default search action
Cheng-Ta Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Chi-Yao Weng, Hao-Yu Weng, Cheng-Ta Huang:
Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment model. EURASIP J. Image Video Process. 2024(1): 37 (2024) - [j25]Cheng-Ta Huang, Chi-Yao Weng, Guo-Ting Zheng, Hao-Yu Weng:
Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity. Signal Image Video Process. 18(6-7): 5043-5059 (2024) - [c19]Changpo Chiang, Cheng-Ta Huang, Yung-Lien Lai, Shiuh-Jeng Wang:
The Study of More Susceptible to Fake News Makers with Influencing Factors in Social Media. CNIOT 2024 - [c18]Hao-Yu Weng, Cheng-Ta Huang, Shiuh-Jeng Wang, Cheng-Hsing Yang, Chang-Po Chiang:
A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding Mechanisms. CNIOT 2024 - 2023
- [j24]Cheng-Ta Huang, Cheng-Yi Lin, Chi-Yao Weng:
Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping. Entropy 25(5): 744 (2023) - [j23]Cheng-Ta Huang, Njabulo Sinethemba Shongwe, Hao-Yu Weng, Chi-Yao Weng:
Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images. Multim. Tools Appl. 82(27): 42699-42716 (2023) - 2022
- [j22]Hung-Jui Ko, Cheng-Ta Huang, Hsueh-Wen Tseng, Shiuh-Jeng Wang:
Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube. IEEE Access 10: 67686-67693 (2022) - [j21]Chi-Yao Weng, Hao-Yu Weng, Cheng-Ta Huang:
High-fidelity reversible data hiding based on PVO and median preserving. J. Supercomput. 78(6): 8367-8388 (2022) - [c17]Hao-Yu Weng, Min-Yi Tsai, Wei-Jen Wang, Cheng-Ta Huang:
High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube. ICS 2022: 670-678 - 2021
- [j20]Hung-Jui Ko, Cheng-Ta Huang, Zhi-Wei Zhuang, Gwoboa Horng, Shiuh-Jeng Wang:
Cloud evidence tracks of storage service linking with iOS systems. J. Supercomput. 77(1): 77-94 (2021) - 2020
- [j19]Hung-Jui Ko, Cheng-Ta Huang, Gwoboa Horng, Shiuh-Jeng Wang:
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517: 128-147 (2020) - [j18]Cheng-Ta Huang:
A scheme of flexible and reversible information-hiding in SMVQ mechanism. Peer-to-Peer Netw. Appl. 13(2): 426-438 (2020) - [c16]Cheng-Hsing Yang, Chi-Yao Weng, Yu-Zhen Yang, Jung-San Lee, Cheng-Ta Huang:
Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images. ICFET 2020: 125-129
2010 – 2019
- 2019
- [j17]Cheng-Ta Huang, Li-Chiun Lin, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Dynamic embedding strategy of VQ-based information hiding approach. J. Vis. Commun. Image Represent. 59: 14-32 (2019) - [j16]Cheng-Ta Huang, Li-Chiun Lin, De-En Sun, Shiuh-Jeng Wang:
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks. Multim. Tools Appl. 78(3): 3131-3151 (2019) - [c15]Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. ICCCS 2019: 327-331 - [c14]Szu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang:
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing. ICCCS 2019: 440-444 - 2018
- [j15]Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang:
File changes with security proof stored in cloud service systems. Pers. Ubiquitous Comput. 22(1): 45-53 (2018) - [j14]Cheng-Ta Huang, Cheng-Hsing Yang, Wei-Jen Wang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Raw reversibility of information hiding on the basis of VQ systems. J. Supercomput. 74(8): 3748-3777 (2018) - [j13]Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J. Supercomput. 74(9): 4295-4314 (2018) - [c13]Cheng-Ta Huang, Hung-Jui Ko, Zhi-Wei Zhuang, Ping-Cheng Shih, Shiuh-Jeng Wang:
Mobile Forensics for Cloud Storage Service on iOS Systems. ISITA 2018: 178-182 - 2017
- [j12]Cheng-Ta Huang, Yu Hong Zhang, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
Mutual authentications to parties with QR-code applications in mobile systems. Int. J. Inf. Sec. 16(5): 525-540 (2017) - [c12]Chi-Yao Weng, Cheng-Ta Huang, Hung-Wei Kao:
DCT-Based Compressed Image with Reversibility Using Modified Quantization. IIH-MSP (1) 2017: 214-221 - [c11]Cheng-Ta Huang, De-En Sun, Yen-Lin Chen, Shiuh-Jeng Wang:
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance. PAISI 2017: 111-128 - 2016
- [j11]Ching-Wei Wang, Cheng-Ta Huang, Jia-Hong Lee, Chung-Hsing Li, Sheng-Wei Chang, Ming-Jhih Siao, Tat-Ming Lai, Bulat Ibragimov, Tomaz Vrtovec, Olaf Ronneberger, Philipp Fischer, Timothy F. Cootes, Claudia Lindner:
A benchmark for comparison of dental radiography analysis algorithms. Medical Image Anal. 31: 63-76 (2016) - [j10]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multim. Tools Appl. 75(22): 14895-14916 (2016) - [c10]Cheng-Ta Huang, Chia-Ling Wu, Jen-Chun Chang, Yu-Lun Wan, Shiuh-Jeng Wang:
Reversible SMVQ Image Hiding Using Adaptive Search Order Coding. DICTA 2016: 1-6 - 2015
- [j9]Ya-Ting Chang, Cheng-Ta Huang, Chia-Ling Huang, Shiuh-Jeng Wang:
Data hiding of high compression ratio in VQ indices with neighboring correlations. Multim. Tools Appl. 74(5): 1645-1666 (2015) - [j8]Ching-Wei Wang, Cheng-Ta Huang, Meng-Che Hsieh, Chung-Hsing Li, Sheng-Wei Chang, Wei-Cheng Li, Remy Vandaele, Raphaël Marée, Sébastien Jodogne, Pierre Geurts, Cheng Chen, Guoyan Zheng, Chengwen Chu, Hengameh Mirzaalian, Ghassan Hamarneh, Tomaz Vrtovec, Bulat Ibragimov:
Evaluation and Comparison of Anatomical Landmark Detection Methods for Cephalometric X-Ray Images: A Grand Challenge. IEEE Trans. Medical Imaging 34(9): 1890-1900 (2015) - 2014
- [j7]Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang:
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems. Peer-to-Peer Netw. Appl. 7(4): 676-686 (2014) - [c9]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ. IWDW 2014: 599-612 - 2013
- [j6]Shao-Jui Chen, Jing-Ying Huang, Cheng-Ta Huang, Wei-Jen Wang:
SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters. Int. J. Grid High Perform. Comput. 5(2): 27-42 (2013) - [j5]Wei-Jen Wang, Cheng-Ta Huang, Chung-Min Liu, Po-Chyi Su, Shiuh-Jeng Wang:
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf. Sci. 246: 69-82 (2013) - [j4]Shiau-Rung Tsui, Cheng-Ta Huang, Wei-Jen Wang:
A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization. J. Inf. Hiding Multim. Signal Process. 4(4): 215-224 (2013) - [j3]Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J. Supercomput. 66(2): 1093-1110 (2013) - [c8]Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:
Memory Forensics for Key Evidence Investigations in Case Illustrations. AsiaJCIS 2013: 96-101 - [c7]Wei-Jen Wang, Yu Hong Zhang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting. IIH-MSP 2013: 387-390 - 2012
- [c6]Chin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang:
An Efficient Lossless Data Hiding Scheme on VQ Index Coding. AsiaJCIS 2012: 6-9 - [c5]Yu-Cheng Tso, Shiuh-Jeng Wang, Cheng-Ta Huang, Wei-Jen Wang:
iPhone social networking for evidence investigations using iTunes forensics. ICUIMC 2012: 62:1-62:7 - [c4]Cheng-Ta Huang, Wei-Jen Wang, Min-Yi Tsai, Chin-Feng Lee:
Employing LSB and VQ for Undetectable Secret Data Hiding. UIC/ATC 2012: 644-649 - 2011
- [j2]Cheng-Hsing Yang, Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf. Sci. 181(11): 2218-2230 (2011) - [j1]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
VQ Applications in Steganographic Data Hiding Upon Multimedia Images. IEEE Syst. J. 5(4): 528-537 (2011) - 2010
- [c3]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible data hiding using neighboring block in VQ-compressed images. ICUIMC 2010: 47
2000 – 2009
- 2009
- [c2]Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. IAS 2009: 607-610 - 2008
- [c1]Cheng-Hsing Yang, Shu-Chien Huang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Non-embedded Image Protection Approaches Based on Vector Quantization. ISDA (3) 2008: 620-625
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint