default search action
Wei-Liang Tai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Ya-Fen Chang, Wei-Liang Tai, Che-Hui Lin:
A Feasible Solution for eHealth with an A nonymous Patient Monitoring System and a Privacy Ensured Telecare Medical Information System. J. Inf. Sci. Eng. 40(6): 1211-1226 (2024) - [j27]Chia-Chen Lin, Bohan Zhang, Wei-Liang Tai, Pei-Feng Shiu, Jinn-Ke Jan:
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact. Symmetry 16(1): 64 (2024) - 2022
- [j26]Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung:
Offline User Authentication Ensuring Non-Repudiation and Anonymity. Sensors 22(24): 9673 (2022) - [j25]Ya-Fen Chang, Wei-Liang Tai:
Separable Reversible Watermarking in Encrypted Images for Privacy Preservation. Symmetry 14(7): 1336 (2022) - 2021
- [j24]Ya-Fen Chang, Wei-Liang Tai, Po-Lin Hou, Kuan-Yu Lai:
A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments. Symmetry 13(7): 1121 (2021) - [c15]Ya-Fen Chang, Huan-Wen Chen, Ting-Yu Chang, Wei-Liang Tai:
Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks. SNPD 2021: 213-217 - 2020
- [j23]Wei-Liang Tai, Ya-Fen Chang, Wen-Hsin Huang:
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing. Int. J. Netw. Secur. 22(2): 212-217 (2020)
2010 – 2019
- 2019
- [j22]Wei-Liang Tai, Ya-Fen Chang, Po-Lin Hou:
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments. Int. J. Netw. Secur. 21(6): 1014-1020 (2019) - [j21]Pei-Feng Shiu, Wei-Liang Tai, Jinn-Ke Jan, Chin-Chen Chang, Chia-Chen Lin:
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images. Signal Process. Image Commun. 74: 64-77 (2019) - 2018
- [j20]Wei-Liang Tai, Zi-Jun Liao:
Image self-recovery with watermark self-embedding. Signal Process. Image Commun. 65: 11-25 (2018) - [j19]Wei-Liang Tai, Ya-Fen Chang:
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography. Symmetry 10(1): 23 (2018) - 2017
- [j18]Wei-Liang Tai, Ya-Fen Chang:
Comments on a Secure Authentication Scheme for IoT and Cloud Servers. Int. J. Netw. Secur. 19(4): 648-651 (2017) - [j17]Wei-Liang Tai, Ya-Fen Chang, Wei-Han Li:
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. J. Inf. Secur. Appl. 34: 133-141 (2017) - [j16]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multim. Tools Appl. 76(1): 463-488 (2017) - [j15]Ya-Fen Chang, Wei-Liang Tai, Min-How Hsu:
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity. Symmetry 9(12): 307 (2017) - 2016
- [j14]Wei-Liang Tai, Ya-Fen Chang, Ti-Sheng Kwang:
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems. J. Inf. Hiding Multim. Signal Process. 7(3): 653-658 (2016) - [j13]Wei-Liang Tai, Ya-Fen Chang, Yung-Chi Chen:
A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks. J. Inf. Hiding Multim. Signal Process. 7(5): 960-969 (2016) - 2015
- [j12]Chia-Chen Lin, Xiao-Long Liu, Wei-Liang Tai, Shyan-Ming Yuan:
A novel reversible data hiding scheme based on AMBTC compression technique. Multim. Tools Appl. 74(11): 3823-3842 (2015) - 2014
- [j11]Ya-Fen Chang, Wei-Liang Tai, Hung-Chin Chang:
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 27(11): 3430-3440 (2014) - [j10]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A High-Quality Image Authentication Scheme for AMBTC-compressed Images. KSII Trans. Internet Inf. Syst. 8(12): 4588-4603 (2014) - [c14]Ya-Fen Chang, Wei-Liang Tai, Wei-Na Wu, Wei-Han Li, Yung-Chi Chen:
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. IIH-MSP 2014: 94-97 - [c13]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
Novel Image Authentication Scheme for AMBTC-Compressed Images. IIH-MSP 2014: 134-137 - [c12]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images. IWDW 2014: 433-443 - 2013
- [j9]Ya-Fen Chang, Wei-Liang Tai, Chia-Chen Chen:
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices. Informatica 24(1): 1-12 (2013) - [c11]Wei-Liang Tai, Chi-Shiang Chan, Chien-An Chu:
Apply Run-length encoding on pixel differences to do image hiding. ICICS 2013: 1-5 - [c10]Ya-Fen Chang, Wei-Liang Tai, Shao-Cian Lin, Ti-Sheng Kwamg:
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN. SITIS 2013: 279-284 - 2012
- [j8]Ya-Fen Chang, Wei-Liang Tai, Chung-Yi Lin:
A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches. Inf. Technol. Control. 41(1): 60-68 (2012) - [j7]Ya-Fen Chang, Wei-Liang Tai:
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting. KSII Trans. Internet Inf. Syst. 6(12): 3100-3116 (2012) - [c9]Wei-Liang Tai, Ya-Fen Chang, Yuan-Fu Li, Shun-Meng Pan:
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating. AINA Workshops 2012: 160-164 - 2011
- [c8]Han C. W. Hsiao, Rouh-Mei Hu, Wei-Liang Tai, Rong-Ming Chen, Jeffrey J. P. Tsai:
Object Relational Programming of Biomedical Images. BIBE 2011: 52-57 - [c7]Wei-Liang Tai, Rouh-Mei Hu, Han C. W. Hsiao, Rong-Ming Chen, Jeffrey J. P. Tsai:
Blood Cell Image Classification Based on Hierarchical SVM. ISM 2011: 129-136
2000 – 2009
- 2009
- [j6]Wei-Liang Tai, Chia-Ming Yeh, Chin-Chen Chang:
Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol. 19(6): 906-910 (2009) - 2008
- [j5]Chin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai:
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit. 41(2): 654-661 (2008) - [j4]Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang:
Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognit. 41(12): 3582-3591 (2008) - [c6]Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen:
Lossless Data Hiding Based on Histogram Modification for Image Authentication. EUC (1) 2008: 506-511 - 2007
- [j3]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Informaticae 77(3): 217-228 (2007) - [j2]Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai:
Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007) - [c5]Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen:
Improvements of EMD Embedding for Large Payloads. IIH-MSP 2007: 473-476 - 2006
- [j1]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Technol. 16(10): 1301-1308 (2006) - [c4]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73 - [c3]Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai:
Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180 - 2005
- [c2]Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin:
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. AINA 2005: 947-952 - [c1]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
Secret Hiding Using Side Match Vector Quantization. WSTST 2005: 172-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint