jss/YangCYW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YangC07,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {An Image Secret Sharing Scheme with the Capability of Previvewing
               the Secret Image},
  booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages     = {1535--1538},
  year      = {2007},
  crossref  = {DBLP:conf/icmcs/2007},
  url       = {https://doi.org/10.1109/ICME.2007.4284955},
  doi       = {10.1109/ICME.2007.4284955},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icmcs/YangC07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/mmm/YangYL07,
  author    = {Ching{-}Nung Yang and
               Kun{-}Hsuan Yu and
               Rastislav Lukac},
  title     = {User-Friendly Image Sharing in Multimedia Database Using Polynomials
               with Different Primes},
  booktitle = {Advances in Multimedia Modeling, 13th International Multimedia Modeling
               Conference, {MMM} 2007, Singapore, January 9-12, 2007. Proceedings,
               Part {II}},
  pages     = {443--452},
  year      = {2007},
  crossref  = {DBLP:conf/mmm/2007-2},
  url       = {https://doi.org/10.1007/978-3-540-69429-8_45},
  doi       = {10.1007/978-3-540-69429-8_45},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/mmm/YangYL07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icae/YangCC06,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen and
               Ming{-}Hung Ching},
  title     = {Embed additional private information into two-dimensional bar codes
               by the visual secret sharing scheme},
  journal   = {Integrated Computer-Aided Engineering},
  volume    = {13},
  number    = {2},
  pages     = {189--199},
  year      = {2006},
  url       = {http://content.iospress.com/articles/integrated-computer-aided-engineering/ica00233},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/icae/YangCC06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/YangC06,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {New Size-Reduced Visual Secret Sharing Schemes with Half Reduction
               of Shadow Size},
  journal   = {{IEICE} Transactions},
  volume    = {89-A},
  number    = {2},
  pages     = {620--625},
  year      = {2006},
  url       = {https://doi.org/10.1093/ietfec/e89-a.2.620},
  doi       = {10.1093/ietfec/e89-a.2.620},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/YangC06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pr/YangC06,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Reduce shadow size in aspect ratio invariant visual secret sharing
               schemes using a square block-wise operation},
  journal   = {Pattern Recognition},
  volume    = {39},
  number    = {7},
  pages     = {1300--1314},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.patcog.2006.01.013},
  doi       = {10.1016/j.patcog.2006.01.013},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/pr/YangC06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/YangL06,
  author    = {Ching{-}Nung Yang and
               Dong{-}Jing Lee},
  title     = {Some New Efficient Second-Order Spectral-Null Codes with Small Lookup
               Tables},
  journal   = {{IEEE} Trans. Computers},
  volume    = {55},
  number    = {7},
  pages     = {924--927},
  year      = {2006},
  url       = {https://doi.org/10.1109/TC.2006.111},
  doi       = {10.1109/TC.2006.111},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/YangL06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangWC06,
  author    = {Ching{-}Nung Yang and
               Chung{-}Chun Wang and
               Tse{-}Shih Chen},
  title     = {Real Perfect Contrast Visual Secret Sharing Schemes with Reversing},
  booktitle = {Applied Cryptography and Network Security, 4th International Conference,
               {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  pages     = {433--447},
  year      = {2006},
  crossref  = {DBLP:conf/acns/2006},
  url       = {https://doi.org/10.1007/11767480_30},
  doi       = {10.1007/11767480_30},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acns/YangWC06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/euc/ChenYL06,
  author    = {Ming{-}Yang Chen and
               Ching{-}Nung Yang and
               Chi{-}Sung Laih},
  title     = {Authorized Tracking and Tracing for {RFID} Tags},
  booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
               Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
               August 1-4, 2006, Proceedings},
  pages     = {435--444},
  year      = {2006},
  crossref  = {DBLP:conf/euc/2006w},
  url       = {https://doi.org/10.1007/11807964_44},
  doi       = {10.1007/11807964_44},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/euc/ChenYL06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciar/YangC06,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Visual Secret Sharing Scheme: Improving the Contrast of a Recovered
               Image Via Different Pixel Expansions},
  booktitle = {Image Analysis and Recognition, Third International Conference, {ICIAR}
               2006, P{\'{o}}voa de Varzim, Portugal, September 18-20, 2006,
               Proceedings, Part {I}},
  pages     = {468--479},
  year      = {2006},
  crossref  = {DBLP:conf/iciar/2006-1},
  url       = {https://doi.org/10.1007/11867586_44},
  doi       = {10.1007/11867586_44},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciar/YangC06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/infoscale/YangL06,
  author    = {Ching{-}Nung Yang and
               Bing{-}Ling Lu},
  title     = {Improved tracing algorithm for random-error-resilient collusion-secure
               fingerprinting codes in {P2P} information systems},
  booktitle = {Proceedings of the 1st International Conference on Scalable Information
               Systems, Infoscale 2006, Hong Kong, May 30-June 1, 2006},
  pages     = {54},
  year      = {2006},
  crossref  = {DBLP:conf/infoscale/2006},
  url       = {http://doi.acm.org/10.1145/1146847.1146902},
  doi       = {10.1145/1146847.1146902},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/infoscale/YangL06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/mm/LukacPY06,
  author    = {Rastislav Lukac and
               Konstantinos N. Plataniotis and
               Ching{-}Nung Yang},
  title     = {Image Secret Sharing},
  booktitle = {Encyclopedia of Multimedia},
  year      = {2006},
  crossref  = {DBLP:reference/mm/2006},
  url       = {https://doi.org/10.1007/0-387-30038-4_101},
  doi       = {10.1007/0-387-30038-4_101},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/mm/LukacPY06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/YangC05,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Size-Adjustable Visual Secret Sharing Schemes},
  journal   = {{IEICE} Transactions},
  volume    = {88-A},
  number    = {9},
  pages     = {2471--2474},
  year      = {2005},
  url       = {https://doi.org/10.1093/ietfec/e88-a.9.2471},
  doi       = {10.1093/ietfec/e88-a.9.2471},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/YangC05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/prl/YangC05,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Aspect ratio invariant visual secret sharing schemes with minimum
               pixel expansion},
  journal   = {Pattern Recognition Letters},
  volume    = {26},
  number    = {2},
  pages     = {193--206},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.patrec.2004.08.025},
  doi       = {10.1016/j.patrec.2004.08.025},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/prl/YangC05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/YangC05,
  author    = {Ching{-}Nung Yang and
               Guo{-}Jau Chen},
  title     = {A comment on "Systematic single asymmetric error-correcting Codes"},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {51},
  number    = {3},
  pages     = {1214--1217},
  year      = {2005},
  url       = {https://doi.org/10.1109/TIT.2004.842760},
  doi       = {10.1109/TIT.2004.842760},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/YangC05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/Yang05,
  author    = {Ching{-}Nung Yang},
  title     = {Design of efficient second-order spectral- codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {51},
  number    = {4},
  pages     = {1580--1584},
  year      = {2005},
  url       = {https://doi.org/10.1109/TIT.2005.844085},
  doi       = {10.1109/TIT.2005.844085},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/Yang05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/YangC05,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {New Size-Reduced Visual Secret Sharing Schemes with Half Reduction
               of Shadow Size},
  booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International
               Conference, Singapore, May 9-12, 2005, Proceedings, Part {I}},
  pages     = {19--28},
  year      = {2005},
  crossref  = {DBLP:conf/iccsa/2005-1},
  url       = {https://doi.org/10.1007/11424758_3},
  doi       = {10.1007/11424758_3},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iccsa/YangC05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciar/YangC05,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square
               Block-Wise Operation},
  booktitle = {Image Analysis and Recognition, Second International Conference, {ICIAR}
               2005, Toronto, Canada, September 28-30, 2005, Proceedings},
  pages     = {1167--1174},
  year      = {2005},
  crossref  = {DBLP:conf/iciar/2005},
  url       = {https://doi.org/10.1007/11559573_141},
  doi       = {10.1007/11559573_141},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciar/YangC05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciar/YangC05a,
  author    = {Ching{-}Nung Yang and
               Tse{-}Shih Chen},
  title     = {Extended Visual Secret Sharing Schemes with High-Quality Shadow Images
               Using Gray Sub Pixels},
  booktitle = {Image Analysis and Recognition, Second International Conference, {ICIAR}
               2005, Toronto, Canada, September 28-30, 2005, Proceedings},
  pages     = {1184--1191},
  year      = {2005},
  crossref  = {DBLP:conf/iciar/2005},
  url       = {https://doi.org/10.1007/11559573_143},
  doi       = {10.1007/11559573_143},
  timestamp = {Tue, 30 May 2017 16:36:54 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciar/YangC05a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/prl/Yang04b,
  author    = {Ching{-}Nung Yang},
  title     = {New visual secret sharing schemes using probabilistic method},
  journal   = {Pattern Recognition Letters},
  volume    = {25},
  number    = {4},
  pages     = {481--494},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.patrec.2003.12.011},
  doi       = {10.1016/j.patrec.2003.12.011},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/prl/Yang04b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jise/LinLY03,
  author    = {Chen{-}Chi Lin and
               Chi{-}Sung Laih and
               Ching{-}Nung Yang},
  title     = {New Audio Secret Sharing Schemes With Time Division Technique},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {19},
  number    = {4},
  pages     = {605--614},
  year      = {2003},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2003/200307_04.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jise/LinLY03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/YangT03,
  author    = {Ching{-}Nung Yang and
               Hsu{-}Tun Teng},
  title     = {An Efficient Method for Finding Minmum Hash Chain of Multi-Payword
               Chains in Micropayment},
  booktitle = {2003 {IEEE} International Conference on Electronic Commerce {(CEC}
               2003), 24-27 June 2003, Newport Beach, CA, {USA}},
  pages     = {45--48},
  year      = {2003},
  crossref  = {DBLP:conf/wecwis/2003},
  url       = {https://doi.org/10.1109/COEC.2003.1210231},
  doi       = {10.1109/COEC.2003.1210231},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wecwis/YangT03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jise/Yang02,
  author    = {Ching{-}Nung Yang},
  title     = {A Note on Efficient Color Visual Encryption},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {18},
  number    = {3},
  pages     = {367--372},
  year      = {2002},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2002/200205_02.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jise/Yang02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jise/Yang02a,
  author    = {Ching{-}Nung Yang},
  title     = {Improvements on Audio and Optical Cryptography},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {18},
  number    = {3},
  pages     = {381--391},
  year      = {2002},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2002/200205_04.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jise/Yang02a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/YangL00,
  author    = {Ching{-}Nung Yang and
               Chi{-}Sung Laih},
  title     = {New Colored Visual Secret Sharing Schemes},
  journal   = {Des. Codes Cryptography},
  volume    = {20},
  number    = {3},
  pages     = {325--336},
  year      = {2000},
  timestamp = {Thu, 05 Feb 2004 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/dcc/YangL00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/YangL98,
  author    = {Ching{-}Nung Yang and
               Chi{-}Sung Laih},
  title     = {DC\({}_{\mbox{\emph{m}}}\) Codes for Constructing \emph{t}-EC/AUED
               Codes},
  journal   = {{IEEE} Trans. Computers},
  volume    = {47},
  number    = {4},
  pages     = {492},
  year      = {1998},
  url       = {https://doi.org/10.1109/12.675719},
  doi       = {10.1109/12.675719},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/YangL98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/YangL97,
  author    = {Ching{-}Nung Yang and
               Chi{-}Sung Laih},
  title     = {A Note on Error-Correcting Codes for Authentication and Subliminal
               Channels},
  journal   = {Inf. Process. Lett.},
  volume    = {62},
  number    = {3},
  pages     = {141--143},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0020-0190(97)00053-7},
  doi       = {10.1016/S0020-0190(97)00053-7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ipl/YangL97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/LaihY96,
  author    = {Chi{-}Sung Laih and
               Ching{-}Nung Yang},
  title     = {On the Analysis and Design of Group Theoretical T-syEC/AUED Codes},
  journal   = {{IEEE} Trans. Computers},
  volume    = {45},
  number    = {1},
  pages     = {103--108},
  year      = {1996},
  url       = {https://doi.org/10.1109/12.481491},
  doi       = {10.1109/12.481491},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/LaihY96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2016-1,
  editor    = {Xingming Sun and
               Alex X. Liu and
               Han{-}Chieh Chao and
               Elisa Bertino},
  title     = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10039},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-48671-0},
  doi       = {10.1007/978-3-319-48671-0},
  isbn      = {978-3-319-48670-3},
  timestamp = {Tue, 23 May 2017 01:10:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icccsec/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icissp/2016,
  editor    = {Olivier Camp and
               Steven Furnell and
               Paolo Mori},
  title     = {Proceedings of the 2nd International Conference on Information Systems
               Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
               2016},
  publisher = {SciTePress},
  year      = {2016},
  isbn      = {978-989-758-167-0},
  timestamp = {Wed, 22 Mar 2017 16:05:10 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icissp/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/smartcity/2015,
  title     = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom
               2015, Chengdu, China, December 19-21, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7453733},
  isbn      = {978-1-5090-1893-2},
  timestamp = {Wed, 09 Nov 2016 10:04:49 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/smartcity/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2014-9,
  editor    = {Yun Q. Shi and
               Feng Liu and
               WeiQi Yan},
  title     = {Transactions on Data Hiding and Multimedia Security {IX} - Special
               Issue on Visual Cryptography},
  series    = {Lecture Notes in Computer Science},
  volume    = {8363},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55046-1},
  doi       = {10.1007/978-3-642-55046-1},
  isbn      = {978-3-642-55045-4},
  timestamp = {Wed, 17 May 2017 10:56:13 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tdhms/2014-9},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2014,
  title     = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
               Wuhan, China, September 3-5, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7001440},
  isbn      = {978-1-4799-5733-0},
  timestamp = {Mon, 02 Mar 2015 09:46:56 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/asiajcis/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iconip/2014-3,
  editor    = {Chu Kiong Loo and
               Keem Siah Yap and
               Kok Wai Wong and
               Andrew Teoh Beng Jin and
               Kaizhu Huang},
  title     = {Neural Information Processing - 21st International Conference, {ICONIP}
               2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8836},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12643-2},
  doi       = {10.1007/978-3-319-12643-2},
  isbn      = {978-3-319-12642-5},
  timestamp = {Wed, 24 May 2017 08:28:29 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iconip/2014-3},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2014,
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Ching{-}Nung Yang},
  title     = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9023},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-19321-2},
  doi       = {10.1007/978-3-319-19321-2},
  isbn      = {978-3-319-19320-5},
  timestamp = {Sun, 21 May 2017 00:19:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/gpc/2013,
  editor    = {James J. Park and
               Hamid R. Arabnia and
               Cheonshik Kim and
               Weisong Shi and
               Joon{-}Min Gil},
  title     = {Grid and Pervasive Computing - 8th International Conference, {GPC}
               2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7861},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38027-3},
  doi       = {10.1007/978-3-642-38027-3},
  isbn      = {978-3-642-38026-6},
  timestamp = {Fri, 02 Jun 2017 20:49:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/gpc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icics/2013,
  editor    = {Sihan Qing and
               Jianying Zhou and
               Dongmei Liu},
  title     = {Information and Communications Security - 15th International Conference,
               {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8233},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-02726-5},
  doi       = {10.1007/978-3-319-02726-5},
  isbn      = {978-3-319-02725-8},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icics/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2013,
  editor    = {Kebin Jia and
               Jeng{-}Shyang Pan and
               Yao Zhao and
               Lakhmi C. Jain},
  title     = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6845398},
  isbn      = {978-0-7695-5120-3},
  timestamp = {Wed, 18 May 2016 12:52:02 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isbast/2013,
  title     = {International Symposium on Biometrics and Security Technologies, {ISBAST}
               2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6597099},
  timestamp = {Wed, 02 Apr 2014 08:28:05 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isbast/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2013,
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title     = {Digital-Forensics and Watermarking - 12th International Workshop,
               {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8389},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43886-2},
  doi       = {10.1007/978-3-662-43886-2},
  isbn      = {978-3-662-43885-5},
  timestamp = {Sun, 21 May 2017 00:19:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/aciids/2012-2,
  editor    = {Jeng{-}Shyang Pan and
               Shyi{-}Ming Chen and
               Ngoc Thanh Nguyen},
  title     = {Intelligent Information and Database Systems - 4th Asian Conference,
               {ACIIDS} 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {7197},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28490-8},
  doi       = {10.1007/978-3-642-28490-8},
  isbn      = {978-3-642-28489-2},
  timestamp = {Sun, 21 May 2017 00:20:46 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/aciids/2012-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2012,
  editor    = {Yun Q. Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title     = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
               2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7809},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40099-5},
  doi       = {10.1007/978-3-642-40099-5},
  isbn      = {978-3-642-40098-8},
  timestamp = {Sun, 04 Jun 2017 10:07:24 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2011,
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title     = {Digital Forensics and Watermarking - 10th International Workshop,
               {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7128},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32205-1},
  doi       = {10.1007/978-3-642-32205-1},
  isbn      = {978-3-642-32204-4},
  timestamp = {Sun, 21 May 2017 00:19:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwdw/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iiwas/2009,
  editor    = {Gabriele Kotsis and
               David Taniar and
               Eric Pardede and
               Ismail Khalil},
  title     = {iiWAS'2009 - The Eleventh International Conference on Information
               Integration and Web-based Applications and Services, 14-16 December
               2009, Kuala Lumpur, Malaysia},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-660-1},
  timestamp = {Tue, 03 May 2011 20:12:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iiwas/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ispa/2009,
  title     = {{IEEE} International Symposium on Parallel and Distributed Processing
               with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
               2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5207830},
  isbn      = {978-0-7695-3747-4},
  timestamp = {Tue, 15 Dec 2015 11:36:31 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ispa/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2008,
  editor    = {Jeng{-}Shyang Pan and
               Xiamu Niu and
               Hsiang{-}Cheh Huang and
               Lakhmi C. Jain},
  title     = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4603986},
  isbn      = {978-0-7695-3278-3},
  timestamp = {Wed, 18 May 2016 12:48:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/mm/2008,
  editor    = {Borko Furht},
  title     = {Encyclopedia of Multimedia, 2nd Ed},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-0-387-78414-4},
  doi       = {10.1007/978-0-387-78414-4},
  isbn      = {978-0-387-74724-8},
  timestamp = {Tue, 16 May 2017 14:02:10 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/mm/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icmcs/2007,
  title     = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4284552},
  isbn      = {1-4244-1017-7},
  timestamp = {Fri, 17 Oct 2014 14:47:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icmcs/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/mmm/2007-2,
  editor    = {Tat{-}Jen Cham and
               Jianfei Cai and
               Chitra Dorai and
               Deepu Rajan and
               Tat{-}Seng Chua and
               Liang{-}Tien Chia},
  title     = {Advances in Multimedia Modeling, 13th International Multimedia Modeling
               Conference, {MMM} 2007, Singapore, January 9-12, 2007. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4352},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-69429-8},
  doi       = {10.1007/978-3-540-69429-8},
  isbn      = {978-3-540-69428-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/mmm/2007-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2006,
  editor    = {Jianying Zhou and
               Moti Yung and
               Feng Bao},
  title     = {Applied Cryptography and Network Security, 4th International Conference,
               {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3989},
  year      = {2006},
  url       = {https://doi.org/10.1007/11767480},
  doi       = {10.1007/11767480},
  isbn      = {3-540-34703-8},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/euc/2006w,
  editor    = {Xiaobo Zhou and
               Oleg Sokolsky and
               Lu Yan and
               Eun{-}Sun Jung and
               Zili Shao and
               Yi Mu and
               Dong Chun Lee and
               Daeyoung Kim and
               Young{-}Sik Jeong and
               Cheng{-}Zhong Xu},
  title     = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
               Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
               August 1-4, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4097},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11807964},
  doi       = {10.1007/11807964},
  isbn      = {3-540-36850-7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/euc/2006w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iciar/2006-1,
  editor    = {Aur{\'{e}}lio C. Campilho and
               Mohamed S. Kamel},
  title     = {Image Analysis and Recognition, Third International Conference, {ICIAR}
               2006, P{\'{o}}voa de Varzim, Portugal, September 18-20, 2006,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4141},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11867586},
  doi       = {10.1007/11867586},
  isbn      = {3-540-44891-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciar/2006-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/infoscale/2006,
  editor    = {Xiaohua Jia},
  title     = {Proceedings of the 1st International Conference on Scalable Information
               Systems, Infoscale 2006, Hong Kong, May 30-June 1, 2006},
  series    = {{ACM} International Conference Proceeding Series},
  volume    = {152},
  publisher = {{ACM}},
  year      = {2006},
  url       = {http://doi.acm.org/10.1145/1146847},
  doi       = {10.1145/1146847},
  isbn      = {1-59593-428-6},
  timestamp = {Fri, 13 Mar 2015 14:05:59 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/infoscale/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/mm/2006,
  editor    = {Borko Furht},
  title     = {Encyclopedia of Multimedia},
  publisher = {Springer},
  year      = {2006},
  isbn      = {978-0-387-24395-5},
  timestamp = {Fri, 25 Nov 2011 18:24:47 +0100},
  biburl    = {http://dblp.org/rec/bib/reference/mm/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iccsa/2005-1,
  editor    = {Osvaldo Gervasi and
               Marina L. Gavrilova and
               Vipin Kumar and
               Antonio Lagan{\`{a}} and
               Heow Pueh Lee and
               Youngsong Mun and
               David Taniar and
               Chih Jeng Kenneth Tan},
  title     = {Computational Science and Its Applications - {ICCSA} 2005, International
               Conference, Singapore, May 9-12, 2005, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {3480},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136266},
  doi       = {10.1007/b136266},
  isbn      = {3-540-25860-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iccsa/2005-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iciar/2005,
  editor    = {Mohamed S. Kamel and
               Aur{\'{e}}lio C. Campilho},
  title     = {Image Analysis and Recognition, Second International Conference, {ICIAR}
               2005, Toronto, Canada, September 28-30, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3656},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11559573},
  doi       = {10.1007/11559573},
  isbn      = {3-540-29069-9},
  timestamp = {Tue, 30 May 2017 16:36:54 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciar/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wecwis/2003,
  title     = {2003 {IEEE} International Conference on Electronic Commerce {(CEC}
               2003), 24-27 June 2003, Newport Beach, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8596},
  isbn      = {0-7695-1969-5},
  timestamp = {Thu, 04 Dec 2014 17:19:20 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/wecwis/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier