default search action
Ching-Nung Yang
James C. N. Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j152]Jingwang Huang, Qi Cui, Zhili Zhou, Keping Yu, Ching-Nung Yang, Kim-Kwang Raymond Choo:
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment. IEEE Internet Things J. 11(2): 2382-2393 (2024) - [j151]Ching-Nung Yang, Peng Li, Hsiang-Han Cheng, Hsin-Chuan Kuo, Ming-Chan Lu, Lizhi Xiong:
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. IEEE Internet Things J. 11(6): 10325-10335 (2024) - [j150]Hao Chen, Lizhi Xiong, Ching-Nung Yang:
Progressive secret image sharing based on Boolean operations and polynomial interpolations. Multim. Syst. 30(4): 189 (2024) - [j149]Lizhi Xiong, Mengtao Zhang, Ching-Nung Yang, Cheonshik Kim:
An enhanced AMBTC for color image compression using color palette. Multim. Tools Appl. 83(11): 31783-31803 (2024) - [j148]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Yun-Qing Shi:
Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction. IEEE Trans. Cloud Comput. 12(1): 186-199 (2024) - [j147]Lizhi Xiong, Jianhua Xu, Ching-Nung Yang, Xinpeng Zhang:
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection. IEEE Trans. Multim. 26: 6090-6101 (2024) - [j146]Xianquan Zhang, Feiyi He, Chunqiang Yu, Xinpeng Zhang, Ching-Nung Yang, Zhenjun Tang:
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression. IEEE Trans. Multim. 26: 10174-10188 (2024) - [j145]Ching-Nung Yang, Xiaotian Wu, Min-Jung Chung:
Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 23:1-23:24 (2024) - [j144]Zhili Zhou, Yao Wan, Qi Cui, Keping Yu, Shahid Mumtaz, Ching-Nung Yang, Mohsen Guizani:
Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks. IEEE Trans. Wirel. Commun. 23(1): 423-435 (2024) - 2023
- [j143]Lizhi Xiong, Xiao Han, Xinwei Zhong, Ching-Nung Yang, Neal N. Xiong:
RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things. IEEE Internet Things J. 10(3): 1933-1945 (2023) - [j142]Ching-Nung Yang, Peng Li, Hsin-Chuan Kuo:
(k, n) secret image sharing scheme with privileged set. J. Inf. Secur. Appl. 73: 103413 (2023) - [j141]Xiaotian Wu, Ching-Nung Yang, Hong-Wu Cai, Yanxiao Liu:
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding. J. Inf. Secur. Appl. 75: 103520 (2023) - [j140]Cheonshik Kim, Ching-Nung Yang, Zhili Zhou, Ki-Hyun Jung:
Dual efficient reversible data hiding using Hamming code and OPAP. J. Inf. Secur. Appl. 76: 103544 (2023) - [j139]Ching-Nung Yang, Cheng-En Zheng, Ming-Chan Lu, Xiaotian Wu:
Secret image sharing by using multi-prime modular arithmetic. Signal Process. 205: 108882 (2023) - [j138]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Xinpeng Zhang:
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism. IEEE Trans. Cloud Comput. 11(3): 3085-3098 (2023) - [j137]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Zhihua Xia:
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing. ACM Trans. Multim. Comput. Commun. Appl. 19(1): 5:1-5:19 (2023) - [c39]Ching-Nung Yang, Hung-Yi Lin, Chang-Ji Wang:
Bidirectional Hash Chain Based Key Pre-distribution for Wireless Sensor Networks. CACRE 2023: 68-72 - [c38]Ching-Nung Yang, Hsin-Chuan Kuo, Hsiang-Han Cheng:
Ensuring FHIR Authentication and Data Integrity by Smart Contract and Blockchain Enabled NFT. ICMHI 2023: 123-128 - [i5]Wenjie Liu, Yong Xu, James C. N. Yang, Wen-Bin Yu, Lian-Hua Chi:
Privacy-Preserving Quantum Two-Party Geometric Intersection. CoRR abs/2309.12605 (2023) - [i4]Wenjie Liu, Yong Xu, Ching-Nung Yang, Peipei Gao, Wen-Bin Yu:
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States. CoRR abs/2309.12719 (2023) - [i3]Wenjie Liu, Yinsong Xu, Maojun Zhang, Junxiu Chen, Ching-Nung Yang:
A Novel Quantum Visual Secret Sharing Scheme. CoRR abs/2309.13659 (2023) - 2022
- [j136]Ching-Nung Yang, Xiaotian Wu, Min-Jung Chung, Xuliang Zhang:
AMBTC-based secret image sharing by simple modular arithmetic. J. Vis. Commun. Image Represent. 84: 103482 (2022) - [j135]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Yun-Qing Shi:
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography. IEEE Trans. Circuits Syst. Video Technol. 32(1): 75-91 (2022) - 2021
- [j134]Zhili Zhou, Meimin Wang, Ching-Nung Yang, Zhangjie Fu, Xingming Sun, Q. M. Jonathan Wu:
Blockchain-based decentralized reputation system in E-commerce environment. Future Gener. Comput. Syst. 124: 155-167 (2021) - [j133]Zhili Zhou, Wenyan Pan, Q. M. Jonathan Wu, Ching-Nung Yang, Zhihan Lv:
Geometric rectification-based neural network architecture for image manipulation detection. Int. J. Intell. Syst. 36(12): 6993-7016 (2021) - [j132]Ching-Nung Yang, Xiaotian Wu, Hsuan-Yu Lin, Cheonshik Kim:
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation. J. Inf. Secur. Appl. 61: 102910 (2021) - [j131]Ching-Nung Yang, Po-Yu Tsai, Yanxiao Liu:
A (k, n) secret document sharing with meaningful shares. J. Inf. Secur. Appl. 62: 102973 (2021) - [j130]Ching-Nung Yang, Chung-Lun Kao, Chang-Ji Wang:
Two-dimensional diagonal layer hash chain based key pre-distribution scheme. J. Inf. Secur. Appl. 63: 103038 (2021) - [j129]Xiaotian Wu, Ching-Nung Yang, Jian-Ming Li:
Secure image secret sharing over distributed cloud network. Signal Process. 178: 107768 (2021) - [j128]Lizhi Xiong, Xiao Han, Ching-Nung Yang:
CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Process. 185: 108064 (2021) - [j127]Ching-Nung Yang, Yi-Yun Yang:
On the Analysis and Design of Visual Cryptography With Error Correcting Capability. IEEE Trans. Circuits Syst. Video Technol. 31(6): 2465-2479 (2021) - [j126]Xuehu Yan, Yuliang Lu, Ching-Nung Yang, Xinpeng Zhang, Shudong Wang:
A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2896-2908 (2021) - [j125]Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang, Xiao Han:
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication. IEEE Trans. Inf. Forensics Secur. 16: 2912-2925 (2021) - [j124]Yanxiao Liu, Ching-Nung Yang, Qindong Sun:
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management. IEEE Trans. Intell. Transp. Syst. 22(7): 3952-3960 (2021) - 2020
- [j123]Wenjie Liu, Yinsong Xu, Junxiu Chen, Ching-Nung Yang:
A (t, n) threshold quantum visual secret sharing. Int. J. Sens. Networks 33(2): 74-84 (2020) - [j122]Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. J. Inf. Secur. Appl. 51: 102452 (2020) - [j121]Ching-Nung Yang, Yi-Chin Lin, Peng Li:
Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55: 102660 (2020) - [j120]Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Yi-Cheng Chen:
(k, n) scalable secret image sharing with multiple decoding options. J. Intell. Fuzzy Syst. 38(1): 219-228 (2020) - [j119]Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato:
Introduction to the special issue on deep learning for real-time information hiding and forensics. J. Real Time Image Process. 17(1): 1-5 (2020) - [j118]Xiaotian Wu, Ching-Nung Yang:
Probabilistic color visual cryptography schemes for black and white secret images. J. Vis. Commun. Image Represent. 70: 102793 (2020) - [j117]Xiaotian Wu, Ching-Nung Yang, Yen-Wei Liu:
High capacity partial reversible data hiding by hamming code. Multim. Tools Appl. 79(31-32): 23425-23444 (2020) - [j116]Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
Sharing and hiding a secret image in color palette images with authentication. Multim. Tools Appl. 79(35-36): 25657-25677 (2020) - [j115]Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang:
DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process. 173: 107571 (2020) - [j114]Xiaotian Wu, Ching-Nung Yang, Yen-Wei Liu:
A general framework for partial reversible data hiding using hamming code. Signal Process. 175: 107657 (2020)
2010 – 2019
- 2019
- [j113]Zhili Zhou, Jingcheng Chen, Ching-Nung Yang, Xingming Sun:
Video Copy Detection Using Spatio-Temporal CNN Features. IEEE Access 7: 100658-100665 (2019) - [j112]Wenjie Liu, Yinsong Xu, Maojun Zhang, Junxiu Chen, Ching-Nung Yang:
A Novel Quantum Visual Secret Sharing Scheme. IEEE Access 7: 114374-114384 (2019) - [j111]Zhili Zhou, Ching-Nung Yang, Song-Ruei Cai, Daoshun Wang:
Boolean Operation Based Visual Cryptography. IEEE Access 7: 165496-165508 (2019) - [j110]Zhili Zhou, Ching-Nung Yang, Yimin Yang, Xingming Sun:
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment. Complex. 2019: 2875676:1-2875676:8 (2019) - [j109]Xiaotian Wu, Ching-Nung Yang:
Partial reversible AMBTC-based secret image sharing with steganography. Digit. Signal Process. 93: 22-33 (2019) - [j108]Fang Huang, Zhili Zhou, Ching-Nung Yang, Xiya Liu, Tao Wang:
Original image tracing with image relational graph for near-duplicate image elimination. Int. J. Comput. Sci. Eng. 18(3): 294-304 (2019) - [j107]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yi-Cheng Chen, Song-Yu Wu:
Data Hiding Using Sequential Hamming + k with m Overlapped Pixels. KSII Trans. Internet Inf. Syst. 13(12): 6159-6174 (2019) - [j106]Ching-Nung Yang, Yung-Shun Chou, Yan-Xiao Liu, Cheonshik Kim:
Exploiting error control in matrix coding-based data hiding over lossy channel. J. Real Time Image Process. 16(3): 577-588 (2019) - [j105]Xiaotian Wu, Dong Chen, Ching-Nung Yang, Yi-Yun Yang:
A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image. J. Vis. Commun. Image Represent. 59: 550-562 (2019) - [j104]Xiaotian Wu, Ching-Nung Yang:
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. J. Vis. Commun. Image Represent. 61: 74-84 (2019) - [j103]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Generalizing Hamming+k data hiding by overlapped pixels. Multim. Tools Appl. 78(13): 17995-18015 (2019) - [j102]Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou, Cheonshik Kim:
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme. Multim. Tools Appl. 78(13): 18595-18616 (2019) - [j101]Yan-Xiao Liu, Ching-Nung Yang, Chi-Ming Wu, Qin-Dong Sun, Wei Bi:
Threshold changeable secret image sharing scheme based on interpolation polynomial. Multim. Tools Appl. 78(13): 18653-18667 (2019) - [j100]Zhaoqing Pan, Ching-Nung Yang, Victor S. Sheng, Naixue Xiong, Weizhi Meng:
Machine Learning for Wireless Multimedia Data Security. Secur. Commun. Networks 2019: 7682306:1-7682306:2 (2019) - [j99]Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Song-Yu Wu, Shin-Shang Lin, Yung-Shun Chou:
Enhanced embedding capacity for the SMSD-based data-hiding method. Signal Process. Image Commun. 78: 216-222 (2019) - [j98]Xiaotian Wu, Ching-Nung Yang:
Invertible secret image sharing with steganography and authentication for AMBTC compressed images. Signal Process. Image Commun. 78: 437-447 (2019) - [j97]Zhen Wu, Yi-Ning Liu, Dong Wang, Ching-Nung Yang:
An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial. Symmetry 11(1): 69 (2019) - [j96]Ching-Nung Yang, Chih-Cheng Wu, Yi-Chin Lin:
k Out of n Region-Based Progressive Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 29(1): 252-262 (2019) - [j95]Zhangjie Fu, Fengxiao Huang, Xingming Sun, Athanasios V. Vasilakos, Ching-Nung Yang:
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data. IEEE Trans. Serv. Comput. 12(5): 813-823 (2019) - 2018
- [j94]Yanxiao Liu, Ching-Nung Yang, Qin-Dong Sun:
Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding. IEEE Access 6: 5374-5378 (2018) - [j93]Zhili Zhou, Ching-Nung Yang, Yi Cao, Xingming Sun:
Secret Image Sharing Based on Encrypted Pixels. IEEE Access 6: 15021-15025 (2018) - [j92]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Separable reversible data hiding in encrypted halftone image. Displays 55: 71-79 (2018) - [j91]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yung-Shun Chou:
Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k. Digit. Signal Process. 78: 284-293 (2018) - [j90]Yan-Xiao Liu, Qin-Dong Sun, Ching-Nung Yang:
(k, n) secret image sharing scheme capable of cheating detection. EURASIP J. Wirel. Commun. Netw. 2018: 72 (2018) - [j89]Yanxiao Liu, Ching-Nung Yang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453: 21-29 (2018) - [j88]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j87]Peng Li, Ching-Nung Yang, Qian Kong:
A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J. Real Time Image Process. 14(1): 41-50 (2018) - [j86]Xuehu Yan, Xin Liu, Ching-Nung Yang:
An enhanced threshold visual secret sharing based on random grids. J. Real Time Image Process. 14(1): 61-73 (2018) - [j85]Cheonshik Kim, Dongkyoo Shin, Lu Leng, Ching-Nung Yang:
Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Process. 14(1): 101-114 (2018) - [j84]Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim, Ching-Nung Yang:
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J. Real Time Image Process. 14(1): 115-126 (2018) - [j83]Ching-Nung Yang, Cheonshik Kim, Yen-Hung Lo:
Adaptive real-time reversible data hiding for JPEG images. J. Real Time Image Process. 14(1): 147-157 (2018) - [j82]Ching-Nung Yang, Fu-Heng Wu, Sheng-Lung Peng:
Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph. J. Vis. Commun. Image Represent. 55: 660-676 (2018) - [j81]Yanxiao Liu, Ching-Nung Yang, Yung-Shun Chou, Song-Yu Wu, Qin-Dong Sun:
Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 55: 766-777 (2018) - [j80]Cheonshik Kim, Bryan Kim, Joel J. P. C. Rodrigues, James C. N. Yang:
Special issue: Advanced technology for smart home automation and entertainment. Pers. Ubiquitous Comput. 22(1): 1-2 (2018) - [j79]Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang:
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquitous Comput. 22(1): 11-22 (2018) - [j78]Yong-Joon Lee, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang:
Study of detection method for spoofed IP against DDoS attacks. Pers. Ubiquitous Comput. 22(1): 35-44 (2018) - [j77]Wenjie Liu, Peipei Gao, Wenbin Yu, Zhiguo Qu, Ching-Nung Yang:
Quantum Relief algorithm. Quantum Inf. Process. 17(10): 280 (2018) - [j76]Peng Li, Zuquan Liu, Ching-Nung Yang:
A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process. Image Commun. 65: 210-220 (2018) - [j75]Xiaotian Wu, Ching-Nung Yang, Yi Ting Zhuang, Shen-Chieh Hsu:
Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process. Image Commun. 66: 42-49 (2018) - [j74]Yan-Xiao Liu, Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou:
Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process. Image Commun. 66: 77-86 (2018) - 2017
- [j73]Ching-Nung Yang, Shen-Chieh Hsu, Cheonshik Kim:
Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 50: 209-215 (2017) - [j72]Ching-Nung Yang, Chihi-Han Wu, Zong-Xuan Yeh, Daoshun Wang, Cheonshik Kim:
A new sharing digital image scheme with clearer shadow images. Comput. Stand. Interfaces 51: 118-131 (2017) - [j71]Ching-Nung Yang, Jung-Kuo Liao, Daoshun Wang:
New privilege-based visual cryptography with arbitrary privilege levels. J. Vis. Commun. Image Represent. 42: 121-131 (2017) - [j70]Ching-Nung Yang, Xiaotian Wu, Yung-Chien Chou, Zhangjie Fu:
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48: 182-194 (2017) - [j69]Yan-Xiao Liu, Ching-Nung Yang:
Scalable secret image sharing scheme with essential shadows. Signal Process. Image Commun. 58: 49-55 (2017) - [j68]Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. IEEE Trans. Inf. Forensics Secur. 12(1): 48-63 (2017) - [c37]Ching-Nung Yang, Jian-Ming Li, Yung-Shun Chou:
On the Analysis of k-Secure t-Conference Key Distribution Scheme. ICCNS 2017: 91-95 - 2016
- [j67]Peng Li, Ching-Nung Yang, Zhili Zhou:
Essential secret image sharing scheme with the same size of shadows. Digit. Signal Process. 50: 51-60 (2016) - [j66]Zhili Zhou, Ching-Nung Yang, Beijing Chen, Xingming Sun, Qi Liu, Q. M. Jonathan Wu:
Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation. IEICE Trans. Inf. Syst. 99-D(6): 1531-1540 (2016) - [j65]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
Secure protection of video recorder video in smart car. Int. J. Distributed Sens. Networks 12(12) (2016) - [j64]Ching-Nung Yang, Li-Zhe Sun, Xuehu Yan, Cheonshik Kim:
Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real Time Image Process. 12(2): 483-494 (2016) - [j63]Ching-Nung Yang, Cheng-Hua Chen, Song-Ruei Cai:
Enhanced Boolean-based multi secret image sharing scheme. J. Syst. Softw. 116: 22-34 (2016) - [j62]Cheonshik Kim, Ching-Nung Yang:
Data hiding based on overlapped pixels using hamming code. Multim. Tools Appl. 75(23): 15651-15663 (2016) - [j61]Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang:
Privacy-preserving outsourced gene data search in encryption domain. Secur. Commun. Networks 9(18): 5178-5186 (2016) - [j60]Ching-Nung Yang, Li-Zhe Sun, Song-Ruei Cai:
Extended color visual cryptography for black and white secret image. Theor. Comput. Sci. 609: 143-161 (2016) - [c36]Zhili Zhou, Yan Mu, Ningsheng Zhao, Q. M. Jonathan Wu, Ching-Nung Yang:
Coverless Information Hiding Method Based on Multi-keywords. ICCCS (1) 2016: 39-47 - [c35]Stelvio Cimato, Ernesto Damiani, Silvia Mella, Ching-Nung Yang:
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks. ICCCS (1) 2016: 456-467 - [c34]Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai:
3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. ICISSP 2016: 400-406 - [c33]Ching-Nung Yang, Zong-Xuan Yeh, Shen-Chieh Hsu, Zhangjie Fu:
Enhancing security for two-party comparison over encrypted data. ICSAI 2016: 439-443 - 2015
- [j59]Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu:
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing. J. Comput. Inf. Technol. 23(4): 341-355 (2015) - [j58]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digit. Signal Process. 38: 53-65 (2015) - [j57]Ching-Nung Yang, Che-Yu Lin:
Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels. Inf. Sci. 312: 131-151 (2015) - [j56]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Random grid-based visual secret sharing with multiple decryptions. J. Vis. Commun. Image Represent. 26: 94-104 (2015) - [j55]Cheonshik Kim, Ching-Nung Yang:
Watermark with DSA signature using predictive coding. Multim. Tools Appl. 74(14): 5189-5203 (2015) - [j54]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109: 317-333 (2015) - [j53]Ching-Nung Yang, Peng Li, Chih-Cheng Wu, Song-Ruei Cai:
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 31: 1-9 (2015) - [j52]