English  |  正體中文  |  简体中文  |  Items with full text/Total items : 92472/107804 (86%)
Visitors : 19123767      Online Users : 465
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Loading community tree, please wait....


    Loading year class tree, please wait....

    Items for Author "CHang)*, 張真誠(Chin-Chen" 

    Return to Browse by Author

    Showing 37 items.

    Collection Date Title Authors Bitstream
    [資訊工程學系] 期刊論文 2016-05 A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method Li), Fan Li(Fan; Mao), Qian Mao(Qian; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2016-04 A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices CHang)*, 張真誠(Chin-Chen; Thai-SonNguy(Thai-SonNguyen); Meng-ChiehLi(Meng-ChiehLin); Chia-ChenLin(Chia-ChenLin)
    [資訊工程學系] 期刊論文 2016-03 A Strong RSA-based and Certificateless-based Signature Scheme CHang)*, 張真誠(Chin-Chen; Sun), Chin-Yu Sun(Chin-Yu; Chang), Shih-Chang C(Shih-Chang
    [資訊工程學系] 期刊論文 2016-02 A Magic Cube Based Information Hiding Scheme of Large Payload Wu), Qiong Wu(Qiong; Zhu), Chen Zhu(Chen; Li), Jian-Jun Li(Jian-Jun; CHang)*, 張真誠(Chin-Chen; Wang), Zhi-Hui Wang(Zhi-Hui
    [資訊工程學系] 期刊論文 2016-01 Reversible Data Hiding Based on Geometric Structure of Pixel Groups Wang), Zhi-Hui Wang(Zhi-Hui; Zhuang), Xu Zhuang(Xu; CHang)*, 張真誠(Chin-Chen; Qin), Chuan Qin(Chuan; Zhu), Yan Zhu(Yan
    [資訊工程學系] 期刊論文 2016-01 Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues Wang), Feng Wang(Feng; CHang)*, 張真誠(Chin-Chen; Lin), Changlu Lin(Changlu; Chang), Shih-Chang C(Shih-Chang
    [資訊工程學系] 期刊論文 2016-01 A Practical Lottery Using Oblivious Transfer Liu), Yi-Ning Liu(Yi-Ning; Cheng), Chi Cheng(Chi; Jiang), Tao Jiang(Tao; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2016-01 A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards CHang)*, 張真誠(Chin-Chen; Cheng), Ting-Fang Ch(Ting-Fang; Hsueh), Wei-Yuan Hsu(Wei-Yuan
    [資訊工程學系] 期刊論文 2015-10 Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding Mao), Qian Mao(Qian; Li), Fan Li(Fan; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-09 A Meaningful Scheme for Sharing Secret Images Using Mosaic Images Zhai), Shengyun Zha(Shengyun; Li), Fan Li(Fan; CHang)*, 張真誠(Chin-Chen; Mao), Qian Mao(Qian
    [資訊工程學系] 期刊論文 2015-09 A Grouped-scalable Secret Image Sharing Scheme Liu), Wenjie Liu(Wenjie; Wang), Anhong Wang(Anhong; CHang)*, 張真誠(Chin-Chen; Li), Zhihong Li(Zhihong; Liu), Li Liu(Li
    [資訊工程學系] 期刊論文 2015-08 A Proxy User Authentication Protocol Using Source-Based Image Morphing Mao), Qian Mao(Qian; Bharanitharan), K. Bharanith(K.; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-07 A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme Kuo), Wen-Chung Ku(Wen-Chung; Kao), Ming-Chih Ka(Ming-Chih; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-07 A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties Liu), Chenglian Li(Chenglian; CHang)*, 張真誠(Chin-Chen; Wu), Zhi-Pan Wu(Zhi-Pan; Ye), Shi-Lin Ye(Shi-Lin
    [資訊工程學系] 期刊論文 2015-07 An Outlier Detection Method for Feature Point Matching Problem Tang), Jin Tang(Jin; Jiang), Bo Jiang(Bo; Luo), Bin Luo(Bin; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-07 A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET Le), Hai-Duong Le(Hai-Duong; CHang)*, 張真誠(Chin-Chen; Chou), Yeh-Chieh Ch(Yeh-Chieh
    [資訊工程學系] 期刊論文 2015-07 A Novel Information Hiding Scheme Based on Line Segments Wang), Zhi-Hui Wang(Zhi-Hui; W), Qing W(Qing; Luo), Zhong-Xuan L(Zhong-Xuan; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-07 Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images Qin), Chuan Qin(Chuan; CHang)*, 張真誠(Chin-Chen; Hsu), Tai-Jung Hsu(Tai-Jung
    [資訊工程學系] 期刊論文 2015-05 Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values Wang), Dong Wang(Dong; CHang)*, 張真誠(Chin-Chen; Liu), Yining Liu(Yining; Song), Guoxiang Son(Guoxiang; Liu), Yunbo Liu(Yunbo
    [資訊工程學系] 期刊論文 2015-05 Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction Liu), Li Liu(Li; Wang), An-Hong Wang(An-Hong; CHang)*, 張真誠(Chin-Chen; Jin), Qiang Jin(Qiang; Xia), Bin-Bin Xia(Bin-Bin
    [資訊工程學系] 期刊論文 2015-05 Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images Lu), Jianfeng Lu(Jianfeng; Wang), Meng Wang(Meng; Dai), Junping Dai(Junping; Huang), Qianru Huang(Qianru; Li), Li Li(Li; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-05 A Secure and Efficient Scheme for Digital Gift Certificates Liu), Yanjun Liu(Yanjun; CHang)*, 張真誠(Chin-Chen; Sun), Chin-Yu Sun(Chin-Yu
    [資訊工程學系] 期刊論文 2015-05 An Image-Based Key Agreement Protocol Using the Morphing Technique Mao), Qian Mao(Qian; CHang)*, 張真誠(Chin-Chen; Harn), Lein Harn(Lein; Chang), Shih-Chang C(Shih-Chang
    [資訊工程學系] 期刊論文 2015-05 A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets Liu), Yanjun Liu(Yanjun; Harn), Lein Harn(Lein; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-04 Second-Order Steganographic Method Based on Adaptive Reference Matrix Yin), Zhao-Xia Yin(Zhao-Xia; CHang)*, 張真誠(Chin-Chen; Xu), Qin Xu(Qin; Luo), Bin Luo(Bin
    [資訊工程學系] 期刊論文 2015-03 A Critique of a Lightweight Identity Authentication Protocol for Vehicular Network Jia), Xue-Dan Jia(Xue-Dan; Chang), Ya-Fen Chang(Ya-Fen; CHang)*, 張真誠(Chin-Chen; Wang), Liang-Min Wa(Liang-Min
    [資訊工程學系] 期刊論文 2015-03 A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems Wu), Hsiao-Ling W(Hsiao-Ling; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-03 Group Authentication and Group Key Distribution for Ad Hoc Networks Wang), Feng Wang(Feng; CHang)*, 張真誠(Chin-Chen; Chou), Yeh-Chieh Ch(Yeh-Chieh
    [資訊工程學系] 期刊論文 2015-03 A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem Guo), Cheng Guo(Cheng; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-03 Novel and Practical Scheme based on Secret Sharing for Laptop Data Protection CHang)*, 張真誠(Chin-Chen; Chou), Yeh-Chieh Ch(Yeh-Chieh; Sun), Chin-Yu Sun(Chin-Yu
    [資訊工程學系] 期刊論文 2015-03 An Adaptive Reversible Steganographic Scheme Based on the Just Noticeable Distortion Qin), Chuan Qin(Chuan; CHang)*, 張真誠(Chin-Chen; Lin), Chia-Chun Li(Chia-Chun
    [資訊工程學系] 期刊論文 2015-03 A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability Liu), Li Liu(Li; Wang), An-Hong Wang(An-Hong; CHang)*, 張真誠(Chin-Chen; Li), Zhi-Hong Li(Zhi-Hong; Liu), Jin-bo Liu(Jin-bo
    [資訊工程學系] 期刊論文 2015-02 A Divide-conquer Heuristic Search Algorithm for Cutting Surplus Steel Plates of Steel & Iron Companies Li), Ziqiang Li(Ziqiang; Huang), Rong Huang(Rong; Peng), Banglun Peng(Banglun; CHang)*, 張真誠(Chin-Chen; Wang), Qiuzhen Wang(Qiuzhen
    [資訊工程學系] 期刊論文 2015-01 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording Li), Li Li(Li; Dong), Zihui Dong(Zihui; Lu), Jianfeng Lu(Jianfeng; Dai), Junping Dai(Junping; Huang), Qianru Huang(Qianru; CHang)*, 張真誠(Chin-Chen; Wu), Ting Wu(Ting
    [資訊工程學系] 期刊論文 2015-01 An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map Lee), Chin-Feng Le(Chin-Feng; CHang)*, 張真誠(Chin-Chen; Pai), Pei-Yan Pai(Pei-Yan; Liu), Chia-Ming Li(Chia-Ming
    [資訊工程學系] 期刊論文 2015-01 Ciphertext-Auditable Identity-Based Encryption Lin), Changlu Lin(Changlu; Li), Yong Li(Yong; Lv), Kewei Lv(Kewei; CHang)*, 張真誠(Chin-Chen
    [資訊工程學系] 期刊論文 2015-01 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management Liu), Yanjun Liu(Yanjun; CHang)*, 張真誠(Chin-Chen; Chang), Shih-Chang C(Shih-Chang

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback