default search action
Yuan-Yu Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Yung-Chen Chou, Alfrindo Lin, Wan-Pei Chen, Yuan-Yu Tsai:
Reversible Data Hiding in Encrypted Point Clouds Using Virtual Points and Multi-MSB Prediction. IVSP 2024: 95-103 - 2023
- [j22]Yuan-Yu Tsai, Hong-Lin Liu:
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models. IEEE Trans. Dependable Secur. Comput. 20(4): 3508-3519 (2023) - 2022
- [j21]Yuan-Yu Tsai, Hong-Lin Liu, Pei-Lin Kuo, Chi-Shiang Chan:
Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images. IEEE Access 10: 49347-49358 (2022) - [j20]Yuan-Yu Tsai, Hong-Lin Liu, Cheng-You Ying:
Applying homogeneity index modification to high-capacity high-dynamic-range image authentication with distortion tolerance. Multim. Tools Appl. 81(17): 24957-24976 (2022) - [c12]Zon-Yin Shae, Kun-Yi Chen, Chi-Yu Chang, Yuan-Yu Tsai, Che-Yi Chou, William Baskett, Chi-Ren Shyu, Jeffrey J. P. Tsai:
Thoughts on Non-IID Data Impact in Healthcare with Federated Learning Medical Blockchain. CogMI 2022: 20-26 - 2021
- [j19]Yuan-Yu Tsai:
Separable Reversible Data Hiding for Encrypted Three-Dimensional Models Based on Spatial Subdivision and Space Encoding. IEEE Trans. Multim. 23: 2286-2296 (2021) - [c11]Li-Wei Chang, Hong-Lin Liu, Cheng-You Ying, Wei-You Tsai, Yuan-Yu Tsai:
A Mirror-based Personal Health Monitoring System Integrating Wearable Devices and Non-contact Measurements. ICCE-TW 2021: 1-2 - [c10]Cheng-You Ying, Pin-Hua Huang, Yuan-Yu Tsai:
Robust 3D Authentication on Point Clouds with Random Sampling and Sequential Dependency. ICCE-TW 2021: 1-2
2010 – 2019
- 2019
- [j18]Cheng-Hung Chuang, Chih-Yang Lin, Yuan-Yu Tsai, Zhen-You Lian, Hong-Xia Xie, Chih-Chao Hsu, Chung-Lin Huang:
Efficient Triple Output Network for Vertebral Segmentation and Identification. IEEE Access 7: 117978-117985 (2019) - 2018
- [j17]Yuan-Yu Tsai, Yushiou Tsai, Chia-Chun Chang:
An Effective Authentication Algorithm for Polygonal Models with High Embedding Capacity. Symmetry 10(7): 290 (2018) - [j16]Yuan-Yu Tsai, Yushiou Tsai, I-Ting Chi, Chi-Shiang Chan:
A Vertex-Based 3D Authentication Algorithm Based on Spatial Subdivision. Symmetry 10(10): 422 (2018) - [c9]Pin-Hsien Liu, Zhen-You Lian, Chih-Yang Lin, Cheng-Hung Chuang, Chung-Lin Huang, Yuan-Yu Tsai:
Two Staged Machine Learning Network for Spine Segmentation and Recognition. ISM 2018: 194-197 - 2017
- [j15]Yuan-Yu Tsai, Tsung-Chieh Cheng, Yao-Hsien Huang:
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models. Secur. Commun. Networks 2017: 1096463:1-1096463:11 (2017) - 2016
- [j14]Yuan-Yu Tsai:
A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision. Adv. Multim. 2016: 4267419:1-4267419:10 (2016) - [j13]Yuan-Yu Tsai, Yao-Hsien Huang, Ruo-Jhu Lin, Chi-Shiang Chan:
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting. Int. J. Digit. Crime Forensics 8(2): 48-61 (2016) - [j12]Yuan-Yu Tsai:
An efficient 3D information hiding algorithm based on sampling concepts. Multim. Tools Appl. 75(13): 7891-7907 (2016) - 2015
- [j11]Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng:
An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation. Int. J. Netw. Secur. 17(1): 79-84 (2015) - [c8]Pei-Yu Lin, Yuan-Yu Tsai, Yin-Chi Kuo, Yi-Hui Chen, Chi-Shiang Chan:
Embedding information on search-order codes of VQ indices by rearranging the indicators. ICCE-TW 2015: 504-505 - 2014
- [j10]Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai:
An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix. Int. J. Netw. Secur. 16(4): 313-317 (2014) - [j9]Yuan-Yu Tsai, Jian-Ting Chen, Chi-Shiang Chan:
Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding. Int. J. Netw. Secur. 16(5): 363-368 (2014) - [j8]Chi-Shiang Chan, Yung-Chen Chou, Yi-Hui Chen, Yuan-Yu Tsai:
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations. KSII Trans. Internet Inf. Syst. 8(5): 1785-1800 (2014) - [j7]Yuan-Yu Tsai, Jian-Ting Chen, Yin-Chi Kuo, Chi-Shiang Chan:
A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality. KSII Trans. Internet Inf. Syst. 8(9): 3286-3301 (2014) - [j6]Yuan-Yu Tsai:
An adaptive steganographic algorithm for 3D polygonal models using vertex decimation. Multim. Tools Appl. 69(3): 859-876 (2014) - 2013
- [j5]Yuan-Yu Tsai, Du-Shiau Tsai, Chao-Liang Liu:
Reversible data hiding scheme based on neighboring pixel differences. Digit. Signal Process. 23(3): 919-927 (2013) - 2012
- [j4]Chi-Shiang Chan, Yuan-Yu Tsai, Chao-Liang Liu:
An Image Hiding Scheme by Linking Pixels in the Circular Way. KSII Trans. Internet Inf. Syst. 6(6): 1718-1734 (2012) - [c7]Chiao-Chih Huang, Yi-Hui Chen, Yuan-Yu Tsai, Chi-Shiang Chan:
An Image Hiding Method by Linking Multiple Pixels with XOR Operator. ICGEC 2012: 39-42 - 2011
- [c6]Yuan-Yu Tsai, Chi-Shiang Chan:
A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding. ICGEC 2011: 172-175
2000 – 2009
- 2007
- [j3]Chung-Ming Wang, Yuan-Yu Tsai:
Tunable Boundng Volumes for Elliptic Paraboloids. J. Inf. Sci. Eng. 23(3): 925-936 (2007) - [j2]Yuan-Yu Tsai, Chung-Ming Wang:
A novel data hiding scheme for color images using a BSP tree. J. Syst. Softw. 80(3): 429-437 (2007) - 2006
- [j1]Chung-Ming Wang, Chung-Hsien Chang, Nen-Chin Hwang, Yuan-Yu Tsai:
A Novel Algorithm for Sampling Uniformly in the Directional Space of a Cone. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(9): 2351-2355 (2006) - [c5]Chung-Hsien Chang, Chung-Ming Wang, Yuan-Yu Tsai, Yu-Ming Cheng:
A Novel Data Hiding Algorithm Using Normal Vectors of 3D Model. Computer Graphics International 2006: 231-241 - [c4]Yuan-Yu Tsai, Chung-Ming Wang, Yu-Ming Cheng, Chung-Hsien Chang, Peng-Cheng Wang:
Steganography on 3D Models Using a Spatial Subdivision Technique. Computer Graphics International 2006: 469-476 - [c3]Yu-Ming Cheng, Chung-Ming Wang, Yuan-Yu Tsai, Chung-Hsien Chang, Peng-Cheng Wang:
Steganography for Three-Dimensional Models. Computer Graphics International 2006: 510-517 - [c2]Yuan-Yu Tsai, Chung-Ming Wang, Chung-Hsien Chang, Yu-Ming Cheng:
Tunable Bounding Volumes for Monte Carlo Applications. ICCSA (1) 2006: 171-180 - [c1]Yu-Ming Cheng, Chung-Ming Wang, Yuan-Yu Tsai:
A Data Hiding Algorithm for Point-Sampled Geometry. ICCSA (1) 2006: 181-191
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint