default search action
Ja-Chen Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j46]Che-Yi Chao, Ja-Chen Lin:
Selection of Embedding Area: A Better Way to Use Prediction-Error Expansion Method for Reversible Hiding. J. Inf. Sci. Eng. 36(3): 621-641 (2020)
2010 – 2019
- 2019
- [c13]Suiang-Shyan Lee, Yi-Jheng Huang, Ja-Chen Lin:
WEB-VC: Visual Cryptography for Web Image. ICIP 2019: 4055-4059 - 2017
- [j45]Suiang-Shyan Lee, Yi-Jheng Huang, Ja-Chen Lin:
Protection of 3D models using cross recovery. Multim. Tools Appl. 76(1): 243-264 (2017) - 2015
- [j44]Sheng-Yu Chang, Suiang-Shyan Lee, Tzu-Min Yeh, Lee Shu-Teng Chen, Ja-Chen Lin:
Progressive sharing of multiple images with sensitivity-controlled decoding. EURASIP J. Adv. Signal Process. 2015: 11 (2015) - 2012
- [j43]Suiang-Shyan Lee, Ja-Chen Lin:
An accelerated K-means clustering algorithm using selection and erasure rules. J. Zhejiang Univ. Sci. C 13(10): 761-768 (2012) - [c12]Shang-Kuan Chen, Ja-Chen Lin:
Image Hiding by LSB Matching of Higher Payload. ICGEC 2012: 468-471 - 2010
- [j42]Lee Shu-Teng Chen, Sian-Jheng Lin, Ja-Chen Lin:
Reversible JPEG-Based Hiding Method with High Hiding-Ratio. Int. J. Pattern Recognit. Artif. Intell. 24(3): 433-456 (2010) - [j41]Lee Shu-Teng Chen, Ja-Chen Lin:
Multithreshold progressive image sharing with compact shadows. J. Electronic Imaging 19(1): 013003 (2010) - [j40]Sian-Jheng Lin, Ja-Chen Lin:
Authentication and recovery of an image by sharing and lattice-embedding. J. Electronic Imaging 19(4): 043008 (2010) - [j39]Sian-Jheng Lin, Shang-Kuan Chen, Ja-Chen Lin:
Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Represent. 21(8): 900-916 (2010) - [c11]Lee Shu-Teng Chen, Wen-Tarn Chang, Suiang-Shyan Lee, Ja-Chen Lin:
Data Hiding Based on Side Match Vector Quantization and Modulus Function. IIH-MSP 2010: 66-69
2000 – 2009
- 2009
- [j38]Kun-Yuan Chao, Ja-Chen Lin:
Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches. Int. J. Pattern Recognit. Artif. Intell. 23(2): 263-285 (2009) - [j37]Kun-Yuan Chao, Ja-Chen Lin:
User-friendly sharing of images: progressive approach based on modulus operations. J. Electronic Imaging 18(3): 033008 (2009) - 2008
- [j36]Yu-Jie Chang, Ran-Zan Wang, Ja-Chen Lin:
A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering. EURASIP J. Adv. Signal Process. 2008 (2008) - [j35]Yu-Jie Chang, Ran-Zan Wang, Ja-Chen Lin:
Hiding Images Using Modified Search-Order Coding and Modulus Function. Int. J. Pattern Recognit. Artif. Intell. 22(6): 1215-1240 (2008) - [j34]Yu-Jie Chang, Sian-Jheng Lin, Ja-Chen Lin:
Authentication and cross-recovery for multiple images. J. Electronic Imaging 17(4): 043007 (2008) - [c10]Yu-Jie Chang, Ja-Chen Lin:
Data hiding using VQ index file. ISI 2008: 230-232 - [c9]Sen-Jen Lin, Ja-Chen Lin, Wen-Pinn Fang:
Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approach. ISI 2008: 271-272 - 2007
- [j33]Sian-Jheng Lin, Ja-Chen Lin:
VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit. 40(12): 3652-3666 (2007) - [j32]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Ja-Chen Lin:
Visual Salience-Guided Mesh Decomposition. IEEE Trans. Multim. 9(1): 46-57 (2007) - 2006
- [j31]Wen-Pinn Fang, Ja-Chen Lin:
Visual cryptography with extra ability of hiding confidential data. J. Electronic Imaging 15(2): 023020 (2006) - 2005
- [j30]Shang-Kuan Chen, Ja-Chen Lin:
Fault-tolerant and progressive transmission of images. Pattern Recognit. 38(12): 2466-2471 (2005) - [j29]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin:
Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multim. 7(6): 997-1006 (2005) - [c8]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Ja-Chen Lin:
A cognitive psychology-based approach for 3-D shape retrieval. ICME 2005: 588-591 - [c7]Hsueh-Yi Sean Lin, Ja-Chen Lin, Hong-Yuan Mark Liao:
3-D Shape Retrieval Using Cognitive Psychology-based Principles. ISM 2005: 287-294 - 2004
- [j28]Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin:
Sharing and hiding secret images with size constraint. Pattern Recognit. 37(7): 1377-1385 (2004) - [c6]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Ja-Chen Lin:
Visual salience-guided mesh decomposition. MMSP 2004: 331-334 - 2003
- [j27]Chih-Ching Thien, Ja-Chen Lin:
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit. 36(12): 2875-2881 (2003) - [j26]Chih-Ching Thien, Ja-Chen Lin:
An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12): 1161-1169 (2003) - [c5]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin:
Authentication of 3-D Polygonal Meshes. IWDW 2003: 168-183 - 2002
- [j25]Chih-Ching Thien, Ja-Chen Lin:
Secret image sharing. Comput. Graph. 26(5): 765-770 (2002) - [j24]Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin:
Wavelet-based optical flow estimation. IEEE Trans. Circuits Syst. Video Technol. 12(1): 1-12 (2002) - 2001
- [j23]Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin:
Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit. 34(3): 671-683 (2001) - [j22]Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Chin-Chuan Han:
Why recognition in a statistics-based face recognition system should be based on the pure face portion: a probabilistic decision-based proof. Pattern Recognit. 34(7): 1393-1403 (2001) - [c4]Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin:
Person identification using facial motion. ICIP (2) 2001: 677-680 - 2000
- [j21]Li-Fen Chen, Hong-Yuan Mark Liao, Ming-Tat Ko, Ja-Chen Lin, Gwo-Jong Yu:
A new LDA-based face recognition system which can solve the small sample size problem. Pattern Recognit. 33(10): 1713-1726 (2000) - [j20]Kuang-Shyr Wu, Ja-Chen Lin:
Fast VQ encoding by an efficient kick-out condition. IEEE Trans. Circuits Syst. Video Technol. 10(1): 59-62 (2000) - [c3]Li-Fen Chen, Ja-Chen Lin, Hong-Yuan Mark Liao:
Wavelet-Based Optical Flow Estimation. ICPR 2000: 7068-7071
1990 – 1999
- 1999
- [j19]Wu-Ja Lin, Ja-Chen Lin:
Color quantization by preserving color distribution features. Signal Process. 78(2): 201-214 (1999) - 1998
- [j18]Trees-Juen Chuang, Ja-Chen Lin:
New approach to image encryption. J. Electronic Imaging 7(2): 350-356 (1998) - [j17]Jing-Yi Lu, Kuang-Shyr Wu, Ja-Chen Lin:
Fast full search in motion estimation by hierarchical use of Minkowski's inequality (HUMI). Pattern Recognit. 31(7): 945-952 (1998) - [j16]Trees-Juen Chuang, Ja-Chen Lin:
A New Algorithm For Lossless Still Image Compression. Pattern Recognit. 31(9): 1343-1352 (1998) - [j15]Ja-Chen Lin, Jenn-Yih Lin:
A 1 log N parallel algorithm for detecting convex hulls on image boards. IEEE Trans. Image Process. 7(6): 922-925 (1998) - 1997
- [j14]Wei-Yu Han, Ja-Chen Lin:
Edge detection and edge-preserved compression for error-diffused images. Comput. Graph. 21(6): 757-767 (1997) - [j13]Wei-Yu Han, Ja-Chen Lin:
Error diffusion without contouring effect. J. Electronic Imaging 6(1): 133-139 (1997) - [j12]Chen-Kuei Yang, Ja-Chen Lin, Wen-Hsiang Tsai:
Color image compression by moment-preserving and block truncation coding techniques. IEEE Trans. Commun. 45(12): 1513-1516 (1997) - 1996
- [j11]Ching-Yung Yang, Ja-Chen Lin:
RWM-cut for color image quantization. Comput. Graph. 20(4): 577-588 (1996) - [j10]Ja-Chen Lin:
Multi-Class Clustering by Analytical Two-Class Formulas. Int. J. Pattern Recognit. Artif. Intell. 10(4): 307-323 (1996) - [j9]Ja-Chen Lin:
The family of universal axes. Pattern Recognit. 29(3): 477-485 (1996) - [j8]Ja-Chen Lin:
A simplified fold number detector for shapes with monotonic radii. Pattern Recognit. 29(6): 997-1005 (1996) - [j7]Ja-Chen Lin, Wu-Ja Lin:
Real-time and automatic two-class clustering by analytical formulas. Pattern Recognit. 29(11): 1919-1930 (1996) - 1995
- [j6]Chen-Kuei Yang, Tsu-Chin Wu, Ja-Chen Lin, Wen-Hsiang Tsai:
Color image sharpening by moment-preserving technique. Signal Process. 45(3): 397-403 (1995) - [c2]Ching-Yung Yang, Ja-Chen Lin:
Color quantization by RWM-cut. ICDAR 1995: 669-672 - 1994
- [j5]Ja-Chen Lin, Wen-Hsiang Tsai:
Feature-Preserving Clustering of 2-D Data for Two-Class Problems Using Analytical Formulas: An Automatic and Fast Approach. IEEE Trans. Pattern Anal. Mach. Intell. 16(5): 554-560 (1994) - [j4]Ja-Chen Lin, Wen-Hsiang Tsai, Jun-Ann Chen:
Detecting number of folds by a simple mathematical property. Pattern Recognit. Lett. 15(10): 1081-1088 (1994) - [c1]Chen-Kuei Yang, Ja-Chen Lin, Wen-Hsiang Tsai:
Color Image Compression by Moment-Preserving and Block Truncation Coding Techniques. ICIP (3) 1994: 972-976 - 1993
- [j3]Ja-Chen Lin:
Universal principal axes: an easy-to-construct tool useful in defining shape orientations for almost every kind of shape. Pattern Recognit. 26(4): 485-493 (1993) - 1992
- [j2]Ja-Chen Lin, Sheng-Lin Chou, Wen-Hsiang Tsai:
Detection of rotationally symmetric shape orientations by fold-invariant shape-specific points. Pattern Recognit. 25(5): 473-482 (1992) - 1991
- [j1]Sheng-Lin Chou, Ja-Chen Lin, Wen-Hsiang Tsai:
Fold principal axis-a new tool for defining the orientations of rotationally symmetric shapes. Pattern Recognit. Lett. 12(2): 109-115 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint