Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Tzung-Her Chen"'
Publikováno v:
IEEE Access, Vol 11, Pp 85202-85213 (2023)
The construction of smart grids provides many benefits. Computational cost, however, drastically grows with an increase in scale since a large amount of data is generated, transmitted, collected, and treated. Although data aggregation technology is h
Externí odkaz:
https://doaj.org/article/ad5c3239f4e841eabd8fc59e70577879
Autor:
Tzung-Her Chen, Jing-Ya Yan
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 8865 (2023)
High-dynamic-range (HDR) images are widely regarded as the ideal format for digital images due to their ability to accurately render a wider range of luminance values. Recently, research has focused on introducing data-hiding techniques to HDR images
Externí odkaz:
https://doaj.org/article/ae97070b4cc349b2be43858338d55d81
Autor:
Chien-Ding Lee, Tzung-Her Chen
Publikováno v:
Symmetry, Vol 13, Iss 7, p 1144 (2021)
The invention of electronic mail (e-mail) has made communication through the Internet easier than before. However, because the fundamental functions of the Internet are built on opensource technologies, it is critical to keep all transmitted e-mail s
Externí odkaz:
https://doaj.org/article/161f0dcc11254df39588031b4a53d37f
Publikováno v:
Symmetry, Vol 13, Iss 5, p 855 (2021)
Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel exis
Externí odkaz:
https://doaj.org/article/7ba2366c478b4cdd98fa48b9734ac453
Autor:
Tzung-Her Chen, 陳宗和
93
As easiness and rapidness of distribution for digital multimedia data over communication networks enrich the daily lives of people, the challenges of multimedia security are rising such as confidentiality, authentication, integrity, non-repud
As easiness and rapidness of distribution for digital multimedia data over communication networks enrich the daily lives of people, the challenges of multimedia security are rising such as confidentiality, authentication, integrity, non-repud
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/41198803464846197046
Autor:
Jing-Ya Yan, Tzung-Her Chen
Publikováno v:
Multimedia Tools and Applications. 80:27807-27828
For the sake of image security, confidentiality and integrity are always the first two concerns and can be further guaranteed by image encryption and authentication techniques, respectively. However, traditional image encryption and authentication fo
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applyi
Publikováno v:
Multimedia Tools and Applications. 80:1901-1924
Recently, the image secret sharing technique based on POB (Permutation Ordered Binary) number systems has drawn attention in academia. Thanks to Singh et al.’s pioneer in combining image confidentiality and authentication to form a cloud-based imag
Autor:
Xi-Wen Wu, Tzung-Her Chen
Publikováno v:
Multimedia Tools and Applications. 79:13247-13265
Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu pioneer in proposing the
Publikováno v:
Computer methods and programs in biomedicine. 221
Due to the mature development of information and network technology, telemedicine is increasingly able to facilitate the implementation of long-term care for patients with disabilities. Such patients may, however, not be adept at usage of such techno