197 results on '"Chang, Chin-Chen"'
Search Results
2. Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules
3. High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images
4. Adaptive Reversible Data Hiding With Contrast Enhancement Based on Multi-Histogram Modification.
5. Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF (p) and GF (2⁸).
6. Toward Human-like Billiard AI Bot Based on Backward Induction and Machine Learning
7. A Lightweight Attribute-Based Access Control Scheme for Intelligent Transportation System With Full Privacy Protection.
8. ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks.
9. On Reliability of Multiprocessor System Based on Star Graph.
10. The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
11. Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption
12. An improved style transfer approach for videos
13. An in-car camera system for traffic sign detection and recognition
14. Model-based 3D pose estimation for pick-and-place application
15. A reversible data hiding scheme for image interpolation based on reference matrix
16. An offline user-verifiable electronic traveler's check system
17. Reversible data hiding in encrypted images using reformed JPEG compression
18. Memory Leakage-Resilient Dynamic and Verifiable Multi-Keyword Ranked Search on Encrypted Smart Body Sensor Network Data.
19. A novel reversible ternary embedding algorithm based on modified full context prediction errors
20. A Survey of Reversible Data Hiding Schemes Based on Pixel Value Ordering
21. Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
22. A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets
23. Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction
24. Reversible data hiding for VQ indices using XOR operator and SOC codes
25. Secure Electronic Coupons
26. Cybersecurity for Cyber-Enabled Multimedia Applications.
27. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
28. Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
29. Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.
30. A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard
31. Applying Histogram Modification to Embed Secret Message in AMBTC
32. Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique
33. A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction
34. A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation
35. Texture Synthesis Approach Using Cooperative Features
36. A Data-Driven Path Synthesis Framework for Racing Games
37. A Fair Hash Chain-based On-line Application Services Granting Scheme for Computing Environment
38. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks.
39. Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability
40. Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction
41. An Efficient and Flexible Mobile Payment Protocol
42. Development of Energy Harvested Wireless Sensing Node for Structural Health Monitoring
43. General Threshold Signature Based on the Chinese Remainder Theorem
44. Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing
45. A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
46. An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices
47. A New Reversible Secret Image Sharing Scheme Based on Multi-Level Encoding
48. An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme
49. A Large Payload EMD Embedding Scheme with High Stego-image Quality
50. The Dual Verifying VSS Scheme Based on Digital Signature and Halftone Logo
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.