default search action
Da-Chun Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j15]Da-Chun Wu, Zong-Nan Shih, Jheng-Han Wu:
Modified Multiway Pixel-Value Differencing Methods Based on General Quantization Ranges for Image Steganography. IEEE Access 10: 8824-8839 (2022) - [j14]Da-Chun Wu, Yu-Tsung Hsu:
Authentication of LINE Chat History Files by Information Hiding. ACM Trans. Multim. Comput. Commun. Appl. 18(1): 22:1-22:23 (2022) - 2021
- [j13]Da-Chun Wu, Babak Bahrami Asl, Ali Razban, Jie Chen:
Air compressor load forecasting using artificial neural network. Expert Syst. Appl. 168: 114209 (2021) - [j12]Da-Chun Wu, Ping-Yu Hsieh:
Copyright Protection of E-books by Data Hiding Based on Integer Factorization. KSII Trans. Internet Inf. Syst. 15(9): 3421-3443 (2021) - [j11]Shan-Chun Liu, Da-Chun Wu, Wen-Hsiang Tsai:
Rectangle-Based Neo-Plasticism-Like Image - A New Type of Art Image and its Application to Covert Communication. J. Inf. Sci. Eng. 37(2): 441-468 (2021) - 2020
- [j10]Da-Chun Wu, Hsiu-Yang Su:
Steganography via E-Books With the EPUB Format by Rearrangements of the Contents of the CSS Files. IEEE Access 8: 20459-20472 (2020) - [j9]Shi-Chei Hung, Da-Chun Wu, Wen-Hsiang Tsai:
Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection. IEICE Trans. Inf. Syst. 103-D(4): 850-865 (2020) - [j8]Yi-Hsin Liu, Da-Chun Wu:
A high-capacity performance-preserving blind technique for reversible information hiding via MIDI files using delta times. Multim. Tools Appl. 79(25-26): 17281-17302 (2020) - [j7]Da-Chun Wu, Yuan-Ming Wu:
Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments. IEEE Open J. Comput. Soc. 1: 12-34 (2020) - 2019
- [j6]Da-Chun Wu, Chin-Yu Hsiang, Ming-Yao Chen:
Steganography via MIDI Files by Adjusting Velocities of Musical Note Sequences With Monotonically Non-Increasing or Non-Decreasing Pitches. IEEE Access 7: 154056-154075 (2019) - 2016
- [j5]Da-Chun Wu, Ming-Yao Chen:
Information Hiding in Standard MIDI Files Based on Velocity Reference Values. Int. J. Netw. Secur. 18(2): 274-282 (2016) - 2015
- [j4]Da-Chun Wu, Ming-Yao Chen:
Reversible data hiding in Standard MIDI Files by adjusting delta time values. Multim. Tools Appl. 74(21): 9827-9844 (2015) - 2010
- [j3]Shyi-Chyi Cheng, Chen-Tsung Kuo, Da-Chun Wu:
A novel 3D mesh compression using mesh segmentation with multiple principal plane analysis. Pattern Recognit. 43(1): 267-279 (2010) - 2003
- [j2]Da-Chun Wu, Wen-Hsiang Tsai:
A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24(9-10): 1613-1626 (2003) - 1999
- [j1]Da-Chun Wu, Wen-Hsiang Tsai:
Embedding of any type of data in images based on a human visual model and multiple-based number conversion. Pattern Recognit. Lett. 20(14): 1511-1517 (1999)
Conference and Workshop Papers
- 2013
- [c5]Da-Chun Wu, Hsiu-Yang Su:
Information Hiding in EPUB Files by Rearranging the Contents of CSS Files. IIH-MSP 2013: 80-83 - 2009
- [c4]Chen-Tsung Kuo, Da-Chun Wu, Shyi-Chyi Cheng:
3D Triangular Mesh Watermarking for Copyright Protection Using Moment-Preserving. IIH-MSP 2009: 136-139 - 2008
- [c3]Da-Chun Wu, Jiun-Sheng Li:
A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in E-commerce Applications. IIH-MSP 2008: 1173-1176 - 2007
- [c2]Shyi-Chyi Cheng, Wei-Kan Huang, Yu-Jhih Liao, Da-Chun Wu:
A Parallel CBIR Implementation using Perceptual Grouping of Block-Based Visual Patterns. ICIP (5) 2007: 161-164 - 2004
- [c1]Pei-Ming Huang, Da-Chun Wu, Wen-Hsiang Tsai:
A novel block-based authentication technique for binary images by block pixel rearrangements. ICME 2004: 903-906
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint