default search action
Ching-Nung Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j152]Jingwang Huang, Qi Cui, Zhili Zhou, Keping Yu, Ching-Nung Yang, Kim-Kwang Raymond Choo:
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment. IEEE Internet Things J. 11(2): 2382-2393 (2024) - [j151]Ching-Nung Yang, Peng Li, Hsiang-Han Cheng, Hsin-Chuan Kuo, Ming-Chan Lu, Lizhi Xiong:
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. IEEE Internet Things J. 11(6): 10325-10335 (2024) - [j150]Hao Chen, Lizhi Xiong, Ching-Nung Yang:
Progressive secret image sharing based on Boolean operations and polynomial interpolations. Multim. Syst. 30(4): 189 (2024) - [j149]Lizhi Xiong, Mengtao Zhang, Ching-Nung Yang, Cheonshik Kim:
An enhanced AMBTC for color image compression using color palette. Multim. Tools Appl. 83(11): 31783-31803 (2024) - [j148]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Yun-Qing Shi:
Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction. IEEE Trans. Cloud Comput. 12(1): 186-199 (2024) - [j147]Lizhi Xiong, Jianhua Xu, Ching-Nung Yang, Xinpeng Zhang:
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection. IEEE Trans. Multim. 26: 6090-6101 (2024) - [j146]Xianquan Zhang, Feiyi He, Chunqiang Yu, Xinpeng Zhang, Ching-Nung Yang, Zhenjun Tang:
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression. IEEE Trans. Multim. 26: 10174-10188 (2024) - [j145]Ching-Nung Yang, Xiaotian Wu, Min-Jung Chung:
Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 23:1-23:24 (2024) - [j144]Zhili Zhou, Yao Wan, Qi Cui, Keping Yu, Shahid Mumtaz, Ching-Nung Yang, Mohsen Guizani:
Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks. IEEE Trans. Wirel. Commun. 23(1): 423-435 (2024) - 2023
- [j143]Lizhi Xiong, Xiao Han, Xinwei Zhong, Ching-Nung Yang, Neal N. Xiong:
RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things. IEEE Internet Things J. 10(3): 1933-1945 (2023) - [j142]Ching-Nung Yang, Peng Li, Hsin-Chuan Kuo:
(k, n) secret image sharing scheme with privileged set. J. Inf. Secur. Appl. 73: 103413 (2023) - [j141]Xiaotian Wu, Ching-Nung Yang, Hong-Wu Cai, Yanxiao Liu:
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding. J. Inf. Secur. Appl. 75: 103520 (2023) - [j140]Cheonshik Kim, Ching-Nung Yang, Zhili Zhou, Ki-Hyun Jung:
Dual efficient reversible data hiding using Hamming code and OPAP. J. Inf. Secur. Appl. 76: 103544 (2023) - [j139]Ching-Nung Yang, Cheng-En Zheng, Ming-Chan Lu, Xiaotian Wu:
Secret image sharing by using multi-prime modular arithmetic. Signal Process. 205: 108882 (2023) - [j138]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Xinpeng Zhang:
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism. IEEE Trans. Cloud Comput. 11(3): 3085-3098 (2023) - [j137]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Zhihua Xia:
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing. ACM Trans. Multim. Comput. Commun. Appl. 19(1): 5:1-5:19 (2023) - [c39]Ching-Nung Yang, Hung-Yi Lin, Chang-Ji Wang:
Bidirectional Hash Chain Based Key Pre-distribution for Wireless Sensor Networks. CACRE 2023: 68-72 - [c38]Ching-Nung Yang, Hsin-Chuan Kuo, Hsiang-Han Cheng:
Ensuring FHIR Authentication and Data Integrity by Smart Contract and Blockchain Enabled NFT. ICMHI 2023: 123-128 - [i5]Wenjie Liu, Yong Xu, James C. N. Yang, Wen-Bin Yu, Lian-Hua Chi:
Privacy-Preserving Quantum Two-Party Geometric Intersection. CoRR abs/2309.12605 (2023) - [i4]Wenjie Liu, Yong Xu, Ching-Nung Yang, Peipei Gao, Wen-Bin Yu:
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States. CoRR abs/2309.12719 (2023) - [i3]Wenjie Liu, Yinsong Xu, Maojun Zhang, Junxiu Chen, Ching-Nung Yang:
A Novel Quantum Visual Secret Sharing Scheme. CoRR abs/2309.13659 (2023) - 2022
- [j136]Ching-Nung Yang, Xiaotian Wu, Min-Jung Chung, Xuliang Zhang:
AMBTC-based secret image sharing by simple modular arithmetic. J. Vis. Commun. Image Represent. 84: 103482 (2022) - [j135]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Yun-Qing Shi:
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography. IEEE Trans. Circuits Syst. Video Technol. 32(1): 75-91 (2022) - 2021
- [j134]Zhili Zhou, Meimin Wang, Ching-Nung Yang, Zhangjie Fu, Xingming Sun, Q. M. Jonathan Wu:
Blockchain-based decentralized reputation system in E-commerce environment. Future Gener. Comput. Syst. 124: 155-167 (2021) - [j133]Zhili Zhou, Wenyan Pan, Q. M. Jonathan Wu, Ching-Nung Yang, Zhihan Lv:
Geometric rectification-based neural network architecture for image manipulation detection. Int. J. Intell. Syst. 36(12): 6993-7016 (2021) - [j132]Ching-Nung Yang, Xiaotian Wu, Hsuan-Yu Lin, Cheonshik Kim:
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation. J. Inf. Secur. Appl. 61: 102910 (2021) - [j131]Ching-Nung Yang, Po-Yu Tsai, Yanxiao Liu:
A (k, n) secret document sharing with meaningful shares. J. Inf. Secur. Appl. 62: 102973 (2021) - [j130]Ching-Nung Yang, Chung-Lun Kao, Chang-Ji Wang:
Two-dimensional diagonal layer hash chain based key pre-distribution scheme. J. Inf. Secur. Appl. 63: 103038 (2021) - [j129]Xiaotian Wu, Ching-Nung Yang, Jian-Ming Li:
Secure image secret sharing over distributed cloud network. Signal Process. 178: 107768 (2021) - [j128]Lizhi Xiong, Xiao Han, Ching-Nung Yang:
CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Process. 185: 108064 (2021) - [j127]Ching-Nung Yang, Yi-Yun Yang:
On the Analysis and Design of Visual Cryptography With Error Correcting Capability. IEEE Trans. Circuits Syst. Video Technol. 31(6): 2465-2479 (2021) - [j126]Xuehu Yan, Yuliang Lu, Ching-Nung Yang, Xinpeng Zhang, Shudong Wang:
A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2896-2908 (2021) - [j125]Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang, Xiao Han:
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication. IEEE Trans. Inf. Forensics Secur. 16: 2912-2925 (2021) - [j124]Yanxiao Liu, Ching-Nung Yang, Qindong Sun:
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management. IEEE Trans. Intell. Transp. Syst. 22(7): 3952-3960 (2021) - 2020
- [j123]Wenjie Liu, Yinsong Xu, Junxiu Chen, Ching-Nung Yang:
A (t, n) threshold quantum visual secret sharing. Int. J. Sens. Networks 33(2): 74-84 (2020) - [j122]Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. J. Inf. Secur. Appl. 51: 102452 (2020) - [j121]Ching-Nung Yang, Yi-Chin Lin, Peng Li:
Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55: 102660 (2020) - [j120]Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Yi-Cheng Chen:
(k, n) scalable secret image sharing with multiple decoding options. J. Intell. Fuzzy Syst. 38(1): 219-228 (2020) - [j119]Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato:
Introduction to the special issue on deep learning for real-time information hiding and forensics. J. Real Time Image Process. 17(1): 1-5 (2020) - [j118]Xiaotian Wu, Ching-Nung Yang:
Probabilistic color visual cryptography schemes for black and white secret images. J. Vis. Commun. Image Represent. 70: 102793 (2020) - [j117]Xiaotian Wu, Ching-Nung Yang, Yen-Wei Liu:
High capacity partial reversible data hiding by hamming code. Multim. Tools Appl. 79(31-32): 23425-23444 (2020) - [j116]Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
Sharing and hiding a secret image in color palette images with authentication. Multim. Tools Appl. 79(35-36): 25657-25677 (2020) - [j115]Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang:
DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process. 173: 107571 (2020) - [j114]Xiaotian Wu, Ching-Nung Yang, Yen-Wei Liu:
A general framework for partial reversible data hiding using hamming code. Signal Process. 175: 107657 (2020)
2010 – 2019
- 2019
- [j113]Zhili Zhou, Jingcheng Chen, Ching-Nung Yang, Xingming Sun:
Video Copy Detection Using Spatio-Temporal CNN Features. IEEE Access 7: 100658-100665 (2019) - [j112]Wenjie Liu, Yinsong Xu, Maojun Zhang, Junxiu Chen, Ching-Nung Yang:
A Novel Quantum Visual Secret Sharing Scheme. IEEE Access 7: 114374-114384 (2019) - [j111]Zhili Zhou, Ching-Nung Yang, Song-Ruei Cai, Daoshun Wang:
Boolean Operation Based Visual Cryptography. IEEE Access 7: 165496-165508 (2019) - [j110]Zhili Zhou, Ching-Nung Yang, Yimin Yang, Xingming Sun:
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment. Complex. 2019: 2875676:1-2875676:8 (2019) - [j109]Xiaotian Wu, Ching-Nung Yang:
Partial reversible AMBTC-based secret image sharing with steganography. Digit. Signal Process. 93: 22-33 (2019) - [j108]Fang Huang, Zhili Zhou, Ching-Nung Yang, Xiya Liu, Tao Wang:
Original image tracing with image relational graph for near-duplicate image elimination. Int. J. Comput. Sci. Eng. 18(3): 294-304 (2019) - [j107]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yi-Cheng Chen, Song-Yu Wu:
Data Hiding Using Sequential Hamming + k with m Overlapped Pixels. KSII Trans. Internet Inf. Syst. 13(12): 6159-6174 (2019) - [j106]Ching-Nung Yang, Yung-Shun Chou, Yan-Xiao Liu, Cheonshik Kim:
Exploiting error control in matrix coding-based data hiding over lossy channel. J. Real Time Image Process. 16(3): 577-588 (2019) - [j105]Xiaotian Wu, Dong Chen, Ching-Nung Yang, Yi-Yun Yang:
A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image. J. Vis. Commun. Image Represent. 59: 550-562 (2019) - [j104]Xiaotian Wu, Ching-Nung Yang:
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. J. Vis. Commun. Image Represent. 61: 74-84 (2019) - [j103]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Generalizing Hamming+k data hiding by overlapped pixels. Multim. Tools Appl. 78(13): 17995-18015 (2019) - [j102]Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou, Cheonshik Kim:
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme. Multim. Tools Appl. 78(13): 18595-18616 (2019) - [j101]Yan-Xiao Liu, Ching-Nung Yang, Chi-Ming Wu, Qin-Dong Sun, Wei Bi:
Threshold changeable secret image sharing scheme based on interpolation polynomial. Multim. Tools Appl. 78(13): 18653-18667 (2019) - [j100]Zhaoqing Pan, Ching-Nung Yang, Victor S. Sheng, Naixue Xiong, Weizhi Meng:
Machine Learning for Wireless Multimedia Data Security. Secur. Commun. Networks 2019: 7682306:1-7682306:2 (2019) - [j99]Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Song-Yu Wu, Shin-Shang Lin, Yung-Shun Chou:
Enhanced embedding capacity for the SMSD-based data-hiding method. Signal Process. Image Commun. 78: 216-222 (2019) - [j98]Xiaotian Wu, Ching-Nung Yang:
Invertible secret image sharing with steganography and authentication for AMBTC compressed images. Signal Process. Image Commun. 78: 437-447 (2019) - [j97]Zhen Wu, Yi-Ning Liu, Dong Wang, Ching-Nung Yang:
An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial. Symmetry 11(1): 69 (2019) - [j96]Ching-Nung Yang, Chih-Cheng Wu, Yi-Chin Lin:
k Out of n Region-Based Progressive Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 29(1): 252-262 (2019) - [j95]Zhangjie Fu, Fengxiao Huang, Xingming Sun, Athanasios V. Vasilakos, Ching-Nung Yang:
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data. IEEE Trans. Serv. Comput. 12(5): 813-823 (2019) - 2018
- [j94]Yanxiao Liu, Ching-Nung Yang, Qin-Dong Sun:
Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding. IEEE Access 6: 5374-5378 (2018) - [j93]Zhili Zhou, Ching-Nung Yang, Yi Cao, Xingming Sun:
Secret Image Sharing Based on Encrypted Pixels. IEEE Access 6: 15021-15025 (2018) - [j92]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Separable reversible data hiding in encrypted halftone image. Displays 55: 71-79 (2018) - [j91]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k. Digit. Signal Process. 78: 284-293 (2018) - [j90]Yan-Xiao Liu, Qin-Dong Sun, Ching-Nung Yang:
(k, n) secret image sharing scheme capable of cheating detection. EURASIP J. Wirel. Commun. Netw. 2018: 72 (2018) - [j89]Yanxiao Liu, Ching-Nung Yang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453: 21-29 (2018) - [j88]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j87]Peng Li, Ching-Nung Yang, Qian Kong:
A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J. Real Time Image Process. 14(1): 41-50 (2018) - [j86]Xuehu Yan, Xin Liu, Ching-Nung Yang:
An enhanced threshold visual secret sharing based on random grids. J. Real Time Image Process. 14(1): 61-73 (2018) - [j85]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Process. 14(1): 101-114 (2018) - [j84]Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim, Ching-Nung Yang:
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J. Real Time Image Process. 14(1): 115-126 (2018) - [j83]Ching-Nung Yang, Cheonshik Kim, Yen-Hung Lo:
Adaptive real-time reversible data hiding for JPEG images. J. Real Time Image Process. 14(1): 147-157 (2018) - [j82]Ching-Nung Yang, Fu-Heng Wu, Sheng-Lung Peng:
Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph. J. Vis. Commun. Image Represent. 55: 660-676 (2018) - [j81]Yanxiao Liu, Ching-Nung Yang, Yung-Shun Chou, Song-Yu Wu, Qin-Dong Sun:
Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 55: 766-777 (2018) - [j80]Cheonshik Kim, Bryan Kim, Joel J. P. C. Rodrigues, James C. N. Yang:
Special issue: Advanced technology for smart home automation and entertainment. Pers. Ubiquitous Comput. 22(1): 1-2 (2018) - [j79]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang:
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquitous Comput. 22(1): 11-22 (2018) - [j78]Yong-Joon Lee, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang:
Study of detection method for spoofed IP against DDoS attacks. Pers. Ubiquitous Comput. 22(1): 35-44 (2018) - [j77]Wenjie Liu, Peipei Gao, Wenbin Yu, Zhiguo Qu, Ching-Nung Yang:
Quantum Relief algorithm. Quantum Inf. Process. 17(10): 280 (2018) - [j76]Peng Li, Zuquan Liu, Ching-Nung Yang:
A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process. Image Commun. 65: 210-220 (2018) - [j75]Xiaotian Wu, Ching-Nung Yang, Yi Ting Zhuang, Shen-Chieh Hsu:
Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process. Image Commun. 66: 42-49 (2018) - [j74]Yan-Xiao Liu, Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou:
Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process. Image Commun. 66: 77-86 (2018) - 2017
- [j73]Ching-Nung Yang, Shen-Chieh Hsu, Cheonshik Kim:
Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 50: 209-215 (2017) - [j72]Ching-Nung Yang, Chihi-Han Wu, Zong-Xuan Yeh, Daoshun Wang, Cheonshik Kim:
A new sharing digital image scheme with clearer shadow images. Comput. Stand. Interfaces 51: 118-131 (2017) - [j71]Ching-Nung Yang, Jung-Kuo Liao, Daoshun Wang:
New privilege-based visual cryptography with arbitrary privilege levels. J. Vis. Commun. Image Represent. 42: 121-131 (2017) - [j70]Ching-Nung Yang, Xiaotian Wu, Yung-Chien Chou, Zhangjie Fu:
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48: 182-194 (2017) - [j69]Yan-Xiao Liu, Ching-Nung Yang:
Scalable secret image sharing scheme with essential shadows. Signal Process. Image Commun. 58: 49-55 (2017) - [j68]Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. IEEE Trans. Inf. Forensics Secur. 12(1): 48-63 (2017) - [c37]Ching-Nung Yang, Jian-Ming Li, Yung-Shun Chou:
On the Analysis of k-Secure t-Conference Key Distribution Scheme. ICCNS 2017: 91-95 - 2016
- [j67]Peng Li, Ching-Nung Yang, Zhili Zhou:
Essential secret image sharing scheme with the same size of shadows. Digit. Signal Process. 50: 51-60 (2016) - [j66]Zhili Zhou, Ching-Nung Yang, Beijing Chen, Xingming Sun, Qi Liu, Q. M. Jonathan Wu:
Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation. IEICE Trans. Inf. Syst. 99-D(6): 1531-1540 (2016) - [j65]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
Secure protection of video recorder video in smart car. Int. J. Distributed Sens. Networks 12(12) (2016) - [j64]Ching-Nung Yang, Li-Zhe Sun, Xuehu Yan, Cheonshik Kim:
Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real Time Image Process. 12(2): 483-494 (2016) - [j63]Ching-Nung Yang, Cheng-Hua Chen, Song-Ruei Cai:
Enhanced Boolean-based multi secret image sharing scheme. J. Syst. Softw. 116: 22-34 (2016) - [j62]Cheonshik Kim, Ching-Nung Yang:
Data hiding based on overlapped pixels using hamming code. Multim. Tools Appl. 75(23): 15651-15663 (2016) - [j61]Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang:
Privacy-preserving outsourced gene data search in encryption domain. Secur. Commun. Networks 9(18): 5178-5186 (2016) - [j60]Ching-Nung Yang, Li-Zhe Sun, Song-Ruei Cai:
Extended color visual cryptography for black and white secret image. Theor. Comput. Sci. 609: 143-161 (2016) - [c36]Zhili Zhou, Yan Mu, Ningsheng Zhao, Q. M. Jonathan Wu, Ching-Nung Yang:
Coverless Information Hiding Method Based on Multi-keywords. ICCCS (1) 2016: 39-47 - [c35]Stelvio Cimato, Ernesto Damiani, Silvia Mella, Ching-Nung Yang:
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks. ICCCS (1) 2016: 456-467 - [c34]Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai:
3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. ICISSP 2016: 400-406 - [c33]Ching-Nung Yang, Zong-Xuan Yeh, Shen-Chieh Hsu, Zhangjie Fu:
Enhancing security for two-party comparison over encrypted data. ICSAI 2016: 439-443 - 2015
- [j59]Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu:
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing. J. Comput. Inf. Technol. 23(4): 341-355 (2015) - [j58]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digit. Signal Process. 38: 53-65 (2015) - [j57]Ching-Nung Yang, Che-Yu Lin:
Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels. Inf. Sci. 312: 131-151 (2015) - [j56]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Random grid-based visual secret sharing with multiple decryptions. J. Vis. Commun. Image Represent. 26: 94-104 (2015) - [j55]Cheonshik Kim, Ching-Nung Yang:
Watermark with DSA signature using predictive coding. Multim. Tools Appl. 74(14): 5189-5203 (2015) - [j54]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109: 317-333 (2015) - [j53]Ching-Nung Yang, Peng Li, Chih-Cheng Wu, Song-Ruei Cai:
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 31: 1-9 (2015) - [j52]Ching-Nung Yang, Zih-Yang Lin, Sheng-Lung Peng:
Reducing Code Length of Second-Order Spectral-Null Code. IEEE Trans. Computers 64(2): 492-503 (2015) - [j51]Le Quang Hoa, Nguyen Huy Truong, Cheonshik Kim, Ching-Nung Yang:
(1, 7, 4) Data hiding scheme for searching in hidden text with automata. Vietnam. J. Comput. Sci. 2(4): 257-265 (2015) - [c32]Ching-Nung Yang, Fu-Heng Wu, Sin-Yen Tsai, Wen-Chung Kuo:
E-Health Services for Elderly Care Based on Google Cloud Messaging. SmartCity 2015: 9-12 - [e1]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Ching-Nung Yang:
Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9023, Springer 2015, ISBN 978-3-319-19320-5 [contents] - 2014
- [j50]Ching-Nung Yang, Yao-Yu Yang:
New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271: 246-263 (2014) - [j49]Ching-Nung Yang, Chih-Cheng Wu, Daoshun Wang:
A discussion on the relationship between probabilistic visual cryptography and random grid. Inf. Sci. 278: 141-173 (2014) - [j48]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang:
A secret sharing scheme for EBTC using steganography. J. Intell. Manuf. 25(2): 241-249 (2014) - [j47]Yan-Xiao Liu, Ching-Nung Yang, Po-Han Yeh:
Reducing shadow size in smooth scalable secret image sharing. Secur. Commun. Networks 7(12): 2237-2244 (2014) - [j46]Ching-Nung Yang, Daoshun Wang:
Property Analysis of XOR-Based Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 24(2): 189-197 (2014) - [j45]Stelvio Cimato, James C. N. Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking. Trans. Data Hiding Multim. Secur. 9: 91-109 (2014) - [j44]Feng Liu, Teng Guo, Chuan Kun Wu, Ching-Nung Yang:
Flexible Visual Cryptography Scheme and Its Application. Trans. Data Hiding Multim. Secur. 9: 110-130 (2014) - [c31]Yu-Chih Huang, Wen-Chung Kuo, Ching-Nung Yang:
Data Hiding Based on Radix-2. AsiaJCIS 2014: 170-174 - [c30]Cheonshik Kim, Ching-Nung Yang:
Improving Data Hiding Capacity Based on Hamming Code. FCC 2014: 697-706 - [c29]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Essential Visual Cryptographic Scheme with Different Importance of Shares. ICONIP (3) 2014: 636-643 - [c28]Peng Li, Ching-Nung Yang, Qian Kong:
Two-in-One Image Secret Sharing Scheme Based on Boolean Operations. IWDW 2014: 305-318 - [c27]Xuehu Yan, Guohui Chen, Ching-Nung Yang, Song-Ruei Cai:
Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations. IWDW 2014: 319-332 - [c26]Daoshun Wang, Feng Yi, Ching-Nung Yang:
Visual Cryptography Scheme with Autostereogram. IWDW 2014: 364-375 - [c25]Cheonshik Kim, Ching-Nung Yang:
Steganography Based on Grayscale Images Using (5, 3) Hamming Code. IWDW 2014: 588-598 - 2013
- [j43]Phan Trung Huy, Nguyen Hai Thanh, Cheonshik Kim, Ching-Nung Yang:
Data-Hiding for Halftone Images Using an Improved CPT scheme. KSII Trans. Internet Inf. Syst. 7(2): 405-424 (2013) - [j42]Hsiao-Ching Lin, Ching-Nung Yang, Chi-Sung Laih, Hui-Tang Lin:
Natural language letter based visual cryptography scheme. J. Vis. Commun. Image Represent. 24(3): 318-331 (2013) - [j41]Peng Li, Ching-Nung Yang, Chih-Cheng Wu, Qian Kong, Yanpeng Ma:
Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 24(7): 1106-1114 (2013) - [j40]Peng Li, Ching-Nung Yang, Qian Kong, Yanpeng Ma, Zheng Liu:
Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24(8): 1380-1393 (2013) - [j39]Ching-Nung Yang, Chih-Cheng Wu:
MSRC: (M)icropayment (S)cheme with ability to (R)eturn (C)hanges. Math. Comput. Model. 58(1-2): 96-107 (2013) - [j38]Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih, Cheonshik Kim:
Aspect ratio invariant visual cryptography by image filtering and resizing. Pers. Ubiquitous Comput. 17(5): 843-850 (2013) - [j37]Daoshun Wang, Tao Song, Lin Dong, Ching-Nung Yang:
Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing. IEEE Trans. Inf. Forensics Secur. 8(12): 2059-2072 (2013) - [c24]Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh, Le Quang Hoa, Ching-Nung Yang:
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules. GPC 2013: 649-658 - [c23]Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. ICICS 2013: 404-412 - [c22]Xing-Fu Xu, Daoshun Wang, Shundong Li, Ching-Nung Yang:
An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes. IIH-MSP 2013: 369-372 - [c21]Ching-Nung Yang, Chih-Cheng Wu, Chih-Wei Chou:
A Comment on "Sharing Secret Images Using Blakley's Concept". IIH-MSP 2013: 383-386 - [c20]Ching-Nung Yang, Jia-Bin Lai:
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing. ISBAST 2013: 259-266 - [c19]Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu:
Cheating Immune Block-Based Progressive Visual Cryptography. IWDW 2013: 95-108 - [i2]Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. IACR Cryptol. ePrint Arch. 2013: 524 (2013) - 2012
- [j36]Ching-Nung Yang, Li-Jen Hu, Jia-Bin Lai:
Query Tree Algorithm for RFID Tag with Binary-Coded Decimal EPC. IEEE Commun. Lett. 16(10): 1616-1619 (2012) - [j35]Yan-Xiao Liu, Lein Harn, Ching-Nung Yang, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6): 1325-1332 (2012) - [j34]Peng Li, Peijun Ma, Xiaohong Su, Ching-Nung Yang:
Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3): 441-453 (2012) - [j33]Ching-Nung Yang, Chih-Cheng Wu, Yi-Chin Lin, Cheonshik Kim:
Enhanced Matrix-Based Secret Image Sharing Scheme. IEEE Signal Process. Lett. 19(12): 789-792 (2012) - [j32]Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, Lein Harn:
$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5): 799-810 (2012) - [c18]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC. ACIIDS (2) 2012: 129-139 - [c17]Stelvio Cimato, Ching-Nung Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking: Definition and Meaning. IWDW 2012: 435-448 - [c16]Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu:
Region-in-Region Incrementing Visual Cryptography Scheme. IWDW 2012: 449-463 - [i1]Daoshun Wang, Tao Song, Lin Dong, Ching-Nung Yang:
Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing. CoRR abs/1210.6123 (2012) - 2011
- [j31]Ching-Nung Yang, Jyun-Yan He:
An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision. IEEE Commun. Lett. 15(5): 539-541 (2011) - [j30]Ching-Nung Yang, Guo-Cin Ye, Cheonshik Kim:
Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization. KSII Trans. Internet Inf. Syst. 5(2): 457-476 (2011) - [j29]Ching-Nung Yang, Yu-Ying Chu:
A general (k, n) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84(10): 1726-1733 (2011) - [j28]Ching-Nung Yang, Chih-Yang Chiu, Gen-Cheng Wu:
Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks. IEEE Trans. Computers 60(10): 1503-1510 (2011) - [c15]Feng Liu, Teng Guo, Chuan Kun Wu, Ching-Nung Yang:
Flexible Visual Cryptography Scheme without Distortion. IWDW 2011: 211-227 - 2010
- [j27]Ching-Nung Yang, Chuei-Bang Ciou:
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image Vis. Comput. 28(12): 1600-1610 (2010)
2000 – 2009
- 2009
- [j26]Ching-Nung Yang, Bing-Ling Lu:
Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes. J. Inf. Sci. Eng. 25(1): 1-10 (2009) - [j25]Ching-Nung Yang, Chuei-Bang Ciou:
A comment on "Sharing secrets in stegoimages with authentication". Pattern Recognit. 42(7): 1615-1619 (2009) - [j24]Ching-Nung Yang, An-Guo Peng, Tse-Shih Chen:
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Process. 89(8): 1602-1624 (2009) - [c14]Ching-Nung Yang, Chih-Cheng Wu, Chih-Yang Chiu, Shin-Yan Chiou, Wen-Chiuan Liao:
Micropayment schemes with ability to return changes. iiWAS 2009: 356-363 - [c13]Ching-Nung Yang, Jie-Ru Chen, Chih-Yang Chiu, Gen-Chin Wu, Chih-Cheng Wu:
Enhancing Privacy and Security in RFID-Enabled Banknotes. ISPA 2009: 439-444 - 2008
- [j23]Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen:
Visual Cryptography Schemes with Reversing. Comput. J. 51(6): 710-722 (2008) - [j22]Ching-Nung Yang, Tse-Shih Chen:
Security Analysis of Authentication of Images Using Recursive Visual Cryptography. Cryptologia 32(2): 131-136 (2008) - [j21]Ching-Nung Yang, Tse-Shih Chen:
Colored visual cryptography scheme based on additive color mixing. Pattern Recognit. 41(10): 3114-3129 (2008) - [j20]Ching-Nung Yang:
Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit Shift. IEEE Trans. Computers 57(7): 876-888 (2008) - [c12]Ching-Nung Yang, Yao-Yu Yang, Tse-Shih Chen, Guo-Cin Ye:
New Steganography Scheme in Halftone Images. IIH-MSP 2008: 1520-1523 - [r2]Rastislav Lukac, Konstantinos N. Plataniotis, Ching-Nung Yang:
Image Secret Sharing. Encyclopedia of Multimedia 2008: 338-343 - 2007
- [j19]Ching-Nung Yang, Tse-Shih Chen:
Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality. Int. J. Pattern Recognit. Artif. Intell. 21(5): 879-898 (2007) - [j18]Ching-Nung Yang, Kun-Hsuan Yu, Rastislav Lukac:
User-friendly image sharing using polynomials with different primes. Int. J. Imaging Syst. Technol. 17(1): 40-47 (2007) - [j17]Ching-Nung Yang, Tse-Shih Chen, Kun-Hsuan Yu, Chung-Chun Wang:
Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7): 1070-1076 (2007) - [c11]Ching-Nung Yang, Tse-Shih Chen:
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. ICME 2007: 1535-1538 - [c10]Ching-Nung Yang, Kun-Hsuan Yu, Rastislav Lukac:
User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes. MMM (2) 2007: 443-452 - 2006
- [j16]Ching-Nung Yang, Tse-Shih Chen, Ming-Hung Ching:
Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2): 189-199 (2006) - [j15]Ching-Nung Yang, Tse-Shih Chen:
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(2): 620-625 (2006) - [j14]Ching-Nung Yang, Tse-Shih Chen:
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognit. 39(7): 1300-1314 (2006) - [j13]Ching-Nung Yang, Dong-Jing Lee:
Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables. IEEE Trans. Computers 55(7): 924-927 (2006) - [c9]Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen:
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. ACNS 2006: 433-447 - [c8]Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih:
Authorized Tracking and Tracing for RFID Tags. EUC Workshops 2006: 435-444 - [c7]Ching-Nung Yang, Tse-Shih Chen:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. ICIAR (1) 2006: 468-479 - [c6]Ching-Nung Yang, Bing-Ling Lu:
Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems. Infoscale 2006: 54 - [r1]Rastislav Lukac, Konstantinos N. Plataniotis, Ching-Nung Yang:
Image Secret Sharing. Encyclopedia of Multimedia 2006 - 2005
- [j12]Ching-Nung Yang, Tse-Shih Chen:
Size-Adjustable Visual Secret Sharing Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(9): 2471-2474 (2005) - [j11]Ching-Nung Yang, Tse-Shih Chen:
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognit. Lett. 26(2): 193-206 (2005) - [j10]Ching-Nung Yang, Guo-Jau Chen:
A comment on "Systematic single asymmetric error-correcting Codes". IEEE Trans. Inf. Theory 51(3): 1214-1217 (2005) - [j9]Ching-Nung Yang:
Design of efficient second-order spectral- codes. IEEE Trans. Inf. Theory 51(4): 1580-1584 (2005) - [c5]Ching-Nung Yang, Tse-Shih Chen:
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. ICCSA (1) 2005: 19-28 - [c4]Ching-Nung Yang, Tse-Shih Chen:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation. ICIAR 2005: 1167-1174 - [c3]Ching-Nung Yang, Tse-Shih Chen:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels. ICIAR 2005: 1184-1191 - 2004
- [j8]Ching-Nung Yang:
New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4): 481-494 (2004) - [c2]Ching-Nung Yang, Tse-Shih Chen:
An algorithm to enumerate codewords for third-order spectral-null codes. ISIT 2004: 88 - 2003
- [j7]Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang:
New Audio Secret Sharing Schemes With Time Division Technique. J. Inf. Sci. Eng. 19(4): 605-614 (2003) - [c1]Ching-Nung Yang, Hsu-Tun Teng:
An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment. CEC 2003: 45-48 - 2002
- [j6]Ching-Nung Yang:
A Note on Efficient Color Visual Encryption. J. Inf. Sci. Eng. 18(3): 367-372 (2002) - [j5]Ching-Nung Yang:
Improvements on Audio and Optical Cryptography. J. Inf. Sci. Eng. 18(3): 381-391 (2002) - 2000
- [j4]Ching-Nung Yang, Chi-Sung Laih:
New Colored Visual Secret Sharing Schemes. Des. Codes Cryptogr. 20(3): 325-336 (2000)
1990 – 1999
- 1998
- [j3]Ching-Nung Yang, Chi-Sung Laih:
DCm Codes for Constructing t-EC/AUED Codes. IEEE Trans. Computers 47(4): 492 (1998) - 1997
- [j2]Ching-Nung Yang, Chi-Sung Laih:
A Note on Error-Correcting Codes for Authentication and Subliminal Channels. Inf. Process. Lett. 62(3): 141-143 (1997) - 1996
- [j1]Chi-Sung Laih, Ching-Nung Yang:
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. IEEE Trans. Computers 45(1): 103-108 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint