default search action
BibTeX records: Ching-Nung Yang
@article{DBLP:journals/iotj/HuangCZYYC24, author = {Jingwang Huang and Qi Cui and Zhili Zhou and Keping Yu and Ching{-}Nung Yang and Kim{-}Kwang Raymond Choo}, title = {Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {2382--2393}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3293165}, doi = {10.1109/JIOT.2023.3293165}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HuangCZYYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangLCKLX24, author = {Ching{-}Nung Yang and Peng Li and Hsiang{-}Han Cheng and Hsin{-}Chuan Kuo and Ming{-}Chan Lu and Lizhi Xiong}, title = {A Security Model of Multihospital {FHIR} Database Authorization Based on Secret Sharing and Blockchain}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {6}, pages = {10325--10335}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3328989}, doi = {10.1109/JIOT.2023.3328989}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangLCKLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/ChenXY24, author = {Hao Chen and Lizhi Xiong and Ching{-}Nung Yang}, title = {Progressive secret image sharing based on Boolean operations and polynomial interpolations}, journal = {Multim. Syst.}, volume = {30}, number = {4}, pages = {189}, year = {2024}, url = {https://doi.org/10.1007/s00530-024-01393-x}, doi = {10.1007/S00530-024-01393-X}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/ChenXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiongZYK24, author = {Lizhi Xiong and Mengtao Zhang and Ching{-}Nung Yang and Cheonshik Kim}, title = {An enhanced {AMBTC} for color image compression using color palette}, journal = {Multim. Tools Appl.}, volume = {83}, number = {11}, pages = {31783--31803}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16734-7}, doi = {10.1007/S11042-023-16734-7}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiongZYK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/XiongHYS24, author = {Lizhi Xiong and Xiao Han and Ching{-}Nung Yang and Yun{-}Qing Shi}, title = {Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {12}, number = {1}, pages = {186--199}, year = {2024}, url = {https://doi.org/10.1109/TCC.2024.3351143}, doi = {10.1109/TCC.2024.3351143}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/XiongHYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/XiongXYZ24, author = {Lizhi Xiong and Jianhua Xu and Ching{-}Nung Yang and Xinpeng Zhang}, title = {CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {6090--6101}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3345160}, doi = {10.1109/TMM.2023.3345160}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/XiongXYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/YangWC24, author = {Ching{-}Nung Yang and Xiaotian Wu and Min{-}Jung Chung}, title = {Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {20}, number = {1}, pages = {23:1--23:24}, year = {2024}, url = {https://doi.org/10.1145/3612927}, doi = {10.1145/3612927}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/YangWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/ZhouWCYMYG24, author = {Zhili Zhou and Yao Wan and Qi Cui and Keping Yu and Shahid Mumtaz and Ching{-}Nung Yang and Mohsen Guizani}, title = {Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {23}, number = {1}, pages = {423--435}, year = {2024}, url = {https://doi.org/10.1109/TWC.2023.3278108}, doi = {10.1109/TWC.2023.3278108}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/ZhouWCYMYG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XiongHZYX23, author = {Lizhi Xiong and Xiao Han and Xinwei Zhong and Ching{-}Nung Yang and Neal N. Xiong}, title = {{RSIS:} {A} Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {3}, pages = {1933--1945}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2021.3139657}, doi = {10.1109/JIOT.2021.3139657}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XiongHZYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLK23, author = {Ching{-}Nung Yang and Peng Li and Hsin{-}Chuan Kuo}, title = {(\emph{k, n}) secret image sharing scheme with privileged set}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103413}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103413}, doi = {10.1016/J.JISA.2022.103413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuYCL23, author = {Xiaotian Wu and Ching{-}Nung Yang and Hong{-}Wu Cai and Yanxiao Liu}, title = {A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103520}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103520}, doi = {10.1016/J.JISA.2023.103520}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuYCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimYZJ23, author = {Cheonshik Kim and Ching{-}Nung Yang and Zhili Zhou and Ki{-}Hyun Jung}, title = {Dual efficient reversible data hiding using Hamming code and {OPAP}}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103544}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103544}, doi = {10.1016/J.JISA.2023.103544}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimYZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YangZLW23, author = {Ching{-}Nung Yang and Cheng{-}En Zheng and Ming{-}Chan Lu and Xiaotian Wu}, title = {Secret image sharing by using multi-prime modular arithmetic}, journal = {Signal Process.}, volume = {205}, pages = {108882}, year = {2023}, url = {https://doi.org/10.1016/j.sigpro.2022.108882}, doi = {10.1016/J.SIGPRO.2022.108882}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YangZLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/XiongHYZ23, author = {Lizhi Xiong and Xiao Han and Ching{-}Nung Yang and Xinpeng Zhang}, title = {Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {3085--3098}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3259478}, doi = {10.1109/TCC.2023.3259478}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/XiongHYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/XiongHYX23, author = {Lizhi Xiong and Xiao Han and Ching{-}Nung Yang and Zhihua Xia}, title = {{RDH-DES:} Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {19}, number = {1}, pages = {5:1--5:19}, year = {2023}, url = {https://doi.org/10.1145/3512797}, doi = {10.1145/3512797}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/XiongHYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cacre/YangLW23, author = {Ching{-}Nung Yang and Hung{-}Yi Lin and Chang{-}Ji Wang}, editor = {Fumin Zhang and Lichuan Zhang}, title = {Bidirectional Hash Chain Based Key Pre-distribution for Wireless Sensor Networks}, booktitle = {8th International Conference on Automation, Control and Robotics Engineering, {CACRE} 2023, Hong Kong, China, July 13-15, 2023}, pages = {68--72}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CACRE58689.2023.10208473}, doi = {10.1109/CACRE58689.2023.10208473}, timestamp = {Mon, 21 Aug 2023 08:22:32 +0200}, biburl = {https://dblp.org/rec/conf/cacre/YangLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmhi/YangKC23, author = {Ching{-}Nung Yang and Hsin{-}Chuan Kuo and Hsiang{-}Han Cheng}, title = {Ensuring {FHIR} Authentication and Data Integrity by Smart Contract and Blockchain Enabled {NFT}}, booktitle = {The 7th International Conference on Medical and Health Informatics, {ICMHI} 2023, Kyoto, Japan, May 12-14, 2023}, pages = {123--128}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3608298.3608322}, doi = {10.1145/3608298.3608322}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmhi/YangKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-12605, author = {Wenjie Liu and Yong Xu and James C. N. Yang and Wen{-}Bin Yu and Lian{-}Hua Chi}, title = {Privacy-Preserving Quantum Two-Party Geometric Intersection}, journal = {CoRR}, volume = {abs/2309.12605}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.12605}, doi = {10.48550/ARXIV.2309.12605}, eprinttype = {arXiv}, eprint = {2309.12605}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-12605.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-12719, author = {Wenjie Liu and Yong Xu and Ching{-}Nung Yang and Peipei Gao and Wen{-}Bin Yu}, title = {An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States}, journal = {CoRR}, volume = {abs/2309.12719}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.12719}, doi = {10.48550/ARXIV.2309.12719}, eprinttype = {arXiv}, eprint = {2309.12719}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-12719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-13659, author = {Wenjie Liu and Yinsong Xu and Maojun Zhang and Junxiu Chen and Ching{-}Nung Yang}, title = {A Novel Quantum Visual Secret Sharing Scheme}, journal = {CoRR}, volume = {abs/2309.13659}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.13659}, doi = {10.48550/ARXIV.2309.13659}, eprinttype = {arXiv}, eprint = {2309.13659}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-13659.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YangWCZ22, author = {Ching{-}Nung Yang and Xiaotian Wu and Min{-}Jung Chung and Xuliang Zhang}, title = {AMBTC-based secret image sharing by simple modular arithmetic}, journal = {J. Vis. Commun. Image Represent.}, volume = {84}, pages = {103482}, year = {2022}, url = {https://doi.org/10.1016/j.jvcir.2022.103482}, doi = {10.1016/J.JVCIR.2022.103482}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/YangWCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/XiongHYS22, author = {Lizhi Xiong and Xiao Han and Ching{-}Nung Yang and Yun{-}Qing Shi}, title = {Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {1}, pages = {75--91}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3055072}, doi = {10.1109/TCSVT.2021.3055072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/XiongHYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhouWYFSW21, author = {Zhili Zhou and Meimin Wang and Ching{-}Nung Yang and Zhangjie Fu and Xingming Sun and Q. M. Jonathan Wu}, title = {Blockchain-based decentralized reputation system in E-commerce environment}, journal = {Future Gener. Comput. Syst.}, volume = {124}, pages = {155--167}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.05.035}, doi = {10.1016/J.FUTURE.2021.05.035}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhouWYFSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhouPWYL21, author = {Zhili Zhou and Wenyan Pan and Q. M. Jonathan Wu and Ching{-}Nung Yang and Zhihan Lv}, title = {Geometric rectification-based neural network architecture for image manipulation detection}, journal = {Int. J. Intell. Syst.}, volume = {36}, number = {12}, pages = {6993--7016}, year = {2021}, url = {https://doi.org/10.1002/int.22577}, doi = {10.1002/INT.22577}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/ZhouPWYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWLK21, author = {Ching{-}Nung Yang and Xiaotian Wu and Hsuan{-}Yu Lin and Cheonshik Kim}, title = {Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102910}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102910}, doi = {10.1016/J.JISA.2021.102910}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangTL21, author = {Ching{-}Nung Yang and Po{-}Yu Tsai and Yanxiao Liu}, title = {A (\emph{k, n}) secret document sharing with meaningful shares}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102973}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102973}, doi = {10.1016/J.JISA.2021.102973}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangKW21, author = {Ching{-}Nung Yang and Chung{-}Lun Kao and Chang{-}Ji Wang}, title = {Two-dimensional diagonal layer hash chain based key pre-distribution scheme}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103038}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103038}, doi = {10.1016/J.JISA.2021.103038}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/WuYL21, author = {Xiaotian Wu and Ching{-}Nung Yang and Jian{-}Ming Li}, title = {Secure image secret sharing over distributed cloud network}, journal = {Signal Process.}, volume = {178}, pages = {107768}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2020.107768}, doi = {10.1016/J.SIGPRO.2020.107768}, timestamp = {Wed, 04 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/WuYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/XiongHY21, author = {Lizhi Xiong and Xiao Han and Ching{-}Nung Yang}, title = {{CP-PSIS:} {CRT} and polynomial-based progressive secret image sharing}, journal = {Signal Process.}, volume = {185}, pages = {108064}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2021.108064}, doi = {10.1016/J.SIGPRO.2021.108064}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/XiongHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YangY21, author = {Ching{-}Nung Yang and Yi{-}Yun Yang}, title = {On the Analysis and Design of Visual Cryptography With Error Correcting Capability}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {6}, pages = {2465--2479}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3017126}, doi = {10.1109/TCSVT.2020.3017126}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YangY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YanLYZW21, author = {Xuehu Yan and Yuliang Lu and Ching{-}Nung Yang and Xinpeng Zhang and Shudong Wang}, title = {A Common Method of Share Authentication in Image Secret Sharing}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {7}, pages = {2896--2908}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3025527}, doi = {10.1109/TCSVT.2020.3025527}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YanLYZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongZYH21, author = {Lizhi Xiong and Xinwei Zhong and Ching{-}Nung Yang and Xiao Han}, title = {Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2912--2925}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3065794}, doi = {10.1109/TIFS.2021.3065794}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiongZYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiuYS21, author = {Yanxiao Liu and Ching{-}Nung Yang and Qindong Sun}, title = {Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {3952--3960}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.2994386}, doi = {10.1109/TITS.2020.2994386}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/LiuYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/LiuXCY20, author = {Wenjie Liu and Yinsong Xu and Junxiu Chen and Ching{-}Nung Yang}, title = {A (t, n) threshold quantum visual secret sharing}, journal = {Int. J. Sens. Networks}, volume = {33}, number = {2}, pages = {74--84}, year = {2020}, url = {https://doi.org/10.1504/IJSNET.2020.107863}, doi = {10.1504/IJSNET.2020.107863}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/LiuXCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuYY20, author = {Xiaotian Wu and Ching{-}Nung Yang and Yi{-}Yun Yang}, title = {A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102452}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102452}, doi = {10.1016/J.JISA.2020.102452}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WuYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLL20, author = {Ching{-}Nung Yang and Yi{-}Chin Lin and Peng Li}, title = {Cheating immune \emph{k}-out-of-\emph{n} block-based progressive visual cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102660}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102660}, doi = {10.1016/J.JISA.2020.102660}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/LiuYSC20, author = {Yan{-}Xiao Liu and Ching{-}Nung Yang and Qin{-}Dong Sun and Yi{-}Cheng Chen}, title = {(\emph{k}, \emph{n}) scalable secret image sharing with multiple decoding options}, journal = {J. Intell. Fuzzy Syst.}, volume = {38}, number = {1}, pages = {219--228}, year = {2020}, url = {https://doi.org/10.3233/JIFS-179396}, doi = {10.3233/JIFS-179396}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/LiuYSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/ZhouYKC20, author = {Zhili Zhou and Ching{-}Nung Yang and Cheonshik Kim and Stelvio Cimato}, title = {Introduction to the special issue on deep learning for real-time information hiding and forensics}, journal = {J. Real Time Image Process.}, volume = {17}, number = {1}, pages = {1--5}, year = {2020}, url = {https://doi.org/10.1007/s11554-020-00947-2}, doi = {10.1007/S11554-020-00947-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/ZhouYKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuY20, author = {Xiaotian Wu and Ching{-}Nung Yang}, title = {Probabilistic color visual cryptography schemes for black and white secret images}, journal = {J. Vis. Commun. Image Represent.}, volume = {70}, pages = {102793}, year = {2020}, url = {https://doi.org/10.1016/j.jvcir.2020.102793}, doi = {10.1016/J.JVCIR.2020.102793}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/WuY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WuYL20, author = {Xiaotian Wu and Ching{-}Nung Yang and Yen{-}Wei Liu}, title = {High capacity partial reversible data hiding by hamming code}, journal = {Multim. Tools Appl.}, volume = {79}, number = {31-32}, pages = {23425--23444}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-09098-9}, doi = {10.1007/S11042-020-09098-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WuYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WuYY20, author = {Xiaotian Wu and Ching{-}Nung Yang and Yi{-}Yun Yang}, title = {Sharing and hiding a secret image in color palette images with authentication}, journal = {Multim. Tools Appl.}, volume = {79}, number = {35-36}, pages = {25657--25677}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-09253-2}, doi = {10.1007/S11042-020-09253-2}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WuYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/XiongZY20, author = {Lizhi Xiong and Xinwei Zhong and Ching{-}Nung Yang}, title = {{DWT-SISA:} a secure and effective discrete wavelet transform-based secret image sharing with authentication}, journal = {Signal Process.}, volume = {173}, pages = {107571}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2020.107571}, doi = {10.1016/J.SIGPRO.2020.107571}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/XiongZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/WuYL20, author = {Xiaotian Wu and Ching{-}Nung Yang and Yen{-}Wei Liu}, title = {A general framework for partial reversible data hiding using hamming code}, journal = {Signal Process.}, volume = {175}, pages = {107657}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2020.107657}, doi = {10.1016/J.SIGPRO.2020.107657}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/WuYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouCYS19, author = {Zhili Zhou and Jingcheng Chen and Ching{-}Nung Yang and Xingming Sun}, title = {Video Copy Detection Using Spatio-Temporal {CNN} Features}, journal = {{IEEE} Access}, volume = {7}, pages = {100658--100665}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2930173}, doi = {10.1109/ACCESS.2019.2930173}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouCYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuXZCY19, author = {Wenjie Liu and Yinsong Xu and Maojun Zhang and Junxiu Chen and Ching{-}Nung Yang}, title = {A Novel Quantum Visual Secret Sharing Scheme}, journal = {{IEEE} Access}, volume = {7}, pages = {114374--114384}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931073}, doi = {10.1109/ACCESS.2019.2931073}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuXZCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouYCW19, author = {Zhili Zhou and Ching{-}Nung Yang and Song{-}Ruei Cai and Daoshun Wang}, title = {Boolean Operation Based Visual Cryptography}, journal = {{IEEE} Access}, volume = {7}, pages = {165496--165508}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2951722}, doi = {10.1109/ACCESS.2019.2951722}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhouYCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/ZhouYYS19, author = {Zhili Zhou and Ching{-}Nung Yang and Yimin Yang and Xingming Sun}, title = {Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment}, journal = {Complex.}, volume = {2019}, pages = {2875676:1--2875676:8}, year = {2019}, url = {https://doi.org/10.1155/2019/2875676}, doi = {10.1155/2019/2875676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/ZhouYYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/WuY19, author = {Xiaotian Wu and Ching{-}Nung Yang}, title = {Partial reversible AMBTC-based secret image sharing with steganography}, journal = {Digit. Signal Process.}, volume = {93}, pages = {22--33}, year = {2019}, url = {https://doi.org/10.1016/j.dsp.2019.06.016}, doi = {10.1016/J.DSP.2019.06.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/WuY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/HuangZYLW19, author = {Fang Huang and Zhili Zhou and Ching{-}Nung Yang and Xiya Liu and Tao Wang}, title = {Original image tracing with image relational graph for near-duplicate image elimination}, journal = {Int. J. Comput. Sci. Eng.}, volume = {18}, number = {3}, pages = {294--304}, year = {2019}, url = {https://doi.org/10.1504/IJCSE.2019.098540}, doi = {10.1504/IJCSE.2019.098540}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/HuangZYLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimSYCW19, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang and Yi{-}Cheng Chen and Song{-}Yu Wu}, title = {Data Hiding Using Sequential Hamming + k with m Overlapped Pixels}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {12}, pages = {6159--6174}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.12.020}, doi = {10.3837/TIIS.2019.12.020}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimSYCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YangCLK19, author = {Ching{-}Nung Yang and Yung{-}Shun Chou and Yan{-}Xiao Liu and Cheonshik Kim}, title = {Exploiting error control in matrix coding-based data hiding over lossy channel}, journal = {J. Real Time Image Process.}, volume = {16}, number = {3}, pages = {577--588}, year = {2019}, url = {https://doi.org/10.1007/s11554-018-0829-1}, doi = {10.1007/S11554-018-0829-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YangCLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuCYY19, author = {Xiaotian Wu and Dong Chen and Ching{-}Nung Yang and Yi{-}Yun Yang}, title = {A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image}, journal = {J. Vis. Commun. Image Represent.}, volume = {59}, pages = {550--562}, year = {2019}, url = {https://doi.org/10.1016/j.jvcir.2019.02.008}, doi = {10.1016/J.JVCIR.2019.02.008}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/WuCYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuY19, author = {Xiaotian Wu and Ching{-}Nung Yang}, title = {A combination of color-black-and-white visual cryptography and polynomial based secret image sharing}, journal = {J. Vis. Commun. Image Represent.}, volume = {61}, pages = {74--84}, year = {2019}, url = {https://doi.org/10.1016/j.jvcir.2019.03.020}, doi = {10.1016/J.JVCIR.2019.03.020}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/WuY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimSYC19, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang and Yung{-}Shun Chou}, title = {Generalizing Hamming+k data hiding by overlapped pixels}, journal = {Multim. Tools Appl.}, volume = {78}, number = {13}, pages = {17995--18015}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-7101-3}, doi = {10.1007/S11042-018-7101-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimSYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangWCK19, author = {Ching{-}Nung Yang and Song{-}Yu Wu and Yung{-}Shun Chou and Cheonshik Kim}, title = {Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme}, journal = {Multim. Tools Appl.}, volume = {78}, number = {13}, pages = {18595--18616}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7220-5}, doi = {10.1007/S11042-019-7220-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YangWCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuYWSB19, author = {Yan{-}Xiao Liu and Ching{-}Nung Yang and Chi{-}Ming Wu and Qin{-}Dong Sun and Wei Bi}, title = {Threshold changeable secret image sharing scheme based on interpolation polynomial}, journal = {Multim. Tools Appl.}, volume = {78}, number = {13}, pages = {18653--18667}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7205-4}, doi = {10.1007/S11042-019-7205-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuYWSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanYSXM19, author = {Zhaoqing Pan and Ching{-}Nung Yang and Victor S. Sheng and Naixue Xiong and Weizhi Meng}, title = {Machine Learning for Wireless Multimedia Data Security}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7682306:1--7682306:2}, year = {2019}, url = {https://doi.org/10.1155/2019/7682306}, doi = {10.1155/2019/7682306}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanYSXM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/LiuYSWLC19, author = {Yan{-}Xiao Liu and Ching{-}Nung Yang and Qin{-}Dong Sun and Song{-}Yu Wu and Shin{-}Shang Lin and Yung{-}Shun Chou}, title = {Enhanced embedding capacity for the SMSD-based data-hiding method}, journal = {Signal Process. Image Commun.}, volume = {78}, pages = {216--222}, year = {2019}, url = {https://doi.org/10.1016/j.image.2019.07.013}, doi = {10.1016/J.IMAGE.2019.07.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/LiuYSWLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/WuY19, author = {Xiaotian Wu and Ching{-}Nung Yang}, title = {Invertible secret image sharing with steganography and authentication for {AMBTC} compressed images}, journal = {Signal Process. Image Commun.}, volume = {78}, pages = {437--447}, year = {2019}, url = {https://doi.org/10.1016/j.image.2019.08.007}, doi = {10.1016/J.IMAGE.2019.08.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/WuY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/WuLWY19, author = {Zhen Wu and Yi{-}Ning Liu and Dong Wang and Ching{-}Nung Yang}, title = {An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial}, journal = {Symmetry}, volume = {11}, number = {1}, pages = {69}, year = {2019}, url = {https://doi.org/10.3390/sym11010069}, doi = {10.3390/SYM11010069}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/WuLWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YangWL19, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Yi{-}Chin Lin}, title = {k Out of n Region-Based Progressive Visual Cryptography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {29}, number = {1}, pages = {252--262}, year = {2019}, url = {https://doi.org/10.1109/TCSVT.2017.2771255}, doi = {10.1109/TCSVT.2017.2771255}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YangWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/FuHSVY19, author = {Zhangjie Fu and Fengxiao Huang and Xingming Sun and Athanasios V. Vasilakos and Ching{-}Nung Yang}, title = {Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {5}, pages = {813--823}, year = {2019}, url = {https://doi.org/10.1109/TSC.2016.2622697}, doi = {10.1109/TSC.2016.2622697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/FuHSVY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuYS18, author = {Yanxiao Liu and Ching{-}Nung Yang and Qin{-}Dong Sun}, title = {Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding}, journal = {{IEEE} Access}, volume = {6}, pages = {5374--5378}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2787803}, doi = {10.1109/ACCESS.2017.2787803}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouYCS18, author = {Zhili Zhou and Ching{-}Nung Yang and Yi Cao and Xingming Sun}, title = {Secret Image Sharing Based on Encrypted Pixels}, journal = {{IEEE} Access}, volume = {6}, pages = {15021--15025}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2811722}, doi = {10.1109/ACCESS.2018.2811722}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouYCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/KimSLY18, author = {Cheonshik Kim and Dongkyoo Shin and Lu Leng and Ching{-}Nung Yang}, title = {Separable reversible data hiding in encrypted halftone image}, journal = {Displays}, volume = {55}, pages = {71--79}, year = {2018}, url = {https://doi.org/10.1016/j.displa.2018.04.002}, doi = {10.1016/J.DISPLA.2018.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/displays/KimSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/KimSYC18, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang and Yung{-}Shun Chou}, title = {Improving capacity of Hamming (\emph{n}, \emph{k})+1 stego-code by using optimized Hamming +{\unicode{8239}}\emph{k}}, journal = {Digit. Signal Process.}, volume = {78}, pages = {284--293}, year = {2018}, url = {https://doi.org/10.1016/j.dsp.2018.03.016}, doi = {10.1016/J.DSP.2018.03.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/KimSYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/0001SY18, author = {Yan{-}Xiao Liu and Qin{-}Dong Sun and Ching{-}Nung Yang}, title = {(k, n) secret image sharing scheme capable of cheating detection}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {72}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1084-7}, doi = {10.1186/S13638-018-1084-7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/0001SY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiuYWZJ18, author = {Yanxiao Liu and Ching{-}Nung Yang and Yichuan Wang and Lei Zhu and Wenjiang Ji}, title = {Cheating identifiable secret sharing scheme using symmetric bivariate polynomial}, journal = {Inf. Sci.}, volume = {453}, pages = {21--29}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.04.043}, doi = {10.1016/J.INS.2018.04.043}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiuYWZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimCYZB18, author = {Cheonshik Kim and Chin{-}Chen Chang and Ching{-}Nung Yang and Xinpeng Zhang and Jinsuk Baek}, title = {Special Issue: Real-Time Data Hiding and Visual Cryptography}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1007/s11554-018-0749-0}, doi = {10.1007/S11554-018-0749-0}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jrtip/KimCYZB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/LiYK18, author = {Peng Li and Ching{-}Nung Yang and Qian Kong}, title = {A novel two-in-one image secret sharing scheme based on perfect black visual cryptography}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {41--50}, year = {2018}, url = {https://doi.org/10.1007/s11554-016-0621-z}, doi = {10.1007/S11554-016-0621-Z}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/LiYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YanLY18, author = {Xuehu Yan and Xin Liu and Ching{-}Nung Yang}, title = {An enhanced threshold visual secret sharing based on random grids}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {61--73}, year = {2018}, url = {https://doi.org/10.1007/s11554-015-0540-4}, doi = {10.1007/S11554-015-0540-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YanLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimSLY18, author = {Cheonshik Kim and Dongkyoo Shin and Lu Leng and Ching{-}Nung Yang}, title = {Lossless data hiding for absolute moment block truncation coding using histogram modification}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {101--114}, year = {2018}, url = {https://doi.org/10.1007/s11554-016-0641-8}, doi = {10.1007/S11554-016-0641-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/KimSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimSKY18, author = {Cheonshik Kim and Dongkyoo Shin and Byung{-}Gyu Kim and Ching{-}Nung Yang}, title = {Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and {OPAP}}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {115--126}, year = {2018}, url = {https://doi.org/10.1007/s11554-017-0674-7}, doi = {10.1007/S11554-017-0674-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/KimSKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YangKL18, author = {Ching{-}Nung Yang and Cheonshik Kim and Yen{-}Hung Lo}, title = {Adaptive real-time reversible data hiding for {JPEG} images}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {147--157}, year = {2018}, url = {https://doi.org/10.1007/s11554-015-0555-x}, doi = {10.1007/S11554-015-0555-X}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YangKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YangWP18, author = {Ching{-}Nung Yang and Fu{-}Heng Wu and Sheng{-}Lung Peng}, title = {Enhancing multi-factor cheating prevention in visual cryptography based minimum (\emph{k}, \emph{n})-connected graph}, journal = {J. Vis. Commun. Image Represent.}, volume = {55}, pages = {660--676}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.07.012}, doi = {10.1016/J.JVCIR.2018.07.012}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/YangWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LiuYCWS18, author = {Yanxiao Liu and Ching{-}Nung Yang and Yung{-}Shun Chou and Song{-}Yu Wu and Qin{-}Dong Sun}, title = {Progressive (k, n) secret image sharing Scheme with meaningful shadow images by {GEMD} and {RGEMD}}, journal = {J. Vis. Commun. Image Represent.}, volume = {55}, pages = {766--777}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.08.003}, doi = {10.1016/J.JVCIR.2018.08.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/LiuYCWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/KimKRY18, author = {Cheonshik Kim and Bryan Kim and Joel J. P. C. Rodrigues and James C. N. Yang}, title = {Special issue: Advanced technology for smart home automation and entertainment}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1102-5}, doi = {10.1007/S00779-017-1102-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/KimKRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/KimSY18, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang}, title = {Self-embedding fragile watermarking scheme to restoration of a tampered image using {AMBTC}}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {11--22}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1061-x}, doi = {10.1007/S00779-017-1061-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/KimSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/LeeBKY18, author = {Yong{-}Joon Lee and Namkyun Baik and Cheonshik Kim and Ching{-}Nung Yang}, title = {Study of detection method for spoofed {IP} against DDoS attacks}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {35--44}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1097-y}, doi = {10.1007/S00779-017-1097-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/LeeBKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiuGYQY18, author = {Wenjie Liu and Peipei Gao and Wenbin Yu and Zhiguo Qu and Ching{-}Nung Yang}, title = {Quantum Relief algorithm}, journal = {Quantum Inf. Process.}, volume = {17}, number = {10}, pages = {280}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-2048-x}, doi = {10.1007/S11128-018-2048-X}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiuGYQY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/LiLY18, author = {Peng Li and Zuquan Liu and Ching{-}Nung Yang}, title = {A construction method of (t, k, n)-essential secret image sharing scheme}, journal = {Signal Process. Image Commun.}, volume = {65}, pages = {210--220}, year = {2018}, url = {https://doi.org/10.1016/j.image.2018.04.002}, doi = {10.1016/J.IMAGE.2018.04.002}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/LiLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/WuYZH18, author = {Xiaotian Wu and Ching{-}Nung Yang and Yi Ting Zhuang and Shen{-}Chieh Hsu}, title = {Improving recovered image quality in secret image sharing by simple modular arithmetic}, journal = {Signal Process. Image Commun.}, volume = {66}, pages = {42--49}, year = {2018}, url = {https://doi.org/10.1016/j.image.2018.05.001}, doi = {10.1016/J.IMAGE.2018.05.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/WuYZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/LiuYWC18, author = {Yan{-}Xiao Liu and Ching{-}Nung Yang and Song{-}Yu Wu and Yung{-}Shun Chou}, title = {Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes}, journal = {Signal Process. Image Commun.}, volume = {66}, pages = {77--86}, year = {2018}, url = {https://doi.org/10.1016/j.image.2018.05.004}, doi = {10.1016/J.IMAGE.2018.05.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/LiuYWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangHK17, author = {Ching{-}Nung Yang and Shen{-}Chieh Hsu and Cheonshik Kim}, title = {Improving stego image quality in image interpolation based data hiding}, journal = {Comput. Stand. Interfaces}, volume = {50}, pages = {209--215}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.10.005}, doi = {10.1016/J.CSI.2016.10.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangWYWK17, author = {Ching{-}Nung Yang and Chihi{-}Han Wu and Zong{-}Xuan Yeh and Daoshun Wang and Cheonshik Kim}, title = {A new sharing digital image scheme with clearer shadow images}, journal = {Comput. Stand. Interfaces}, volume = {51}, pages = {118--131}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.11.015}, doi = {10.1016/J.CSI.2016.11.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangWYWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YangLW17, author = {Ching{-}Nung Yang and Jung{-}Kuo Liao and Daoshun Wang}, title = {New privilege-based visual cryptography with arbitrary privilege levels}, journal = {J. Vis. Commun. Image Represent.}, volume = {42}, pages = {121--131}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2016.10.014}, doi = {10.1016/J.JVCIR.2016.10.014}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/YangLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YangWCF17, author = {Ching{-}Nung Yang and Xiaotian Wu and Yung{-}Chien Chou and Zhangjie Fu}, title = {Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options}, journal = {J. Vis. Commun. Image Represent.}, volume = {48}, pages = {182--194}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.06.012}, doi = {10.1016/J.JVCIR.2017.06.012}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/YangWCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/LiuY17, author = {Yan{-}Xiao Liu and Ching{-}Nung Yang}, title = {Scalable secret image sharing scheme with essential shadows}, journal = {Signal Process. Image Commun.}, volume = {58}, pages = {49--55}, year = {2017}, url = {https://doi.org/10.1016/j.image.2017.06.011}, doi = {10.1016/J.IMAGE.2017.06.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/LiuY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouWWYS17, author = {Zhili Zhou and Yunlong Wang and Q. M. Jonathan Wu and Ching{-}Nung Yang and Xingming Sun}, title = {Effective and Efficient Global Context Verification for Image Copy Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {48--63}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601065}, doi = {10.1109/TIFS.2016.2601065}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouWWYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangLC17, author = {Ching{-}Nung Yang and Jian{-}Ming Li and Yung{-}Shun Chou}, title = {On the Analysis of k-Secure t-Conference Key Distribution Scheme}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {91--95}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163076}, doi = {10.1145/3163058.3163076}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/YangLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/LiYZ16, author = {Peng Li and Ching{-}Nung Yang and Zhili Zhou}, title = {Essential secret image sharing scheme with the same size of shadows}, journal = {Digit. Signal Process.}, volume = {50}, pages = {51--60}, year = {2016}, url = {https://doi.org/10.1016/j.dsp.2015.12.004}, doi = {10.1016/J.DSP.2015.12.004}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/LiYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhouYCSLW16, author = {Zhili Zhou and Ching{-}Nung Yang and Beijing Chen and Xingming Sun and Qi Liu and Q. M. Jonathan Wu}, title = {Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {6}, pages = {1531--1540}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDP7341}, doi = {10.1587/TRANSINF.2015EDP7341}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhouYCSLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KimSSY16, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Ching{-}Nung Yang}, title = {Secure protection of video recorder video in smart car}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {12}, year = {2016}, url = {https://doi.org/10.1177/1550147716681792}, doi = {10.1177/1550147716681792}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KimSSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YangSYK16, author = {Ching{-}Nung Yang and Li{-}Zhe Sun and Xuehu Yan and Cheonshik Kim}, title = {Design a new visual cryptography for human-verifiable authentication in accessing a database}, journal = {J. Real Time Image Process.}, volume = {12}, number = {2}, pages = {483--494}, year = {2016}, url = {https://doi.org/10.1007/s11554-015-0511-9}, doi = {10.1007/S11554-015-0511-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YangSYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/YangCC16, author = {Ching{-}Nung Yang and Cheng{-}Hua Chen and Song{-}Ruei Cai}, title = {Enhanced Boolean-based multi secret image sharing scheme}, journal = {J. Syst. Softw.}, volume = {116}, pages = {22--34}, year = {2016}, url = {https://doi.org/10.1016/j.jss.2015.01.031}, doi = {10.1016/J.JSS.2015.01.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/YangCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimY16a, author = {Cheonshik Kim and Ching{-}Nung Yang}, title = {Data hiding based on overlapped pixels using hamming code}, journal = {Multim. Tools Appl.}, volume = {75}, number = {23}, pages = {15651--15663}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2355-x}, doi = {10.1007/S11042-014-2355-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimY16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangFSY16, author = {Fengxiao Huang and Zhangjie Fu and Xingming Sun and Ching{-}Nung Yang}, title = {Privacy-preserving outsourced gene data search in encryption domain}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5178--5186}, year = {2016}, url = {https://doi.org/10.1002/sec.1687}, doi = {10.1002/SEC.1687}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangFSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YangSC16, author = {Ching{-}Nung Yang and Li{-}Zhe Sun and Song{-}Ruei Cai}, title = {Extended color visual cryptography for black and white secret image}, journal = {Theor. Comput. Sci.}, volume = {609}, pages = {143--161}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2015.09.016}, doi = {10.1016/J.TCS.2015.09.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/YangSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhouMZWY16, author = {Zhili Zhou and Yan Mu and Ningsheng Zhao and Q. M. Jonathan Wu and Ching{-}Nung Yang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Coverless Information Hiding Method Based on Multi-keywords}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {39--47}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_4}, doi = {10.1007/978-3-319-48671-0\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhouMZWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CimatoDMY16, author = {Stelvio Cimato and Ernesto Damiani and Silvia Mella and Ching{-}Nung Yang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Key Recovery in Public Clouds: {A} Survey on Cross-VM Side Channel Attacks}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {456--467}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_40}, doi = {10.1007/978-3-319-48671-0\_40}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CimatoDMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YangCWC16, author = {Ching{-}Nung Yang and Stelvio Cimato and Jihi{-}Han Wu and Song{-}Ruei Cai}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {400--406}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005740504000406}, doi = {10.5220/0005740504000406}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YangCWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/YangYHF16, author = {Ching{-}Nung Yang and Zong{-}Xuan Yeh and Shen{-}Chieh Hsu and Zhangjie Fu}, editor = {Xiang Fei and Lipo Wang and Chunlei Ji and Qiang Sun and Niansheng Chen and Xiaoyong Song and Xin Wang}, title = {Enhancing security for two-party comparison over encrypted data}, booktitle = {3rd International Conference on Systems and Informatics, {ICSAI} 2016, Shanghai, China, November 19-21, 2016}, pages = {439--443}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICSAI.2016.7810995}, doi = {10.1109/ICSAI.2016.7810995}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icsai/YangYHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/YangLF15, author = {Ching{-}Nung Yang and Jia{-}Bin Lai and Zhangjie Fu}, title = {Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {341--355}, year = {2015}, url = {https://doi.org/10.2498/cit.1002593}, doi = {10.2498/CIT.1002593}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/YangLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/YanWNY15, author = {Xuehu Yan and Shen Wang and Xiamu Niu and Ching{-}Nung Yang}, title = {Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality}, journal = {Digit. Signal Process.}, volume = {38}, pages = {53--65}, year = {2015}, url = {https://doi.org/10.1016/j.dsp.2014.12.002}, doi = {10.1016/J.DSP.2014.12.002}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/YanWNY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangL15, author = {Ching{-}Nung Yang and Che{-}Yu Lin}, title = {Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels}, journal = {Inf. Sci.}, volume = {312}, pages = {131--151}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.03.024}, doi = {10.1016/J.INS.2015.03.024}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YanWNY15, author = {Xuehu Yan and Shen Wang and Xiamu Niu and Ching{-}Nung Yang}, title = {Random grid-based visual secret sharing with multiple decryptions}, journal = {J. Vis. Commun. Image Represent.}, volume = {26}, pages = {94--104}, year = {2015}, url = {https://doi.org/10.1016/j.jvcir.2014.11.003}, doi = {10.1016/J.JVCIR.2014.11.003}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/YanWNY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimY15a, author = {Cheonshik Kim and Ching{-}Nung Yang}, title = {Watermark with {DSA} signature using predictive coding}, journal = {Multim. Tools Appl.}, volume = {74}, number = {14}, pages = {5189--5203}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1667-6}, doi = {10.1007/S11042-013-1667-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimY15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YanWNY15, author = {Xuehu Yan and Shen Wang and Xiamu Niu and Ching{-}Nung Yang}, title = {Generalized random grids-based threshold visual cryptography with meaningful shares}, journal = {Signal Process.}, volume = {109}, pages = {317--333}, year = {2015}, url = {https://doi.org/10.1016/j.sigpro.2014.12.002}, doi = {10.1016/J.SIGPRO.2014.12.002}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YanWNY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/YangLWC15, author = {Ching{-}Nung Yang and Peng Li and Chih{-}Cheng Wu and Song{-}Ruei Cai}, title = {Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach}, journal = {Signal Process. Image Commun.}, volume = {31}, pages = {1--9}, year = {2015}, url = {https://doi.org/10.1016/j.image.2014.11.003}, doi = {10.1016/J.IMAGE.2014.11.003}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/YangLWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YangLP15, author = {Ching{-}Nung Yang and Zih{-}Yang Lin and Sheng{-}Lung Peng}, title = {Reducing Code Length of Second-Order Spectral-Null Code}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {2}, pages = {492--503}, year = {2015}, url = {https://doi.org/10.1109/TC.2013.231}, doi = {10.1109/TC.2013.231}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YangLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vjcs/HoaTKY15, author = {Le Quang Hoa and Nguyen Huy Truong and Cheonshik Kim and Ching{-}Nung Yang}, title = {(1, 7, 4) Data hiding scheme for searching in hidden text with automata}, journal = {Vietnam. J. Comput. Sci.}, volume = {2}, number = {4}, pages = {257--265}, year = {2015}, url = {https://doi.org/10.1007/s40595-015-0050-0}, doi = {10.1007/S40595-015-0050-0}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vjcs/HoaTKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcity/YangWTK15, author = {Ching{-}Nung Yang and Fu{-}Heng Wu and Sin{-}Yen Tsai and Wen{-}Chung Kuo}, title = {E-Health Services for Elderly Care Based on Google Cloud Messaging}, booktitle = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, Chengdu, China, December 19-21, 2015}, pages = {9--12}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SmartCity.2015.39}, doi = {10.1109/SMARTCITY.2015.39}, timestamp = {Thu, 13 Apr 2023 12:52:26 +0200}, biburl = {https://dblp.org/rec/conf/smartcity/YangWTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwdw/2014, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19321-2}, doi = {10.1007/978-3-319-19321-2}, isbn = {978-3-319-19320-5}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangY14, author = {Ching{-}Nung Yang and Yao{-}Yu Yang}, title = {New extended visual cryptography schemes with clearer shadow images}, journal = {Inf. Sci.}, volume = {271}, pages = {246--263}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.099}, doi = {10.1016/J.INS.2014.02.099}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangWW14, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Daoshun Wang}, title = {A discussion on the relationship between probabilistic visual cryptography and random grid}, journal = {Inf. Sci.}, volume = {278}, pages = {141--173}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.03.033}, doi = {10.1016/J.INS.2014.03.033}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/KimSSTY14, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Raylin Tso and Ching{-}Nung Yang}, title = {A secret sharing scheme for {EBTC} using steganography}, journal = {J. Intell. Manuf.}, volume = {25}, number = {2}, pages = {241--249}, year = {2014}, url = {https://doi.org/10.1007/s10845-012-0660-7}, doi = {10.1007/S10845-012-0660-7}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/KimSSTY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuYY14, author = {Yan{-}Xiao Liu and Ching{-}Nung Yang and Po{-}Han Yeh}, title = {Reducing shadow size in smooth scalable secret image sharing}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2237--2244}, year = {2014}, url = {https://doi.org/10.1002/sec.930}, doi = {10.1002/SEC.930}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YangW14, author = {Ching{-}Nung Yang and Daoshun Wang}, title = {Property Analysis of XOR-Based Visual Cryptography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {24}, number = {2}, pages = {189--197}, year = {2014}, url = {https://doi.org/10.1109/TCSVT.2013.2276708}, doi = {10.1109/TCSVT.2013.2276708}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YangW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/CimatoYW14, author = {Stelvio Cimato and James C. N. Yang and Chih{-}Cheng Wu}, title = {Visual Cryptography Based Watermarking}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {91--109}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_6}, doi = {10.1007/978-3-642-55046-1\_6}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/CimatoYW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LiuGWY14, author = {Feng Liu and Teng Guo and Chuan Kun Wu and Ching{-}Nung Yang}, title = {Flexible Visual Cryptography Scheme and Its Application}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {110--130}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_7}, doi = {10.1007/978-3-642-55046-1\_7}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LiuGWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuangKY14, author = {Yu{-}Chih Huang and Wen{-}Chung Kuo and Ching{-}Nung Yang}, title = {Data Hiding Based on Radix-2}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {170--174}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.22}, doi = {10.1109/ASIAJCIS.2014.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuangKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcc/KimY14, author = {Cheonshik Kim and Ching{-}Nung Yang}, editor = {James Jong Hyuk Park and Albert Y. Zomaya and Hwa{-}Young Jeong and Mohammad S. Obaidat}, title = {Improving Data Hiding Capacity Based on Hamming Code}, booktitle = {Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 {FTRA} International Symposium on Frontier and Innovation in Future Computing and Communications, {FCC} 2014, Auckland, New Zealand, January 13-16, 2014}, series = {Lecture Notes in Electrical Engineering}, volume = {301}, pages = {697--706}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-94-017-8798-7\_80}, doi = {10.1007/978-94-017-8798-7\_80}, timestamp = {Fri, 27 Mar 2020 08:55:45 +0100}, biburl = {https://dblp.org/rec/conf/fcc/KimY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/YanWNY14, author = {Xuehu Yan and Shen Wang and Xiamu Niu and Ching{-}Nung Yang}, editor = {Chu Kiong Loo and Keem Siah Yap and Kok Wai Wong and Andrew Teoh Beng Jin and Kaizhu Huang}, title = {Essential Visual Cryptographic Scheme with Different Importance of Shares}, booktitle = {Neural Information Processing - 21st International Conference, {ICONIP} 2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {8836}, pages = {636--643}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12643-2\_77}, doi = {10.1007/978-3-319-12643-2\_77}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/YanWNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiYK14, author = {Peng Li and Ching{-}Nung Yang and Qian Kong}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Two-in-One Image Secret Sharing Scheme Based on Boolean Operations}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {305--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_23}, doi = {10.1007/978-3-319-19321-2\_23}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YanCYC14, author = {Xuehu Yan and Guohui Chen and Ching{-}Nung Yang and Song{-}Ruei Cai}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {319--332}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_24}, doi = {10.1007/978-3-319-19321-2\_24}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YanCYC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WangYY14, author = {Daoshun Wang and Feng Yi and Ching{-}Nung Yang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Visual Cryptography Scheme with Autostereogram}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {364--375}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_27}, doi = {10.1007/978-3-319-19321-2\_27}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/WangYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KimY14, author = {Cheonshik Kim and Ching{-}Nung Yang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Steganography Based on Grayscale Images Using (5, 3) Hamming Code}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {588--598}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_45}, doi = {10.1007/978-3-319-19321-2\_45}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/KimY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HuyTKY13, author = {Phan Trung Huy and Nguyen Hai Thanh and Cheonshik Kim and Ching{-}Nung Yang}, title = {Data-Hiding for Halftone Images Using an Improved {CPT} scheme}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {2}, pages = {405--424}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.02.013}, doi = {10.3837/TIIS.2013.02.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HuyTKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LinYLL13, author = {Hsiao{-}Ching Lin and Ching{-}Nung Yang and Chi{-}Sung Laih and Hui{-}Tang Lin}, title = {Natural language letter based visual cryptography scheme}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {3}, pages = {318--331}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.01.003}, doi = {10.1016/J.JVCIR.2013.01.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/LinYLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LiYWKM13, author = {Peng Li and Ching{-}Nung Yang and Chih{-}Cheng Wu and Qian Kong and Yanpeng Ma}, title = {Essential secret image sharing scheme with different importance of shadows}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {7}, pages = {1106--1114}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.07.005}, doi = {10.1016/J.JVCIR.2013.07.005}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/LiYWKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LiYKML13, author = {Peng Li and Ching{-}Nung Yang and Qian Kong and Yanpeng Ma and Zheng Liu}, title = {Sharing more information in gray visual cryptography scheme}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {8}, pages = {1380--1393}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.09.010}, doi = {10.1016/J.JVCIR.2013.09.010}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/LiYKML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/YangW13, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu}, title = {{MSRC:} (M)icropayment (S)cheme with ability to (R)eturn (C)hanges}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {96--107}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.07.010}, doi = {10.1016/J.MCM.2012.07.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/YangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/YangCSK13, author = {Ching{-}Nung Yang and Pin{-}Wei Chen and Hsiang{-}Wen Shih and Cheonshik Kim}, title = {Aspect ratio invariant visual cryptography by image filtering and resizing}, journal = {Pers. Ubiquitous Comput.}, volume = {17}, number = {5}, pages = {843--850}, year = {2013}, url = {https://doi.org/10.1007/s00779-012-0535-0}, doi = {10.1007/S00779-012-0535-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/YangCSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSDY13, author = {Daoshun Wang and Tao Song and Lin Dong and Ching{-}Nung Yang}, title = {Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {2059--2072}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2281108}, doi = {10.1109/TIFS.2013.2281108}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangSDY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/HuyKAHY13, author = {Phan Trung Huy and Cheonshik Kim and Nguyen Tuan Anh and Le Quang Hoa and Ching{-}Nung Yang}, editor = {James J. Park and Hamid R. Arabnia and Cheonshik Kim and Weisong Shi and Joon{-}Min Gil}, title = {Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules}, booktitle = {Grid and Pervasive Computing - 8th International Conference, {GPC} 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7861}, pages = {649--658}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38027-3\_70}, doi = {10.1007/978-3-642-38027-3\_70}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/gpc/HuyKAHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GuoLWYWR13, author = {Teng Guo and Feng Liu and Chuan Kun Wu and Ching{-}Nung Yang and Wen Wang and YaWei Ren}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Threshold Secret Image Sharing}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {404--412}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_29}, doi = {10.1007/978-3-319-02726-5\_29}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/GuoLWYWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/XuWLY13, author = {Xing{-}Fu Xu and Daoshun Wang and Shundong Li and Ching{-}Nung Yang}, editor = {Kebin Jia and Jeng{-}Shyang Pan and Yao Zhao and Lakhmi C. Jain}, title = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes}, booktitle = {Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October 16-18, 2013}, pages = {369--372}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IIH-MSP.2013.99}, doi = {10.1109/IIH-MSP.2013.99}, timestamp = {Wed, 01 Apr 2020 17:00:41 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/XuWLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YangWC13, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Chih{-}Wei Chou}, editor = {Kebin Jia and Jeng{-}Shyang Pan and Yao Zhao and Lakhmi C. Jain}, title = {A Comment on "Sharing Secret Images Using Blakley's Concept"}, booktitle = {Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October 16-18, 2013}, pages = {383--386}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IIH-MSP.2013.102}, doi = {10.1109/IIH-MSP.2013.102}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/YangWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/YangL13, author = {Ching{-}Nung Yang and Jia{-}Bin Lai}, title = {Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {259--266}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.46}, doi = {10.1109/ISBAST.2013.46}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isbast/YangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YangLW13, author = {Ching{-}Nung Yang and Yi{-}Chin Lin and Chih{-}Cheng Wu}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Cheating Immune Block-Based Progressive Visual Cryptography}, booktitle = {Digital-Forensics and Watermarking - 12th International Workshop, {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {95--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43886-2\_7}, doi = {10.1007/978-3-662-43886-2\_7}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YangLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLWYWR13, author = {Teng Guo and Feng Liu and Chuan Kun Wu and Ching{-}Nung Yang and Wen Wang and YaWei Ren}, title = {Threshold Secret Image Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2013}, url = {http://eprint.iacr.org/2013/524}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLWYWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/YangHL12, author = {Ching{-}Nung Yang and Li{-}Jen Hu and Jia{-}Bin Lai}, title = {Query Tree Algorithm for {RFID} Tag with Binary-Coded Decimal {EPC}}, journal = {{IEEE} Commun. Lett.}, volume = {16}, number = {10}, pages = {1616--1619}, year = {2012}, url = {https://doi.org/10.1109/LCOMM.2012.090312.121213}, doi = {10.1109/LCOMM.2012.090312.121213}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/YangHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/LiuHYZ12, author = {Yan{-}Xiao Liu and Lein Harn and Ching{-}Nung Yang and Yuqing Zhang}, title = {Efficient (n, t, n) secret sharing schemes}, journal = {J. Syst. Softw.}, volume = {85}, number = {6}, pages = {1325--1332}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2012.01.027}, doi = {10.1016/J.JSS.2012.01.027}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/LiuHYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LiMSY12, author = {Peng Li and Peijun Ma and Xiaohong Su and Ching{-}Nung Yang}, title = {Improvements of a two-in-one image secret sharing scheme based on gray mixing model}, journal = {J. Vis. Commun. Image Represent.}, volume = {23}, number = {3}, pages = {441--453}, year = {2012}, url = {https://doi.org/10.1016/j.jvcir.2012.01.003}, doi = {10.1016/J.JVCIR.2012.01.003}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/LiMSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/YangWLK12, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Yi{-}Chin Lin and Cheonshik Kim}, title = {Enhanced Matrix-Based Secret Image Sharing Scheme}, journal = {{IEEE} Signal Process. Lett.}, volume = {19}, number = {12}, pages = {789--792}, year = {2012}, url = {https://doi.org/10.1109/LSP.2012.2220348}, doi = {10.1109/LSP.2012.2220348}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/YangWLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YangSWH12, author = {Ching{-}Nung Yang and Hsiang{-}Wen Shih and Chih{-}Cheng Wu and Lein Harn}, title = {{\textdollar}k{\textdollar} Out of {\textdollar}n{\textdollar} Region Incrementing Scheme in Visual Cryptography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {22}, number = {5}, pages = {799--810}, year = {2012}, url = {https://doi.org/10.1109/TCSVT.2011.2180952}, doi = {10.1109/TCSVT.2011.2180952}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YangSWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aciids/KimSSY12, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Ching{-}Nung Yang}, editor = {Jeng{-}Shyang Pan and Shyi{-}Ming Chen and Ngoc Thanh Nguyen}, title = {A (2, 2) Secret Sharing Scheme Based on Hamming Code and {AMBTC}}, booktitle = {Intelligent Information and Database Systems - 4th Asian Conference, {ACIIDS} 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7197}, pages = {129--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28490-8\_14}, doi = {10.1007/978-3-642-28490-8\_14}, timestamp = {Thu, 16 Mar 2023 20:00:29 +0100}, biburl = {https://dblp.org/rec/conf/aciids/KimSSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/CimatoYW12, author = {Stelvio Cimato and Ching{-}Nung Yang and Chih{-}Cheng Wu}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Visual Cryptography Based Watermarking: Definition and Meaning}, booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW} 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7809}, pages = {435--448}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40099-5\_36}, doi = {10.1007/978-3-642-40099-5\_36}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/CimatoYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YangLW12, author = {Ching{-}Nung Yang and Yi{-}Chin Lin and Chih{-}Cheng Wu}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Region-in-Region Incrementing Visual Cryptography Scheme}, booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW} 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7809}, pages = {449--463}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40099-5\_37}, doi = {10.1007/978-3-642-40099-5\_37}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YangLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-6123, author = {Daoshun Wang and Tao Song and Lin Dong and Ching{-}Nung Yang}, title = {Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing}, journal = {CoRR}, volume = {abs/1210.6123}, year = {2012}, url = {http://arxiv.org/abs/1210.6123}, eprinttype = {arXiv}, eprint = {1210.6123}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-6123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/YangH11, author = {Ching{-}Nung Yang and Jyun{-}Yan He}, title = {An Effective 16-bit Random Number Aided Query Tree Algorithm for {RFID} Tag Anti-Collision}, journal = {{IEEE} Commun. Lett.}, volume = {15}, number = {5}, pages = {539--541}, year = {2011}, url = {https://doi.org/10.1109/LCOMM.2011.031411.110213}, doi = {10.1109/LCOMM.2011.031411.110213}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/YangH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangYK11, author = {Ching{-}Nung Yang and Guo{-}Cin Ye and Cheonshik Kim}, title = {Data Hiding in Halftone Images by {XOR} Block-Wise Operation with Difference Minimization}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {5}, number = {2}, pages = {457--476}, year = {2011}, url = {https://doi.org/10.3837/tiis.2011.02.013}, doi = {10.3837/TIIS.2011.02.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangYK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/YangC11, author = {Ching{-}Nung Yang and Yu{-}Ying Chu}, title = {A general (k, n) scalable secret image sharing scheme with the smooth scalability}, journal = {J. Syst. Softw.}, volume = {84}, number = {10}, pages = {1726--1733}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.05.008}, doi = {10.1016/J.JSS.2011.05.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/YangC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YangCW11, author = {Ching{-}Nung Yang and Chih{-}Yang Chiu and Gen{-}Cheng Wu}, title = {Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {10}, pages = {1503--1510}, year = {2011}, url = {https://doi.org/10.1109/TC.2010.242}, doi = {10.1109/TC.2010.242}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YangCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiuGWY11, author = {Feng Liu and Teng Guo and Chuan Kun Wu and Ching{-}Nung Yang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Flexible Visual Cryptography Scheme without Distortion}, booktitle = {Digital Forensics and Watermarking - 10th International Workshop, {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7128}, pages = {211--227}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32205-1\_18}, doi = {10.1007/978-3-642-32205-1\_18}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiuGWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ivc/YangC10, author = {Ching{-}Nung Yang and Chuei{-}Bang Ciou}, title = {Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability}, journal = {Image Vis. Comput.}, volume = {28}, number = {12}, pages = {1600--1610}, year = {2010}, url = {https://doi.org/10.1016/j.imavis.2010.04.003}, doi = {10.1016/J.IMAVIS.2010.04.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ivc/YangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/YangL09, author = {Ching{-}Nung Yang and Bing{-}Ling Lu}, title = {Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {1}, pages = {1--10}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200901\_01.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/YangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/YangC09, author = {Ching{-}Nung Yang and Chuei{-}Bang Ciou}, title = {A comment on "Sharing secrets in stegoimages with authentication"}, journal = {Pattern Recognit.}, volume = {42}, number = {7}, pages = {1615--1619}, year = {2009}, url = {https://doi.org/10.1016/j.patcog.2009.01.024}, doi = {10.1016/J.PATCOG.2009.01.024}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/YangC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YangPC09, author = {Ching{-}Nung Yang and An{-}Guo Peng and Tse{-}Shih Chen}, title = {{MTVSS:} (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty}, journal = {Signal Process.}, volume = {89}, number = {8}, pages = {1602--1624}, year = {2009}, url = {https://doi.org/10.1016/j.sigpro.2009.02.014}, doi = {10.1016/J.SIGPRO.2009.02.014}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/YangPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/YangWCCL09, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Chih{-}Yang Chiu and Shin{-}Yan Chiou and Wen{-}Chiuan Liao}, editor = {Gabriele Kotsis and David Taniar and Eric Pardede and Ismail Khalil}, title = {Micropayment schemes with ability to return changes}, booktitle = {iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia}, pages = {356--363}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1806338.1806403}, doi = {10.1145/1806338.1806403}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/YangWCCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/YangCCWW09, author = {Ching{-}Nung Yang and Jie{-}Ru Chen and Chih{-}Yang Chiu and Gen{-}Chin Wu and Chih{-}Cheng Wu}, title = {Enhancing Privacy and Security in RFID-Enabled Banknotes}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August 2009}, pages = {439--444}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ISPA.2009.77}, doi = {10.1109/ISPA.2009.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/YangCCWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangWC08, author = {Ching{-}Nung Yang and Chung{-}Chun Wang and Tse{-}Shih Chen}, title = {Visual Cryptography Schemes with Reversing}, journal = {Comput. J.}, volume = {51}, number = {6}, pages = {710--722}, year = {2008}, url = {https://doi.org/10.1093/comjnl/bxm118}, doi = {10.1093/COMJNL/BXM118}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YangC08, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Security Analysis of Authentication of Images Using Recursive Visual Cryptography}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {131--136}, year = {2008}, url = {https://doi.org/10.1080/01611190701869669}, doi = {10.1080/01611190701869669}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/YangC08, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Colored visual cryptography scheme based on additive color mixing}, journal = {Pattern Recognit.}, volume = {41}, number = {10}, pages = {3114--3129}, year = {2008}, url = {https://doi.org/10.1016/j.patcog.2008.03.031}, doi = {10.1016/J.PATCOG.2008.03.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/YangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Yang08, author = {Ching{-}Nung Yang}, title = {Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit Shift}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {7}, pages = {876--888}, year = {2008}, url = {https://doi.org/10.1109/TC.2007.70849}, doi = {10.1109/TC.2007.70849}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Yang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YangYCY08, author = {Ching{-}Nung Yang and Yao{-}Yu Yang and Tse{-}Shih Chen and Guo{-}Cin Ye}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {New Steganography Scheme in Halftone Images}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1520--1523}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.265}, doi = {10.1109/IIH-MSP.2008.265}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/YangYCY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mm/LukacPY08, author = {Rastislav Lukac and Konstantinos N. Plataniotis and Ching{-}Nung Yang}, editor = {Borko Furht}, title = {Image Secret Sharing}, booktitle = {Encyclopedia of Multimedia, 2nd Ed}, pages = {338--343}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-78414-4\_82}, doi = {10.1007/978-0-387-78414-4\_82}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/mm/LukacPY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/YangC07, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {21}, number = {5}, pages = {879--898}, year = {2007}, url = {https://doi.org/10.1142/S0218001407005740}, doi = {10.1142/S0218001407005740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/YangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imst/YangYL07, author = {Ching{-}Nung Yang and Kun{-}Hsuan Yu and Rastislav Lukac}, title = {User-friendly image sharing using polynomials with different primes}, journal = {Int. J. Imaging Syst. Technol.}, volume = {17}, number = {1}, pages = {40--47}, year = {2007}, url = {https://doi.org/10.1002/ima.20096}, doi = {10.1002/IMA.20096}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imst/YangYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/YangCYW07, author = {Ching{-}Nung Yang and Tse{-}Shih Chen and Kun{-}Hsuan Yu and Chung{-}Chun Wang}, title = {Improvements of image sharing with steganography and authentication}, journal = {J. Syst. Softw.}, volume = {80}, number = {7}, pages = {1070--1076}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.11.022}, doi = {10.1016/J.JSS.2006.11.022}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/YangCYW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YangC07, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {1535--1538}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284955}, doi = {10.1109/ICME.2007.4284955}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/YangYL07, author = {Ching{-}Nung Yang and Kun{-}Hsuan Yu and Rastislav Lukac}, editor = {Tat{-}Jen Cham and Jianfei Cai and Chitra Dorai and Deepu Rajan and Tat{-}Seng Chua and Liang{-}Tien Chia}, title = {User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes}, booktitle = {Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, {MMM} 2007, Singapore, January 9-12, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4352}, pages = {443--452}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69429-8\_45}, doi = {10.1007/978-3-540-69429-8\_45}, timestamp = {Wed, 10 Jun 2020 15:40:49 +0200}, biburl = {https://dblp.org/rec/conf/mmm/YangYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icae/YangCC06, author = {Ching{-}Nung Yang and Tse{-}Shih Chen and Ming{-}Hung Ching}, title = {Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme}, journal = {Integr. Comput. Aided Eng.}, volume = {13}, number = {2}, pages = {189--199}, year = {2006}, url = {https://doi.org/10.3233/ica-2006-13207}, doi = {10.3233/ICA-2006-13207}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icae/YangCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangC06, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {2}, pages = {620--625}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.2.620}, doi = {10.1093/IETFEC/E89-A.2.620}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YangC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/YangC06, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation}, journal = {Pattern Recognit.}, volume = {39}, number = {7}, pages = {1300--1314}, year = {2006}, url = {https://doi.org/10.1016/j.patcog.2006.01.013}, doi = {10.1016/J.PATCOG.2006.01.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/YangC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YangL06, author = {Ching{-}Nung Yang and Dong{-}Jing Lee}, title = {Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables}, journal = {{IEEE} Trans. Computers}, volume = {55}, number = {7}, pages = {924--927}, year = {2006}, url = {https://doi.org/10.1109/TC.2006.111}, doi = {10.1109/TC.2006.111}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangWC06, author = {Ching{-}Nung Yang and Chung{-}Chun Wang and Tse{-}Shih Chen}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Real Perfect Contrast Visual Secret Sharing Schemes with Reversing}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {433--447}, year = {2006}, url = {https://doi.org/10.1007/11767480\_30}, doi = {10.1007/11767480\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/YangWC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ChenYL06, author = {Ming{-}Yang Chen and Ching{-}Nung Yang and Chi{-}Sung Laih}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {Authorized Tracking and Tracing for {RFID} Tags}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {435--444}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_44}, doi = {10.1007/11807964\_44}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/ChenYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciar/YangC06, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, editor = {Aur{\'{e}}lio C. Campilho and Mohamed S. Kamel}, title = {Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions}, booktitle = {Image Analysis and Recognition, Third International Conference, {ICIAR} 2006, P{\'{o}}voa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4141}, pages = {468--479}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11867586\_44}, doi = {10.1007/11867586\_44}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/iciar/YangC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoscale/YangL06, author = {Ching{-}Nung Yang and Bing{-}Ling Lu}, editor = {Xiaohua Jia}, title = {Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in {P2P} information systems}, booktitle = {Proceedings of the 1st International Conference on Scalable Information Systems, Infoscale 2006, Hong Kong, May 30-June 1, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {152}, pages = {54}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1146847.1146902}, doi = {10.1145/1146847.1146902}, timestamp = {Tue, 06 Nov 2018 16:57:28 +0100}, biburl = {https://dblp.org/rec/conf/infoscale/YangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mm/LukacPY06, author = {Rastislav Lukac and Konstantinos N. Plataniotis and Ching{-}Nung Yang}, editor = {Borko Furht}, title = {Image Secret Sharing}, booktitle = {Encyclopedia of Multimedia}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-30038-4\_101}, doi = {10.1007/0-387-30038-4\_101}, timestamp = {Wed, 26 Jun 2019 12:55:10 +0200}, biburl = {https://dblp.org/rec/reference/mm/LukacPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangC05, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Size-Adjustable Visual Secret Sharing Schemes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {9}, pages = {2471--2474}, year = {2005}, url = {https://doi.org/10.1093/ietfec/e88-a.9.2471}, doi = {10.1093/IETFEC/E88-A.9.2471}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/YangC05, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion}, journal = {Pattern Recognit. Lett.}, volume = {26}, number = {2}, pages = {193--206}, year = {2005}, url = {https://doi.org/10.1016/j.patrec.2004.08.025}, doi = {10.1016/J.PATREC.2004.08.025}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/YangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YangC05, author = {Ching{-}Nung Yang and Guo{-}Jau Chen}, title = {A comment on "Systematic single asymmetric error-correcting Codes"}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {3}, pages = {1214--1217}, year = {2005}, url = {https://doi.org/10.1109/TIT.2004.842760}, doi = {10.1109/TIT.2004.842760}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/YangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Yang05, author = {Ching{-}Nung Yang}, title = {Design of efficient second-order spectral- codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {4}, pages = {1580--1584}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.844085}, doi = {10.1109/TIT.2005.844085}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Yang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/YangC05, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3480}, pages = {19--28}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424758\_3}, doi = {10.1007/11424758\_3}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/YangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciar/YangC05, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, editor = {Mohamed S. Kamel and Aur{\'{e}}lio C. Campilho}, title = {New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation}, booktitle = {Image Analysis and Recognition, Second International Conference, {ICIAR} 2005, Toronto, Canada, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3656}, pages = {1167--1174}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11559573\_141}, doi = {10.1007/11559573\_141}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/iciar/YangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciar/YangC05a, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, editor = {Mohamed S. Kamel and Aur{\'{e}}lio C. Campilho}, title = {Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels}, booktitle = {Image Analysis and Recognition, Second International Conference, {ICIAR} 2005, Toronto, Canada, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3656}, pages = {1184--1191}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11559573\_143}, doi = {10.1007/11559573\_143}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciar/YangC05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/Yang04b, author = {Ching{-}Nung Yang}, title = {New visual secret sharing schemes using probabilistic method}, journal = {Pattern Recognit. Lett.}, volume = {25}, number = {4}, pages = {481--494}, year = {2004}, url = {https://doi.org/10.1016/j.patrec.2003.12.011}, doi = {10.1016/J.PATREC.2003.12.011}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/Yang04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/YangC04, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {An algorithm to enumerate codewords for third-order spectral-null codes}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {88}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365127}, doi = {10.1109/ISIT.2004.1365127}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/YangC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LinLY03, author = {Chen{-}Chi Lin and Chi{-}Sung Laih and Ching{-}Nung Yang}, title = {New Audio Secret Sharing Schemes With Time Division Technique}, journal = {J. Inf. Sci. Eng.}, volume = {19}, number = {4}, pages = {605--614}, year = {2003}, url = {http://www.iis.sinica.edu.tw/page/jise/2003/200307\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LinLY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/YangT03, author = {Ching{-}Nung Yang and Hsu{-}Tun Teng}, title = {An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment}, booktitle = {2003 {IEEE} International Conference on Electronic Commerce {(CEC} 2003), 24-27 June 2003, Newport Beach, CA, {USA}}, pages = {45--48}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/COEC.2003.1210231}, doi = {10.1109/COEC.2003.1210231}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/YangT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Yang02, author = {Ching{-}Nung Yang}, title = {A Note on Efficient Color Visual Encryption}, journal = {J. Inf. Sci. Eng.}, volume = {18}, number = {3}, pages = {367--372}, year = {2002}, url = {http://www.iis.sinica.edu.tw/page/jise/2002/200205\_02.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Yang02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Yang02a, author = {Ching{-}Nung Yang}, title = {Improvements on Audio and Optical Cryptography}, journal = {J. Inf. Sci. Eng.}, volume = {18}, number = {3}, pages = {381--391}, year = {2002}, url = {http://www.iis.sinica.edu.tw/page/jise/2002/200205\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Yang02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YangL00, author = {Ching{-}Nung Yang and Chi{-}Sung Laih}, title = {New Colored Visual Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {20}, number = {3}, pages = {325--336}, year = {2000}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YangL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YangL98, author = {Ching{-}Nung Yang and Chi{-}Sung Laih}, title = {DC\({}_{\mbox{\emph{m}}}\) Codes for Constructing \emph{t}-EC/AUED Codes}, journal = {{IEEE} Trans. Computers}, volume = {47}, number = {4}, pages = {492}, year = {1998}, url = {https://doi.org/10.1109/12.675719}, doi = {10.1109/12.675719}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YangL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/YangL97, author = {Ching{-}Nung Yang and Chi{-}Sung Laih}, title = {A Note on Error-Correcting Codes for Authentication and Subliminal Channels}, journal = {Inf. Process. Lett.}, volume = {62}, number = {3}, pages = {141--143}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00053-7}, doi = {10.1016/S0020-0190(97)00053-7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/YangL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LaihY96, author = {Chi{-}Sung Laih and Ching{-}Nung Yang}, title = {On the Analysis and Design of Group Theoretical T-syEC/AUED Codes}, journal = {{IEEE} Trans. Computers}, volume = {45}, number = {1}, pages = {103--108}, year = {1996}, url = {https://doi.org/10.1109/12.481491}, doi = {10.1109/12.481491}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LaihY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.