default search action
Chi-Yao Weng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Chi-Yao Weng, Hao-Yu Weng, Cheng-Ta Huang:
Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment model. EURASIP J. Image Video Process. 2024(1): 37 (2024) - [j39]Cheng-Ta Huang, Chi-Yao Weng, Guo-Ting Zheng, Hao-Yu Weng:
Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity. Signal Image Video Process. 18(6-7): 5043-5059 (2024) - [c26]Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng Wang:
Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images. CNIOT 2024 - 2023
- [j38]Chi-Yao Weng, Cheng-Hsing Yang:
Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm. Entropy 25(2): 209 (2023) - [j37]Cheng-Ta Huang, Cheng-Yi Lin, Chi-Yao Weng:
Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping. Entropy 25(5): 744 (2023) - [j36]Cheng-Ta Huang, Njabulo Sinethemba Shongwe, Hao-Yu Weng, Chi-Yao Weng:
Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images. Multim. Tools Appl. 82(27): 42699-42716 (2023) - 2022
- [j35]Cheng-Hsing Yang, Chi-Yao Weng, Yu-Zhen Yang:
TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy. J. Inf. Secur. Appl. 70: 103352 (2022) - [j34]Chwei-Shyong Tsai, Yung-Sung Zhang, Chi-Yao Weng:
Separable reversible data hiding in encrypted images based on Paillier cryptosystem. Multim. Tools Appl. 81(13): 18807-18827 (2022) - [j33]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize:
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications. Sensors 22(23): 9534 (2022) - [j32]Cheng-Hsing Yang, Chi-Yao Weng, Jian-Yu Chen:
High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption. Soft Comput. 26(4): 1727-1742 (2022) - [j31]Chi-Yao Weng, Hao-Yu Weng, Cheng-Ta Huang:
High-fidelity reversible data hiding based on PVO and median preserving. J. Supercomput. 78(6): 8367-8388 (2022) - 2021
- [j30]Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng:
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services. IEEE Access 9: 145522-145537 (2021) - 2020
- [j29]Chi-Yao Weng:
DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images. Peer-to-Peer Netw. Appl. 13(2): 514-523 (2020) - [c25]Chi-Yao Weng, Cheng-Hsing Yang, Guang-Yih Hsu, Rong-Jaye Chen, Chun-Ta Li:
Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process. ICFET 2020: 108-112 - [c24]Cheng-Hsing Yang, Chi-Yao Weng, Yu-Zhen Yang, Jung-San Lee, Cheng-Ta Huang:
Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images. ICFET 2020: 125-129
2010 – 2019
- 2019
- [j28]Chin-Feng Lee, Chi-Yao Weng, Cheng-Yu Kao:
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput. 23(19): 9719-9731 (2019) - [c23]Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. ICCCS 2019: 327-331 - [c22]Szu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang:
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing. ICCCS 2019: 440-444 - [c21]Hung-Min Sun, Chi-En Shen, Chi-Yao Weng:
A Flexible Framework for Malicious Open XML Document Detection based on APT Attacks. INFOCOM Workshops 2019: 2005-2006 - 2018
- [j27]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. J. Inf. Sci. Eng. 34(1): 155-170 (2018) - [j26]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw. Appl. 11(1): 198-208 (2018) - [j25]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput. 22(8): 2495-2506 (2018) - [j24]Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. J. Supercomput. 74(3): 1001-1023 (2018) - [c20]Hsiang-Shian Fan, Cheng-Hsing Yang, Chi-Yao Weng:
Secure File Transfer Protocol for Named Data Networks Supporting Homomorphic Computations. ICS 2018: 567-579 - [c19]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee:
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System. IOV 2018: 278-288 - 2017
- [j23]Chin-Feng Lee, Chi-Yao Weng, Kuan-Ting Li:
VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy. J. Inf. Hiding Multim. Signal Process. 8(1): 54-67 (2017) - [j22]Chin-Feng Lee, Chi-Yao Weng, Kai-Chin Chen:
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multim. Tools Appl. 76(7): 9993-10016 (2017) - [j21]Cheng-Hsing Yang, Chi-Yao Weng, Yih-Kai Lin, Kuan-Liang Liu:
High-fidelity lossless data hiding based on predictors selection. Multim. Tools Appl. 76(22): 23699-23720 (2017) - [c18]Chi-Yao Weng, Yen-Chia Huang, Chin-Feng Lee, Dong-Peng Lin:
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing. ICGEC 2017: 109-117 - [c17]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - [c16]Chi-Yao Weng, Cheng-Ta Huang, Hung-Wei Kao:
DCT-Based Compressed Image with Reversibility Using Modified Quantization. IIH-MSP (1) 2017: 214-221 - 2016
- [j20]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System. J. Medical Syst. 40(5): 117:1-117:15 (2016) - [j19]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen:
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems. J. Medical Syst. 40(11): 233:1-233:10 (2016) - [j18]Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma:
Steganographic access control in data hiding using run-length encoding and modulo-operations. Secur. Commun. Networks 9(2): 139-148 (2016) - [c15]Chun-Ta Chen, Jyh-Shing Roger Jang, Wen-Shan Liu, Chi-Yao Weng:
An efficient method for polyphonic audio-to-score alignment using onset detection and constant Q transform. ICASSP 2016: 2802-2806 - 2015
- [j17]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j16]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee:
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System. J. Medical Syst. 39(8): 77 (2015) - [j15]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang:
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System. J. Medical Syst. 39(11): 144:1-144:11 (2015) - [j14]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. Secur. Commun. Networks 8(18): 3372-3382 (2015) - [c14]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang:
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS. ANT/SEIT 2015: 21-28 - [c13]Mu-En Wu, Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng:
An Adaptive Kelly Betting Strategy for Finite Repeated Games. ICGEC (2) 2015: 39-46 - [c12]Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang:
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions. ICT-EurAsia/CONFENIS 2015: 235-242 - [c11]Jeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen, Chwei-Shyong Tsai:
A KL Divergence Function for Randomized Secret Shares. IIH-MSP 2015: 231-234 - 2014
- [j13]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(9): 77 (2014) - [c10]Ci-Rong Li, Chie-Yang Kuan, Bing-Zhe He, Wu-En Wu, Chi-Yao Weng, Hung-Min Sun:
A Security System Based on Door Movement Detecting. ECC (1) 2014: 155-163 - 2013
- [j12]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j11]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee:
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. Sensors 13(8): 9589-9603 (2013) - [j10]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang, Cheng-Hsing Yang:
Data embedding in image-media using weight-function on modulo operations. ACM Trans. Embed. Comput. Syst. 12(2): 21:1-21:12 (2013) - [j9]Chi-Yao Weng, Yu Hong Zhang, Li Chun Lin, Shiuh-Jeng Wang:
Visible watermarking images in high quality of data hiding. J. Supercomput. 66(2): 1033-1048 (2013) - [c9]Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun:
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality. AsiaJCIS 2013: 102-107 - [c8]Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. CSS 2013: 338-348 - [c7]Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin:
Active One-Time Password Mechanism for User Authentication. GPC 2013: 464-471 - 2012
- [j8]Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan C. L. Liu, Dushyant Goyal:
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images. KSII Trans. Internet Inf. Syst. 6(4): 1248-1266 (2012) - [c6]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - 2011
- [j7]Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee, Cheng-Hsing Yang:
Anti-Forensics with Steganographic Data Embedding in Digital Images. IEEE J. Sel. Areas Commun. 29(7): 1392-1403 (2011) - [j6]Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4): 669-678 (2011) - 2010
- [j5]Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations. Fundam. Informaticae 98(2-3): 321-336 (2010) - [j4]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J. Syst. Softw. 83(10): 1635-1643 (2010) - [j3]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. J. Vis. Commun. Image Represent. 21(1): 49-55 (2010)
2000 – 2009
- 2009
- [j2]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Codebook-linked Watermarking Scheme for Digital Images. Fundam. Informaticae 92(4): 397-409 (2009) - [c5]Wen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang:
Robustness-set in watermarking embedding systems using codebook classifications. ICUIMC 2009: 207-215 - [c4]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. IIH-MSP 2009: 365-368 - 2008
- [j1]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans. Inf. Forensics Secur. 3(3): 488-497 (2008) - [c3]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
Histogram-based undetectable fidelity image in steganography as MSB controller. ICUIMC 2008: 566-569 - [c2]Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng:
Secret Sharing Systems with Authentication-Based Steganography. IIH-MSP 2008: 1146-1149 - 2007
- [c1]Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy. IIH-MSP 2007: 445-448
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint