Search

Your search keyword '"Pei-Yu Lin"' showing total 39 results

Search Constraints

Start Over You searched for: Author "Pei-Yu Lin" Remove constraint Author: "Pei-Yu Lin" Topic computer science Remove constraint Topic: computer science
39 results on '"Pei-Yu Lin"'

Search Results

1. Improved Beam Search for Optimizing No-Wait Flowshops With Release Times

4. A Smart Roadside Parking System Using Bluetooth Low Energy Beacons

5. A mobile payment mechanism with anonymity for cloud computing

6. Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code

7. Comments on a dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

8. A remote pet feeder control system via MQTT protocol

9. Prevention of cheating in visual cryptography by using coherent patterns

10. Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching

11. Video exhibition with adjustable augmented reality system based on temporal psycho-visual modulation

12. Media pattern exhibition mechanism via mobile devices

13. Imperceptible visible watermarking based on postcamera histogram operation

14. Optimization of Cable Force of Extradosed Bridges

15. Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism

16. QR code steganography mechanism with high capacity

17. Augmented reality via temporal psycho-visual modulation

18. QR code steganography with secret payload enhancement

19. Protecting the content integrity of digital imagery with fidelity preservation

20. Dual Digital Watermarking for Internet Media Based on Hybrid Strategies

21. Preserving robustness and removability for digital watermarks using subsampling and difference correlation

22. Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs

23. Adaptive watermark mechanism for rightful ownership protection

24. A Color Image Authentication Method Using Partitioned Palette and Morphological Operations

25. Diverse augmented reality exhibitions for differential users based upon private quick response code

26. Embedding information on search-order codes of VQ indices by rearranging the indicators

27. Active tamper detection of digital images using VQ compression

28. An Efficient Graph-Based Method for Parallel Mining Problems

29. An ID-Based User Authentication Scheme for Cloud Computing

30. Secret Hiding Mechanism Using QR Barcode

31. Secret sharing mechanism with cheater detection

32. Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation

33. A Verifiable and Recoverable Secret Image Sharing Mechanism

34. Verifiable and Lossless Distributed Media Content Sharing

35. Secret Image Sharing with Reversible Steganography

36. A Self-Reference Watermarking Scheme Based on Wet Paper Coding

37. Sharing a Secret Two-Tone Image in Two Gray-Level Images

38. Secret Sharing Application for Two-dimensional QR Barcode

39. High payload secret hiding technology for QR codes

Catalog

Books, media, physical & digital resources