default search action
Ying-Hsuan Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c9]Lee-Jang Yang, Fang-Ping Pai, Ying-Hsuan Huang, Ching-Ya Tseng:
High Capacity Data Hiding for AMBTC Decompressed Images Using Pixel Modification and Difference Expansion. IntelliSys (2) 2021: 388-403 - 2020
- [j19]Jung-Yao Yeh, Chih-Cheng Chen, Po-Liang Liu, Ying-Hsuan Huang:
High-Payload Data-Hiding Method for AMBTC Decompressed Images. Entropy 22(2): 145 (2020)
2010 – 2019
- 2018
- [j18]Chih-Cheng Chen, Ching-Yen Lee, Gwoboa Horng, Lee-Jang Yang, Ying-Hsuan Huang:
Prediction-Based Reversible Data Hiding Using Energy Deviation Strategy. J. Inf. Hiding Multim. Signal Process. 9(2): 293-302 (2018) - [j17]Yung-I Lin, Ying-Hsuan Huang, Chih-Cheng Chen:
An Effective Dual-Image Reversible Hiding for UAV's Image Communication. Symmetry 10(7): 271 (2018) - 2017
- [j16]Ying-Hsuan Huang, Ching-Chun Chang:
A Multiple Image Based Reversible Data Hiding Scheme with High Embedding Capacity. J. Inf. Hiding Multim. Signal Process. 8(4): 880-887 (2017) - [j15]Tzu-Chuen Lu, Chang-Mu Chen, Mei-Chen Lin, Ying-Hsuan Huang:
Multiple predictors hiding scheme using asymmetric histograms. Multim. Tools Appl. 76(3): 3361-3382 (2017) - [j14]Ying-Hsuan Huang, Ching-Chun Chang, Yi-Hui Chen:
Hybrid secret hiding schemes based on absolute moment block truncation coding. Multim. Tools Appl. 76(5): 6159-6174 (2017) - [j13]Chin-Chen Chang, Ying-Hsuan Huang, Tzu-Chuen Lu:
A difference expansion based reversible information hiding scheme with high stego image visual quality. Multim. Tools Appl. 76(10): 12659-12681 (2017) - 2016
- [j12]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang:
Very efficient variable-length codes for the lossless compression of VQ indices. Multim. Tools Appl. 75(6): 3537-3552 (2016) - 2015
- [j11]Ying-Hsuan Huang, Chin-Chen Chang, Meng-Chieh Lin, Gwoboa Horng:
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification. J. Inf. Hiding Multim. Signal Process. 6(4) (2015) - [j10]Zhi-Hui Wang, Ying-Hsuan Huang, Chin-Chen Chang, Hai-Rui Yang:
Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy. J. Inf. Hiding Multim. Signal Process. 6(4): 629-638 (2015) - [j9]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. J. Inf. Hiding Multim. Signal Process. 6(5): 956-967 (2015) - [j8]Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur. Commun. Networks 8(6): 899-906 (2015) - [c8]Chin-Chen Chang, Ying-Hsuan Huang, Wei-Chi Chang:
Reversible data hiding for VQ indices using XOR operator and SOC codes. ICMLC 2015: 340-345 - [c7]Tzu-Chuen Lu, Ying-Hsuan Huang:
Combined Prediction-Based Reversible Data Embedding Methods for High Image Quality. IIH-MSP 2015: 109-112 - 2014
- [j7]Zhi-Hui Wang, Hai-Rui Yang, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang:
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks. KSII Trans. Internet Inf. Syst. 8(8): 2913-2929 (2014) - [j6]Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:
(k, n)-Image Reversible Data Hiding. J. Inf. Hiding Multim. Signal Process. 5(2): 152-164 (2014) - [j5]Ying-Hsuan Huang, Chin-Chen Chang, Chun-Yu Wu:
A DNA-based data hiding technique with low modification rates. Multim. Tools Appl. 70(3): 1439-1451 (2014) - [j4]Tzu-Chuen Lu, Chin-Chen Chang, Ying-Hsuan Huang:
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multim. Tools Appl. 72(1): 417-435 (2014) - [c6]Tzu-Chuen Lu, Chun-Ya Tseng, Chang-Mu Chen, Hui-Shih Leng, Ying-Hsuan Huang:
An Efficient and Simplified Data Hiding Technique Based on 2's Complement. IIH-MSP 2014: 126-129 - 2013
- [j3]Chung-Chu Liu, Ying-Hsuan Huang:
Prioritizing Value Measures of Auction Websites Through Usersapos Perspectives. Int. J. Electron. Bus. Manag. 11(2) (2013) - [j2]Chuan Qin, Chin-Chen Chang, Ying-Hsuan Huang, Li-Ting Liao:
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7): 1109-1118 (2013) - [c5]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Yung-Ming Hsu:
A high payload data embedding scheme using dual stego-images with reversibility. ICICS 2013: 1-5 - 2011
- [j1]Chin-Feng Lee, Ying-Hsuan Huang, Chin-Chen Chang, Tien-Chung Liu:
A Prediction-Based Adaptive Reversible Data Embedding Scheme. J. Softw. 6(9): 1813-1820 (2011) - [c4]Chin-Chen Chang, Kuo-Nan Chen, Ying-Hsuan Huang:
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing. IIH-MSP 2011: 157-160
2000 – 2009
- 2009
- [c3]Tzu-Chuen Lu, Ying-Hsuan Huang:
An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods. IAS 2009: 599-602 - [c2]Tzu-Chuen Lu, Ying-Hsuan Huang:
An efficient block-based lossless information hiding technique. ICUIMC 2009: 342-347 - 2008
- [c1]Tzu-Chuen Lu, Ying-Hsuan Huang:
The Distortion Control Method of Reversible Contrast Mapping Hiding Scheme. IIH-MSP 2008: 1133-1136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint