default search action
Chi-Shiang Chan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j21]Yuan-Yu Tsai, Hong-Lin Liu, Pei-Lin Kuo, Chi-Shiang Chan:
Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images. IEEE Access 10: 49347-49358 (2022) - 2021
- [j20]Ching-Lin Wang, Chi-Shiang Chan, Wei-Jyun Wang, Yung-Kuan Chan, Meng-Hsiun Tsai, Chia-Yi Chuang, Wen-Yu Cheng, Shyr-Shen Yu:
Automatic Brain Cancer Segmentation on PET Image. Int. J. Pattern Recognit. Artif. Intell. 35(3): 2150008:1-2150008:22 (2021)
2010 – 2019
- 2018
- [j19]Yuan-Yu Tsai, Yushiou Tsai, I-Ting Chi, Chi-Shiang Chan:
A Vertex-Based 3D Authentication Algorithm Based on Spatial Subdivision. Symmetry 10(10): 422 (2018) - 2016
- [j18]Yuan-Yu Tsai, Yao-Hsien Huang, Ruo-Jhu Lin, Chi-Shiang Chan:
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting. Int. J. Digit. Crime Forensics 8(2): 48-61 (2016) - 2015
- [c18]Wen-Chuan Wu, Chi-Shiang Chan, Chih-Yang Lin, Zi-Wei Lin:
Joint SVD and QR codes for image authentication. APSIPA 2015: 1137-1140 - [c17]Pei-Yu Lin, Yuan-Yu Tsai, Yin-Chi Kuo, Yi-Hui Chen, Chi-Shiang Chan:
Embedding information on search-order codes of VQ indices by rearranging the indicators. ICCE-TW 2015: 504-505 - 2014
- [j17]Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai:
An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix. Int. J. Netw. Secur. 16(4): 313-317 (2014) - [j16]Yuan-Yu Tsai, Jian-Ting Chen, Chi-Shiang Chan:
Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding. Int. J. Netw. Secur. 16(5): 363-368 (2014) - [j15]Chi-Shiang Chan, Yung-Chen Chou, Yi-Hui Chen, Yuan-Yu Tsai:
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations. KSII Trans. Internet Inf. Syst. 8(5): 1785-1800 (2014) - [j14]Yuan-Yu Tsai, Jian-Ting Chen, Yin-Chi Kuo, Chi-Shiang Chan:
A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality. KSII Trans. Internet Inf. Syst. 8(9): 3286-3301 (2014) - [c16]Yi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, Wei-Lin Huang:
Tagged visual cryptography with access control. ICME Workshops 2014: 1-5 - [c15]Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. IIH-MSP 2014: 110-113 - 2013
- [c14]Wei-Liang Tai, Chi-Shiang Chan, Chien-An Chu:
Apply Run-length encoding on pixel differences to do image hiding. ICICS 2013: 1-5 - 2012
- [j13]Chi-Shiang Chan, Yuan-Yu Tsai, Chao-Liang Liu:
An Image Hiding Scheme by Linking Pixels in the Circular Way. KSII Trans. Internet Inf. Syst. 6(6): 1718-1734 (2012) - [j12]Chi-Shiang Chan, Chin-Chen Chang, Hung P. Vo:
A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor. J. Inf. Hiding Multim. Signal Process. 3(4): 340-351 (2012) - [c13]Chiao-Chih Huang, Yi-Hui Chen, Yuan-Yu Tsai, Chi-Shiang Chan:
An Image Hiding Method by Linking Multiple Pixels with XOR Operator. ICGEC 2012: 39-42 - 2011
- [j11]Chi-Shiang Chan:
An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14): 1679-1690 (2011) - [c12]Yuan-Yu Tsai, Chi-Shiang Chan:
A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding. ICGEC 2011: 172-175 - [c11]Pei-Yu Lin, Chi-Shiang Chan:
A Verifiable and Recoverable Secret Image Sharing Mechanism. ISPA 2011: 288-293 - 2010
- [j10]Pei-Yu Lin, Chi-Shiang Chan:
Invertible secret image sharing with steganography. Pattern Recognit. Lett. 31(13): 1887-1893 (2010) - [c10]Chi-Shiang Chan, Ching-Yun Chang:
Hiding secret in parity check bits by applying XOR Function. IEEE ICCI 2010: 835-839 - [c9]Chi-Shiang Chan, Ching-Yun Chang:
Hiding data in parity check bit. ICUIMC 2010: 52
2000 – 2009
- 2009
- [j9]Chi-Shiang Chan:
On Using LSB Matching Function for Data Hiding in Pixels. Fundam. Informaticae 96(1-2): 49-59 (2009) - [j8]Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang:
Non-iterative privacy preservation for online lotteries. IET Inf. Secur. 3(4): 139-147 (2009) - [c8]Chi-Shiang Chan, Ching-Yun Chang:
An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. ICUIMC 2009: 246-250 - [c7]Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, Mingchu Li:
Reversible Steganography for VQ Indices Using the Modified State Codebook. IIH-MSP 2009: 320-323 - 2007
- [j7]Chi-Shiang Chan, Chin-Chen Chang:
An efficient image authentication method based on Hamming code. Pattern Recognit. 40(2): 681-690 (2007) - [c6]Chi-Shiang Chan, Chin-Chen Chang:
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470 - 2006
- [j6]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan:
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognit. 39(6): 1155-1167 (2006) - [j5]Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng:
Removing blocking effects using an artificial neural network. Signal Process. 86(9): 2381-2387 (2006) - [c5]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan:
A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478 - 2005
- [j4]Chi-Shiang Chan, Chin-Chen Chang:
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. Fundam. Informaticae 65(4): 291-305 (2005) - [j3]Chin-Chen Chang, Chi-Shiang Chan:
An Inverse Halftoning Technique Using Modified Look-Up Tables. Fundam. Informaticae 68(3): 207-220 (2005) - [c4]Chi-Shiang Chan, Chin-Chen Chang:
A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. AINA 2005: 75-78 - 2003
- [j2]Chin-Chen Chang, Chi-Shiang Chan:
A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica 14(4): 431-444 (2003) - [j1]Chin-Chen Chang, Ju Yuan Hsiao, Chi-Shiang Chan:
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit. 36(7): 1583-1595 (2003) - [c3]Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao:
Lossless Image Compression Based on Two-Way Smaller Difference. AINA 2003: 821-824 - 2002
- [c2]Chin-Chen Chang, Chi-Shiang Chan, Ya-Ping Pan:
An Inverse Halftoning Technique using Genetic Algorithm. ISDB 2002: 184-189 - 2001
- [c1]Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao:
A Color Image Retrieval Method Based on Local Histogram. IEEE Pacific Rim Conference on Multimedia 2001: 831-836
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint