研究成果列表
單位名稱資訊工程學系教師姓名陳宗和
教師分級教授專兼任專任
在校狀態在職行政職務

期刊論文(共計111筆)
序號學年度學期年度月份作者題目通訊作者作者順位期刊名稱卷數頁數關鍵字
1114120259Tzung-Her Chen, Wei-Hsiang HungFeasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware第一順位Electronics14 3821  
2114120259Tzung-Her Chen, Chien-Ding Lee, and Yu-Chieh ChangPioneering quantum authenticated key agreement through Grover’s algorithm第一順位 Quantum Information Processing  
3113220256Tzung-Her Chen A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things第一順位Future Internet17  263  
4112220243Xi-Wen Wu, Tzung-Her ChenSecurity enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares第二順位Multimedia Tools and Applications83 28913–28926  
5112120238Chien-Ding Lee, Jhih-Hong Li, and Tzung-Her ChenA Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids第三順位IEEE Access11  85202-8521  
6112120238Tzung-Her Chen, Jing-Ya YanEnhanced Steganography for High Dynamic Range Images with Improved Security and Capacity第一順位Applied Sciences13 8865  
7111220232江毓晴、陳元娣、呂明憲、汪侑翰、陳宗和智能合約的安全防護與檢測平台實作第一順位Communications of the CCISA29 35-52  
8110220226Chien-Ding Lee, Zhen-Hong Liao and Tzung-Her ChenMedical Cooperative Authenticated Key Agreement Schemes with Involvement of Personal Care Assistant in Telemedicine第三順位Computer Methods and Programs in Biomedicine221 106809  
9109220216Chien-Ding Lee and Tzung-Her ChenNew Secure and Practical E-mail Protocol with Perfect Forward Secrecy第二順位Symmetry 13 1144  
10109220215Tzung-Her Chen and Jing-Ya YanCommutative Encryption and Authentication for OpenEXR High Dynamic Range Images第一順位Multimedia Tools and Applications80 1901-1924  
11109220215Tzung-Her Chen, Wei-Bin Lee, Hsing-Bai Chen and Chien-Lung WangRevisited - the Subliminal Channel in Blockchain and its application to IoT security第一順位Symmetry13 855  
12109220212Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung WangBlockchain-as-a-CA: A provably secure signcryption scheme revisited by leveraging blockchains第一順位Security and Communication Networks2021  6637402  
13109120211Tzung-Her Chen, Tzu-Ching Chang, and Ting-Le ZhuSecurity-enhanced Cloud-based Image Secret Sharing and Authentication Using POB Number System第一順位Multimedia Tools and Applications80 1901-1924  
14108220205Tzung-Her Chen, Xi-Wen WuMultiple Secret Image Sharing with General Access Structure第一順位Multimedia Tools and Applications79 13247–13265 Booleanoperation.Generalaccessstructure.Multiplesecretimagesharing.Visual secret sharing 
15107220195Tai-Yuan Tu, Chih-Hung Wang, Tzung-Her ChenSecure Progressive Visual Secret Sharing第三順位 Journal of Chung Cheng Institute of Technology48 10157-10180  
16107220194Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her ChenOn The Security of Threshold Random Grid-based Visual Secret Sharing 其他Multimedia Tools and Applications 78 10157-10180  
17107120191Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, and Tzung-Her ChenSecure and efficient protection for HTTP cookie with self-verification其他International Journal of Communication Systems32  e3857  
18107120189Hsing-Bai Chen, Wei-Bin Lee, and Tzung-Her ChenA Novel DRM Scheme for Accommodating Expectations of Personal Use第三順位Multimedia Tools and Applications77 23099-23114  
19106220185Fuh-Gwo Jeng, Bing-Jian Wang, Tzung-Her ChenSecurity of a UUP Web Search Protocol with Privacy Preserving," Journal of Chung Cheng Institute of Technology (EI) 第三順位Journal of Chung Cheng Institute of Technology47 107-114  
20106220185Tzung-Her Chen and Tzu-Ching ChangOn the security of a BTC-based-compression image authentication scheme第一順位Multimedia Tools and Applications77 12979-12989  
21106220184Tzung-Her Chen, Kai-Siang Lin, Chih-Hung LinOn the Design of Two-decoding-option Image Secret Sharing Scheme第一順位Multimedia Tools and Applications77 7865-7881  
221061201711I-Chun Weng and Tzung-Her ChenA Novel Weighted Visual Cryptography Scheme with High Visual Quality 第二順位International Journal of Network Security19 922-928  
231061201710李琪霖、黃偉倫、郭育麟、王炳兼、陳宗和,漫談H.264/AVC的選擇加密法其他Communications of the CCISA23 73-92  
24105220176Jyun-Ci Huang, Fuh-Gwo Jeng and Tzung-Her ChenA new buyer-seller watermarking protocol without multiple watermarks insertion第三順位Multimedia Tools and Applications76 9667-9679  
25104220167Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her ChenA Multi-Watermarking Protocol for Health Information Management第三順位Multimedia Tools and Applications 75 8123-8135  
26104220167Fuh-Gwo Jeng, Jyun-Ci Huang and Tzung-Her ChenAn improved anonymous buyer-reseller watermarking protocol其他International Journal of Network Security18 728-735  
27104220165Tzung-Her Chen , Yao-Sheng Lee and Chih-Hung LinOn the difficulty of aligning VSS random grids 第一順位Signal Processing: Image Communication44 101-107  
28104220165Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, *Tzung-Her ChenOn the security of privacy-preserving keyword searching for cloud storage services其他International Journal of Network Security18 597-600  
291041201511Chih-Hung Lin, Yao-Sheng Lee and Tzung-Her ChenFriendly progressive random-grid-based visual secret sharing with adaptive contrast第三順位Journal of Visual Communication and Image Representation34 45-51  
301041201510Kai-Hsiang Tsao, Shyong Jian Shyu, Chih-Hung Lin, Yao Sheng Lee and Tzung-Her ChenVisual Multiple-Secret Sharing for Flexible General Access Structure by Random Grids其他Display39 pp. 80-92  
31103220153Fuh-Gwo Jeng, Wei-Lun Huang, Tzung-Her ChenCryptanalysis and improvement of two hyper-chaos-based image encryption schemes第三順位Signal Processing: Image Communication34 pp. 45-51  
321031201412Kai-Siang Lin, Chih-Hung Lin, Tzung-Her ChenDistortionless visual multi-secret sharing based on random grid第三順位Information Sciences288 330–346  
331031201412Tzung-Her Chen, Sheng-Shiang ChangImage encryption on HDR images for OpenEXR format第一順位International Journal of Science and Engineering19-23  
341031201411Ci-Lin Li, Chih-Yang Lin and Tzung-Her ChenEfficient compression-jointed quality controllable scrambling method for H.264/SVC第三順位International Journal of Network Security 16 541-548  
351031201410Chih-Hung Lin, Yan-Ting Wu; Kai-Hsiang Tsao; Kai-Siang Lin, Tzung-Her ChenMulti-factor Cheating Prevention in Visual Secret Sharing by Hybrid Codebooks其他Journal of Visual Communication and Image Representation25 1543–1557  
36103120149Jia-Hong Li, Tzung-Her Chen, and Wei-Bin LeeTattooing Attack - A New Type of Watermarking Attacks on Image Authentication第二順位International Journal of Digital Crime and Forensics36-40  
37103120148Fuh-Gwo Jeng, Kai-Siang Lin, Chih-Hung Lin, and Tzung-Her ChenVisual multi-secret sharing with friendliness其他Journal of Shanghai Jiaotong University (Science)19 445-465  
381021201312Tzung-Her Chen, Bing-Jian Wang, Yao-Sheng LeeA random grid-based cyclic access structure VSS scheme for multiple secret images第一順位Displays34 380-387  
39101220136Chih-Hung Lin, Tzung-Her Chen* and Chang-Sian WuA Batch image encryption scheme based on chaining random grids第二順位Scientia Iranica20 670-681  
40101220133Yao-Sheng Lee, Bing-Jian Wang and Tzung-Her Chen*Quality-improved threshold visual secret sharing scheme by random grids第一順位IET Image Processing137-143  
41101220133T.-H. Chen, Y.-S. Lee, W.-L. Huang, Justie Su-Tzu Juan, Y.-Y. Chen, and M.-J. LiQuality-Adaptive Visual Secret Sharing by Random Grids第一順位Journal of Systems and Software86 1267–1274  
42101120131Chih-Hung Lin, Tzung-Her Chen* and Chun-Wei ChiuColor image authentication with tamper detection and remedy based on BCH and Bayer Pattern第二順位Displays34 59-68  
431011201210Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Lin and Tzung-Her ChenOn the security of time-bound hierarchical key management scheme for secure broadcasting其他ICIC Express Letters2541-2544  
44101120129Chih-Yang Lin, Panyaporn Prangjarote, Li-Wei Kang, Wei-Lun Huang, *Tzung-Her Chen,Joint Fingerprinting and Decryption with Noise-resistant for Vector Quantization Images其他Signal Processing92 2159–2171  
45101120128Tzung-Her Chen and Yao-Sheng LeeA new random-grid-based visual secret sharing by edge enhancement第一順位Computational Information Systems1507-1513  
46100220124Tzung-Her Chen and Kuang-Che LiMulti-Image encryption by circular Random Grids第一順位Information Sciences189 255-265  
47100220124Tai-Yuan Tu, Chih-Hung Wang, Tzung-Her ChenA High-Capacity Data Hiding Scheme by Vector Quantization Index with Search-Order Coding第三順位Advanced Science Letters822-827  
48100220123Yao-Sheng Lee and Tzung-Her ChenInsight into collusion attacks in random-gird-based visual secret sharing第二順位Signal Processing92 727-736  
49100220123Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung WangA security-enhanced key agreement protocol based on chaotic maps第一順位Security and Communication Networks108-114  
50100220122Tzung-Her Chen, Kai-Hsiang Tsao, and Yao-Sheng LeeYet Another Multiple-image encryption by rotating random grids第一順位Signal Processing92 2229-2237  
51100120121邱俊瑋、李琪霖、陳宗和具有低運算與壓縮率的H.264_AVC可知覺視訊加密之研究第三順位Communications of the CCISA18 1-22  
521001201110Bing-Jian Wang, Tzung-Her Chen, *Fuh-Gwo JengSecurity Improvement against Malicious Server’s attack for A dPEKS Scheme第二順位International Journal of Information and Education Technology350-353  
53099120111Tzung-Her Chen, Kai-Hsiang TsaoUser-friendly random grid-based visual secret sharing第一順位IEEE Transactions on Circuits and Systems for Video Technology21 1693-1703  
54099120111Tzung-Her Chen and Ci-Lin LiAn enhanced threshold authenticated encryption scheme with convertibility第一順位Innovative Computing Information and Control6177-6185  
55099120111Tzung-Her Chen and Kai-Hsiang TsaoThreshold Visual Secret Sharing by Random Grids第一順位Journal of Systems and Software84 1197-1208  
56099120111Tzung-Her Chen, Kai-Hsiang Tsao, and Shu-Jye ChangGenerating friendly and colorful shares in color visual cryptography第一順位Communications of the CCISA17 37-47  
57099120111Tzung-Her Chen and Chang-Sian WuEfficient multi-secret image sharing based on boolean operations第一順位Signal Processing   
58099120109Hao-Li Wang, Tzung-Her Chen, Long-Sheng Li, Yan-Ting Wu, Jhong ChenAn Authenticated Key Exchange Protocol for Mobile Stations from Two Distinct Home Networks第二順位International Journal of Innovative Computing Information and Control   
59098220106Tzung-Her Chen, Tsung-Hao Hung and Yan-Ting WuLightweight key management of DRM systems第一順位International Journal of Innovative Computing Information and Control   
60098220106Tzung-Her ChenRemarks on some watermarking schemes based on DWT第一順位Journal of Computational Information Systems   
61098220105Chih-Hung Wang, Tzung-Her Chen, Chun-Wei Chiu, Shih-Yi WeiComments on a secure dynamic ID-based remote user authentication scheme for multi-server environment第二順位Journal of Computational Information Systems   
62098220105Tzung-Her Chen and Yan-Ting WuA New Protocol of Wide Use for E-Mail with Perfect Forward Secrecy第一順位Journal of Zhejiang University-SCIENCE C   
63098220104Tzung-Her Chen and Jyun-Ci HuangA novel user-participating authentication scheme第一順位Journal of Systems and Software   
64098220103Tzung-Her Chen and Chun-Wei ChiuA New Hierarchical Digital Image Authentication Method for Tamper Detection and Recovery against Microdotting Attacks第一順位Journal of Computational Information Systems   
65098120101Tzung-Her Chen and Chang-Sian WuCompression-unimpaired batch image encryption combining Vector Quantization and index compression第一順位Information Sciences   
66098120101陳宗和, 潘偉誠基於JPEG壓縮及霍夫曼編碼之批次影像加密技術第一順位Journal of Computer Science and Application95-106  
67098120101Tzung-Her Chen, De-Yu Zeng, and Kai-Hsiang TsaoVisual mult-secret sharing by circular random grids 使用圓形之隨機網格加密多重視覺機密影像第一順位Communication of CCISA 資訊安全通訊16 37-49  
68098120101Tzung-Her Chen and Yan-Ting WuA new protocol of wide use for e-mail with perfect forward secrecy第一順位Journal of Zhejiang University-SCIENCE C11 74-78  
690981200912Tzung-Her Chen, Kai-Hsiang Taso, and Yan-Ting YangFriendly color visual secret sharing by Random Grids第一順位Fundamenta Informaticae96 61-70  
700981200911Tzung-Her Chen, Shu-Chen Yeh, Kuan-Chieh LiaoA practical and efficient electronic checkbook第一順位Journal of Organizational Computing and Electronic Commerce19 285-293  
710981200910Tzung-Her ChenAn Authentication Protocol with Billing Non-Repudiation to Personal Communication Systems第一順位International Journal of Innovative Computing Information and Control   
72098120099Tzung-Her Chen and Kai-Hsiang TasoVisual secret sharing by random grids revisited第一順位Pattern Recognition42 2203-2217  
73098120099Du-Shiau Tsai, Gwoboa Horng, Tzung-Her Chen, and Yao-Te HuangA novel secret image sharing scheme for true color images with size constraint第三順位Information Sciences179 3247-3254  
74097220094Wei-Bin Lee, Jia-Hong Li, Shih-Cheng Chen and Tzung-Her ChenAn authenticated secure image hiding scheme其他The Imaging Science Journal57 109-117  
75097220094Tzung-Her Chen, Chih-Hung Wang, Tsung-Hao Hung, and Jyun-Ci HuangRemarks on a dynamic key management scheme for user hierarchical access control第一順位Journal of Computational Information Systems   
76097220094Hsing-Bai Chen, Tzung-Her Chen, Chau-Kai Chang, and Wei-Bin LeeA Novel E-Coupon System with Security and Efficiency in Mobile Commerce第二順位Journal of Computational Information Systems   
77097220093Tzung-Her Chen, Chin-Chen Chang, Chang-Sian Wu, and Der-Chyuan LouOn the security of a copyright protection scheme based on visual cryptography第一順位Computer Standards & Interfaces   
78097220092Ren-Der Lin, Tzung-Her Chen, Chien-Chen Huang, Wei-Bin Lee, Wen-Shyen E. ChenA secure image authentication scheme with tampering proof and remedy based on Hamming code第二順位International Journal of Innovative Computing Information and Control   
79097220092Tzung-Her Chen, Wei-Bin Lee, and Hsing-Bai ChenA self-verification authentication mechanism for mobile satellite communication systems第一順位Computers and Electrical Engineering35 41-48  
80097120091Tzung-Her Chen Wei-Cheng Pan and Kuang-Che LiBatch image authentication第一順位Journal of Computer Science and Application141-154  
81097120091Chin-Chen Chang, Tzung-Her Chen, and Li-Jen LiuPreventing cheating in computational visual cryptography第二順位Fundamenta Informaticae   
82097120091Gwoboa Horng, Chien-Lung Wang, and Tzung-Her ChenAn efficient concealed data aggregation scheme for sensor networks based on secret sharing第三順位International Journal of Innovative Computing Information and Control   
830971200810Tzung-Her Chen and Wei-Bin LeeA New Method for Using Hash Functions to Solve Remote User Authentication第一順位Computers & Electrical Engineering   
84096220087Tzung-Her Chen, and Chang-Sian WuIntegrated batch encryption to still images第一順位Journal of Chung Cheng Institute of Technology37 81-88  
85096220087Tzung-Her Chen and Jyun-Ci HuangA simple and secure AKE protocol with perfect forward secrecy第一順位Journal of Computational Information Systems   
86096220085Tzung-Her Chen, Tsung-Hao Hung, Gwoboa Horng, and Chia-Ming ChangMultiple Watermarking Based on Visual Secret Sharing第一順位International Journal of Innovative Computing Information and Control   
87096220084Tzung-Her Chen, Wei-Bin Lee, and Hsing-Bai ChenA Round- and Computation-Efficient Three-Party Authenticated Key Exchange Protocol第一順位The Journal of Systems and Software   
88096220083Hsing-Bai Chen, Tzung-Her Chen, Wei-Bin Lee, and Chin-Chen ChangSecurity Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks第二順位Computer Standards & Interfaces   
89096220083陳宗和, 蔡柏侃具有篡改及復原能力之JPEG2000影像驗證方法第一順位中華民國資訊學會通訊11 43-57  
90096220082Dushiau Tsai, Tzung-Her Chen and Gwoboa HorngOn Generating Meaningful Shares in Visual Secret Sharing Schemes第二順位The Imaging Science Journal   
91096120081Tzung-Her Chen, Gwoboa Horng and Chuan-Sheng YangPublic Key Authentication for Local Area Networks第一順位INFORMATICA   
920961200710Hsing-Bai Chen, Tzung-Her Chen, Wei-Bin Lee and Ren-Der LinSecurity analysis of a password-based simple three-party key exchange protocol第二順位WSEAS Transactions on Information Science and Applications   
93095220072Tzung-Her Chen and Gwoboa HorngA lightweight and anonymous copyright protection protocol第一順位Computer Standards and Interfaces29 229-237  
94095120071Du-Shiau Tsai, Tzung-Her Chen and Gwoboa HorngA Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images第二順位Pattern Recognition   
95095120071Tzung-Her Chen, Gwoboa Horng, and Ke-Chiang WuA secure YS-like user authentication scheme第一順位INFORMATICA18 27-36  
96094120061Tzung-Her Chen, and Du-Shiau Tsai Owner-Customer Right Protection Mechanism using a Watermarking Scheme and a Watermarking Protocol第一順位Pattern Recognition, Vol. 39, Issue 8, pp. 1530-1541   
97094120061Tzung-Her Chen, Dushiau Tsai, and Gwoboa Horng Secure User-friendly Remote Authentication Schemes第一順位Information & Security. An International Journal, Vol. 18, pp. 111-121   
98094120061Gwoboa Horng, Tzung-Her Chen, and Dushiau TsaiCheating in Visual Cryptography第二順位Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 219-236   
99094120061Wei-Bin Lee, Tzung-Her Chen, Jung-Wen Lo and Chen-Yi Chang An Efficient Group Signature Based on PSS-R第一順位WSEAS Transactions on Information Science and Applications, Vol. 3, Issue 10, pp.1804-1809    
100094120061Wei-Bin Lee, Tzung-Her Chen and Chen-Chieh LeeSecurity of a new encryption algorithm for image cryptosystems第一順位 The Imaging Science Journal, Vol. 54, Issue 3, pp. 178-187   
1010941200510Tzung-Her Chen, Wei-Bin Lee, and Gwoboa HorngRemarks on some signature schemes based on factoring and discrete logarithms第一順位Applied Mathematics and Computation , Vol. 169, Issue 1, pp. 1070-1075   
102093220055Tzung-Her Chen, Gwoboa Horng, and Dushiau TsaiAn Anonymous buyer-reseller protocol第一順位Journal of The Chinese Institute of Engineers, Vol. 28, No. 3, pp. 535-538.    
103093220052Tzung-Her Chen, Gwoboa Horng, and Wei-Bin LeeA publicly verifiable copyright-proving scheme surviving malicious attacks第一順位IEEE Transactions on Industrial Electronics50 pp.327-334  
104092120041Tzung-Her Chen, Wei-Bin Lee, and Gwoboa HorngSecure SAS-like password authentication第一順位schemesComputer Standards and Interfaces   
105091220037Tzung-Her Chen, Gwoboa Horng, Sang-Hao WangA Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model第一順位Pakistan Journal of Applied Science    
106091220034Wei-Bin Lee, Tzung-Her Chen, Chen-Chieh LeeImprovement of an Encryption Scheme for Binary Images第二順位Pakistan Journal of Information & Technology   
107091120031Wei-Bin Lee and Tzung-Her ChenConstructing a proxy signature scheme based on existing security mechanisms第二順位Information & Security. An International Journal    
108091120031Tzung-Her Chen,Wei-Bin LeeA variance-based public verifiable copyright-protection scheme surviving intentional attacks第一順位The Imaging Science Journal   
109091120031Gwoboa Horng and Tzung-Her ChenAn anonymous buyer-seller watermarking protocol 第二順位International Journal of Computational and Numerical Analysis and Applications   
110090120021Wei-Bin Lee,Tzung-Her Chen A public verifiable copy protection technique for still images第二順位The Journal of Systems and Software    
111089120011李維斌, 陳宗和數位影像驗證與數位簽章第一順位資訊安全通訊   

會議論文(共計89筆)
序號學年度學期年度月份作者題目通訊作者作者順位發表性質會議論文集或研討會名稱地點
1109120211Ting-Le Zhu and Tzung-Her ChenA Study of Blockchain-based two-party Key Management for Healthcare Information System第二順位壁報發表The 2021 IEEE Conference on Dependable and Secure Computing (IEEE DSC)  Fukushima, Japan 
2109120209駱彥儒 林少玄 陳宗和以Hyperledger Fabric建構一個適用於智慧微電網之可信任再生能源交易平台第三順位口頭發表第三十屆全國資訊安全會議  
3107220195Tzung-Her Chen, Wen-Rui Fu, Yung-ChuanTsengA study on trading of renewable energy certificate based on HyperledgerFabric and Composer第一順位口頭發表第二十九屆全國資訊安全會議  
4107220193Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung WangBlockchain-based Key Management for Healthcare Information System第一順位壁報發表The 2nd International Conference on Information Science and System (ICISS 2019) Tokyo, Japan 
51071201812Tai-Yuan Tu, Tzung-Her Chen, Ji-min Yang, Chih-Hung WangA Weighted Threshold Visual Cryptography第二順位口頭發表2018 International Computer Symposium 雲林 
6106220185Tzung-Her Chen, Ting-Le Zhu, Chih-Hung WangPrivacy-preserving-enhanced designated-verifier proof of assets for cryptocurrency exchange第一順位口頭發表2018 3rd International Conference on Electronic Engineering and Computer Science  杭州 
7106220185Ting-Le Zhu, Chih-Hung Wang, Tzung-Her ChenPrivacy-enhanced fair protocol for data trading based on Bitcoin transactions第三順位口頭發表第二十八屆全國資訊安全會議  
8105220174Xi-Wen Wu and Tzung-Her ChenA Boolean-Operation-Based Multi-Secret Visual Secret Sharing Scheme by General Access Structure第二順位口頭發表2017 International Conference on e-Commerce and e-Technology Kyoto, Japan 
9104220167Hang-Yu Lin and Tzung-Her ChenEfficient clouding data sharing with signature aggregation第二順位口頭發表 7th International Conference on Systematic Innovation (ICSI 2016) Lisbon, Portugal​ 
10104220167Tzu-Ching Chang and Tzung-Her ChenAn image authentication scheme based on Sudoku第二順位口頭發表 7th International Conference on Systematic Innovation (ICSI 2016) Lisbon, Portugal​ 
11104220165Yi-Hui Chen, I-Chun Weng and Tzung-Her ChenVisual cryptography for flexible general access structure第三順位口頭發表第二十六屆全國資訊安全會議  
12103220157I-Chun Weng, Tzung-Her ChenOn the Contrast of Random Grid-based Visual Secret Sharing for General Access Structure with Cheat-Preventing Ability第二順位口頭發表International Conference on Engineering and Applied Sciences (ICEAS) Sapporo, Japan 
13103220156Jing-Ya Yan、Tzung-Her ChenAn electronic ticket scheme based on designated verifier proxy signature第二順位口頭發表DLT2015數位生活科技研討會  
14103220155Zhen-Hong Liao, Tzung-Her ChenA Billing Scheme in Smart Grid with Non-Repudiation第二順位口頭發表第二十五屆全國資訊安全會議 高雄 
15103120148Tzung-Her Chen, Sheng-Shiang ChangImage encryption on HDR images for OpenEXR format第一順位口頭發表第十九屆行動計算研討會 The 2014 Mobile Computing Workshop (MC 2014)  Tainan 
16102220147Zhen-Hong Liao, Fuh-Gwo Jeng, Tzung-Her ChenAn authenticated Concealed Data Aggregation Scheme Based on Secret Sharing for Smart Grid第三順位口頭發表The 5th International Conference on Systematic Innovation (ICSI) San Jose, California, USA. 
17102220147Jing-Ya Yan, Fuh-Gwo Jeng, Tzung-Her ChenAn Image Authentication Scheme for High Dynamic Range Images第三順位口頭發表The 5th International Conference on Systematic Innovation (ICSI) San Jose, California, USA. 
18102220145Wei-Bin Lee, Tzung-Her Chen, Wei-Rung Sun, Kevin HoA S/Key-like One-Time Password Authentication Scheme Us ing Smart Cards for Smart Meter第二順位口頭發表Proceedings of The 28th IEEE International Conference on Advanced Info Networking & Applications Victoria, Canada 
191021201310Jing-Ya Yan, Tzung-Her Chen and Chih-Hung LinEncryption In High Dynamic Range Images for RGBE Format第二順位口頭發表The Ninth International Conference on Intelligent Info Hiding and Multimedia Signal Processing Beijing China 
201021201310Jing-Ya Yan, Tzung-Her Chen and Chih-Hung LinEncryption in high dynamic range images for RGBE format第二順位口頭發表IIHMSP-2013  
21102120139Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her ChenA friendly visual multi-secret sharing scheme其他口頭發表The Second Cross-Straits Conference on Information Security (CSCIS 2013)  
22102120139Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her ChenA friendly visual multi-secret sharing scheme其他口頭發表The Second Cross-Straits Conference on Information Security (CSCIS 2013) Kaohsiung 
23102120138Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen,and K. S. LinRobust watermarking for multiple images and users based on visual cryptography第三順位口頭發表Proceedings of the Seventh International Conference on Genetic and Evolutionary Computing (ICGEC 201 Prague, Czech 
24102120138Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, Sheng-Shiang ChangA Tailor-made high dynamic range image encryption第二順位口頭發表Proceedings of the Seventh International Conference on Genetic and Evolutionary Computing (ICGEC 201 Prague, Czech 
25102120138Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, and Sheng-Shiang ChangA tailor-made encryption scheme for high-dynamic range images第二順位書面發表ICGEC 2013  
26102120138Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen, and Kai-Siang LinRobust watermarking for multiple images and users based on visual cryptography第三順位口頭發表ICGEC 2013  
27101220136Shu-Yuan Lin, Tzung-Her Chen, and Chih-Hung LinHybrid depth-estimation method for 2D-to-3D conversion第二順位書面發表DTIM2013  
28101220134Chih-Hung Lin, Shu-Yuan Lin and Tzung-Her ChenDynamic range optimization by flexible local contrast enhancement using luminance map第三順位書面發表Fifth International Conference on Digital Image Processing (ICDIP 2013)  
29101220134Chih-Hung Lin, Shu-Yuan Lin and Tzung-Her ChenDynamic range optimization by flexible local contrast enhancement using luminance map第三順位口頭發表Proceedings of Fifth International Conference on Digital Image Processing (ICDIP 2013) Beijing, China 
301001201110Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her ChenA designated-tester public key encryption scheme with conjunctive-subset keyword search其他書面發表MSE 2011  
311001201110Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her ChenA designated-tester public key encryption scheme with conjunctive-subset keyword search其他書面發表(MSE 2011)  
32100120119Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo JengSecurity improvement against malicious servers in dPEKS scheme第二順位書面發表ICNEE 2011  
33100120119Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo JengSecurity Improvement against Malicious Servers in dPEKS Scheme第二順位書面發表(ICNEE 2011)  
340991201011Chih-Yang Lin, Wei-Lun Huang, Tzung-Her ChenNoise-resistant joint fingerprinting and decryption based on vector quantization第三順位書面發表CWECS 2010  
350991201011Tzung-Her Chen, Yao-Sheng Lee and Ci-Lin LiHigh-capacity multi-secret sharing by random grid第一順位書面發表CWECS 2010  
360991201011Chih-Yang Lin, Wei-Lun Huang, Tzung-Her ChenNoise-resistant Joint Fingerprinting and Decryption Based on Vector Quantization第三順位書面發表(CWECS 2010)  
370991201011Tzung-Her Chen, Yao-Sheng Lee and Ci-Lin LiHigh-capacity multi-secret sharing by random grid第一順位書面發表(CWECS 2010)  
380991201010Tzung-Her Chen, Wei-Lun Huang, and Chih-Yang LinChaos-based Image Integrity Authentication Code第一順位書面發表(IIHMSP-2010)  
390991201010Tzung-Her Chen, Wei-Lun Huang, and Chih-Yang LinChaos-based image integrity authentication code第一順位書面發表IIHMSP-2010  
40098120099Tzung-Her Chen and Yao-Sheng LeeYet another friendly progressive visual secret sharing scheme第一順位書面發表(IIHMSP-2009)  
41098120099Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong LinMedical Video Encryption Based on H.264/AVC with Near-Lossless Compression第一順位書面發表(IIHMSP-2009)  
42098120099Tzung-Her Chen and Yao-Sheng LeeYet another friendly progressive visual secret sharing scheme第一順位書面發表IIHMSP-2009  
43098120099Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong LinMedical video encryption based on H.264/AVC with near-lossless compression第一順位書面發表IIHMSP-2009  
440971200811Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen WeiMultiple-image encryption by rotating random grids第一順位書面發表(ISDA 2008)  
450971200811Tzung-Her Chen, Kuang-Che Li and Kai-Hsiang TsaoVisual multi-image sharing by circular random grids第一順位書面發表第十屆「網際空間:資安、犯罪與法律社會」學術暨實務研討會, Nov. 21, 2008  
460971200811Tzung-Her Chen, Yao-Sheng Lee, and Kai-Hsiang TsaoVisual secret sharing by random grids with pixel reduction第一順位書面發表 第十屆「網際空間:資安、犯罪與法律社會」學術暨實務研討會, Nov. 21, 2008  
470971200810Tzung-Her Chen, Kai-Hsiang Tsao, and Chang-Sian WuMulti-secrets visual secret sharing第一順位書面發表Proceedings of The 14th Asia-Pacific Conference on Communications, October 14-16  
48097120088Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, and Tzung-Her ChenAssigning Keys in a Hierarchy其他書面發表(IIHMSP-2008)  
49096220085Tzung-Her Chen and Kai-Hsiang TsaoImage encryption by (n,n) Random Grids第一順位書面發表Proceedings of 18th Information Security Conference, May 29-30, 2008  
50096220085陳宗和, 魏國珍, 曹凱翔使用隨機網格加密多重秘密影像第一順位書面發表Proceedings of 18th Information Security Conference, May 29-30, 2008  
510961200712Gwoboa Horng, Chien-Lung Wang, Tzung-Her ChenAn Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks第三順位書面發表Information Security and Cryptology Conference (ISCTurkey 2007), Dec. 13-14, 2007  
520961200711陳宗和, 黃焌華基於拜爾排列樣式的彩色影像隱藏技術第一順位書面發表2007年民生電子暨信號處理研討會, Nov. 2, 2007  
530961200711陳宗和, 曾靖皓具有效性及高安全性之圖形密碼機制第一順位書面發表2007年民生電子暨信號處理研討會, Nov. 2, 2007  
540961200711Tzung-Her Chen, Chang-Sian Wu, and Wei-Bin LeeA Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding第一順位書面發表(IIHMSP-2008)  
550961200710陳宗和, 曾靖皓以動態向量為基礎的MPEG-4視訊加密第一順位書面發表Computer Graphics Workshop 2007, Oct. 18-19, 2007  
56096120078Tzung-Her Chen and Chang-Sian WuBATCH IMAGE ENCRYPTION WITH VECTOR QUANTIZATION AND INDEX COMPRESSION第一順位書面發表20th Computer Vision, Graphics, and Image Processing, August 19-21, 2007  
57096120078Tzung-Her Chen and Jyun-Ci HuangUser-Participation-based Authentication for Remote Users第一順位書面發表The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007  
58096120078Tzung-Her Chen and Chang-Sian WuMultiple Secrets Sharing Based on Boolean Operations第一順位書面發表The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007  
59096120078Chao-Kai Chang, Hsing-Bai Chen, Tzung-Her Chen*, Wei-Bin LeeE-Gift Certificate Book with Different Face Values第三順位書面發表 The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007  
60095220077Tzung-Her Chen and Tsung-Hao HungAn adaptive and transient authentication protocol for mobile device第一順位書面發表The 11th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2007)  
61095220077Chiung-Chou Tsai, Kuan-Chieh Liao, Tzung-Her Chen, and Wei-Bin LeeSecurity enhancement of a novel proxy key generation protocol第三順位書面發表(STPSA’07)  
62095220076Kuan-Chieh Liao, Tzung-Her Chen, Chao-Kai Chang, and Wei-Bin LeeRemarks on a Practical Password-Based Two-Server Authentication and Key Exchange System第二順位書面發表2007 Conference of Digital Technology and Innovation Management, June 2, 2007  
63095220076Tzung-Her Chen and Chang-Sian WuA batch image encryption scheme based on random grid第一順位書面發表第十一屆資訊管理學術暨警政資訊實務研討會, June 1, 2007  
64095220076陳宗和,蔡柏侃可適用於多人環境之行動裝置的快速驗證協定第一順位書面發表Proceedings of 17th Information Security Conference, June 8, 2007.  
65095220076李維斌,葉書辰,陳宗和植基於單向赫序鏈之電子旅行支票系統第三順位書面發表2007年資訊技術與產業應用研討會, June 8, 2007  
66095220075Tzung-Her Chen and Jyun-Ci HuangRemarks on a password-based authentication and key distribution protocol with perfect forward secrecy第一順位書面發表2007知識社群與資訊安全研討會, May 16, 2007  
67095220075Ren-Der Lin, Tzung-Her Chen and Chien-Chen HuangSecurity of an image authentication scheme based on Hamming code第二順位書面發表2007傳播技術與數位內容學術研討會, May 22, 2007  
68095220075Tzung-Her Chen and Po-Kan TsaiA JPEG2000 Image Encryption Scheme With Changed Context Label第一順位書面發表2007資訊管理學術與實務研討會, May 29, 2007  
69095220073Tzung-Her Chen and Tsung-Hao HungA Secure Key Management Scheme in Digital Rights Management System for Mobile Users第一順位書面發表2007電子商務與數位生活研討會, Mar. 17, 2007  
70095220073陳宗和,蔡柏侃應用於行動裝置的快速驗證協定第一順位書面發表第五屆現代通訊科技應用學術研討會, Mar. 16, 2007  
710951200612蔡柏侃、洪宗豪、陳宗和 數位權限管理之基於單向雜湊函數鏈的金鑰傳遞方法2006數位教學暨資訊實務研討會, 南台科技大學, Dec. 8 南台科技大學 
720951200611Tzung-Her Chen and Chang-Sian Wu A Batch Image Encryption Scheme2006 Workshop on Consumer Electronics and Signal Processing, Nov. 16-17, 2006 中華大學 
73094220066Du-Shiau Tsai, Tzung-Her Chen, Gwoboa Horng A New Cheating Prevention Scheme for Visual Cryptography16th Information Security Conference, June 8-9, 2006 逢甲大學 
74094220066Tzung-Her Chen, Tsung-Hao Hung An Authentication Protocol for UMTS with Non-repudiation16th Information Security Conference, June 8-9, 2006 逢甲大學 
75094220062Tzung-Her Chen and Tsung-Hao HungSecurity Enhancement of an Authentication Protocol for Personal Communication Systems2006電子商務與數位生活研討會 台北大學 
760941200510Dahua Xie, Tzung-Her Chen and C.-C. Jay KuoDistortion-Aware Multimedia Authentication Using an Enhanced Hash FunctionInternational Workshop on Multimedia Signal Processing 2005 (IEEE MMSP) Shanghai, China 
77092220046陳宗和,洪國寶,楊子慶一個基於YS-like通行碼驗證方法的安全性分析2004 數位生活與網際網路研討會  成功大學 
78092220046Wei-Bin Lee, Shih-Cheng Chen and Tzung-Her Chen A Secure Image Hiding Scheme with Authentication2004 International Conference of Information Management 育達商業技術學院 
79092220046Tzung-Her Chen, and Gwoboa HorngAn Asymmetric and Anonymous Protocol for Copyright Protection 14th Information Security Conference 台灣科技大學 
80092220045洪國寶,劉兆樑,陳宗和,張若芬一個遠端認證方法之改進以及軍事上之應用陸軍軍官學校八十週年校慶綜合學術研討會 陸軍軍官學校 
81092220045洪國寶, 陳宗和, 張家銘, 李碩庭重點區域不失真的醫學影像驗證技術第五屆管理學域學術研討會 朝陽科技大學 
82092220043Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee, and Kuang-Long LinFurther enhancement for OPSA2004電子商務與數位生活研討會 台北 
830921200311Tzung-Her Chen, Gwoboa Horng, and Chao-Liang LiuSecurity enhancement for a one-time password authentication scheme using smart cards2003 Workshop on Consumer Electronics  National Cheng-Kung University 
84092120039洪國寶, 黃耀德, 蔡篤校, 陳宗和植基於類神經網路之全彩秘密影像分享技術2003數位生活與網際網路科技研討會 成功大學 
85091220036Tzung-Her Chen, Gwoboa Horng, and Dushiau TsaiImprovements of a buyer-reseller watermarking protocol2003 Symposium on Application and Development of Information Technologies 屏東商業技術學院 
860911200211洪國寶, 陳俊華, 曾斌誠, 陳宗和一個植基於類神經網路之具強韌性的無失真著作權保護技術第七屆人工智慧與應用研討會 朝陽科技大學 
87090220025Gwoboa Horng, Tzung-her Chen and San-Hao WangA Robust Wavelet-Based Watermarking Using Quantization and Human Visual System12th National Conference on Information Security Taichung 
880891200012Wei-Bin Lee and Tzung-Her ChenA Robust Copyright Protection Scheme for Still Images 2000 International Computer Symposium Workshop 花蓮 
890891200010李維斌, 陳宗和數位影像著作權保護~一個無失真高強韌度的浮水印技術2000年暨第五屆全國電腦與通訊研討會 大葉大學 

研究計畫(共計22筆)
備註欄說明:「教師研究計畫管理系統轉入之計畫」(係指依「國立嘉義大學產學合作計畫實施要點」第3點規定,與政府機關、法人、公民營事業機構、民間團體、學術研究機構等合作辦理有關事項,以本校名義與合作機構辦理簽約,其經費撥入本校之產學合作計畫。)
序號學年度學期年度月份參與性質委辦單位計畫名稱開始日期結束日期經費備註欄
11141202508計畫主持人國家科學及技術委員會基於量子安全區塊鏈打造智慧電網能源交易的抗量子攻擊與去中心化密碼學技術2025/08/012026/07/31830,000教師研究計畫管理系統轉入之計畫
21122202407計畫主持人國家科學及技術委員會大專學生研究計畫大專生計畫:留暗化明–利用機器學習重構HDR影像-指導學生:何霆威2024/07/012025/02/2858,000教師研究計畫管理系統轉入之計畫
31121202308計畫主持人國家科學及技術委員會可信任的去中心化智慧電網能源交易機制2023/08/012024/07/31690,000教師研究計畫管理系統轉入之計畫
41111202208計畫主持人國家科學及技術委員會高動態範圍影像安全:可交換式加密及驗證技術之研製(2/2)2022/08/012023/07/31806,000教師研究計畫管理系統轉入之計畫
51102202207計畫主持人國家科學及技術委員會大專學生研究計畫大專生計畫:動態掃描區塊鏈智能合約之弱點檢測平台-指導學生:呂明憲2022/07/012023/02/2858,000教師研究計畫管理系統轉入之計畫
61101202108計畫主持人國家科學及技術委員會高動態範圍影像安全:可交換式加密及驗證技術之研製(1/2)2021/08/012022/07/31840,000教師研究計畫管理系統轉入之計畫
71092202107計畫主持人國家科學及技術委員會大專學生研究計畫大專生計畫:智能合約的安全防護與檢測平台實作(指導學生:陳元娣)2021/07/012022/02/2848,000教師研究計畫管理系統轉入之計畫
81091202008國家科學及技術委員會整個區塊鏈就是我們可信任的綠能平台~具隱密性及隱私保護之微電網再生能源與再生能源憑證交易(3/3)2020/08/012021/07/31662,000
91081201908國家科學及技術委員會整個區塊鏈就是我們可信任的綠能平台~具隱密性及隱私保護之微電網再生能源與再生能源憑證交易(2/3)2019/08/012020/07/31685,000
101071201808國家科學及技術委員會整個區塊鏈就是我們可信任的綠能平台~具隱密性及隱私保護之微電網再生能源與再生能源憑證交易(1/3)2018/08/012019/07/31743,000
111051201608國家科學及技術委員會具多重秘密分享之權重與彈性式一般型存取結構之視覺密碼技術2016/08/012017/07/31780,000
121041201601其他政府機關-其他政府單位具地理資訊之雲端web2.0敬字亭社群系統 2016/01/012016/12/31270,000
131041201508國家科學及技術委員會強化安全性的視覺化秘密分享2015/08/012016/07/31775,000
141032201507國家科學及技術委員會大專生研究計畫:基於車聯網概念實踐車禍偵測並即時通報與提供事後分析之雲端平台2015/07/012016/02/2948,000
151032201502教育部行動雲端運算資訊軟體創作與推廣課程計畫2015/02/012016/01/31675,000
161032201502教育部104年度教育部資通訊軟體創新人才推升推廣計畫-行動雲端運算資訊軟體創作與推廣課程計畫2015/02/012016/01/31675,000
171031201408國家科學及技術委員會安全且友善的權重式視覺化多重秘密分享2014/08/012015/10/31719,000
181031201408國家科學及技術委員會安全且友善的權重式視覺化多重秘密分享2014/08/012015/07/31719,000
191021201308國家科學及技術委員會具高容量及使用彈性之安全視覺化秘密分享技術2013/08/012014/10/31721,000
201021201308國家科學及技術委員會具高容量及使用彈性之安全視覺化秘密分享技術2013/08/012014/07/31721,000
211011201208國家科學及技術委員會高效率之H.264/SVC視訊加密技術之研製2012/08/012013/07/31683,000
221011201208國家科學及技術委員會高效率之H.264/SVC視訊加密技術之研製2012/08/012013/10/31683,000

學術活動(共計160筆)
序號學年度學期年度月份活動分類活動名稱活動地點/期刊學報/比賽名稱
1106220183學術期刊論文審查學術期刊論文審查(Mar. 2018)Security and Communication Networks 
2106220183學術期刊論文審查學術期刊論文審查(Mar. 2018)IEEE Transactions on Image Processing 
3106220183學術期刊論文審查學術期刊論文審查(Mar. 2018)IEEE Transactions on Circuits and Systems for Video Technology 
4106220183學術期刊論文審查學術期刊論文審查(Mar. 2018)IET Image Processing 
5106120181學術期刊論文審查學術期刊論文審查(Jan. 2018)Signal Processing 
6106120181學術期刊論文審查學術期刊論文審查(Jan. 2018)Journal of Visual Communication and Image Representation 
7106120181學術期刊論文審查學術期刊論文審查(Jan. 2018)Signal Processing: Image Communication 
8106120181學術期刊論文審查學術期刊論文審查(Jan. 2018)IEEE Access 
91061201712學術期刊論文審查學術期刊論文審查(Dec. 2017) IEEE Transactions on Circuits and Systems for Video Technology  
101061201712學術期刊論文審查學術期刊論文審查(Dec. 2017)Information Sciences 
111061201712學術期刊論文審查學術期刊論文審查(Dec. 2017)IET Information Security 
121061201711學術期刊論文審查學術期刊論文審查(Nov. 2017)IEEE Transactions on Circuits and Systems for Video Technology  
131061201711學術期刊論文審查學術期刊論文審查(Nov. 2017)IET Image Processing  
141061201711學術期刊論文審查學術期刊論文審查(Nov. 2017)Information Technology and Control 
151061201710學術期刊論文審查學術期刊論文審查(Oct. 2017)Signal Processing: Image Communication 
161061201710學術期刊論文審查學術期刊論文審查(Oct. 2017)KSII Transactions on Internet and Information Systems 
171061201710學術期刊論文審查學術期刊論文審查(Oct. 2017)Journal of Visual Communication and Image Representation 
18106120179學術期刊論文審查學術期刊論文審查(Sep. 2017)Mobile Information Systems 
19106120179學術期刊論文審查學術期刊論文審查(Sep. 2017)Digital Signal Processing  
20106120178出席國際研討會The 12th Asia Joint Conference on Information Security (AsiaJCIS 2017)Seoul, Korea 
21106120178學術期刊論文審查學術期刊論文審查(Aug. 2017)IET Image Processing 
22105220177學術期刊論文審查學術期刊論文審查(Jul. 2017)Signal Processing: Image Communication 
23105220176出席國內研討會2017 數位生活科技嘉義大學, 嘉義 
24105220176學術期刊論文審查學術期刊論文審查(Jun. 2017)IEEE Transactions on Information Forensics and Security 
25105220176學術期刊論文審查學術期刊論文審查(Jun. 2017)KSII Transactions on Internet and Information Systems  
26105220176學術期刊論文審查學術期刊論文審查(Jun. 2017)International Journal of Bifurcation and Chaos 
27105220176學術期刊論文審查學術期刊論文審查(Jun. 2017)IEEE Access 
28105220175出席國內研討會2017全國資訊安全會議義守大學, 高雄 
29105220175學術期刊論文審查學術期刊論文審查(May 2017)Digital Signal Processing 
30105220175學術期刊論文審查學術期刊論文審查(May 2017)Multidimensional Systems and Signal Processing 
31105220175學術期刊論文審查學術期刊論文審查(May 2017)Signal Processing: Image Communication 
32105220175學術期刊論文審查學術期刊論文審查(May 2017)KSII Transactions on Internet and Information Systems 
33105220175學術期刊論文審查學術期刊論文審查(May 2017)IEEE Transactions on Industrial Informatics 
34105220174學術期刊論文審查學術期刊論文審查(Apr. 2017)Neural Computing and Applications  
35105220173學術期刊論文審查學術期刊論文審查(Mar. 2017)ACM Transactions on Multimedia Computing, Communications and Applications  
36105220173學術期刊論文審查學術期刊論文審查(Mar. 2017)IEEE Transactions on Industrial Informatics  
37105220173學術期刊論文審查學術期刊論文審查(Mar. 2017)IEEE Transactions on Image Processing  
38105220172學術期刊論文審查學術期刊論文審查(Feb. 2017)IEEE Signal Processing Letters  
39105220172學術期刊論文審查學術期刊論文審查(Jan. 2017)Information Sciences  
40105120171學術期刊論文審查學術期刊論文審查(Jan. 2017)IET Image Processing  
411051201612學術期刊論文審查學術期刊論文審查(Dec. 2016)IET Information Security  
421051201612學術期刊論文審查學術期刊論文審查(Dec. 2016)Digital Signal Processing  
431051201610學術期刊論文審查 學術期刊論文審查(Oct. 2016)IET Image Processing 
44105120169學術期刊論文審查學術期刊論文審查(Sep. 2016)Security and Communication Networks  
45105120169學術期刊論文審查學術期刊論文審查(Sep. 2016)Signal Processing: Image Communication  
46105120169學術期刊論文審查學術期刊論文審查 (Sep. 2016)Journal of Visual Communication and Image Representation 
47105120168出席國際研討會The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016)Fukuoka, Japan Kushu University, Nishijin Plaza 
48105120168學術期刊論文審查學術期刊論文審查(Aug. 2016)Informatica  
49105120168學術期刊論文審查學術期刊論文審查(Aug. 2016)Journal of Real-Time Image Processing  
50105120168學術期刊論文審查學術期刊論文審查(Aug. 2016)Electronics Letters  
51105120168學術期刊論文審查學術期刊論文審查(Aug. 2016)Journal of Information Science and Engineering  
52105120168執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal  
53105120168執行編輯、編輯委員、指導委員擔任editorCryptography  
54105120168執行編輯、編輯委員、指導委員擔任editorInternational Journal of Computer and Software Engineering  
55104220167學術期刊論文審查學術期刊論文審查 (July, 2016)Journal of Visual Languages and Computing 
56104220166出席國內研討會2016數位生活科技屏東大學, 屏東 
57104220166學術期刊論文審查 學術期刊論文審查(June 2016)Journal of Intelligent Systems 
58104220166學術期刊論文審查學術期刊論文審查(June 2016)Electronics Letters  
59104220166學術期刊論文審查學術期刊論文審查(June 2016)Advances in Mathematics of Communications  
60104220166學術期刊論文審查學術期刊論文審查(June 2016)Signal Processing: Image Communication  
61104220165出席國內研討會2016全國資訊安全會議亞洲大學, 台中 
62104220165學術期刊論文審查學術期刊論文審查 (May 2016)Wireless Personal Communications 
63104220165學術期刊論文審查學術期刊論文審查(May 2016)Mathematical Problems in Engineering  
64104220165學術期刊論文審查學術期刊論文審查(May, 2016)Journal of Visual Communication and Image Representation  
65104220164學術期刊論文審查學術期刊論文審查(Apr. 2016)Mathematical Problems in Engineering  
66104220163學術期刊論文審查學術期刊論文審查(Mar. 2016)Measurement  
67104220162學術期刊論文審查學術期刊論文審查 (Feb. 2016)KSII Transactions on Internet and Information Systems 
68104220162學術期刊論文審查 學術期刊論文審查(Feb. 2016)IEEE Signal Processing Letters 
69104120161學術期刊論文審查學術期刊論文審查(Jan. 2016)KSII Transactions on Internet and Information Systems  
701041201511學術期刊論文審查學術期刊論文審查(Nov. 2015)International Journal of Communication Systems  
711041201511學術期刊論文審查學術期刊論文審查(Nov. 2015)Wireless Personal Communications  
721041201510學術期刊論文審查 學術期刊論文審查(First, Oct. 2015)Security and Communication Networks 
731041201510學術期刊論文審查 學術期刊論文審查(Second, Oct. 2015)Security and Communication Networks 
74104120159出席國際研討會The 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2015)Adelaide, Australia 
75104120159主編、副主編學術期刊論文審查(Sep. 2015) International Journal of Communication Systems  
76104120159學術期刊論文審查學術期刊論文審查 (Sep. 2015)Security and Communication Networks 
77104120158主編、副主編學術期刊論文審查(Aug. 2015)IEEE MultiMedia  
78104120158學術期刊論文審查學術期刊論文審查(Aug. 2015)Journal of Information Science and Engineering  
79104120158執行編輯、編輯委員、指導委員擔任editorCryptography  
80104120158執行編輯、編輯委員、指導委員擔任editorInternational Journal of Computer and Software Engineering  
81104120158執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal  
82103220157學術期刊論文審查 學術期刊論文審查(July 2015)IEEE Transactions on Information Forensics and Security 
83103220156學術期刊論文審查學術期刊論文審查 (Jun. 2015)Security and Communication Networks 
84103220156學術期刊論文審查學術期刊論文審查(Jun. 2015)IEEE Transactions on Information Forensics and Security  
85103220156學術期刊論文審查學術期刊論文審查(Jun. 2015)China Communications  
86103220155出席國內研討會2015全國資訊安全會議高雄第一科技大學, 高雄 
87103220153學術期刊論文審查學術期刊論文審查(May 2015)International Journal of Computer Mathematics  
88103220153學術期刊論文審查學術期刊論文審查(Mar. 2015)Security and Communication Networks  
89103220152學術期刊論文審查學術期刊論文審查(Feb. 2015)IEEE Signal Processing Letters  
90103120151出席國際研討會2015 International Conference on Platform Technology and ServiceJeju, Korea 
91103120151學術期刊論文審查 學術期刊論文審查(Jan. 2015)Information Sciences 
92103120151學術期刊論文審查學術期刊論文審查(Jan., 2015)Journal of Information Science and Engineering  
931031201412學術期刊論文審查 學術期刊論文審查(Dec. 2014)Security and Communication Networks 
941031201412學術期刊論文審查學術期刊論文審查(Dec. 2014IEEE Transactions on Circuits and Systems for Video Technology  
951031201412學術期刊論文審查學術期刊論文審查(Dec. 2014)Journal of Visual Communication and Image Representation  
961031201412學術期刊論文審查學術期刊論文審查(Dec. 2014)JZUS-C (Computers and Electronics)  
971031201411學術期刊論文審查學術期刊論文審查 (Nov. 2014)IEEE Transactions on Industrial Electronics 
981031201411學術期刊論文審查學術期刊論文審查(Nov. 2014)International Journal of Communication Systems  
991031201410學術期刊論文審查學術期刊論文審查(Oct. 2014)Security and Communication Networks  
100103120149學術期刊論文審查學術期刊論文審查(Sep. 2014)Journal of Information Science and Engineering  
101103120148出席國際研討會The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014) Kitakyushu, Japan 
102103120148學術期刊論文審查學術期刊論文審查(Aug. 2014)Signal Processing: Image Communication  
103103120148學術期刊論文審查學術期刊論文審查(Aug. 2014)Wireless Personal Communications  
104103120148學術期刊論文審查學術期刊論文審查(Aug. 2014)IET Information Security  
105103120148執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal  
106102220147學術期刊論文審查學術期刊論文審查(Jul. 2014)Journal of Visual Communication and Image Representation  
107102220146學術期刊論文審查學術期刊論文審查(Jun. 2014)Security and Communication Networks  
108102220145出席國內研討會2014全國資訊安全會議政治大學,台北 
109102220145學術期刊論文審查學術期刊論文審查 (May 2014)Signal Processing: Image Communication 
110102220144學術期刊論文審查學術期刊論文審查(Apr. 2014)Security and Communication Networks  
111102220143學術期刊論文審查學術期刊論文審查(Mar. 2014)Journal of Supercomputing  
112102220143學術期刊論文審查學術期刊論文審查(Mar. 2014)IEEE Transactions on Information Forensics AND Security  
113102220143學術期刊論文審查學術期刊論文審查(Mar. 2014)IEEE Transactions on Circuits and Systems for Video Technology  
114102220143學術期刊論文審查學術期刊論文審查(Mar. 2014)Security and Communication Networks  
115102220143學術期刊論文審查學術期刊論文審查(Mar. 2014) IEEE Transactions on Cybernetics  
116102220142學術期刊論文審查學術期刊論文審查(Feb. 2014)Signal Processing  
117102120141學術期刊論文審查學術期刊論文審查(Jan. 2014)China Communications  
118102120141學術期刊論文審查學術期刊論文審查(Jan. 2014)Wireless Personal Communications  
119102120141學術期刊論文審查 學術期刊論文審查(Jan. 2014)KSII Transactions on Internet and Information Systems 
120102120141學術期刊論文審查學術期刊論文審查 (Jan. 2014)Security and Communication Networks 
121102120141主編、副主編學術期刊論文審查(Jan. 2014)Journal of Visual Communication and Image Representation  
1221021201312出席國內研討會2013全國計算機會議亞洲大學,台中 
1231021201312學術期刊論文審查學術期刊論文審查(Dec. 2013)KSII Transactions on Internet and Information Systems  
1241021201312學術期刊論文審查學術期刊論文審查(Dec. 2013)Signal Processing  
1251021201312學術期刊論文審查 學術期刊論文審查(Dec. 2013)The Journal of Supercomputing 
1261021201312學術期刊論文審查學術期刊論文審查(Dec. 2013)Journal of Visual Communication and Image Representation  
1271021201311學術期刊論文審查學術期刊論文審查(Nov. 2013)IEEE Transactions on Parallel and Distributed Systems  
1281021201310學術期刊論文審查學術期刊論文審查 (Oct. 2013)KSII Transactions on Internet and Information Systems 
1291021201310學術期刊論文審查學術期刊論文審查(Oct. 2013)IEEE Transactions on Image Processing  
1301021201310學術期刊論文審查學術期刊論文審查(Oct. 2013)Journal of Systems and Software  
131102120139學術期刊論文審查 學術期刊論文審查(Sep. 2013)The Scientific World Journal 
132102120139學術期刊論文審查學術期刊論文審查(Sep. 2013)Digital Signal Processing  
133102120139學術期刊論文審查學術期刊論文審查(Sep. 2013)The Scientific World Journal  
134102120139學術期刊論文審查學術期刊論文審查(Sep. 2013)Journal of Visual Communication and Image Representation  
135102120139學術期刊論文審查學術期刊論文審查(Sep, 2013)Journal of Information Science and Engineering  
136102120139學術期刊論文審查 學術期刊論文審查(Sep. 2013)Journal of Systems and Software 
137102120138執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal 
138101220137學術期刊論文審查學術期刊論文審查 (July, 2013)Journal of Visual Communication and Image Representation 
139101220137學術期刊論文審查學術期刊論文審查 (July, 2013)Journal of Information Science and Engineering 
140101220135出席國內研討會2013全國資訊安全會議南台科技大學, 台南 
141101220135學術期刊論文審查學術期刊論文審查(May 2013) IEEE Transactions on Circuits and Systems for Video Technology  
142101220135學術期刊論文審查學術期刊論文審查(May 2013) Signal Processing  
143101220135學術期刊論文審查學術期刊論文審查(May 2013)IET Image Processing  
144101220135學術期刊論文審查學術期刊論文審查 (May 2013)Signal Processing 
145101220135學術期刊論文審查學術期刊論文審查(May 2013)KSII Transactions on Internet and Information Systems  
146101220134學術期刊論文審查學術期刊論文審查(Apr. 2013)EURASIP Journal on Advances in Signal Processing  
147101220134學術期刊論文審查學術期刊論文審查(Apr. 2013)Journal of Visual Communication and Image Representation  
148101220133學術期刊論文審查學術期刊論文審查 (Mar. 2013)Journal of Visual Communication and Image Representation 
149101220133學術期刊論文審查 學術期刊論文審查(Mar. 2013)IEEE Transactions on Circuits and Systems for Video Technology 
150101220133學術期刊論文審查學術期刊論文審查(Mar. 2013)International Journal of Computer Mathematics  
151101220133學術期刊論文審查學術期刊論文審查 (Mar. 2013) Digital Signal Processing 
152101220132學術期刊論文審查學術期刊論文審查(Feb. 2013)Signal Processing  
153101220132學術期刊論文審查學術期刊論文審查(Feb. 2013)KSII Transactions on Internet and Information Systems  
154101220132學術期刊論文審查學術期刊論文審查(Feb. 2013)IEEE Transactions on Image Processing  
155101120131學術期刊論文審查 學術期刊論文審查(Jan. 2013)IEEE Communications Letters 
156101120131學術期刊論文審查學術期刊論文審查 (Jan. 2013)Signal Processing 
157101120131學術期刊論文審查 學術期刊論文審查(Jan. 2013)IEEE Transactions on Information Forensics and Security 
158101120131學術期刊論文審查學術期刊論文審查(Jan. 2013)Journal of Information Science and Engineering  
159101120131學術期刊論文審查學術期刊論文審查(Jan. 2013)IET Image Processing  
160101120131學術期刊論文審查學術期刊論文審查(Jan. 2013)Journal of System and Software  

推廣工作(共計53筆)
序號學年度學期年度月份推廣類別推廣名稱推廣地點
1106220183學術演講或教學講習主講演講: 整個區塊鏈就是我的安全密室台中教育大學 
2106220182其他科技部資安旗鑑計畫期中執行進度暨成果展示審查委員台灣大學 
3106220182其他科技部資安旗鑑計畫期中執行進度暨成果展示審查委員交通大學 
4106120181其他科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視中興大學 
5106120181輔導科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視成功大學 
6106120181輔導科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視財團法人國家實驗研究院高速網路與計算中心(南科) 
71061201712輔導科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視清華大學 
8106120179其他106年度科技部資安旗艦計畫複審會議 
9105220177其他逢甲大學資訊工程系碩士學位考試委員(蔡 Jul, 2017) 
10105220177其他逢甲大學資訊工程系碩士學位考試委員(陳 Jul, 2017)逢甲大學 
11105220177其他逢甲大學資訊工程系碩士學位考試委員(許 Jul, 2017)逢甲大學 
12105220177其他中興大學資訊科學與工程學系博士生考試委員(陳國璋 July, 2017)中興大學 
13105220177其他中興大學資訊科學與工程學系碩士生考試委員(陳炳元 July, 2017)中興大學 
14105220177其他中興大學資訊科學與工程學系碩士生考試委員(蘇旻姿 July, 2017)中興大學 
15105220177其他中興大學資訊科學與工程學系碩士生考試委員(王孟穎 July, 2017)中興大學 
16105220176其他彰化師範大學數學系博士學位考試委員(洪) Jun., 2017)彰化師範大學 
17105220175其他中華民國資訊安全學會第八屆出版委員會委員 
18105220175其他中華民國資訊安全學會第八屆監事 
19105220174學術演講或教學講習主講演講:視覺化的多重機密共享 (Visual sharing of multiple secrets)輔仁大學電機工程學系 
20105220172學術演講或教學講習主講演講: 視覺化的多重機密共享 (Visual sharing of multiple secrets中央大學資訊工程學系 
211051201612其他輔仁大學資訊工程系博士學位考試委員(劉) Dec., 2016)輔仁大學 
22104220165其他中華民國資訊安全學會第八屆出版委員會委員 
23104220165其他中華民國資訊安全學會第八屆監事 
24104120161其他逢甲大學資訊工程系博士學位考試委員(高元宏 Jan. 16, 2016)逢甲大學 
25104120158其他中央大學資訊工程系第二屆系務發展委員會委員 
26103220157其他中興大學資訊科學與工程學系碩士生考試委員(張哲豪 July, 2015) 
27103220157其他中興大學資訊科學與工程學系碩士生考試委員(曹昌林 July, 2015) 
28103220157其他中興大學資訊科學與工程學系碩士生考試委員(陳昱安 July, 2015)中興大學 
29103220157其他屏東大學資訊科學系碩士學位考試委員(陳博瀚 July, 2015)屏東大學, 屏東 
30103220157其他屏東大學資訊科學系碩士學位考試委員(昌俊豪 July, 2015)屏東大學 
31103220156學術演講或教學講習主講演講: 門檻式不變形之視覺化多重秘密分享亞洲大學資訊工程學系 
32103220155其他中華民國資訊安全學會第八屆出版委員會委員 
33103220155其他中華民國資訊安全學會第八屆監事 
341031201411其他國立台南大學資工系課程大綱審查委員 
35102220147其他南台科技大學資訊傳播學系碩士生考試委員南台科技大學 
36102220145其他逢甲大學資訊工程系博士學位考試委員(1)逢甲大學 
37102220145其他中華民國資訊安全學會第七屆出版委員會委員 
38102220145其他逢甲大學資訊工程系博士學位考試委員(2) 
39102220145其他逢甲大學資訊工程系碩士學位考試委員(1) 
40102220145其他逢甲大學資訊工程系碩士學位考試委員(2) 
41102220145其他逢甲大學資訊工程系碩士學位考試委員(3) 
42102120141其他雲林科技大學資訊工程系碩士學位考試委員雲林科技大學 
431021201312其他中興大學資訊科學與工程學系博士生考試委員(陳昱圻 Dec., 2013)中興大學 
44101220135其他中華民國資訊安全學會第七屆出版委員會委員 
45101220134學術演講或教學講習主講演講: 不變形之視覺化多重秘密分享朝陽科技大學資訊工程學系 
46101220133學術演講或教學講習主講演講: 視覺化多重秘密分享暨南大學資訊工程學系 
47101120131其他中興大學資訊科學與工程學系碩士生考試委員(劉冠宏 Jan. 23, 2013) 
48101120131其他中興大學資訊科學與工程學系碩士生考試委員(劉碧惠 Jan. 23, 2013)中興大學 
49100220127其他南台科技大學資訊傳播學系碩士生考試委員南台科技大學 
50100220126其他中興大學資訊科學與工程學系碩士生考試委員中興大學 
51100220125其他逢甲大學資訊工程系碩士學位考試委員逢甲大學 
52100220125其他中華民國資訊安全學會第七屆出版委員會委員 
53097220096其他中華民國資訊安全學會第六屆出版委員會委員