|
研究計畫 |
1. |
詹啟祥 國科會 2008.08.1 ~2009.07.31
|
以雜湊法及取代表為基礎之秘密影像分享技術 |
2. |
詹啟祥 國科會 2009.08.1 ~2010.07.31
|
高隱藏容量及隱藏效能之資料隱藏技術 |
3. |
詹啟祥 國科會 2010.08.2 ~2011.07.31
|
植基於模數函式之秘密影像分享技術 |
SCI、SSCI、A&HCI、EI、TSSCI期刊論文 |
1. |
詹啟祥(Chi-Shiang Chan) ,2009-, (已刊登)
|
FUNDAMENTA INFORMATICAE 96卷1-2期:49頁~59頁 |
On Using LSB Matching Function for Data Hiding in Pixels |
2. |
詹啟祥(Chi-Shiang Chan) ,2010-, (已刊登)
|
FUNDAMENTA INFORMATICAE 卷期:頁~頁 |
On Using LSB Matching Function for Data Hiding in Pixels |
3. |
詹啟祥(Chi-Shiang Chan) ,2010-, (已刊登)
|
International Journal of Innovative Computing Information and Control 6卷5期:2080頁~2102頁 |
Reversible Data Hiding in Two Steganographic Images Using Matrix Coding |
4. |
詹啟祥(Chi-Shiang Chan) ,2010-, (已刊登)
|
International Journal of Innovative Computing Information and Control 卷期:頁~頁 |
Reversible Data Hiding in Two Steganographic Images Using Matrix Coding |
5. |
李榮三(Jung-San Lee)、詹啟祥(Chi-Shiang Chan)、張真誠(Chin-Chen Chang) ,2009-, (已刊登)
|
IET Information Security 3卷4期:139頁~147頁 |
Non-Iterative Privacy Preservation for Online Lotteries |
6. |
(Pei-Yu Lin)、詹啟祥(Chi-Shiang Chan) ,2010-, (已刊登)
|
PATTERN RECOGNITION LETTERS 31卷無期:1887頁~1893頁 |
Invertible Secret Image Sharing with Steganography |
7. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
Optical Engineering 卷期:頁~頁 |
A Color Image Hiding Scheme Using Image Differencing |
8. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
Fundamenta Informaticae 卷期:頁~頁 |
A Inverse Halftoning Technique Using Modified Look-Up Tables |
9. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
INFORMATICA 卷期:頁~頁 |
A Watermarking Scheme Based on Principal Component Analysis Technique |
10. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
Fundamenta Informaticae 卷期:頁~頁 |
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy |
11. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
IMAGING SCIENCE JOURNAL 卷期:頁~頁 |
An Image Hiding Scheme by Fiding an Optimal One-to-two Substitution Table Using Dynamic Programming Strategy |
12. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
Pattern Recognition 卷期:頁~頁 |
Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy |
13. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
Pattern Recognition 卷期:頁~頁 |
Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels |
14. |
詹啟祥(Chi-Shiang Chan) ,-, ()
|
Signal Processing 卷期:頁~頁 |
Removing the Blocking Effects Using Artificial Neural Network |
15. |
詹啟祥(Chi-Shiang Chan) ,2011-, (已刊登)
|
PATTERN RECOGNITION LETTERS 32卷期:1697頁~1690頁 |
An image authentication method by applying Hamming code on rearranged bits |
16. |
詹啟祥(Chi-Shiang Chan) ,2009-, (已刊登)
|
The 3rd International Conference on Ubiquitous Information Management and Communication 卷期:246頁~250頁 |
An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited |
17. |
詹啟祥(Chi-Shiang Chan) ,2009-, (已刊登)
|
The 2009 International Conference on Computational Intelligence and Natural Computing 卷期:253頁~256頁 |
Secret image sharing with reversible steganography |
18. |
詹啟祥(Chi-Shiang Chan) ,2009-, (已刊登)
|
Proceedings - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing 卷期:320頁~323頁 |
Reversible Steganography for VQ Indices Using the Modified State Codebook |
19. |
詹啟祥(Chi-Shiang Chan) ,2010-, (已刊登)
|
Proceedings of the 9th IEEE International Conference on Cognitive Informatics 卷期:835頁~839頁 |
Hiding secret in parity check bits by applying XOR Function |
20. |
詹啟祥(Chi-Shiang Chan) ,2010-, (已刊登)
|
Proceedings - 2010 1st International Conference on Pervasive Computing, Signal Processing and Applications 卷期:382頁~385頁 |
Secret image sharing with steganography and authentication using dynamic programming strategy |
21. |
詹啟祥(Chi-Shiang Chan) ,2011-, (已刊登)
|
2011 IEEE 3rd International Conference on Communication Software and Networks 卷期:417頁~420頁 |
Feature-based disconnected edge segments linker |
22. |
詹啟祥(Chi-Shiang Chan) ,2011-, (已刊登)
|
Proceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011 卷期:288頁~293頁 |
A verifiable and recoverable secret image sharing mechanism |
23. |
蔡淵裕(Yuan-Yu Tsai)、詹啟祥(Chi-Shiang Chan) ,2011-, (已刊登)
|
The Fifth International Conference on Genetic and Evolutionary Computing 卷期:172頁~175頁 |
A Novel Cluster-based Difference Expansion Transform for Lossless Data Hiding |
24. |
詹啟祥(Chi-Shiang Chan) ,2007-02, (已刊登)
|
PATTERN RECOGNITION 40卷2期:681頁~690頁 |
An Efficient Image Authentication Method Based on Hamming Code |
25. |
陳宜惠(Yi-Hui Chen)、詹啟祥(Chi-Shiang Chan) ,2011-12, (已刊登)
|
Journal of Electronic Science and Technology 9卷4期:297頁~300頁 |
A Double-Layer Data Embedding Scheme Based on Three-Pixel Differences |
26. |
陳宜惠(Yi-Hui Chen)、詹啟祥(Chi-Shiang Chan) ,2012-, (已接受未出版)
|
中華輔導與諮商學報/Chinese Journal of Guidance and Counseling 卷32期:頁~頁 |
團體領導能力量表之編製與信、效度建構 |
非SCI、SSCI、A&HCI、EI、TSSCI...等具審查機制論文 |
1. |
(Chin-Chen Chang)、(Yu-Zheng Wang)、詹啟祥(Chi-Shiang Chan)* ,2009-, (已刊登)
|
International Journal of Signal Processing, Image Processing and Pattern Recognition 2卷1期:71頁~78頁 |
An Efficient Probability -based t out of n Secret Image Sharing Scheme |
|
|