Zobrazeno 1 - 10
of 137
pro vyhledávání: '"Jen Chun Chang"'
Publikováno v:
Sensors, Vol 22, Iss 2, p 530 (2022)
Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limita
Externí odkaz:
https://doaj.org/article/7a9c36766d4c46a680b6939dd989f9a4
Autor:
Jen Chun Chang, Jun Yang Chang
Publikováno v:
ICFET
In recent years, the issue of person re-identification has become more and more popular, which is an important research subject in the field of computer vision, and many models or methods for different predicaments have been proposed successively. Ho
Publikováno v:
Journal of Non-Crystalline Solids. 482:170-176
The amorphous thin film metallic glasses (TFMGs) have been studied widely due to their unique properties and ease of fabrication as compared with the bulk metallic glasses (BMGs). Among the many TFMG systems, the W-based TFMG remains unstudied. In th
Publikováno v:
Signal Processing. 133:135-143
In this paper, we construct a separable reversible data hiding scheme for encrypted JPEG bitstreams. Our proposed scheme is constructed via a reserving-room-before-encryption manner, that is, the original JPEG bitstream is modified with small distort
Autor:
Jen-Chun Chang1 jcchang@csie.nctu.edu.tw, Rong-Jaye Chen2 rjchen@csie.nctu.edu.tw, Hwang, Frank K.3 fhwang@math.nctu.edu.tw
Publikováno v:
Methodology & Computing in Applied Probability. Dec2001, Vol. 3 Issue 4, p379-386. 8p.
Publikováno v:
Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing ISBN: 9783030037444
In this paper, we study the d-dimensional knapsack problem (d-KP). The problem d-KP is a generalized version of the well-known knapsack problem (1-KP) which is known to be an NP-complete problem. It is also known that there is no fully polynomial-tim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a0b8b8f2a3fd320067717707e2bfce32
https://doi.org/10.1007/978-3-030-03745-1_5
https://doi.org/10.1007/978-3-030-03745-1_5
Publikováno v:
2018 3rd International Conference on Computer and Communication Systems (ICCCS).
Ransomwares are continuously produced in underground markets such that increasingly high-level and sophisticated ransomwares are spreading all over the world, significantly affecting individuals, businesses, governments, and countries. To prevent lar
Publikováno v:
Thin Solid Films. 584:253-256
While thin film metallic glass (TFMG) materials have been studied widely due to their easy fabrication process and unique properties, the W-based or W-containing TFMGs have yet to be explored extensively. In this work, four W-containing Zr–W–Ti T
Publikováno v:
Advances in Intelligent Information Hiding and Multimedia Signal Processing ISBN: 9783319638553
IIH-MSP (1)
IIH-MSP (1)
In this paper, we study reversible data hiding schemes for JPEG images and we propose a method which is constructed by embedding secret data into zero quantized coefficients. In the proposed method, consecutive zero quantized coefficients in a fixed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::733fd41f521ca9d7e51cddcb1d68684f
https://doi.org/10.1007/978-3-319-63856-0_19
https://doi.org/10.1007/978-3-319-63856-0_19
Publikováno v:
Digital Forensics and Watermarking ISBN: 9783319534640
IWDW
IWDW
Reference-matrix-based data hiding is a way to embed secret data within cover images according to a secret reference matrix. Existing schemes such as exploiting-modification-direction-based method, Sudoku-based method, and magic-cube-based method pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::301971dc73bad12df09e5e17d14da395
https://doi.org/10.1007/978-3-319-53465-7_43
https://doi.org/10.1007/978-3-319-53465-7_43