期刊論文(共計14筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 作者 | 題目 | 通訊作者 | 作者順位 | 期刊名稱 | 卷數 | 頁數 | 關鍵字 |
1 | 108 | 1 | 2019 | 10 | Chin-Feng Lee, Chi-Yao Weng, Cheng-Yu Kao | Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding | 是 | 第二順位 | Soft Computing | 23 | 9719-9731 | Prediction error · Reversible data hiding · Lagrange interpolation · Histogram shifting modification |
2 | 108 | 2 | 2020 | 3 | Chi-Yao Weng | DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images | 是 | 第一順位 | Peer to Peer Networking and Applications | 13 | 514-523 | Multimedia IoTapplications . Prediction error expansion . Discrete wavelet transform . Prediction-generating-method |
3 | 110 | 1 | 2021 | 10 | Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng | A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services | 是 | 第一順位 | IEEE ACCESS | 9 | 145522-145537 | Anonymous authentication, fog computing, Internet of Things, session key agreement, security |
4 | 111 | 1 | 2022 | 11 | Cheng-Hsing Yang, Chi-Yao Weng, Yu-Zhen Yang | TPEIP:Thumbnail preserving encryption based on sum preserving for image privacy | 是 | 第二順位 | Journal of Information Security and Application | 70 | 103352 | Image privacy, TPE, Sun preserving, Image privacy |
5 | 111 | 1 | 2022 | 12 | Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize | An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications | 否 | 第二順位 | Sensors | 22 | 9534 | authentication; Internet of Drones; privacy preservation; session key agreement; security |
6 | 110 | 2 | 2022 | 2 | Cheng-Hsing Yang, Chi-Yao Weng, Jian-Yu Chen | High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption | 是 | 第二順位 | Soft Computing | 26 | 11727-1742 | |
7 | 110 | 2 | 2022 | 4 | Chi-Yao Weng, Hao-Yu Weng, Cheng-Ta Huang | High-fidelity reversible data hiding based on PVO and median preserving | 否 | 第一順位 | Journal of Supercomputing | 78 | 8367-8388 | Reversible data hiding · Pixel value ordering · Median preserving · Hiding capacity |
8 | 110 | 2 | 2022 | 5 | Chwei-Shyong Tsai, Yung-Sung Zhang, Chi-Yao Weng | Separable reversible data hiding in encrypted images based on Paillier cryptosystem | 是 | 第三順位 | Multimedia Tools and Applications | 81 | 18807-18827 | Encrypted image, Reversible data hiding, Histogram shifting, Paillier cryptosystem |
9 | 111 | 1 | 2023 | 1 | Chi-Yao Weng, Cheng-Hsing Yang | Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm | 是 | 第一順位 | Entropy | 25 | 209 | encrypted image; reversible data hiding; secret sharing; multi-hider mechanism |
10 | 112 | 1 | 2023 | 11 | Cheng-Ta Huang, Njabulo Sinethemba Shongwe, Hao-Yu Weng, Chi-Yao Weng | Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images. | 是 | 其他 | Multimedia Tools and Application | 82 | 42699-42716 | |
11 | 111 | 2 | 2023 | 3 | Cheng-Ta Huang, Cheng-Yi Lin, Chi-Yao Weng | Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping | 是 | 第三順位 | Entropy | 25 | 744 | neighbor mean interpolation (NMI); ones’ complement; flipped data; high capacit |
12 | 113 | 1 | 2024 | 12 | Chi-Yao Weng, Hao-Yu Weng, Cheng-Ta Huang | Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment model. | 否 | 第一順位 | EURASIP Journal on Image and Video Processing | 2024 | 37 | |
13 | 113 | 1 | 2024 | 8 | Cheng-Ta Huang, Chi-Yao Weng, Guo-Ting Zheng, Hao-Yu Weng: | Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity | 是 | 第二順位 | Signal, Image and Video Processing | 18 | 5043-5059 | |
14 | 113 | 1 | 2025 | 1 | Cheng-Ta Huang, Njabulo Sinethemba Shongwe, Hao-Yu Weng, Chi-Yao Weng, Shiva Prasad Sirmulwar | Hybrid coding table-based semi-reversible data hiding using least significant | 是 | 第三順位 | Journal of Supercomputing | 81 | 210 | |
會議論文(共計6筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 作者 | 題目 | 通訊作者 | 作者順位 | 發表性質 | 會議論文集或研討會名稱 | 地點 |
1 | 110 | 1 | 2021 | 11 | Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng Wang | Reversible Data Hiding in Encrypted Image Based on MSB Inversion | 否 | 第二順位 | 書面發表 | 2021th International Conference on Security Information Technologies with AI, Internet Computing and | |
2 | 111 | 1 | 2022 | 12 | 翁麒耀 | 基於Multiple Data-Hiders 之高容量可逆式加密影像技術 | 是 | 第二順位 | 口頭發表 | 台灣網際網路研討會(TANET 2022) | |
3 | 110 | 2 | 2022 | 5 | 翁麒耀 | 基於臉部移動與深度學習技術之Anti-Spoofing攻擊 | 是 | 第一順位 | 口頭發表 | 第二十屆離島資訊技術與應用研討會 | |
4 | 110 | 2 | 2022 | 5 | 翁麒耀 | 結合虛擬骨架與肢體辨識之數位遊戲開發與設計-以屏大魔法校園為例 | 是 | 第一順位 | 口頭發表 | 第二十屆離島資訊技術與應用研討會 | |
5 | 111 | 2 | 2023 | 4 | 翁麒耀 | Face authentication system for Anti-Spoofing based on Mask RCNN | 是 | 第一順位 | 壁報發表 | 2023 IEEE International Conference on Applied System Innovation | Toyko, Japan |
6 | 112 | 2 | 2024 | 5 | Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng Wang: | Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images | 是 | 第二順位 | 口頭發表 | Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things | Tokyo, Japan |