default search action
Shiuh-Jeng Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Chit-Jie Chew, Wei-Bin Lee, Tzu-Li Sung, Ying-Chin Chen, Shiuh-Jeng Wang, Jung-San Lee:
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime. IEEE Trans. Inf. Forensics Secur. 19: 5956-5970 (2024) - [c51]Changpo Chiang, Cheng-Ta Huang, Yung-Lien Lai, Shiuh-Jeng Wang:
The Study of More Susceptible to Fake News Makers with Influencing Factors in Social Media. CNIOT 2024 - [c50]Hao-Yu Weng, Cheng-Ta Huang, Shiuh-Jeng Wang, Cheng-Hsing Yang, Chang-Po Chiang:
A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding Mechanisms. CNIOT 2024 - [c49]Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng Wang:
Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images. CNIOT 2024 - 2022
- [j66]Hung-Jui Ko, Cheng-Ta Huang, Hsueh-Wen Tseng, Shiuh-Jeng Wang:
Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube. IEEE Access 10: 67686-67693 (2022) - [j65]Chang-Po Chiang, Shiuh-Jeng Wang, Yu-Shu Chen:
Manipulating cyber army in pilot case forensics on social media. J. Supercomput. 78(6): 7749-7767 (2022) - 2021
- [j64]Hung-Jui Ko, Cheng-Ta Huang, Zhi-Wei Zhuang, Gwoboa Horng, Shiuh-Jeng Wang:
Cloud evidence tracks of storage service linking with iOS systems. J. Supercomput. 77(1): 77-94 (2021) - 2020
- [j63]Hung-Jui Ko, Cheng-Ta Huang, Gwoboa Horng, Shiuh-Jeng Wang:
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517: 128-147 (2020) - [c48]Chang-Po Chiang, Hung-Yuan Chen, Tyan-Muh Tsai, Shih-Hao Chang, Ying-Chin Chen, Shiuh-Jeng Wang:
Profiling Operations of Cyber Army in Manipulating Public Opinions. ICFET 2020: 222-225
2010 – 2019
- 2019
- [j62]Cheng-Ta Huang, Li-Chiun Lin, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Dynamic embedding strategy of VQ-based information hiding approach. J. Vis. Commun. Image Represent. 59: 14-32 (2019) - [j61]Cheng-Ta Huang, Li-Chiun Lin, De-En Sun, Shiuh-Jeng Wang:
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks. Multim. Tools Appl. 78(3): 3131-3151 (2019) - [c47]Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. ICCCS 2019: 327-331 - [c46]Szu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang:
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing. ICCCS 2019: 440-444 - 2018
- [j60]Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang:
File changes with security proof stored in cloud service systems. Pers. Ubiquitous Comput. 22(1): 45-53 (2018) - [j59]Cheng-Ta Huang, Cheng-Hsing Yang, Wei-Jen Wang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Raw reversibility of information hiding on the basis of VQ systems. J. Supercomput. 74(8): 3748-3777 (2018) - [j58]Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J. Supercomput. 74(9): 4295-4314 (2018) - [c45]Cheng-Ta Huang, Hung-Jui Ko, Zhi-Wei Zhuang, Ping-Cheng Shih, Shiuh-Jeng Wang:
Mobile Forensics for Cloud Storage Service on iOS Systems. ISITA 2018: 178-182 - [c44]Ming-Jung Chiu Huang, Yu-Lun Wan, Chang-Po Chiang, Shiuh-Jeng Wang:
Tor Browser Forensics in Exploring Invisible Evidence. SMC 2018: 3909-3914 - 2017
- [j57]Cheng-Ta Huang, Yu Hong Zhang, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
Mutual authentications to parties with QR-code applications in mobile systems. Int. J. Inf. Sec. 16(5): 525-540 (2017) - [c43]Cheng-Ta Huang, De-En Sun, Yen-Lin Chen, Shiuh-Jeng Wang:
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance. PAISI 2017: 111-128 - 2016
- [j56]Nele Mentens, Damien Sauveron, José M. Sierra, Shiuh-Jeng Wang, Isaac Woungang:
Guest Editorial. IET Inf. Secur. 10(5): 223-224 (2016) - [j55]Jaeik Cho, Shiuh-Jeng Wang:
Guest Editorial: Information and Communication Security in Multimedia Applications. Multim. Tools Appl. 75(22): 14503-14506 (2016) - [j54]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multim. Tools Appl. 75(22): 14895-14916 (2016) - [j53]Fu-Hau Hsu, Min-Hao Wu, Syun-Cheng Ou, Shiuh-Jeng Wang:
Data concealments with high privacy in new technology file system. J. Supercomput. 72(1): 120-140 (2016) - [c42]Cheng-Ta Huang, Chia-Ling Wu, Jen-Chun Chang, Yu-Lun Wan, Shiuh-Jeng Wang:
Reversible SMVQ Image Hiding Using Adaptive Search Order Coding. DICTA 2016: 1-6 - 2015
- [j52]Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:
Security and privacy information technologies and applications for wireless pervasive computing environments. Inf. Sci. 321: 147-149 (2015) - [j51]Ya-Ting Chang, Cheng-Ta Huang, Chia-Ling Huang, Shiuh-Jeng Wang:
Data hiding of high compression ratio in VQ indices with neighboring correlations. Multim. Tools Appl. 74(5): 1645-1666 (2015) - [j50]Fu-Hau Hsu, Min-Hao Wu, Yi-Wen Chang, Shiuh-Jeng Wang:
Web security in a windows system as PrivacyDefender in private browsing mode. Multim. Tools Appl. 74(5): 1667-1688 (2015) - [c41]Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang:
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions. ICT-EurAsia/CONFENIS 2015: 235-242 - 2014
- [j49]Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang:
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems. Peer-to-Peer Netw. Appl. 7(4): 676-686 (2014) - [j48]Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Image reversibility in data embedding on the basis of blocking-predictions. Peer-to-Peer Netw. Appl. 7(4): 723-736 (2014) - [j47]Sang-Soo Yeo, Shiuh-Jeng Wang:
Editorial of special section on Hybrid Information Security Technologies: part II. J. Supercomput. 70(1): 1-2 (2014) - [j46]Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Visible watermarking with reversibility of multimedia images for ownership declarations. J. Supercomput. 70(1): 247-268 (2014) - [c40]Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang:
Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy. ICT-EurAsia 2014: 633-642 - [c39]Da-Yu Kao, Min-Jung Chung, Shiuh-Jeng Wang:
Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics. ICS 2014: 904-913 - [c38]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ. IWDW 2014: 599-612 - 2013
- [j45]Sang Soo Yeo, Shiuh-Jeng Wang, Rodrigo Roman Castro:
Advanced processing technologies and applications for mobile communication systems. Int. J. Commun. Syst. 26(6): 687-689 (2013) - [j44]Wei-Jen Wang, Cheng-Ta Huang, Chung-Min Liu, Po-Chyi Su, Shiuh-Jeng Wang:
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf. Sci. 246: 69-82 (2013) - [j43]Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang:
Reversible data hiding using side-match predictions on steganographic images. Multim. Tools Appl. 67(3): 571-591 (2013) - [j42]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang, Cheng-Hsing Yang:
Data embedding in image-media using weight-function on modulo operations. ACM Trans. Embed. Comput. Syst. 12(2): 21:1-21:12 (2013) - [j41]Binod Vaidya, Shiuh-Jeng Wang, Jongsung Kim, Ivan Lee:
Special issue on wireless multimedia networks and security services. Telecommun. Syst. 52(4): 2219-2220 (2013) - [j40]Taeshik Shon, Shiuh-Jeng Wang, Lei Shu, Liudong Xing:
Editorial of special section on advanced in high performance, algorithm, and framework for future computing. J. Supercomput. 65(2): 483 (2013) - [j39]Sang-Soo Yeo, Shiuh-Jeng Wang:
Editorial of special section on hybrid information security technologies - part I. J. Supercomput. 66(2): 781-782 (2013) - [j38]Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang, Chia-Ling Huang:
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion. J. Supercomput. 66(2): 812-828 (2013) - [j37]Chi-Yao Weng, Yu Hong Zhang, Li Chun Lin, Shiuh-Jeng Wang:
Visible watermarking images in high quality of data hiding. J. Supercomput. 66(2): 1033-1048 (2013) - [j36]Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J. Supercomput. 66(2): 1093-1110 (2013) - [c37]Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:
Memory Forensics for Key Evidence Investigations in Case Illustrations. AsiaJCIS 2013: 96-101 - [c36]Wei-Jen Wang, Yu Hong Zhang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting. IIH-MSP 2013: 387-390 - 2012
- [j35]Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan C. L. Liu, Dushyant Goyal:
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images. KSII Trans. Internet Inf. Syst. 6(4): 1248-1266 (2012) - [j34]Jong Hyuk Park, Shiuh-Jeng Wang, Damien Sauveron:
Security technologies and applications for convergence environments. Secur. Commun. Networks 5(3): 249-251 (2012) - [c35]Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen:
Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks. AsiaJCIS 2012: 51-58 - [c34]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - [c33]Yu-Cheng Tso, Shiuh-Jeng Wang, Cheng-Ta Huang, Wei-Jen Wang:
iPhone social networking for evidence investigations using iTunes forensics. ICUIMC 2012: 62:1-62:7 - [c32]Hai-Cheng Chu, Szu-Wei Yang, Shiuh-Jeng Wang, Jong Hyuk Park:
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone. ITCS 2012: 171-178 - [c31]Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang:
Dual-Watermarking by QR-code Applications in Image Processing. UIC/ATC 2012: 638-643 - 2011
- [j33]Cheng-Hsing Yang, Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf. Sci. 181(11): 2218-2230 (2011) - [j32]Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4): 669-678 (2011) - [j31]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
VQ Applications in Steganographic Data Hiding Upon Multimedia Images. IEEE Syst. J. 5(4): 528-537 (2011) - [j30]Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen:
Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC. Wirel. Pers. Commun. 56(1): 173-182 (2011) - [c30]Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal:
Hash-Algorithms Output for Digital Evidence in Computer Forensics. BWCCA 2011: 399-404 - [c29]Min-Hao Wu, Fu-Hau Hsu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Reversible Watermarking Scheme with Visibility Using Randomize Distance. ICGEC 2011: 204-207 - [c28]Da-Yu Kao, Shiuh-Jeng Wang, Dushyant Goyal, Jonathan C. L. Liu:
A Trustworthy Computing of ADAPT Principle Guaranteeing Genuine Medical Image. ICPADS 2011: 618-623 - 2010
- [j29]Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases. Comput. Law Secur. Rev. 26(1): 52-60 (2010) - [j28]Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations. Fundam. Informaticae 98(2-3): 321-336 (2010) - [j27]Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen:
Hierarchical key derivation scheme for group-oriented communication systems. Int. J. Inf. Technol. Commun. Convergence 1(1): 66-76 (2010) - [j26]Cheng-Hsing Yang, Shiuh-Jeng Wang:
Transforming LSB Substitution for Image-based Steganography in Matching Algorithms. J. Inf. Sci. Eng. 26(4): 1199-1212 (2010) - [j25]Hsing-Chung Chen, Franz I. S. Ko, Yung-Chen Chou, Shyan-Ming Yuan, Yaw-Chung Chen, Chin-Chen Chang, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Keh-Ming Lu:
Guest Editorial. J. Networks 5(8): 875-879 (2010) - [j24]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Yung-Fa Huang, Chung-Wei Chen:
A Generalized Temporal and Spatial Role-Based Access Control Model. J. Networks 5(8): 912-920 (2010) - [j23]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J. Syst. Softw. 83(10): 1635-1643 (2010) - [j22]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. J. Vis. Commun. Image Represent. 21(1): 49-55 (2010) - [c27]Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen:
Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications. BWCCA 2010: 395-400 - [c26]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible data hiding using neighboring block in VQ-compressed images. ICUIMC 2010: 47
2000 – 2009
- 2009
- [j21]Da-Yu Kao, Frank Fu-Yuan Huang, Shiuh-Jeng Wang:
Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers. Comput. Law Secur. Rev. 25(5): 464-476 (2009) - [j20]Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang:
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models. Comput. Stand. Interfaces 31(4): 795-800 (2009) - [j19]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Codebook-linked Watermarking Scheme for Digital Images. Fundam. Informaticae 92(4): 397-409 (2009) - [j18]Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Shu-Wen Lin:
Visual-based embedding systems with targeted secret disclosures and applications. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 44-53 (2009) - [c25]Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen:
Hierarchical Key Agreement Protocols in Group-User Systems. IAS 2009: 259-262 - [c24]Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. IAS 2009: 607-610 - [c23]Wen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang:
Robustness-set in watermarking embedding systems using codebook classifications. ICUIMC 2009: 207-215 - [c22]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. IIH-MSP 2009: 365-368 - [c21]Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen:
A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN. NCM 2009: 2062-2068 - [c20]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen:
Temporal and Location-Based RBAC Model. NCM 2009: 2111-2116 - 2008
- [j17]Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen:
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks. J. Commun. 3(1): 20-26 (2008) - [j16]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans. Inf. Forensics Secur. 3(3): 488-497 (2008) - [c19]Da-Yu Kao, Shiuh-Jeng Wang, Kush Mathur, Saransh Jain, Frank Fu-Yuan Huang:
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. APSCC 2008: 1364-1368 - [c18]Shiuh-Jeng Wang, Yuh-Ren Tsai, Jian-Jhih Shen:
Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps. FGCN (2) 2008: 405-410 - [c17]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
Histogram-based undetectable fidelity image in steganography as MSB controller. ICUIMC 2008: 566-569 - [c16]Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng:
Secret Sharing Systems with Authentication-Based Steganography. IIH-MSP 2008: 1146-1149 - [c15]Shiuh-Jeng Wang, Yuh-Ren Tsai, Pin-You Chen:
An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems. ISDA (1) 2008: 507-512 - [c14]Cheng-Hsing Yang, Shu-Chien Huang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Non-embedded Image Protection Approaches Based on Vector Quantization. ISDA (3) 2008: 620-625 - [c13]Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta:
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. ISI Workshops 2008: 245-250 - [c12]Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai:
Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. MUE 2008: 499-504 - [c11]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen:
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. MUE 2008: 521-526 - 2007
- [j15]Yuh-Ren Tsai, Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks. Comput. Networks 51(3): 883-900 (2007) - [j14]Shiuh-Jeng Wang:
Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Comput. Stand. Interfaces 29(2): 216-223 (2007) - [j13]Shiuh-Jeng Wang, Da-Yu Kao:
Internet forensics on the basis of evidence gathering with Peep attacks. Comput. Stand. Interfaces 29(4): 423-429 (2007) - [j12]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen:
Packet construction for secure conference call request in ad hoc network systems. Inf. Sci. 177(24): 5598-5610 (2007) - [c10]Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang:
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. FGCN (2) 2007: 125-129 - [c9]Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai:
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. FGCN (1) 2007: 328-331 - [c8]Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy. IIH-MSP 2007: 445-448 - [c7]Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Yao-Han Chang:
Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems. MUE 2007: 1136-1142 - 2006
- [c6]Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. ISI 2006: 644-646 - 2005
- [j11]Shiuh-Jeng Wang, Cheng-Hsing Yang:
Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism. Appl. Math. Comput. 162(2): 559-576 (2005) - [j10]Shiuh-Jeng Wang:
Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164(1): 99-116 (2005) - [j9]Cheng-Hsing Yang, Shiuh-Jeng Wang:
Accelerating VQ-based codeword search on the basis of partial search strategy. Comput. Stand. Interfaces 28(2): 231-240 (2005) - [c5]Shiuh-Jeng Wang, Cheng-Hsing Yang:
Gathering Digital Evidence in Response to Information Security Incidents. ISI 2005: 644-645 - 2004
- [j8]Shiuh-Jeng Wang:
Threshold verification scheme to a valid-signature using identity only on specialized approval. Appl. Math. Comput. 152(2): 373-383 (2004) - [j7]Shiuh-Jeng Wang, Chen-Ming Chuang:
Anonymous message communications with user hierarchy in a multicast system. Appl. Math. Comput. 159(1): 95-112 (2004) - [j6]Shiuh-Jeng Wang:
Remote table-based log-in authentication upon geometric triangle. Comput. Stand. Interfaces 26(2): 85-92 (2004) - [j5]Shiuh-Jeng Wang:
Direct construction of a secret in generalized group-oriented cryptography. Comput. Stand. Interfaces 26(5): 455-460 (2004) - [j4]Shiuh-Jeng Wang:
Anonymous Wireless Authentication on a Portable Cellular Mobile System. IEEE Trans. Computers 53(10): 1317-1329 (2004) - [c4]Shiuh-Jeng Wang:
Multicasting Secret Images using a Knapsack-like Cipher System. CAINE 2004: 67-72 - 2003
- [j3]Shiuh-Jeng Wang:
Yet another log-in authentication using n-dimensional construction based on circle property. IEEE Trans. Consumer Electron. 49(2): 337-341 (2003) - 2002
- [c3]Shiuh-Jeng Wang, Kai-Sheng Yang:
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. EC-Web 2002: 333-342
1990 – 1999
- 1999
- [j2]Shiuh-Jeng Wang, Jinn-ke Jan:
A displacement addressing method for letter-oriented keys. J. Syst. Softw. 46(1): 77-88 (1999) - [c2]Shiuh-Jeng Wang, Jin-Fu Chang:
A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing. DEXA 1999: 372-381 - 1996
- [j1]Shiuh-Jeng Wang, Jin-Fu Chang:
Smart card based secure password authentication scheme. Comput. Secur. 15(3): 231-237 (1996) - [c1]Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Yuh-Ren Tsai:
ID-based authentication for mobile conference call. SEC 1996: 49-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint