default search action
Jeanne Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Wien Hong, Guan-Zhong Su, Tung-Shou Chen, Jeanne Chen:
On the bitmap compression for joint coding and data hiding of AMBTC compressed images. Multim. Tools Appl. 83(35): 82131-82148 (2024) - 2023
- [j14]Xiaoyu Zhou, Wien Hong, Guangsong Yang, Tung-Shou Chen, Jeanne Chen:
An unsolvable pixel reduced authentication method for color images with grayscale invariance. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101726 (2023) - 2021
- [j13]Wien Hong, Jeanne Chen, Peishih Chang, Jie Wu, Tung-Shou Chen, Jason Lin:
A Color Image Authentication Scheme With Grayscale Invariance. IEEE Access 9: 6522-6535 (2021) - [j12]Wien Hong, Jie Wu, Der-Chyuan Lou, Xiaoyu Zhou, Jeanne Chen:
An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match. IEEE Access 9: 133746-133761 (2021) - [j11]Wei-Ling Lin, Chun-Hung Hsieh, Tung-Shou Chen, Jeanne Chen, Jian-Le Lee, Wei-Chung Chen:
Apply IOT technology to practice a pandemic prevention body temperature measurement system: A case study of response measures for COVID-19. Int. J. Distributed Sens. Networks 17(5): 155014772110181 (2021) - [j10]Chen-Yi Lin, Tung-Shou Chen, Jeanne Chen, Chih-Yu Chen:
Personalized live streaming channel recommendation based on most similar neighbors. Multim. Tools Appl. 80(13): 19867-19883 (2021) - 2020
- [j9]Xiaoyu Zhou, Wien Hong, Shaowei Weng, Tung-Shou Chen, Jeanne Chen:
Reversible and recoverable authentication method for demosaiced images using adaptive coding technique. J. Inf. Secur. Appl. 55: 102629 (2020)
2010 – 2019
- 2018
- [c14]Chih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji:
Data Hiding for Color Image by Rubik's Cube. SSIC 2018: 1-5 - 2016
- [c13]Cheng-Jung Yu, Jeanne Chen, Tzu-Ling Lin, Tung-Shou Chen, Wei-Hao Hsu:
Effectiveness of combing airdrop and mobile devices in word card teaching. ICSAI 2016: 471-475 - [c12]Chi-Nan Lin, Tzu-Ling Lin, Tung-Shou Chen, Jeanne Chen, Wei-Jhong Chen:
VoIP communication quality and flow volume preference - A SIP and Red5 example. ICSAI 2016: 782-786 - 2015
- [j8]Wien Hong, Tung-Shou Chen, Jeanne Chen:
Reversible data hiding using Delaunay triangulation and selective embedment. Inf. Sci. 308: 140-154 (2015) - 2014
- [j7]Jeanne Chen, Tung-Shou Chen, Wien Hong, Gwoboa Horng, Han-Yan Wu, Chih-Wei Shiu:
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map. KSII Trans. Internet Inf. Syst. 8(3): 1105-1118 (2014) - [j6]Jeanne Chen:
A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process. Image Commun. 29(3): 375-384 (2014) - 2013
- [j5]Jeanne Chen, Chih-Wei Shiu, Mei-Chen Wu:
An improvement of diamond encoding using characteristic value positioning and modulus function. J. Syst. Softw. 86(5): 1377-1383 (2013) - [j4]Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao, Pei-Wen Hou:
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. J. Supercomput. 66(2): 907-917 (2013) - [c11]Jeanne Chen, Tung-Shou Chen, Wien Hong, Chi-Nan Lin, Mei-Chen Wu, Han-Yan Wu:
A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording. ITQM 2013: 229-236 - [c10]Wien Hong, Tung-Shou Chen, Jeanne Chen, Yu-Hsin Kao, Han-Yan Wu, Mei-Chen Wu:
Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping. ICSI (2) 2013: 208-214 - 2012
- [c9]Wien Hong, Jeanne Chen, Mei-Chen Wu, Chih-Wei Shiu:
A secure data hiding method based on preservation of saturated pixels. ICDIP 2012: 83342Z
2000 – 2009
- 2008
- [c8]Tung-Shou Chen, Jeanne Chen, Yuan-Hung Kao, Tsang-Chou Hsieh:
A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC). ISDA (3) 2008: 426-430 - [c7]Jeanne Chen, Tung-Shou Chen, Ping-Feng Chen:
Prediction Filling Differences for Compress a Set of HDR Images. ISDA (3) 2008: 581-586 - 2007
- [c6]Jeanne Chen, Tung-Shou Chen:
Content-based Rate Controlled Data Hiding in JPEG-LS. IIH-MSP 2007: 477-480 - 2005
- [j3]Jeanne Chen, Tung-Shou Chen, Hwa-Ching Hsu, Hsiao-Wen Chen:
New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electronic Imaging 14(3): 033018 (2005) - [j2]Jeanne Chen, Tung-Shou Chen, Yu-Mei Pan:
A crisscross checking technique for tamper detection in halftone images. J. Syst. Softw. 76(3): 287-295 (2005) - [c5]Jeanne Chen, Tung-Shou Chen, Tzu-Hsin Tsai, Hui-Fang Tsai, Mingli Hsieh, Shih-Shan Tang:
Using the ACM Technique to Refine Protein Spots in 2DGE Images. AINA 2005: 289-292 - [c4]Rong-Chang Chen, Jeanne Chen, Tung-Shou Chen, Chunhung Hsieh, Teyu Chen, Kaiyang Wu:
Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm. ISNN (3) 2005: 409-414 - 2004
- [j1]Tung-Shou Chen, Jeanne Chen, Jian-Guo Chen:
A simple and efficient watermark technique based on JPEG2000 Codec. Multim. Syst. 10(1): 16-26 (2004) - 2003
- [c3]Tung-Shou Chen, Jeanne Chen, Jian-Guo Chen:
A simple and efficient watermarking technique based on JPEG2000 codec. ISMSE 2003: 80-87 - [c2]Jeanne Chen, Tung-Shou Chen, Meng-Wen Cheng:
A new data hiding method in binary image. ISMSE 2003: 88-93 - [c1]Tung-Shou Chen, Jeanne Chen, Yu-Mei Pan:
A new detection method of halftone images based on crisscross checking technique. ISMSE 2003: 94-101
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint