default search action
Ching-Nung Yang
- > Home > Persons > Ching-Nung Yang
Publications
- 2024
- [j148]Lizhi Xiong, Mengtao Zhang, Ching-Nung Yang, Cheonshik Kim:
An enhanced AMBTC for color image compression using color palette. Multim. Tools Appl. 83(11): 31783-31803 (2024) - 2023
- [j140]Cheonshik Kim, Ching-Nung Yang, Zhili Zhou, Ki-Hyun Jung:
Dual efficient reversible data hiding using Hamming code and OPAP. J. Inf. Secur. Appl. 76: 103544 (2023) - 2021
- [j132]Ching-Nung Yang, Xiaotian Wu, Hsuan-Yu Lin, Cheonshik Kim:
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation. J. Inf. Secur. Appl. 61: 102910 (2021) - 2020
- [j119]Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato:
Introduction to the special issue on deep learning for real-time information hiding and forensics. J. Real Time Image Process. 17(1): 1-5 (2020) - 2019
- [j107]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yi-Cheng Chen, Song-Yu Wu:
Data Hiding Using Sequential Hamming + k with m Overlapped Pixels. KSII Trans. Internet Inf. Syst. 13(12): 6159-6174 (2019) - [j106]Ching-Nung Yang, Yung-Shun Chou, Yan-Xiao Liu, Cheonshik Kim:
Exploiting error control in matrix coding-based data hiding over lossy channel. J. Real Time Image Process. 16(3): 577-588 (2019) - [j103]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Generalizing Hamming+k data hiding by overlapped pixels. Multim. Tools Appl. 78(13): 17995-18015 (2019) - [j102]Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou, Cheonshik Kim:
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme. Multim. Tools Appl. 78(13): 18595-18616 (2019) - 2018
- [j92]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Separable reversible data hiding in encrypted halftone image. Displays 55: 71-79 (2018) - [j91]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k. Digit. Signal Process. 78: 284-293 (2018) - [j88]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j85]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Process. 14(1): 101-114 (2018) - [j84]Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim, Ching-Nung Yang:
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J. Real Time Image Process. 14(1): 115-126 (2018) - [j83]Ching-Nung Yang, Cheonshik Kim, Yen-Hung Lo:
Adaptive real-time reversible data hiding for JPEG images. J. Real Time Image Process. 14(1): 147-157 (2018) - [j80]Cheonshik Kim, Bryan Kim, Joel J. P. C. Rodrigues, James C. N. Yang:
Special issue: Advanced technology for smart home automation and entertainment. Pers. Ubiquitous Comput. 22(1): 1-2 (2018) - [j79]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang:
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquitous Comput. 22(1): 11-22 (2018) - [j78]Yong-Joon Lee, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang:
Study of detection method for spoofed IP against DDoS attacks. Pers. Ubiquitous Comput. 22(1): 35-44 (2018) - 2017
- [j73]Ching-Nung Yang, Shen-Chieh Hsu, Cheonshik Kim:
Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 50: 209-215 (2017) - [j72]Ching-Nung Yang, Chihi-Han Wu, Zong-Xuan Yeh, Daoshun Wang, Cheonshik Kim:
A new sharing digital image scheme with clearer shadow images. Comput. Stand. Interfaces 51: 118-131 (2017) - 2016
- [j65]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
Secure protection of video recorder video in smart car. Int. J. Distributed Sens. Networks 12(12) (2016) - [j64]Ching-Nung Yang, Li-Zhe Sun, Xuehu Yan, Cheonshik Kim:
Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real Time Image Process. 12(2): 483-494 (2016) - [j62]Cheonshik Kim, Ching-Nung Yang:
Data hiding based on overlapped pixels using hamming code. Multim. Tools Appl. 75(23): 15651-15663 (2016) - 2015
- [j55]Cheonshik Kim, Ching-Nung Yang:
Watermark with DSA signature using predictive coding. Multim. Tools Appl. 74(14): 5189-5203 (2015) - [j51]Le Quang Hoa, Nguyen Huy Truong, Cheonshik Kim, Ching-Nung Yang:
(1, 7, 4) Data hiding scheme for searching in hidden text with automata. Vietnam. J. Comput. Sci. 2(4): 257-265 (2015) - 2014
- [j48]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang:
A secret sharing scheme for EBTC using steganography. J. Intell. Manuf. 25(2): 241-249 (2014) - [c30]Cheonshik Kim, Ching-Nung Yang:
Improving Data Hiding Capacity Based on Hamming Code. FCC 2014: 697-706 - [c25]Cheonshik Kim, Ching-Nung Yang:
Steganography Based on Grayscale Images Using (5, 3) Hamming Code. IWDW 2014: 588-598 - 2013
- [j43]Phan Trung Huy, Nguyen Hai Thanh, Cheonshik Kim, Ching-Nung Yang:
Data-Hiding for Halftone Images Using an Improved CPT scheme. KSII Trans. Internet Inf. Syst. 7(2): 405-424 (2013) - [j38]Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih, Cheonshik Kim:
Aspect ratio invariant visual cryptography by image filtering and resizing. Pers. Ubiquitous Comput. 17(5): 843-850 (2013) - [c24]Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh, Le Quang Hoa, Ching-Nung Yang:
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules. GPC 2013: 649-658 - 2012
- [j33]Ching-Nung Yang, Chih-Cheng Wu, Yi-Chin Lin, Cheonshik Kim:
Enhanced Matrix-Based Secret Image Sharing Scheme. IEEE Signal Process. Lett. 19(12): 789-792 (2012) - [c18]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC. ACIIDS (2) 2012: 129-139 - 2011
- [j30]Ching-Nung Yang, Guo-Cin Ye, Cheonshik Kim:
Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization. KSII Trans. Internet Inf. Syst. 5(2): 457-476 (2011)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint