研究成果列表
單位名稱資訊工程學系教師姓名陳宗和
教師分級教授專兼任專任
在校狀態在職行政職務

期刊論文(共計108筆)
序號學年度學期年度月份作者題目通訊作者作者順位期刊名稱卷數頁數關鍵字
1089120011李維斌, 陳宗和數位影像驗證與數位簽章第一順位資訊安全通訊   
2090120021Wei-Bin Lee,Tzung-Her Chen A public verifiable copy protection technique for still images第二順位The Journal of Systems and Software    
3091120031Tzung-Her Chen,Wei-Bin LeeA variance-based public verifiable copyright-protection scheme surviving intentional attacks第一順位The Imaging Science Journal   
4091120031Wei-Bin Lee and Tzung-Her ChenConstructing a proxy signature scheme based on existing security mechanisms第二順位Information & Security. An International Journal    
5091120031Gwoboa Horng and Tzung-Her ChenAn anonymous buyer-seller watermarking protocol 第二順位International Journal of Computational and Numerical Analysis and Applications   
6091220034Wei-Bin Lee, Tzung-Her Chen, Chen-Chieh LeeImprovement of an Encryption Scheme for Binary Images第二順位Pakistan Journal of Information & Technology   
7091220037Tzung-Her Chen, Gwoboa Horng, Sang-Hao WangA Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model第一順位Pakistan Journal of Applied Science    
8092120041Tzung-Her Chen, Wei-Bin Lee, and Gwoboa HorngSecure SAS-like password authentication第一順位schemesComputer Standards and Interfaces   
90941200510Tzung-Her Chen, Wei-Bin Lee, and Gwoboa HorngRemarks on some signature schemes based on factoring and discrete logarithms第一順位Applied Mathematics and Computation , Vol. 169, Issue 1, pp. 1070-1075   
10093220052Tzung-Her Chen, Gwoboa Horng, and Wei-Bin LeeA publicly verifiable copyright-proving scheme surviving malicious attacks第一順位IEEE Transactions on Industrial Electronics50 pp.327-334  
11093220055Tzung-Her Chen, Gwoboa Horng, and Dushiau TsaiAn Anonymous buyer-reseller protocol第一順位Journal of The Chinese Institute of Engineers, Vol. 28, No. 3, pp. 535-538.    
12094120061Tzung-Her Chen, and Du-Shiau Tsai Owner-Customer Right Protection Mechanism using a Watermarking Scheme and a Watermarking Protocol第一順位Pattern Recognition, Vol. 39, Issue 8, pp. 1530-1541   
13094120061Tzung-Her Chen, Dushiau Tsai, and Gwoboa Horng Secure User-friendly Remote Authentication Schemes第一順位Information & Security. An International Journal, Vol. 18, pp. 111-121   
14094120061Gwoboa Horng, Tzung-Her Chen, and Dushiau TsaiCheating in Visual Cryptography第二順位Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 219-236   
15094120061Wei-Bin Lee, Tzung-Her Chen, Jung-Wen Lo and Chen-Yi Chang An Efficient Group Signature Based on PSS-R第一順位WSEAS Transactions on Information Science and Applications, Vol. 3, Issue 10, pp.1804-1809    
16094120061Wei-Bin Lee, Tzung-Her Chen and Chen-Chieh LeeSecurity of a new encryption algorithm for image cryptosystems第一順位 The Imaging Science Journal, Vol. 54, Issue 3, pp. 178-187   
17095120071Tzung-Her Chen, Gwoboa Horng, and Ke-Chiang WuA secure YS-like user authentication scheme第一順位INFORMATICA18 27-36  
18095120071Du-Shiau Tsai, Tzung-Her Chen and Gwoboa HorngA Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images第二順位Pattern Recognition   
190961200710Hsing-Bai Chen, Tzung-Her Chen, Wei-Bin Lee and Ren-Der LinSecurity analysis of a password-based simple three-party key exchange protocol第二順位WSEAS Transactions on Information Science and Applications   
20095220072Tzung-Her Chen and Gwoboa HorngA lightweight and anonymous copyright protection protocol第一順位Computer Standards and Interfaces29 229-237  
21096120081Tzung-Her Chen, Gwoboa Horng and Chuan-Sheng YangPublic Key Authentication for Local Area Networks第一順位INFORMATICA   
220971200810Tzung-Her Chen and Wei-Bin LeeA New Method for Using Hash Functions to Solve Remote User Authentication第一順位Computers & Electrical Engineering   
23096220082Dushiau Tsai, Tzung-Her Chen and Gwoboa HorngOn Generating Meaningful Shares in Visual Secret Sharing Schemes第二順位The Imaging Science Journal   
24096220083Hsing-Bai Chen, Tzung-Her Chen, Wei-Bin Lee, and Chin-Chen ChangSecurity Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks第二順位Computer Standards & Interfaces   
25096220083陳宗和, 蔡柏侃具有篡改及復原能力之JPEG2000影像驗證方法第一順位中華民國資訊學會通訊11 43-57  
26096220084Tzung-Her Chen, Wei-Bin Lee, and Hsing-Bai ChenA Round- and Computation-Efficient Three-Party Authenticated Key Exchange Protocol第一順位The Journal of Systems and Software   
27096220085Tzung-Her Chen, Tsung-Hao Hung, Gwoboa Horng, and Chia-Ming ChangMultiple Watermarking Based on Visual Secret Sharing第一順位International Journal of Innovative Computing Information and Control   
28096220087Tzung-Her Chen, and Chang-Sian WuIntegrated batch encryption to still images第一順位Journal of Chung Cheng Institute of Technology37 81-88  
29096220087Tzung-Her Chen and Jyun-Ci HuangA simple and secure AKE protocol with perfect forward secrecy第一順位Journal of Computational Information Systems   
30097120091Chin-Chen Chang, Tzung-Her Chen, and Li-Jen LiuPreventing cheating in computational visual cryptography第二順位Fundamenta Informaticae   
31097120091Gwoboa Horng, Chien-Lung Wang, and Tzung-Her ChenAn efficient concealed data aggregation scheme for sensor networks based on secret sharing第三順位International Journal of Innovative Computing Information and Control   
32097120091Tzung-Her Chen Wei-Cheng Pan and Kuang-Che LiBatch image authentication第一順位Journal of Computer Science and Application141-154  
330981200910Tzung-Her ChenAn Authentication Protocol with Billing Non-Repudiation to Personal Communication Systems第一順位International Journal of Innovative Computing Information and Control   
340981200911Tzung-Her Chen, Shu-Chen Yeh, Kuan-Chieh LiaoA practical and efficient electronic checkbook第一順位Journal of Organizational Computing and Electronic Commerce19 285-293  
350981200912Tzung-Her Chen, Kai-Hsiang Taso, and Yan-Ting YangFriendly color visual secret sharing by Random Grids第一順位Fundamenta Informaticae96 61-70  
36097220092Ren-Der Lin, Tzung-Her Chen, Chien-Chen Huang, Wei-Bin Lee, Wen-Shyen E. ChenA secure image authentication scheme with tampering proof and remedy based on Hamming code第二順位International Journal of Innovative Computing Information and Control   
37097220092Tzung-Her Chen, Wei-Bin Lee, and Hsing-Bai ChenA self-verification authentication mechanism for mobile satellite communication systems第一順位Computers and Electrical Engineering35 41-48  
38097220093Tzung-Her Chen, Chin-Chen Chang, Chang-Sian Wu, and Der-Chyuan LouOn the security of a copyright protection scheme based on visual cryptography第一順位Computer Standards & Interfaces   
39097220094Hsing-Bai Chen, Tzung-Her Chen, Chau-Kai Chang, and Wei-Bin LeeA Novel E-Coupon System with Security and Efficiency in Mobile Commerce第二順位Journal of Computational Information Systems   
40097220094Tzung-Her Chen, Chih-Hung Wang, Tsung-Hao Hung, and Jyun-Ci HuangRemarks on a dynamic key management scheme for user hierarchical access control第一順位Journal of Computational Information Systems   
41097220094Wei-Bin Lee, Jia-Hong Li, Shih-Cheng Chen and Tzung-Her ChenAn authenticated secure image hiding scheme其他The Imaging Science Journal57 109-117  
42098120099Du-Shiau Tsai, Gwoboa Horng, Tzung-Her Chen, and Yao-Te HuangA novel secret image sharing scheme for true color images with size constraint第三順位Information Sciences179 3247-3254  
43098120099Tzung-Her Chen and Kai-Hsiang TasoVisual secret sharing by random grids revisited第一順位Pattern Recognition42 2203-2217  
44098120101Tzung-Her Chen, De-Yu Zeng, and Kai-Hsiang TsaoVisual mult-secret sharing by circular random grids 使用圓形之隨機網格加密多重視覺機密影像第一順位Communication of CCISA 資訊安全通訊16 37-49  
45098120101Tzung-Her Chen and Yan-Ting WuA new protocol of wide use for e-mail with perfect forward secrecy第一順位Journal of Zhejiang University-SCIENCE C11 74-78  
46098120101陳宗和, 潘偉誠基於JPEG壓縮及霍夫曼編碼之批次影像加密技術第一順位Journal of Computer Science and Application95-106  
47098120101Tzung-Her Chen and Chang-Sian WuCompression-unimpaired batch image encryption combining Vector Quantization and index compression第一順位Information Sciences   
48098220103Tzung-Her Chen and Chun-Wei ChiuA New Hierarchical Digital Image Authentication Method for Tamper Detection and Recovery against Microdotting Attacks第一順位Journal of Computational Information Systems   
49098220104Tzung-Her Chen and Jyun-Ci HuangA novel user-participating authentication scheme第一順位Journal of Systems and Software   
50098220105Tzung-Her Chen and Yan-Ting WuA New Protocol of Wide Use for E-Mail with Perfect Forward Secrecy第一順位Journal of Zhejiang University-SCIENCE C   
51098220105Chih-Hung Wang, Tzung-Her Chen, Chun-Wei Chiu, Shih-Yi WeiComments on a secure dynamic ID-based remote user authentication scheme for multi-server environment第二順位Journal of Computational Information Systems   
52098220106Tzung-Her ChenRemarks on some watermarking schemes based on DWT第一順位Journal of Computational Information Systems   
53098220106Tzung-Her Chen, Tsung-Hao Hung and Yan-Ting WuLightweight key management of DRM systems第一順位International Journal of Innovative Computing Information and Control   
54099120109Hao-Li Wang, Tzung-Her Chen, Long-Sheng Li, Yan-Ting Wu, Jhong ChenAn Authenticated Key Exchange Protocol for Mobile Stations from Two Distinct Home Networks第二順位International Journal of Innovative Computing Information and Control   
55099120111Tzung-Her Chen and Chang-Sian WuEfficient multi-secret image sharing based on boolean operations第一順位Signal Processing   
56099120111Tzung-Her Chen, Kai-Hsiang Tsao, and Shu-Jye ChangGenerating friendly and colorful shares in color visual cryptography第一順位Communications of the CCISA17 37-47  
57099120111Tzung-Her Chen, Kai-Hsiang TsaoUser-friendly random grid-based visual secret sharing第一順位IEEE Transactions on Circuits and Systems for Video Technology21 1693-1703  
58099120111Tzung-Her Chen and Ci-Lin LiAn enhanced threshold authenticated encryption scheme with convertibility第一順位Innovative Computing Information and Control6177-6185  
59099120111Tzung-Her Chen and Kai-Hsiang TsaoThreshold Visual Secret Sharing by Random Grids第一順位Journal of Systems and Software84 1197-1208  
601001201110Bing-Jian Wang, Tzung-Her Chen, *Fuh-Gwo JengSecurity Improvement against Malicious Server’s attack for A dPEKS Scheme第二順位International Journal of Information and Education Technology350-353  
61100120121邱俊瑋、李琪霖、陳宗和具有低運算與壓縮率的H.264_AVC可知覺視訊加密之研究第三順位Communications of the CCISA18 1-22  
621011201210Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Lin and Tzung-Her ChenOn the security of time-bound hierarchical key management scheme for secure broadcasting其他ICIC Express Letters2541-2544  
63100220122Tzung-Her Chen, Kai-Hsiang Tsao, and Yao-Sheng LeeYet Another Multiple-image encryption by rotating random grids第一順位Signal Processing92 2229-2237  
64100220123Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung WangA security-enhanced key agreement protocol based on chaotic maps第一順位Security and Communication Networks108-114  
65100220123Yao-Sheng Lee and Tzung-Her ChenInsight into collusion attacks in random-gird-based visual secret sharing第二順位Signal Processing92 727-736  
66100220124Tzung-Her Chen and Kuang-Che LiMulti-Image encryption by circular Random Grids第一順位Information Sciences189 255-265  
67100220124Tai-Yuan Tu, Chih-Hung Wang, Tzung-Her ChenA High-Capacity Data Hiding Scheme by Vector Quantization Index with Search-Order Coding第三順位Advanced Science Letters822-827  
68101120128Tzung-Her Chen and Yao-Sheng LeeA new random-grid-based visual secret sharing by edge enhancement第一順位Computational Information Systems1507-1513  
69101120129Chih-Yang Lin, Panyaporn Prangjarote, Li-Wei Kang, Wei-Lun Huang, *Tzung-Her Chen,Joint Fingerprinting and Decryption with Noise-resistant for Vector Quantization Images其他Signal Processing92 2159–2171  
70101120131Chih-Hung Lin, Tzung-Her Chen* and Chun-Wei ChiuColor image authentication with tamper detection and remedy based on BCH and Bayer Pattern第二順位Displays34 59-68  
711021201312Tzung-Her Chen, Bing-Jian Wang, Yao-Sheng LeeA random grid-based cyclic access structure VSS scheme for multiple secret images第一順位Displays34 380-387  
72101220133Yao-Sheng Lee, Bing-Jian Wang and Tzung-Her Chen*Quality-improved threshold visual secret sharing scheme by random grids第一順位IET Image Processing137-143  
73101220133T.-H. Chen, Y.-S. Lee, W.-L. Huang, Justie Su-Tzu Juan, Y.-Y. Chen, and M.-J. LiQuality-Adaptive Visual Secret Sharing by Random Grids第一順位Journal of Systems and Software86 1267–1274  
74101220136Chih-Hung Lin, Tzung-Her Chen* and Chang-Sian WuA Batch image encryption scheme based on chaining random grids第二順位Scientia Iranica20 670-681  
751031201410Chih-Hung Lin, Yan-Ting Wu; Kai-Hsiang Tsao; Kai-Siang Lin, Tzung-Her ChenMulti-factor Cheating Prevention in Visual Secret Sharing by Hybrid Codebooks其他Journal of Visual Communication and Image Representation25 1543–1557  
761031201411Ci-Lin Li, Chih-Yang Lin and Tzung-Her ChenEfficient compression-jointed quality controllable scrambling method for H.264/SVC第三順位International Journal of Network Security 16 541-548  
771031201412Kai-Siang Lin, Chih-Hung Lin, Tzung-Her ChenDistortionless visual multi-secret sharing based on random grid第三順位Information Sciences288 330–346  
781031201412Tzung-Her Chen, Sheng-Shiang ChangImage encryption on HDR images for OpenEXR format第一順位International Journal of Science and Engineering19-23  
79103120148Fuh-Gwo Jeng, Kai-Siang Lin, Chih-Hung Lin, and Tzung-Her ChenVisual multi-secret sharing with friendliness其他Journal of Shanghai Jiaotong University (Science)19 445-465  
80103120149Jia-Hong Li, Tzung-Her Chen, and Wei-Bin LeeTattooing Attack - A New Type of Watermarking Attacks on Image Authentication第二順位International Journal of Digital Crime and Forensics36-40  
811041201510Kai-Hsiang Tsao, Shyong Jian Shyu, Chih-Hung Lin, Yao Sheng Lee and Tzung-Her ChenVisual Multiple-Secret Sharing for Flexible General Access Structure by Random Grids其他Display39 pp. 80-92  
821041201511Chih-Hung Lin, Yao-Sheng Lee and Tzung-Her ChenFriendly progressive random-grid-based visual secret sharing with adaptive contrast第三順位Journal of Visual Communication and Image Representation34 45-51  
83103220153Fuh-Gwo Jeng, Wei-Lun Huang, Tzung-Her ChenCryptanalysis and improvement of two hyper-chaos-based image encryption schemes第三順位Signal Processing: Image Communication34 pp. 45-51  
84104220165Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, *Tzung-Her ChenOn the security of privacy-preserving keyword searching for cloud storage services其他International Journal of Network Security18 597-600  
85104220165Tzung-Her Chen , Yao-Sheng Lee and Chih-Hung LinOn the difficulty of aligning VSS random grids 第一順位Signal Processing: Image Communication44 101-107  
86104220167Fuh-Gwo Jeng, Jyun-Ci Huang and Tzung-Her ChenAn improved anonymous buyer-reseller watermarking protocol其他International Journal of Network Security18 728-735  
87104220167Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her ChenA Multi-Watermarking Protocol for Health Information Management第三順位Multimedia Tools and Applications 75 8123-8135  
881061201710李琪霖、黃偉倫、郭育麟、王炳兼、陳宗和,漫談H.264/AVC的選擇加密法其他Communications of the CCISA23 73-92  
891061201711I-Chun Weng and Tzung-Her ChenA Novel Weighted Visual Cryptography Scheme with High Visual Quality 第二順位International Journal of Network Security19 922-928  
90105220176Jyun-Ci Huang, Fuh-Gwo Jeng and Tzung-Her ChenA new buyer-seller watermarking protocol without multiple watermarks insertion第三順位Multimedia Tools and Applications76 9667-9679  
91106220184Tzung-Her Chen, Kai-Siang Lin, Chih-Hung LinOn the Design of Two-decoding-option Image Secret Sharing Scheme第一順位Multimedia Tools and Applications77 7865-7881  
92106220185Tzung-Her Chen and Tzu-Ching ChangOn the security of a BTC-based-compression image authentication scheme第一順位Multimedia Tools and Applications77 12979-12989  
93106220185Fuh-Gwo Jeng, Bing-Jian Wang, Tzung-Her ChenSecurity of a UUP Web Search Protocol with Privacy Preserving," Journal of Chung Cheng Institute of Technology (EI) 第三順位Journal of Chung Cheng Institute of Technology47 107-114  
94107120189Hsing-Bai Chen, Wei-Bin Lee, and Tzung-Her ChenA Novel DRM Scheme for Accommodating Expectations of Personal Use第三順位Multimedia Tools and Applications77 23099-23114  
95107120191Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, and Tzung-Her ChenSecure and efficient protection for HTTP cookie with self-verification其他International Journal of Communication Systems32  e3857  
96107220194Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her ChenOn The Security of Threshold Random Grid-based Visual Secret Sharing 其他Multimedia Tools and Applications 78 10157-10180  
97107220195Tai-Yuan Tu, Chih-Hung Wang, Tzung-Her ChenSecure Progressive Visual Secret Sharing第三順位 Journal of Chung Cheng Institute of Technology48 10157-10180  
98108220205Tzung-Her Chen, Xi-Wen WuMultiple Secret Image Sharing with General Access Structure第一順位Multimedia Tools and Applications79 13247–13265 Booleanoperation.Generalaccessstructure.Multiplesecretimagesharing.Visual secret sharing 
99109120211Tzung-Her Chen, Tzu-Ching Chang, and Ting-Le ZhuSecurity-enhanced Cloud-based Image Secret Sharing and Authentication Using POB Number System第一順位Multimedia Tools and Applications80 1901-1924  
100109220212Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung WangBlockchain-as-a-CA: A provably secure signcryption scheme revisited by leveraging blockchains第一順位Security and Communication Networks2021  6637402  
101109220215Tzung-Her Chen and Jing-Ya YanCommutative Encryption and Authentication for OpenEXR High Dynamic Range Images第一順位Multimedia Tools and Applications80 1901-1924  
102109220215Tzung-Her Chen, Wei-Bin Lee, Hsing-Bai Chen and Chien-Lung WangRevisited - the Subliminal Channel in Blockchain and its application to IoT security第一順位Symmetry13 855  
103109220216Chien-Ding Lee and Tzung-Her ChenNew Secure and Practical E-mail Protocol with Perfect Forward Secrecy第二順位Symmetry 13 1144  
104110220226Chien-Ding Lee, Zhen-Hong Liao and Tzung-Her ChenMedical Cooperative Authenticated Key Agreement Schemes with Involvement of Personal Care Assistant in Telemedicine第三順位Computer Methods and Programs in Biomedicine221 106809  
105111220232江毓晴、陳元娣、呂明憲、汪侑翰、陳宗和智能合約的安全防護與檢測平台實作第一順位Communications of the CCISA29 35-52  
106112120238Tzung-Her Chen, Jing-Ya YanEnhanced Steganography for High Dynamic Range Images with Improved Security and Capacity第一順位Applied Sciences13 8865  
107112120238Chien-Ding Lee, Jhih-Hong Li, and Tzung-Her ChenA Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids第三順位IEEE Access11  85202-8521  
108112220243Xi-Wen Wu, Tzung-Her ChenSecurity enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares第二順位Multimedia Tools and Applications83 28913–28926  

會議論文(共計89筆)
序號學年度學期年度月份作者題目通訊作者作者順位發表性質會議論文集或研討會名稱地點
10891200010李維斌, 陳宗和數位影像著作權保護~一個無失真高強韌度的浮水印技術 2000年暨第五屆全國電腦與通訊研討會 大葉大學 
20891200012Wei-Bin Lee and Tzung-Her ChenA Robust Copyright Protection Scheme for Still Images  2000 International Computer Symposium Workshop 花蓮 
30911200211洪國寶, 陳俊華, 曾斌誠, 陳宗和一個植基於類神經網路之具強韌性的無失真著作權保護技術 第七屆人工智慧與應用研討會 朝陽科技大學 
4090220025Gwoboa Horng, Tzung-her Chen and San-Hao WangA Robust Wavelet-Based Watermarking Using Quantization and Human Visual System 12th National Conference on Information Security Taichung 
50921200311Tzung-Her Chen, Gwoboa Horng, and Chao-Liang LiuSecurity enhancement for a one-time password authentication scheme using smart cards 2003 Workshop on Consumer Electronics  National Cheng-Kung University 
6091220036Tzung-Her Chen, Gwoboa Horng, and Dushiau TsaiImprovements of a buyer-reseller watermarking protocol 2003 Symposium on Application and Development of Information Technologies 屏東商業技術學院 
7092120039洪國寶, 黃耀德, 蔡篤校, 陳宗和植基於類神經網路之全彩秘密影像分享技術 2003數位生活與網際網路科技研討會 成功大學 
8092220043Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee, and Kuang-Long LinFurther enhancement for OPSA 2004電子商務與數位生活研討會 台北 
9092220045洪國寶,劉兆樑,陳宗和,張若芬一個遠端認證方法之改進以及軍事上之應用 陸軍軍官學校八十週年校慶綜合學術研討會 陸軍軍官學校 
10092220045洪國寶, 陳宗和, 張家銘, 李碩庭重點區域不失真的醫學影像驗證技術 第五屆管理學域學術研討會 朝陽科技大學 
11092220046陳宗和,洪國寶,楊子慶一個基於YS-like通行碼驗證方法的安全性分析 2004 數位生活與網際網路研討會  成功大學 
12092220046Wei-Bin Lee, Shih-Cheng Chen and Tzung-Her Chen A Secure Image Hiding Scheme with Authentication 2004 International Conference of Information Management 育達商業技術學院 
13092220046Tzung-Her Chen, and Gwoboa HorngAn Asymmetric and Anonymous Protocol for Copyright Protection  14th Information Security Conference 台灣科技大學 
140941200510Dahua Xie, Tzung-Her Chen and C.-C. Jay KuoDistortion-Aware Multimedia Authentication Using an Enhanced Hash Function International Workshop on Multimedia Signal Processing 2005 (IEEE MMSP) Shanghai, China 
150951200611Tzung-Her Chen and Chang-Sian Wu A Batch Image Encryption Scheme 2006 Workshop on Consumer Electronics and Signal Processing, Nov. 16-17, 2006 中華大學 
160951200612蔡柏侃、洪宗豪、陳宗和 數位權限管理之基於單向雜湊函數鏈的金鑰傳遞方法 2006數位教學暨資訊實務研討會, 南台科技大學, Dec. 8 南台科技大學 
17094220062Tzung-Her Chen and Tsung-Hao HungSecurity Enhancement of an Authentication Protocol for Personal Communication Systems 2006電子商務與數位生活研討會 台北大學 
18094220066Du-Shiau Tsai, Tzung-Her Chen, Gwoboa Horng A New Cheating Prevention Scheme for Visual Cryptography 16th Information Security Conference, June 8-9, 2006 逢甲大學 
19094220066Tzung-Her Chen, Tsung-Hao Hung An Authentication Protocol for UMTS with Non-repudiation 16th Information Security Conference, June 8-9, 2006 逢甲大學 
200961200710陳宗和, 曾靖皓以動態向量為基礎的MPEG-4視訊加密第一順位書面發表 Computer Graphics Workshop 2007, Oct. 18-19, 2007  
210961200711陳宗和, 黃焌華基於拜爾排列樣式的彩色影像隱藏技術第一順位書面發表 2007年民生電子暨信號處理研討會, Nov. 2, 2007  
220961200711陳宗和, 曾靖皓具有效性及高安全性之圖形密碼機制第一順位書面發表 2007年民生電子暨信號處理研討會, Nov. 2, 2007  
230961200711Tzung-Her Chen, Chang-Sian Wu, and Wei-Bin LeeA Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding第一順位書面發表 (IIHMSP-2008)  
240961200712Gwoboa Horng, Chien-Lung Wang, Tzung-Her ChenAn Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks第三順位書面發表 Information Security and Cryptology Conference (ISCTurkey 2007), Dec. 13-14, 2007  
25095220073Tzung-Her Chen and Tsung-Hao HungA Secure Key Management Scheme in Digital Rights Management System for Mobile Users第一順位書面發表 2007電子商務與數位生活研討會, Mar. 17, 2007  
26095220073陳宗和,蔡柏侃應用於行動裝置的快速驗證協定第一順位書面發表 第五屆現代通訊科技應用學術研討會, Mar. 16, 2007  
27095220075Tzung-Her Chen and Jyun-Ci HuangRemarks on a password-based authentication and key distribution protocol with perfect forward secrecy第一順位書面發表 2007知識社群與資訊安全研討會, May 16, 2007  
28095220075Ren-Der Lin, Tzung-Her Chen and Chien-Chen HuangSecurity of an image authentication scheme based on Hamming code第二順位書面發表 2007傳播技術與數位內容學術研討會, May 22, 2007  
29095220075Tzung-Her Chen and Po-Kan TsaiA JPEG2000 Image Encryption Scheme With Changed Context Label第一順位書面發表 2007資訊管理學術與實務研討會, May 29, 2007  
30095220076Tzung-Her Chen and Chang-Sian WuA batch image encryption scheme based on random grid第一順位書面發表 第十一屆資訊管理學術暨警政資訊實務研討會, June 1, 2007  
31095220076陳宗和,蔡柏侃可適用於多人環境之行動裝置的快速驗證協定第一順位書面發表 Proceedings of 17th Information Security Conference, June 8, 2007.  
32095220076李維斌,葉書辰,陳宗和植基於單向赫序鏈之電子旅行支票系統第三順位書面發表 2007年資訊技術與產業應用研討會, June 8, 2007  
33095220076Kuan-Chieh Liao, Tzung-Her Chen, Chao-Kai Chang, and Wei-Bin LeeRemarks on a Practical Password-Based Two-Server Authentication and Key Exchange System第二順位書面發表 2007 Conference of Digital Technology and Innovation Management, June 2, 2007  
34095220077Tzung-Her Chen and Tsung-Hao HungAn adaptive and transient authentication protocol for mobile device第一順位書面發表 The 11th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2007)  
35095220077Chiung-Chou Tsai, Kuan-Chieh Liao, Tzung-Her Chen, and Wei-Bin LeeSecurity enhancement of a novel proxy key generation protocol第三順位書面發表 (STPSA’07)  
36096120078Tzung-Her Chen and Chang-Sian WuBATCH IMAGE ENCRYPTION WITH VECTOR QUANTIZATION AND INDEX COMPRESSION第一順位書面發表 20th Computer Vision, Graphics, and Image Processing, August 19-21, 2007  
37096120078Tzung-Her Chen and Jyun-Ci HuangUser-Participation-based Authentication for Remote Users第一順位書面發表 The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007  
38096120078Tzung-Her Chen and Chang-Sian WuMultiple Secrets Sharing Based on Boolean Operations第一順位書面發表 The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007  
39096120078Chao-Kai Chang, Hsing-Bai Chen, Tzung-Her Chen*, Wei-Bin LeeE-Gift Certificate Book with Different Face Values第三順位書面發表  The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007  
400971200810Tzung-Her Chen, Kai-Hsiang Tsao, and Chang-Sian WuMulti-secrets visual secret sharing第一順位書面發表 Proceedings of The 14th Asia-Pacific Conference on Communications, October 14-16  
410971200811Tzung-Her Chen, Kuang-Che Li and Kai-Hsiang TsaoVisual multi-image sharing by circular random grids第一順位書面發表 第十屆「網際空間:資安、犯罪與法律社會」學術暨實務研討會, Nov. 21, 2008  
420971200811Tzung-Her Chen, Yao-Sheng Lee, and Kai-Hsiang TsaoVisual secret sharing by random grids with pixel reduction第一順位書面發表  第十屆「網際空間:資安、犯罪與法律社會」學術暨實務研討會, Nov. 21, 2008  
430971200811Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen WeiMultiple-image encryption by rotating random grids第一順位書面發表 (ISDA 2008)  
44096220085Tzung-Her Chen and Kai-Hsiang TsaoImage encryption by (n,n) Random Grids第一順位書面發表 Proceedings of 18th Information Security Conference, May 29-30, 2008  
45096220085陳宗和, 魏國珍, 曹凱翔使用隨機網格加密多重秘密影像第一順位書面發表 Proceedings of 18th Information Security Conference, May 29-30, 2008  
46097120088Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, and Tzung-Her ChenAssigning Keys in a Hierarchy其他書面發表 (IIHMSP-2008)  
47098120099Tzung-Her Chen and Yao-Sheng LeeYet another friendly progressive visual secret sharing scheme第一順位書面發表 IIHMSP-2009  
48098120099Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong LinMedical video encryption based on H.264/AVC with near-lossless compression第一順位書面發表 IIHMSP-2009  
49098120099Tzung-Her Chen and Yao-Sheng LeeYet another friendly progressive visual secret sharing scheme第一順位書面發表 (IIHMSP-2009)  
50098120099Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong LinMedical Video Encryption Based on H.264/AVC with Near-Lossless Compression第一順位書面發表 (IIHMSP-2009)  
510991201010Tzung-Her Chen, Wei-Lun Huang, and Chih-Yang LinChaos-based Image Integrity Authentication Code第一順位書面發表 (IIHMSP-2010)  
520991201010Tzung-Her Chen, Wei-Lun Huang, and Chih-Yang LinChaos-based image integrity authentication code第一順位書面發表 IIHMSP-2010  
530991201011Chih-Yang Lin, Wei-Lun Huang, Tzung-Her ChenNoise-resistant joint fingerprinting and decryption based on vector quantization第三順位書面發表 CWECS 2010  
540991201011Tzung-Her Chen, Yao-Sheng Lee and Ci-Lin LiHigh-capacity multi-secret sharing by random grid第一順位書面發表 CWECS 2010  
550991201011Chih-Yang Lin, Wei-Lun Huang, Tzung-Her ChenNoise-resistant Joint Fingerprinting and Decryption Based on Vector Quantization第三順位書面發表 (CWECS 2010)  
560991201011Tzung-Her Chen, Yao-Sheng Lee and Ci-Lin LiHigh-capacity multi-secret sharing by random grid第一順位書面發表 (CWECS 2010)  
571001201110Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her ChenA designated-tester public key encryption scheme with conjunctive-subset keyword search其他書面發表 (MSE 2011)  
581001201110Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her ChenA designated-tester public key encryption scheme with conjunctive-subset keyword search其他書面發表 MSE 2011  
59100120119Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo JengSecurity improvement against malicious servers in dPEKS scheme第二順位書面發表 ICNEE 2011  
60100120119Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo JengSecurity Improvement against Malicious Servers in dPEKS Scheme第二順位書面發表 (ICNEE 2011)  
611021201310Jing-Ya Yan, Tzung-Her Chen and Chih-Hung LinEncryption In High Dynamic Range Images for RGBE Format第二順位口頭發表 The Ninth International Conference on Intelligent Info Hiding and Multimedia Signal Processing Beijing China 
621021201310Jing-Ya Yan, Tzung-Her Chen and Chih-Hung LinEncryption in high dynamic range images for RGBE format第二順位口頭發表 IIHMSP-2013  
63101220134Chih-Hung Lin, Shu-Yuan Lin and Tzung-Her ChenDynamic range optimization by flexible local contrast enhancement using luminance map第三順位口頭發表 Proceedings of Fifth International Conference on Digital Image Processing (ICDIP 2013) Beijing, China 
64101220134Chih-Hung Lin, Shu-Yuan Lin and Tzung-Her ChenDynamic range optimization by flexible local contrast enhancement using luminance map第三順位書面發表 Fifth International Conference on Digital Image Processing (ICDIP 2013)  
65101220136Shu-Yuan Lin, Tzung-Her Chen, and Chih-Hung LinHybrid depth-estimation method for 2D-to-3D conversion第二順位書面發表 DTIM2013  
66102120138Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, and Sheng-Shiang ChangA tailor-made encryption scheme for high-dynamic range images第二順位書面發表 ICGEC 2013  
67102120138Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen, and Kai-Siang LinRobust watermarking for multiple images and users based on visual cryptography第三順位口頭發表 ICGEC 2013  
68102120138Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen,and K. S. LinRobust watermarking for multiple images and users based on visual cryptography第三順位口頭發表 Proceedings of the Seventh International Conference on Genetic and Evolutionary Computing (ICGEC 201 Prague, Czech 
69102120138Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, Sheng-Shiang ChangA Tailor-made high dynamic range image encryption第二順位口頭發表 Proceedings of the Seventh International Conference on Genetic and Evolutionary Computing (ICGEC 201 Prague, Czech 
70102120139Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her ChenA friendly visual multi-secret sharing scheme其他口頭發表 The Second Cross-Straits Conference on Information Security (CSCIS 2013) Kaohsiung 
71102120139Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her ChenA friendly visual multi-secret sharing scheme其他口頭發表 The Second Cross-Straits Conference on Information Security (CSCIS 2013)  
72102220145Wei-Bin Lee, Tzung-Her Chen, Wei-Rung Sun, Kevin HoA S/Key-like One-Time Password Authentication Scheme Us ing Smart Cards for Smart Meter第二順位口頭發表 Proceedings of The 28th IEEE International Conference on Advanced Info Networking & Applications Victoria, Canada 
73102220147Zhen-Hong Liao, Fuh-Gwo Jeng, Tzung-Her ChenAn authenticated Concealed Data Aggregation Scheme Based on Secret Sharing for Smart Grid第三順位口頭發表 The 5th International Conference on Systematic Innovation (ICSI) San Jose, California, USA. 
74102220147Jing-Ya Yan, Fuh-Gwo Jeng, Tzung-Her ChenAn Image Authentication Scheme for High Dynamic Range Images第三順位口頭發表 The 5th International Conference on Systematic Innovation (ICSI) San Jose, California, USA. 
75103120148Tzung-Her Chen, Sheng-Shiang ChangImage encryption on HDR images for OpenEXR format第一順位口頭發表 第十九屆行動計算研討會 The 2014 Mobile Computing Workshop (MC 2014)  Tainan 
76103220155Zhen-Hong Liao, Tzung-Her ChenA Billing Scheme in Smart Grid with Non-Repudiation第二順位口頭發表 第二十五屆全國資訊安全會議 高雄 
77103220156Jing-Ya Yan、Tzung-Her ChenAn electronic ticket scheme based on designated verifier proxy signature第二順位口頭發表 DLT2015數位生活科技研討會  
78103220157I-Chun Weng, Tzung-Her ChenOn the Contrast of Random Grid-based Visual Secret Sharing for General Access Structure with Cheat-Preventing Ability第二順位口頭發表 International Conference on Engineering and Applied Sciences (ICEAS) Sapporo, Japan 
79104220165Yi-Hui Chen, I-Chun Weng and Tzung-Her ChenVisual cryptography for flexible general access structure第三順位口頭發表 第二十六屆全國資訊安全會議  
80104220167Hang-Yu Lin and Tzung-Her ChenEfficient clouding data sharing with signature aggregation第二順位口頭發表  7th International Conference on Systematic Innovation (ICSI 2016) Lisbon, Portugal​ 
81104220167Tzu-Ching Chang and Tzung-Her ChenAn image authentication scheme based on Sudoku第二順位口頭發表  7th International Conference on Systematic Innovation (ICSI 2016) Lisbon, Portugal​ 
82105220174Xi-Wen Wu and Tzung-Her ChenA Boolean-Operation-Based Multi-Secret Visual Secret Sharing Scheme by General Access Structure第二順位口頭發表 2017 International Conference on e-Commerce and e-Technology Kyoto, Japan 
831071201812Tai-Yuan Tu, Tzung-Her Chen, Ji-min Yang, Chih-Hung WangA Weighted Threshold Visual Cryptography第二順位口頭發表 2018 International Computer Symposium 雲林 
84106220185Ting-Le Zhu, Chih-Hung Wang, Tzung-Her ChenPrivacy-enhanced fair protocol for data trading based on Bitcoin transactions第三順位口頭發表 第二十八屆全國資訊安全會議  
85106220185Tzung-Her Chen, Ting-Le Zhu, Chih-Hung WangPrivacy-preserving-enhanced designated-verifier proof of assets for cryptocurrency exchange第一順位口頭發表 2018 3rd International Conference on Electronic Engineering and Computer Science  杭州 
86107220193Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung WangBlockchain-based Key Management for Healthcare Information System第一順位壁報發表 The 2nd International Conference on Information Science and System (ICISS 2019) Tokyo, Japan 
87107220195Tzung-Her Chen, Wen-Rui Fu, Yung-ChuanTsengA study on trading of renewable energy certificate based on HyperledgerFabric and Composer第一順位口頭發表 第二十九屆全國資訊安全會議  
88109120209駱彥儒 林少玄 陳宗和以Hyperledger Fabric建構一個適用於智慧微電網之可信任再生能源交易平台第三順位口頭發表 第三十屆全國資訊安全會議  
89109120211Ting-Le Zhu and Tzung-Her ChenA Study of Blockchain-based two-party Key Management for Healthcare Information System第二順位壁報發表 The 2021 IEEE Conference on Dependable and Secure Computing (IEEE DSC)  Fukushima, Japan 

研究計畫(共計20筆)
備註欄說明:「教師研究計畫管理系統轉入之計畫」(係指依「國立嘉義大學產學合作計畫實施要點」第3點規定,與政府機關、法人、公民營事業機構、民間團體、學術研究機構等合作辦理有關事項,以本校名義與合作機構辦理簽約,其經費撥入本校之產學合作計畫。)
序號學年度學期年度月份參與性質委辦單位計畫名稱開始日期結束日期經費備註欄
11011201208國家科學及技術委員會高效率之H.264/SVC視訊加密技術之研製2012/08/012013/07/31683000
21011201208國家科學及技術委員會高效率之H.264/SVC視訊加密技術之研製2012/08/012013/10/31683000
31021201308國家科學及技術委員會具高容量及使用彈性之安全視覺化秘密分享技術2013/08/012014/07/31721000
41021201308國家科學及技術委員會具高容量及使用彈性之安全視覺化秘密分享技術2013/08/012014/10/31721000
51031201408國家科學及技術委員會安全且友善的權重式視覺化多重秘密分享2014/08/012015/07/31719000
61031201408國家科學及技術委員會安全且友善的權重式視覺化多重秘密分享2014/08/012015/10/31719000
71032201502教育部行動雲端運算資訊軟體創作與推廣課程計畫2015/02/012016/01/31675000
81032201502教育部104年度教育部資通訊軟體創新人才推升推廣計畫-行動雲端運算資訊軟體創作與推廣課程計畫2015/02/012016/01/31675000
91032201507國家科學及技術委員會大專生研究計畫:基於車聯網概念實踐車禍偵測並即時通報與提供事後分析之雲端平台2015/07/012016/02/2948000
101041201508國家科學及技術委員會強化安全性的視覺化秘密分享2015/08/012016/07/31775000
111041201601其他政府機關-其他政府單位具地理資訊之雲端web2.0敬字亭社群系統 2016/01/012016/12/31270000
121051201608國家科學及技術委員會具多重秘密分享之權重與彈性式一般型存取結構之視覺密碼技術2016/08/012017/07/31780000
131071201808國家科學及技術委員會整個區塊鏈就是我們可信任的綠能平台~具隱密性及隱私保護之微電網再生能源與再生能源憑證交易(1/3)2018/08/012019/07/31743000
141081201908國家科學及技術委員會整個區塊鏈就是我們可信任的綠能平台~具隱密性及隱私保護之微電網再生能源與再生能源憑證交易(2/3)2019/08/012020/07/31685000
151091202008國家科學及技術委員會整個區塊鏈就是我們可信任的綠能平台~具隱密性及隱私保護之微電網再生能源與再生能源憑證交易(3/3)2020/08/012021/07/31662000
161092202107計畫主持人國家科學及技術委員會大專學生研究計畫大專生計畫:智能合約的安全防護與檢測平台實作(指導學生:陳元娣)2021/07/012022/02/2848000教師研究計畫管理系統轉入之計畫
171101202108計畫主持人國家科學及技術委員會高動態範圍影像安全:可交換式加密及驗證技術之研製(1/2)2021/08/012022/07/31840000教師研究計畫管理系統轉入之計畫
181102202207計畫主持人國家科學及技術委員會大專學生研究計畫大專生計畫:動態掃描區塊鏈智能合約之弱點檢測平台-指導學生:呂明憲2022/07/012023/02/2858000教師研究計畫管理系統轉入之計畫
191111202208計畫主持人國家科學及技術委員會高動態範圍影像安全:可交換式加密及驗證技術之研製(2/2)2022/08/012023/07/31806000教師研究計畫管理系統轉入之計畫
201121202308計畫主持人國家科學及技術委員會可信任的去中心化智慧電網能源交易機制2023/08/012024/07/31690000教師研究計畫管理系統轉入之計畫

學術活動(共計160筆)
序號學年度學期年度月份活動分類活動名稱活動地點/期刊學報/比賽名稱
11011201301學術期刊論文審查 學術期刊論文審查(Jan. 2013)IEEE Communications Letters 
21011201301學術期刊論文審查學術期刊論文審查 (Jan. 2013)Signal Processing 
31011201301學術期刊論文審查 學術期刊論文審查(Jan. 2013)IEEE Transactions on Information Forensics and Security 
41011201301學術期刊論文審查學術期刊論文審查(Jan. 2013)Journal of Information Science and Engineering  
51011201301學術期刊論文審查學術期刊論文審查(Jan. 2013)IET Image Processing  
61011201301學術期刊論文審查學術期刊論文審查(Jan. 2013)Journal of System and Software  
71012201302學術期刊論文審查學術期刊論文審查(Feb. 2013)Signal Processing  
81012201302學術期刊論文審查學術期刊論文審查(Feb. 2013)KSII Transactions on Internet and Information Systems  
91012201302學術期刊論文審查學術期刊論文審查(Feb. 2013)IEEE Transactions on Image Processing  
101012201303學術期刊論文審查學術期刊論文審查 (Mar. 2013)Journal of Visual Communication and Image Representation 
111012201303學術期刊論文審查 學術期刊論文審查(Mar. 2013)IEEE Transactions on Circuits and Systems for Video Technology 
121012201303學術期刊論文審查學術期刊論文審查(Mar. 2013)International Journal of Computer Mathematics  
131012201303學術期刊論文審查學術期刊論文審查 (Mar. 2013) Digital Signal Processing 
141012201304學術期刊論文審查學術期刊論文審查(Apr. 2013)EURASIP Journal on Advances in Signal Processing  
151012201304學術期刊論文審查學術期刊論文審查(Apr. 2013)Journal of Visual Communication and Image Representation  
161012201305學術期刊論文審查學術期刊論文審查(May 2013) IEEE Transactions on Circuits and Systems for Video Technology  
171012201305學術期刊論文審查學術期刊論文審查(May 2013) Signal Processing  
181012201305學術期刊論文審查學術期刊論文審查(May 2013)IET Image Processing  
191012201305學術期刊論文審查學術期刊論文審查 (May 2013)Signal Processing 
201012201305學術期刊論文審查學術期刊論文審查(May 2013)KSII Transactions on Internet and Information Systems  
211012201307學術期刊論文審查學術期刊論文審查 (July, 2013)Journal of Visual Communication and Image Representation 
221012201307學術期刊論文審查學術期刊論文審查 (July, 2013)Journal of Information Science and Engineering 
231021201308執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal 
241021201309學術期刊論文審查 學術期刊論文審查(Sep. 2013)The Scientific World Journal 
251021201309學術期刊論文審查學術期刊論文審查(Sep. 2013)Digital Signal Processing  
261021201309學術期刊論文審查學術期刊論文審查(Sep. 2013)The Scientific World Journal  
271021201309學術期刊論文審查學術期刊論文審查(Sep. 2013)Journal of Visual Communication and Image Representation  
281021201309學術期刊論文審查學術期刊論文審查(Sep, 2013)Journal of Information Science and Engineering  
291021201309學術期刊論文審查 學術期刊論文審查(Sep. 2013)Journal of Systems and Software 
301021201310學術期刊論文審查學術期刊論文審查 (Oct. 2013)KSII Transactions on Internet and Information Systems 
311021201310學術期刊論文審查學術期刊論文審查(Oct. 2013)IEEE Transactions on Image Processing  
321021201310學術期刊論文審查學術期刊論文審查(Oct. 2013)Journal of Systems and Software  
331021201311學術期刊論文審查學術期刊論文審查(Nov. 2013)IEEE Transactions on Parallel and Distributed Systems  
341021201312出席國內研討會2013全國計算機會議亞洲大學,台中 
351021201312學術期刊論文審查學術期刊論文審查(Dec. 2013)KSII Transactions on Internet and Information Systems  
361021201312學術期刊論文審查學術期刊論文審查(Dec. 2013)Signal Processing  
371021201312學術期刊論文審查 學術期刊論文審查(Dec. 2013)The Journal of Supercomputing 
381021201312學術期刊論文審查學術期刊論文審查(Dec. 2013)Journal of Visual Communication and Image Representation  
39101220135出席國內研討會2013全國資訊安全會議南台科技大學, 台南 
401021201401學術期刊論文審查學術期刊論文審查(Jan. 2014)China Communications  
411021201401學術期刊論文審查學術期刊論文審查(Jan. 2014)Wireless Personal Communications  
421021201401學術期刊論文審查 學術期刊論文審查(Jan. 2014)KSII Transactions on Internet and Information Systems 
431021201401學術期刊論文審查學術期刊論文審查 (Jan. 2014)Security and Communication Networks 
441021201401主編、副主編學術期刊論文審查(Jan. 2014)Journal of Visual Communication and Image Representation  
451022201402學術期刊論文審查學術期刊論文審查(Feb. 2014)Signal Processing  
461022201403學術期刊論文審查學術期刊論文審查(Mar. 2014)Journal of Supercomputing  
471022201403學術期刊論文審查學術期刊論文審查(Mar. 2014)IEEE Transactions on Information Forensics AND Security  
481022201403學術期刊論文審查學術期刊論文審查(Mar. 2014)IEEE Transactions on Circuits and Systems for Video Technology  
491022201403學術期刊論文審查學術期刊論文審查(Mar. 2014)Security and Communication Networks  
501022201403學術期刊論文審查學術期刊論文審查(Mar. 2014) IEEE Transactions on Cybernetics  
511022201404學術期刊論文審查學術期刊論文審查(Apr. 2014)Security and Communication Networks  
521022201405學術期刊論文審查學術期刊論文審查 (May 2014)Signal Processing: Image Communication 
531022201406學術期刊論文審查學術期刊論文審查(Jun. 2014)Security and Communication Networks  
541022201407學術期刊論文審查學術期刊論文審查(Jul. 2014)Journal of Visual Communication and Image Representation  
551031201408學術期刊論文審查學術期刊論文審查(Aug. 2014)Signal Processing: Image Communication  
561031201408學術期刊論文審查學術期刊論文審查(Aug. 2014)Wireless Personal Communications  
571031201408學術期刊論文審查學術期刊論文審查(Aug. 2014)IET Information Security  
581031201408執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal  
591031201409學術期刊論文審查學術期刊論文審查(Sep. 2014)Journal of Information Science and Engineering  
601031201410學術期刊論文審查學術期刊論文審查(Oct. 2014)Security and Communication Networks  
611031201411學術期刊論文審查學術期刊論文審查 (Nov. 2014)IEEE Transactions on Industrial Electronics 
621031201411學術期刊論文審查學術期刊論文審查(Nov. 2014)International Journal of Communication Systems  
631031201412學術期刊論文審查 學術期刊論文審查(Dec. 2014)Security and Communication Networks 
641031201412學術期刊論文審查學術期刊論文審查(Dec. 2014IEEE Transactions on Circuits and Systems for Video Technology  
651031201412學術期刊論文審查學術期刊論文審查(Dec. 2014)Journal of Visual Communication and Image Representation  
661031201412學術期刊論文審查學術期刊論文審查(Dec. 2014)JZUS-C (Computers and Electronics)  
67102220145出席國內研討會2014全國資訊安全會議政治大學,台北 
68103120148出席國際研討會The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014) Kitakyushu, Japan 
691031201501學術期刊論文審查 學術期刊論文審查(Jan. 2015)Information Sciences 
701031201501學術期刊論文審查學術期刊論文審查(Jan., 2015)Journal of Information Science and Engineering  
711032201502學術期刊論文審查學術期刊論文審查(Feb. 2015)IEEE Signal Processing Letters  
721032201503學術期刊論文審查學術期刊論文審查(May 2015)International Journal of Computer Mathematics  
731032201503學術期刊論文審查學術期刊論文審查(Mar. 2015)Security and Communication Networks  
741032201506學術期刊論文審查學術期刊論文審查 (Jun. 2015)Security and Communication Networks 
751032201506學術期刊論文審查學術期刊論文審查(Jun. 2015)IEEE Transactions on Information Forensics and Security  
761032201506學術期刊論文審查學術期刊論文審查(Jun. 2015)China Communications  
771032201507學術期刊論文審查 學術期刊論文審查(July 2015)IEEE Transactions on Information Forensics and Security 
781041201508主編、副主編學術期刊論文審查(Aug. 2015)IEEE MultiMedia  
791041201508學術期刊論文審查學術期刊論文審查(Aug. 2015)Journal of Information Science and Engineering  
801041201508執行編輯、編輯委員、指導委員擔任editorCryptography  
811041201508執行編輯、編輯委員、指導委員擔任editorInternational Journal of Computer and Software Engineering  
821041201508執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal  
831041201509主編、副主編學術期刊論文審查(Sep. 2015) International Journal of Communication Systems  
841041201509學術期刊論文審查學術期刊論文審查 (Sep. 2015)Security and Communication Networks 
85103120151出席國際研討會2015 International Conference on Platform Technology and ServiceJeju, Korea 
861041201510學術期刊論文審查 學術期刊論文審查(First, Oct. 2015)Security and Communication Networks 
871041201510學術期刊論文審查 學術期刊論文審查(Second, Oct. 2015)Security and Communication Networks 
881041201511學術期刊論文審查學術期刊論文審查(Nov. 2015)International Journal of Communication Systems  
891041201511學術期刊論文審查學術期刊論文審查(Nov. 2015)Wireless Personal Communications  
90103220155出席國內研討會2015全國資訊安全會議高雄第一科技大學, 高雄 
91104120159出席國際研討會The 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2015)Adelaide, Australia 
921041201601學術期刊論文審查學術期刊論文審查(Jan. 2016)KSII Transactions on Internet and Information Systems  
931042201602學術期刊論文審查學術期刊論文審查 (Feb. 2016)KSII Transactions on Internet and Information Systems 
941042201602學術期刊論文審查 學術期刊論文審查(Feb. 2016)IEEE Signal Processing Letters 
951042201603學術期刊論文審查學術期刊論文審查(Mar. 2016)Measurement  
961042201604學術期刊論文審查學術期刊論文審查(Apr. 2016)Mathematical Problems in Engineering  
971042201605學術期刊論文審查學術期刊論文審查 (May 2016)Wireless Personal Communications 
981042201605學術期刊論文審查學術期刊論文審查(May 2016)Mathematical Problems in Engineering  
991042201605學術期刊論文審查學術期刊論文審查(May, 2016)Journal of Visual Communication and Image Representation  
1001042201606學術期刊論文審查 學術期刊論文審查(June 2016)Journal of Intelligent Systems 
1011042201606學術期刊論文審查學術期刊論文審查(June 2016)Electronics Letters  
1021042201606學術期刊論文審查學術期刊論文審查(June 2016)Advances in Mathematics of Communications  
1031042201606學術期刊論文審查學術期刊論文審查(June 2016)Signal Processing: Image Communication  
1041042201607學術期刊論文審查學術期刊論文審查 (July, 2016)Journal of Visual Languages and Computing 
1051051201608學術期刊論文審查學術期刊論文審查(Aug. 2016)Informatica  
1061051201608學術期刊論文審查學術期刊論文審查(Aug. 2016)Journal of Real-Time Image Processing  
1071051201608學術期刊論文審查學術期刊論文審查(Aug. 2016)Electronics Letters  
1081051201608學術期刊論文審查學術期刊論文審查(Aug. 2016)Journal of Information Science and Engineering  
1091051201608執行編輯、編輯委員、指導委員擔任editorThe Scientific World Journal  
1101051201608執行編輯、編輯委員、指導委員擔任editorCryptography  
1111051201608執行編輯、編輯委員、指導委員擔任editorInternational Journal of Computer and Software Engineering  
1121051201609學術期刊論文審查學術期刊論文審查(Sep. 2016)Security and Communication Networks  
1131051201609學術期刊論文審查學術期刊論文審查(Sep. 2016)Signal Processing: Image Communication  
1141051201609學術期刊論文審查學術期刊論文審查 (Sep. 2016)Journal of Visual Communication and Image Representation 
1151051201610學術期刊論文審查 學術期刊論文審查(Oct. 2016)IET Image Processing 
1161051201612學術期刊論文審查學術期刊論文審查(Dec. 2016)IET Information Security  
1171051201612學術期刊論文審查學術期刊論文審查(Dec. 2016)Digital Signal Processing  
118104220165出席國內研討會2016全國資訊安全會議亞洲大學, 台中 
119104220166出席國內研討會2016數位生活科技屏東大學, 屏東 
120105120168出席國際研討會The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016)Fukuoka, Japan Kushu University, Nishijin Plaza 
1211051201701學術期刊論文審查學術期刊論文審查(Jan. 2017)IET Image Processing  
1221052201702學術期刊論文審查學術期刊論文審查(Feb. 2017)IEEE Signal Processing Letters  
1231052201702學術期刊論文審查學術期刊論文審查(Jan. 2017)Information Sciences  
1241052201703學術期刊論文審查學術期刊論文審查(Mar. 2017)ACM Transactions on Multimedia Computing, Communications and Applications  
1251052201703學術期刊論文審查學術期刊論文審查(Mar. 2017)IEEE Transactions on Industrial Informatics  
1261052201703學術期刊論文審查學術期刊論文審查(Mar. 2017)IEEE Transactions on Image Processing  
1271052201704學術期刊論文審查學術期刊論文審查(Apr. 2017)Neural Computing and Applications  
1281052201705學術期刊論文審查學術期刊論文審查(May 2017)Digital Signal Processing 
1291052201705學術期刊論文審查學術期刊論文審查(May 2017)Multidimensional Systems and Signal Processing 
1301052201705學術期刊論文審查學術期刊論文審查(May 2017)Signal Processing: Image Communication 
1311052201705學術期刊論文審查學術期刊論文審查(May 2017)KSII Transactions on Internet and Information Systems 
1321052201705學術期刊論文審查學術期刊論文審查(May 2017)IEEE Transactions on Industrial Informatics 
1331052201706學術期刊論文審查學術期刊論文審查(Jun. 2017)IEEE Transactions on Information Forensics and Security 
1341052201706學術期刊論文審查學術期刊論文審查(Jun. 2017)KSII Transactions on Internet and Information Systems  
1351052201706學術期刊論文審查學術期刊論文審查(Jun. 2017)International Journal of Bifurcation and Chaos 
1361052201706學術期刊論文審查學術期刊論文審查(Jun. 2017)IEEE Access 
1371052201707學術期刊論文審查學術期刊論文審查(Jul. 2017)Signal Processing: Image Communication 
1381061201708學術期刊論文審查學術期刊論文審查(Aug. 2017)IET Image Processing 
1391061201709學術期刊論文審查學術期刊論文審查(Sep. 2017)Mobile Information Systems 
1401061201709學術期刊論文審查學術期刊論文審查(Sep. 2017)Digital Signal Processing  
1411061201710學術期刊論文審查學術期刊論文審查(Oct. 2017)Signal Processing: Image Communication 
1421061201710學術期刊論文審查學術期刊論文審查(Oct. 2017)KSII Transactions on Internet and Information Systems 
1431061201710學術期刊論文審查學術期刊論文審查(Oct. 2017)Journal of Visual Communication and Image Representation 
1441061201711學術期刊論文審查學術期刊論文審查(Nov. 2017)IEEE Transactions on Circuits and Systems for Video Technology  
1451061201711學術期刊論文審查學術期刊論文審查(Nov. 2017)IET Image Processing  
1461061201711學術期刊論文審查學術期刊論文審查(Nov. 2017)Information Technology and Control 
1471061201712學術期刊論文審查學術期刊論文審查(Dec. 2017) IEEE Transactions on Circuits and Systems for Video Technology  
1481061201712學術期刊論文審查學術期刊論文審查(Dec. 2017)Information Sciences 
1491061201712學術期刊論文審查學術期刊論文審查(Dec. 2017)IET Information Security 
150105220175出席國內研討會2017全國資訊安全會議義守大學, 高雄 
151105220176出席國內研討會2017 數位生活科技嘉義大學, 嘉義 
152106120178出席國際研討會The 12th Asia Joint Conference on Information Security (AsiaJCIS 2017)Seoul, Korea 
1531061201801學術期刊論文審查學術期刊論文審查(Jan. 2018)Signal Processing 
1541061201801學術期刊論文審查學術期刊論文審查(Jan. 2018)Journal of Visual Communication and Image Representation 
1551061201801學術期刊論文審查學術期刊論文審查(Jan. 2018)Signal Processing: Image Communication 
1561061201801學術期刊論文審查學術期刊論文審查(Jan. 2018)IEEE Access 
1571062201803學術期刊論文審查學術期刊論文審查(Mar. 2018)Security and Communication Networks 
1581062201803學術期刊論文審查學術期刊論文審查(Mar. 2018)IEEE Transactions on Image Processing 
1591062201803學術期刊論文審查學術期刊論文審查(Mar. 2018)IEEE Transactions on Circuits and Systems for Video Technology 
1601062201803學術期刊論文審查學術期刊論文審查(Mar. 2018)IET Image Processing 

推廣工作(共計53筆)
序號學年度學期年度月份推廣類別推廣名稱推廣地點
1097220096其他中華民國資訊安全學會第六屆出版委員會委員 
21002201205其他逢甲大學資訊工程系碩士學位考試委員逢甲大學 
31002201206其他中興大學資訊科學與工程學系碩士生考試委員中興大學 
41002201207其他南台科技大學資訊傳播學系碩士生考試委員南台科技大學 
5100220125其他中華民國資訊安全學會第七屆出版委員會委員 
61011201301其他中興大學資訊科學與工程學系碩士生考試委員(劉碧惠 Jan. 23, 2013)中興大學 
71011201301其他中興大學資訊科學與工程學系碩士生考試委員(劉冠宏 Jan. 23, 2013) 
81012201303學術演講或教學講習主講演講: 視覺化多重秘密分享暨南大學資訊工程學系 
91012201304學術演講或教學講習主講演講: 不變形之視覺化多重秘密分享朝陽科技大學資訊工程學系 
101021201312其他中興大學資訊科學與工程學系博士生考試委員(陳昱圻 Dec., 2013)中興大學 
11101220135其他中華民國資訊安全學會第七屆出版委員會委員 
121021201401其他雲林科技大學資訊工程系碩士學位考試委員雲林科技大學 
131022201405其他逢甲大學資訊工程系博士學位考試委員(1)逢甲大學 
141022201405其他逢甲大學資訊工程系博士學位考試委員(2) 
151022201405其他逢甲大學資訊工程系碩士學位考試委員(1) 
161022201405其他逢甲大學資訊工程系碩士學位考試委員(2) 
171022201405其他逢甲大學資訊工程系碩士學位考試委員(3) 
181022201407其他南台科技大學資訊傳播學系碩士生考試委員南台科技大學 
191031201411其他國立台南大學資工系課程大綱審查委員 
20102220145其他中華民國資訊安全學會第七屆出版委員會委員 
211032201506學術演講或教學講習主講演講: 門檻式不變形之視覺化多重秘密分享亞洲大學資訊工程學系 
221032201507其他屏東大學資訊科學系碩士學位考試委員(陳博瀚 July, 2015)屏東大學, 屏東 
231032201507其他中興大學資訊科學與工程學系碩士生考試委員(張哲豪 July, 2015) 
241032201507其他中興大學資訊科學與工程學系碩士生考試委員(曹昌林 July, 2015) 
251032201507其他中興大學資訊科學與工程學系碩士生考試委員(陳昱安 July, 2015)中興大學 
261032201507其他屏東大學資訊科學系碩士學位考試委員(昌俊豪 July, 2015)屏東大學 
271041201508其他中央大學資訊工程系第二屆系務發展委員會委員 
28103220155其他中華民國資訊安全學會第八屆出版委員會委員 
29103220155其他中華民國資訊安全學會第八屆監事 
301041201601其他逢甲大學資訊工程系博士學位考試委員(高元宏 Jan. 16, 2016)逢甲大學 
311051201612其他輔仁大學資訊工程系博士學位考試委員(劉) Dec., 2016)輔仁大學 
32104220165其他中華民國資訊安全學會第八屆監事 
33104220165其他中華民國資訊安全學會第八屆出版委員會委員 
341052201702學術演講或教學講習主講演講: 視覺化的多重機密共享 (Visual sharing of multiple secrets中央大學資訊工程學系 
351052201704學術演講或教學講習主講演講:視覺化的多重機密共享 (Visual sharing of multiple secrets)輔仁大學電機工程學系 
361052201706其他彰化師範大學數學系博士學位考試委員(洪) Jun., 2017)彰化師範大學 
371052201707其他逢甲大學資訊工程系碩士學位考試委員(蔡 Jul, 2017) 
381052201707其他逢甲大學資訊工程系碩士學位考試委員(陳 Jul, 2017)逢甲大學 
391052201707其他逢甲大學資訊工程系碩士學位考試委員(許 Jul, 2017)逢甲大學 
401052201707其他中興大學資訊科學與工程學系博士生考試委員(陳國璋 July, 2017)中興大學 
411052201707其他中興大學資訊科學與工程學系碩士生考試委員(陳炳元 July, 2017)中興大學 
421052201707其他中興大學資訊科學與工程學系碩士生考試委員(蘇旻姿 July, 2017)中興大學 
431052201707其他中興大學資訊科學與工程學系碩士生考試委員(王孟穎 July, 2017)中興大學 
441061201709其他106年度科技部資安旗艦計畫複審會議 
451061201712輔導科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視清華大學 
46105220175其他中華民國資訊安全學會第八屆出版委員會委員 
47105220175其他中華民國資訊安全學會第八屆監事 
481061201801其他科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視中興大學 
491061201801輔導科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視成功大學 
501061201801輔導科技部資安旗鑑計畫期中執行進度審查會議及計畫訪視財團法人國家實驗研究院高速網路與計算中心(南科) 
511062201802其他科技部資安旗鑑計畫期中執行進度暨成果展示審查委員台灣大學 
521062201802其他科技部資安旗鑑計畫期中執行進度暨成果展示審查委員交通大學 
531062201803學術演講或教學講習主講演講: 整個區塊鏈就是我的安全密室台中教育大學