Chin-Chen Chang
Chin-Chen Chang
Chair Professor
Professor Chang has worked on many different topics in information security, cryptography, multimedia image processing and published several hundreds of papers in international conferences and journals and over 37 books. He was cited over 47,383 times and has an h-factor of 99 according to Google Scholar. Several well-known concepts and algorithms were adopted in textbooks. He also worked with the National Science Council, Ministry of Technology, Ministry of Education, Ministry of Transportation, Ministry of Economic Affairs and other Government agencies on more than 100 projects and holds 33 patents, including one in US and sixteen in China. He served as Honorary Professor, Consulting Professor, Distinguished Professor, Guest Professor at over 60 academic institutions and received Distinguished Alumni Award's from his Alma Master's. He also served as Editor or Chair of several international journals and conferences and had given almost a thousand invited talks at institutions including Chinese Academy of Sciences, Academia Sinica, Tokyo University, Kyoto University, National University of Singapore, Nanyang Technological University, The University of Hong Kong, National Taiwan University and Peking University. Professor Chang has mentored 7 postdoctoral, 66 PhD students and 202 master students, most of whom hold academic positions at major national or international universities. He has been the Editor-in-Chief of Information Education, a magazine that aims at providing educational materials for middle-school teachers in computer science. He is a leader in the field of information security of Taiwan. He founded the Chinese Cryptography and Information Security Association, accelerating information security the application and development and consulting on the government policy. He is also the recipient of several awards, including the Top Citation Award from Pattern Recognition Letters, Outstanding Scholar Award from Journal of Systems and Software, and Ten Outstanding Young Men Award of Taiwan. He was elected as a Fellow of IEEE in 1998, a Fellow of IET in 2000, a Fellow of CS in 2020, an AAIA Fellow in 2021, a Member of the Academy of Europe (AE) in 2022, and a Member of the European Academy of Sciences and Arts (EASA) in the same year for his contribution in the area of information security. In 2023, he was awarded the Honorary Ph.D. Degree in Engineering, National Chung Cheng University, Taiwan.

Education:
Research Interest:
Current Position:
Full time experience:
Part time experience:
- Wang, K., Li, L., Luo, T. and Chang, C. C./Deep Neural Network Watermarking Based on Texture Analysis/Artificial Intelligence and Security/ Springer Nature Singapore Pte Ltd./2020-08-01/./None
- Li, L., Li, Y., Wang, B., Lu, J.*, Zhang, S., Yuan, W., Wang, S. and Chang, C. C./A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM/Security with Intelligent Computing and Big-data Services/ Springer/2018-08-01/pp. 20-32/
- Liu, L.*, Wang, A. H., Chang, C. C. and Li, Z. H./A Novel Secret Image Sharing with Deep-steganography and Two-stage Authentication/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 259-271/
- Zhuang, X.*, Zhu, Y., Chang, C. C. and Peng, Q./Cryptanalysis of T-function Based Ultralightweight RFID Authentication Protocols/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 397-412/
- Li, J. J., Di, Y. F., Wang, Z. H.* and Chang, C. C/Progressive Secret Image Sharing with Meaningful Shadows/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 327-344/
- Chang, C. C.*, Yang, B. C. and Cheng, T. F./Perfectly Reversible Information Hiding in Data Compression Codes Using Locally Adaptive Coding/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 141-154/
- Wang, M., Lu, J., Qiu, J., Li, L. and Chang, C. C.*/A Zero-Watermarking Scheme Based on Invariant Moments for Medical Image/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 227-235/
- Wang, X. T., Wang, Z. H., Chang, C. C. and Li, M. C./Lossless Data Hiding Based on VQ/Steganography and Watermarking, (Yang, C. N., Lin, C. C. and Chang, C. C. Eds.)/ Nova Science Publishers, Inc. New York, U. S. A./2013-05-01/Chapter 4, pp. 77-95/
- Qin, C., Chang, C. C. and Lin, T. Y./Steganography in Script Files/Steganography and Watermarking, (Yang, C. N., Lin, C. C. and Chang, C. C. Eds.)/ Nova Science Publishers, Inc. New York, U. S. A./2013-05-01/Chapter 7, pp. 163-177/
- Yue, S., Wang, Z. H. and Chang, C. C.*/An Image Data Hiding Scheme Base on Vector Quantization and Graph Coloring/Recent Advances in Information Hiding and Applications, (Pan, J. S., Huang, H. C., Jain, L. C. and Zhao, Y. Eds.)/ Springer Verlag, Germany/2013-01-01/pp. 1-17/
- Cui, S. Y., Wang, Z. H., Tsai, P. W., Chang, C. C.* and Yue, S./Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization/Recent Advances in Information Hiding and Applications, (Pan, J. S., Huang, H. C., Jain, L. C. and Zhao, Y. Eds.)/ Springer Verlag, Germany/2013-01-01/pp. 119-138/
- Wang, Z. H., Sun, M. T. and Chang, C. C/Reversible Data Hiding Techniques for Digital Images/Multimedia Security and Steganography/ CRC Press, USA/2012-09-01/Chapter 7, pp. 115-139/None
- Chang, C. C., Mao, Q. and Wu, H. L./A Novel Authentication Scheme Based on Torus Automorphism for Smart Card/Advances in Intelligent Systems and Applications, Vol. 2--Proc. 2012 International Computer Symposium (ICS 2012) (J. S. Pan, C. Y. Yang and C. C. Lin Eds.)/ Springer/2012-09-01/pp. 53-60/
- Yin, Z. X., Lin, C. C. and Chang, C. C./Image Sharing with Steganography and Authentication/Visual Cryptography and Secret Image Sharing (S. Climato and C. N. Yang Eds.)/ CRC Press, USA/2012-03-01/ Chapter 16, pp. 425-461/
- Yu, F., Chang, C. C., Chen, W., Zhang, J. and Yue, G./Journal of Networks, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App./Journal of Networks (Yu, F., Chang, C. C., Chen, W., Zhang, J. and Yue, G.)/ IEEE CS/2010-06-01/Vol. 5, No. 6/(ISSN : 1796-2056)
- Yu, F., Chang, C. C. Shu, J. Liao, g. and Yue, G./Journal of Software, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App./Journal of Software, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App. (Yu, F., Chang, C. C. Shu, J. Liao, g. and Yue, G.)/ IEEE CS/2010-05-01/Vol. 5, No. 5/(ISSN: 1796-217X)
- Yu, F., Chang, C. C., Yue, G., Zeng, J. and Chen, W./Journal of Computers, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App./Journal of Computers (Yu, F., Chang, C. C., Yue, G., Zeng, J. and Chen, W.)/ IEEE CS/2010-04-01/Vol. 5, NO. 4/(ISSN : 1796-203X)
- Chang, C. C., Tai, W. L. and Lin, C. C./Minimizing the Stego-Image Quality Impact of Message Embedding Using DM Allocation Method/Ubiquitous Multimedia Computing (Li, Q. and Shih, T.)/ Chapman and Hall/2010-01-01/pp. 215-230/None
- Chang, C. C., Lin, C. C. and Chen, Y. H./A Secure Data Embedding Scheme Using Gray-code Computation and SMVQ Encoding/Information Hiding and Application, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Springer Verlag/2009-09-01/pp. 63-74/None
- Chou, Y. C. and Chang, C. C./Restoring Objects for Digital Inpainting/Information Hiding and Applications, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Springer Verlag/2009-09-01/pp. 47-61/None
- Yu, F., Chang, C.C., Zhang, D.Y., Zeng, J., Zhang, J./Journal of Multimedia/Journal of Multimedia (Yu, F., Chang, C. C., Zhang, D. Y., Zeng, J., Zhang, J.)/ IEEE CS/2009-06-01/Vol. 4, No. 3/(ISSN: 1796-2048)
- Shu, J., Yu, F., Chang, C. C., Sun, L., Yue, G./Journal of Networks/Journal of Networks (Shu, J., Yu, F., Chang, C. C., Sun, L., Yue, G.)/ IEEE CS/2009-06-01/Vol. 4, No. 4/(ISSN: 1796-2056)
- Ming, L., Wang, M., Zhang, D.Y., Chang, C.C., Yu, F./Journal of Computers/Journal of Computers (Ming, L., Wang, M., Zhang, D. Y., Chang, C. C., Yu, F.)/ IEEE CS/2009-06-01/Vol. 4, No. 6/(ISSN: 1796-203X)
- Yu, F., Chang, C. C., Chen, B. M., Zhang, J., Yue, G./Journal of Software/Journal of Software (Yu, F., Chang, C. C., Chen, B. M., Zhang, J. and Yue, G.)/ IEEE CS/2009-02-01/Vol. 4, No. 1/(ISSN: 1796-217X)
- Lee, J.S. and Chang, C.C./Recent Developments on Multimedia Security Technologies/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心/ National Applied Research Laboratories, NARLabs/2009-01-01/pp. 1-38/None
- Yu, F., Chang, C. C., Chen, B. M., Shu, J., Yue, G./Journal of Computers, Special Issue on Recent Advances in Information Technology and security/Journal of Computers, Special Issue on Recent Advances in Information Technology and security (Yu, F., Chang, C. C., Chen, B. M., Shu, J. and Yue, G.)/ IEEE CS/2009-01-01/Vol. 4, No. 1/(ISSN : 1796-203X)
- Yu, F., Chang, C. C., Chen, B. M., Chen, Y., Chen, Z./Journal of Software/Journal of Software (Yu, F., Chang, C. C., Chen, B. M., Chen, Y. and Chen, Z.)/ IEEE CS/2008-11-01/Vol. 3, No. 9/(ISSN: 1796-217X)
- Pan, J. S., Abraham, A. and Chang, C. C./Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications/Proceedings of ISDA 2008 (Pan, J. S., Abraham, A. and Chang, C. C.)/ IEEE CS/2008-11-01/Vol. I ~ Vol. III/(ISBN: 978-0-7695-3382-7)
- Yu, F., Chang, C. C., Chen, B. M., Chen, W., Chen, Y./Journal of Communications/(Yu, F., Chang, C. C., Chen, B. M., Chen, W. and Chen, Y.)/ IEEE CS/2008-11-01/Vol. 3, No. 6/(ISSN: 1796-2021)
- Chen, W., Yu, F., Chang, C. C., Zeng, J. and Yue, G./Journal of Communications/Journal of Communications (Chen, W., Yu, F., Chang, C. C., Zeng, J. and Yue, G.)/ IEEE CS/2008-11-01/Vol. 3., No. 7/(ISSN: 1796-2021)
- Yu, F., Chang, C. C., Chen, B. M., Chen, Z., Ni, J./Journal of Computers/Journal of Computers (Yu, F., Chang, C. C., Chen, B. M., Chen, Z. and Ni, J.)/ IEEE CS/2008-11-01/Vol. 3, No. 12/(ISSN: 1796-203X)
- Lee, J.S. and Chang, C.C./Recent Developments on Multimedia Security Technologies/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心/ National Applied Research Laboratories, NARLabs/2008-10-01/./None
- Chang, C. C., Cheng, Y. F. and Lin, I. C./Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control/Information Security and Cryptology, (Goos, G., Hartmanis, J. and Leeuwen, J. V.)/ Springer Verlag/2008-08-01/Vol. 4990, pp. 457-462/None
- Tsai, P., Lin, C. C. and Chang, C. C./A Low Bit Rate VQ Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking/Harmonious Human Computer Environment 2007, (Li, X., Shi, Y., Meng, X., Xu, G., Liu, Z. Eds.)/ Tsinghus University/2008-05-01/pp. 3-11/None
- Chang, C. C., Chang, P. Y. and Lin, I. C./A Novel Group Signature Scheme Based on Bilinear Pairings and Gap Diffie-Hellman Group/Studies in Computational Intelligence--2nd International Workshop on Rational, Robust, and Secure Negotiations in Multi-Agent Systems (RRS), (Ito, T., Hattori, H., Zhang, M. and Matsuo, T. Eds.)/ Springer-Verlag/2008-02-01/Vol. 89, pp. 117-125/-
- Chang, C. C., Tsou, C. C. and Chou, Y. C./A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ/Advances in Multimedia Information Processing-PMC2007 -- Proceedings of 8th Pacific-Rim Conference on Multimedia, (Ip, H. S., Au, O. C., Leung, H., Sun, M. T., Ma, W. Y. and Hu, M. Eds.)/ Springer Verlag/2007-12-01/pp. 446-449/-
- Chang, C. C., Lin, C. Y. and Wang, Y. Z./A High Payload VQ Steganographic Method for Binary Images/Pre-Proceedings of the 6th International Workshop on Digital Watermarking (IWDW2007), (Shi, Y. Q., Kim, H. J., Katzenbeisser, S. Eds.)/ Springer Verlag/2007-12-01/pp. 484-498/-
- Chang, C. C. and Wu, W. C./Reversible Quantization-Index Modulation Using Neighboring Correlation/Pre-Proceedings of the 6th International Workshop on Digital Watermarking (IWDW2007), (Shi, Y. Q., Kim, H. J., Katzenbeisser, S. Eds.)/ Springer Verlag/2007-12-01/pp. 225-234/-
- Chang, C. C., Chou, Y. C. and Lu, T. C./A Semi-blind Watermarking Based on Discrete Wavelet Transform/Information and Communications Security--Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007),(Qing, S. Imai, H., and Wang, G. Eds.)/ Springer Verlag/2007-12-01/pp. 164-176./-
- Chang, C. C., Cheng, Y. F. and Lin, I. C./Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access/Pre-proceedings of the 3rd International SKLOIS Conference on Information Security and Cryptology/ Springer Verlag/2007-09-01/pp.467-472/None
- Wang, C. C., Chang, C. C., Zhang, X. and Jan, J. K./Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images/Multimedia Content Analysis and Mining (MCAM'07)/ Springer Verlag/2007-06-01/pp. 351-360/None
- Wu, C. C., Chang, C. C. and Yang, S. R./An Efficient Fragile Watermarking for Web Pages Tamper-proof/Advances in Web and Network Technologies, and Information Management/ Springer-Verlag/2007-06-01/pp. 654-663/None
- Chang, C. C., Chen, Y. H. and Chou, Y. C./Reversible Data Embedding Technique for Palette Images Using De-clustering/Multimedia Content Analysis and Mining (MCAM'07)/ Springer Verlag/2007-06-01/pp. 130-139./None
- Yeh, J. S., Li, Y. C. and Chang, C. C./Two-Phase Algorithms for a Novel Utility-Frequent Mining Model/Proceedings of 2007 International Workshop on High Performance Data Mining and Applications (HPDMA 2007, in conjunction with PAKDD 2007)/ Springer-Verlag/2007-05-01/pp. 433–444/None
- Chan, C. W. and Chang, C. C./A New (t, n)-Threshold Scheme Based on Difference Equations/Combinatorics, Algorithms, Probabilistic and Experimental Methodologies--First International Symposium (ESCAPE 2007), (Chen, B. Paterson, M., and Zhang, G. Eds.)/ Springer-Verlag/2007-04-01/pp. 94-106/None
- Chang, C. C., Hu, Y. S. and Lin, C. C./A Digital Watermarking Scheme Based on Singular Value Decomposition/Combinatorics, Algorithms, Probabilistic and Experimental Methodologies--First International Symposium (ESCAPE 2007),(Chen, B. Paterson, M., and Zhang, G. Eds.)/ Springer-Verlag/2007-04-01/pp. 82-93/None
- Chang, C. C., Chan, C. S. and Fan, Y. H./Safeguarding Visual Secrets Using Meaningful Shadow Images/Embedded Computing: Design, Optimization and Applications, (Liu, Z., Shao, Z. Yang, L. T. Sha, E. Eds.)/ IDEA-group/2007-04-01/None/None
- Chang, C. C., Wang, Y. C. and Hu, Y. C./Adaptive Data Hiding Scheme for Palette Images/Intelligent Multimedia Data Hiding, (J. S. Pan, W. C. Fang, H. C. Huang, and L. C. Jain, eds)/ Springer-Verlag/2007-02-01/Chapter 5, pp. 103-122/None
- Chang, C. C. and Lin, C. Y./Density-Based Image Vector Quantization Using a Genetic Algorithm/The 13th International MultiMedia Modelling Conference (MMM2007), (Cham, T. J., Cai, J., Dorai, C., Rajan, D., Chua, T. S. and Chia, L. T. Eds.)/ Springer Verlag/2007-01-01/Part I, pp. 289-298/None
- Chan, C. S. and Chang, C. C./A Color Image Hiding Scheme Based on SMVQ and Modulo Operator/The 13th International MultiMedia Modelling Conference (MMM2007),(Cham, T. J., Cai, J., Dorai, C., Rajan, D., Chua, T. S. and Chia, L. T. Eds.)/ Springer-Verlag/2007-01-01/Part II, pp. 461-470./None
- Chang, C.C., Lee, J.S. and Lee, W.B/Secure Mechanisms for Electronic Commerce/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心/ National Applied Research Laboratories, NARLabs/2006-12-01/./None
- 張真誠、李榮三、李維斌/電子商務的消費機制/資通安全專論彙編之一, 國家實驗研究院科技政策研究與資訊中心/ 國家實驗研究院/2006-12-01/pp. 111-143/None
- Huang, H. F. and Chang, C. C./Enhancement of an Auth. Mulitple-key Agreement Protocol without Using Conventional One-way Function/Computational Intelligence and Security-International Conference on Computational Intelligence and Security, (Hao, Y., Liu, J., Wang, Y., Cheung, Y.M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.C. Eds.)/ Springer-Verlag/2006-12-01/Part I, pp. 554-559/-
- Lee, W.B., Chen, B.H. and Chang, C.C./Security Threats of Electronic Commerce/資通安全分析專論/ National Applied Research Laboratories, NARLabs/2006-11-01/pp. 229-263/None
- Shen, J. J., Chang, C. C. and Chou, Y. C./Absorber Filter--A New Efficient and Cost Reduced Search Filter/Advances in Natural Computation and Data Mining - the 3rd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'06), (Jiao, L., Shi, G., Gao, X.,Wang, L., Wang, S. and Liu, J. Eds.)/ Xidan University Press/2006-09-01/pp. 346-357./None
- Chang, C. C., Chan, C. S. and Fan, Y. H./A Secret Image Sharing Scheme Based on Vector Quantization Mechanism/Embedded and Ubiquitous Computing - the 2006 IFIP International Conference on Embedded And Ubiquitous Computing (EUC'2006), (Sha, E. Han, S. K., Xu, C. Z., Kim, M. H., Yang, L. T. and Xiao, Bin. Eds.)/ Springer-Verlag/2006-08-01/pp. 469-478./-
- Chang, C. C. and Wu, C. C./A Novel Key Agreement Scheme in a Multiple Server Environment/Information Security Applications--Proceedings of the 7th International Workshop on Information Security Applications (WISA 06), (Lee, J. K., Yi, O. and Yuang, M. Eds.)/ Springer-Verlag/2006-08-01/pp. 187-197/
- Chang, C. C., Chen, K. L. and Lin, C. H./A Group-Oriented (t,n) Threshold Signature Scheme Against Replay Attacks/Ubiquitous Intelligence and Computing - the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06), (Ma, J., Jin, H., Yang, L. T. and Tsai, J. P. Eds.)/ Springer-Verlag/2006-08-01/pp. 816-825/
- Yang, J. H., Chang, C. C. and Wang, C. H./A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme/Ubiquitous Intelligence and Computing - the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06), (Ma, J., Jin, H., Yang, L. T. and Tsai, J. P. Eds.)/ Springer-Verlag/2006-08-01/pp. 998-1007./
- Lin, I. C. and Chang, C. C./An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem/Autonomic and Trusted Computing - the 3rd IFIP International Conference on Autonomic and Trusted Computing (ATC-06), (Yang, L. T., Jin, H. Ma, J. and Ungerer, T. Eds.)/ Springer-Verlag/2006-08-01/pp. 601-610/-
- Lin, K. C. and Chang, C. C./Securing Mobile Ad Hoc Networks - Intrusion Prevention and Detection Systems/Communications of the Chinese Cryptology and Information Security Association/ None/2006-08-01/Vol.12, No.1.pp. 58-75/None
- Chen, C. Y., Chang, C. C. and Hsueh, C. C./A Fast Modular Multiplication Algorithm Based on the Window Method/Journal of I-Shou University/ I-Shou University/2006-08-01/None/None
- Chang, C. C., Hsieh, Y. P. and Wu, W. C./Wavelet-Based Initialization for VQ Codebook Generation/International Computer Conference 2006 on Wavelet Active Media Technology and Information Processing, (Li, J. P., Yang, S. X, Torresani, B., and Yen, J. Eds.)/ World Scientific/2006-08-01/Vol. 2, pp. 581-592/None
- Chang, C. C., Hsieh, Y. P. and Wu, W. C./An Adaptive Search Algorithm for VQ Using Wavelet Transform and Principle Component Analysis/International Computer Conference 2006 on Wavelet Active Media Technology and Information Processing, (Li, J. P., Yang, S. X, Torresani, B., and Yen, J. Eds.)/ World Scientific/2006-08-01/Vol. 2, pp. 581-592/None
- Lin, C. Y. and Chang, C. C./Hiding Data in VQ-compressed Images Using Dissimilar Pairs/Journal of Computers/ None/2006-07-01/Vol.17, No.2, pp. 3-10/None
- Chang, C. C., Lu, T. C. and Fan, Y. H./A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operat/Intelligent Multimedia Data Hiding, (J. S. Pan, W. C. Fang, H. C. Huang, and L. C. Jain, eds)/ Springer-Verlag/2006-06-01/Chapter 4, pp. 83-101/None
- Lee, J.S., Chang, Y.F. and Chang, C.C./Authentication Protocols for Wireless Communications/Communication of the Chinese Cryptology and Information Security Association/ ./2005-12-01/vol. 12, pp. 24-38/None
- Chang, C. C., and Lee, J. S./Improvement on An Optimized Protocol for Mobile Network Authentication and Security/Computational Intelligence and Security-International Conference on Computational Intelligence and Security, (Hao, Y., Liu, J., Wang, Y., Cheung, Y.M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.C. Eds.)/ Springer-Verlag/2005-12-01/Part I, pp.538-541/None
- Wu, M. N., Lin, C. C. and Chang, C. C./Image Copy Detection with Rotating Tolerance/Computational Intelligence and Security-International Conference on Computational Intelligence and Security, (Hao, Y., Liu, J., Wang, Y., Cheung, Y.M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.C. Eds.)/ Springer-Verlag/2005-12-01/Part I, pp. 464-469/None
- Chang, C. C., Yeh, J. B. and Lin, C. C./Adaptive Hiding Scheme Based on VQ-indices Using Commutable Codewords/Computational Intelligence and Security: International Conference (CIS 2005), (Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao)/ Springer Berlin/Heidelberg/2005-12-01/pp. 567 - 572/None
- Chang, C. C., Chou, Y. C. and Wu, W. C./Image Retrieval Using Spatial Color and Edge Detection/Advances in Mulitmedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, (Ho, Y. S., Kim, H. J. Eds.)/ Springer-Verlag/2005-11-01/2767 (1), pp. 981-992/None
- Hwang, R. J., Chang, C. C. and Shiau, S. H./A Design Concept of Generalized Group-Oriented Cryptosystem without Trusted Parties/New Horizons of Parallel and Distributed Computing, (Guo, M. and Yang, L. T. Eds.)/ Kluwer Academic Publishers/2005-11-01/pp. 81-96/None
- Chang, C. C. and Lu, T. C./A Color-based Image Retrieval Method Using Color Distribution and Common Bitmap/Information Retrieval Technology - Second Asia Information Retrieval Symposium, AIRS 2005, (Lee, G. G., Yamada, A., Meng, H. and Myaeng, S. H.)/ Springer-Verlag/2005-10-01/pp. 56-71/None
- Chang, C. C. and Lai, Y. P./A Parallel Modular Exponentiation Scheme for Transformed Exponents/Advanced Parallel Processing Technologies, 6th International Workshop, (Cao, J., Nejdl, W. and Xu, M. Eds.)/ Springer-Verlag/2005-10-01/pp. 443-452/None
- Chang, C. C. and Lu, T. C./Method for Searching Similar Images Using Quality Index Measurement/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett and L.C. Jain)/ Springer-Verlag GmbH/2005-09-01/Vol.3682,pp. 1224-1230/None
- Chang, C. C. and Wu, W. C./A Reversible Information Hiding Scheme Based on Vector Quantization/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3683, pp.1101-1107/None
- Chang, C. C., Lu, T. C. and Yeh, J. B./A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3684,pp.249-256/None
- Chang, C. C., Lin, C. Y. and Wang, Y. Z./VQ image Steganographic Method with High Embedding Capacity Using Multi-Way Search Approach/Knowledge-Based Intelligent Information and Engineering Systems(R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3683,pp.1058-1064/None
- Chang, C. C., Chou, Y. C. and Shen, J. J./Improving Image Quality for JPEG Compression/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3683,pp.442-448/None
- Li, Y. C., Chang, C. C. and Yeh, J. S./An Algorithm for Mining Association Rules with Weighted Minimum Supports/Artificial Intelligence Applications and Innovations II (D. Li and B. Wang Eds.)/ Springer/2005-08-01/pp. 291-300/None
- Chang, Y. F. and Chang, C. C./An Improvement on Strong-password Authentication/Embedded Software and Systems (Yang, L. T., Zhou, X. S., Zhao, W., Wu, Z. H., Zhu, Y. and Lin, M. Eds.)/ Springer-Verlag/2005-08-01/pp. 629-637/None
- Li, Y. C., Yeh, J. S. and Chang, C. C./Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets/2nd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD2005), (Wang, L. and Jin, Y. Eds.)/ Springer Verlag/2005-08-01/pp. 551-560/None
- Huang, H. F. and Chang, C. C./A Novel Conference Key Distribution System with Re-keying Protocol/Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet, (Shimojo, S., Ichii, S. and Ling, T. W. Eds.)/ Springer-Verlag/2005-07-01/pp. 282-290/None
- Li, Y. C., Yeh, J. S. and Chang, C. C./Efficient Algorithms for Mining Share-Frequent Itemsets/Fuzzy Logic, Soft Computing and Computational Intelligence --- 11th World Congress of International Fuzzy Systems Association (IFSA 2005), (Y. Liu, G. Chen, and M. Ying Eds.)/ Springer Tsinghua/2005-07-01/pp. 534-539/None
- Chang, C. C., Chou, H. and Lin, C. C./A Steganographic Technique for Color Images Using Index Replacement and Principal Component Analysis/6th International Progress on Wavelet Analysis and Active Media Technology, (Li, J. P., Jaffard, S., Suen, C. Y, Daugman, J., Wickerhauser, V., Torresani, B., Yen, J., Zhong, N. and Pal, S. K., Eds.)/ World Scientific/2005-05-01/pp. 15-22./None
- Chang, C. C., Wu, W. C. and Hu, Y. C./Color Image Retrieval Based on Regional Features/6th International Progress on Wavelet Analysis and Active Media Technology, (Li, J. P., Jaffard, S., Suen, C. Y, Daugman, J., Wickerhauser, V., Torresani, B., Yen, J., Zhong, N. and Pal, S. K., Eds.)/ World Scientific/2005-05-01/pp. 23-33/None
- Chang, C. C., Lu, T. C. and Liu, Y. L./A Secret Information Hiding Scheme Based on Switching Tree Coding/Computer Security in the Twenty-First Century, (Lee, D. T., Shieh, S. P., and Tygar, J. D. Eds.)/ Springer/2005-05-01/pp. 255-263./None
- Chang, C. C., Shen, J. J. and Chou, Y. C./FA-Tree--A Dynamic Indexing Structure for Spatial Data/Soft Computing as Transdisciplinary Science and Technology, (Abraham, A., Dote, Y., Furuhashi, T., Koppen, M., Ohuchi, A., and Ohsawa, Y. Eds.)/ Springer-Verlag/2005-05-01/pp. 1071-1080/None
- Chang, C. C., Tai, W. L. and Lin, C. C./Secret Hiding Using Side Match Vector Quantization/Soft Computing as Transdisciplinary Science and Technology, (Abraham, A., Dote, Y., Furuhashi, T., Koppen, M., Ohuchi, A., and Ohsawa, Y. Eds.)/ Springer-Verlag/2005-05-01/pp. 172-181/None
- Chang, C. C., Tseng, C. S. and Lin, C. C./Hiding Data in Binary Images/Lecture Notes in Computer Science 3439 - Information Security Practice and Experience: First International Conference ISPEC 2005, (Deng, H., Bao, F., Pang, H.H., et al. Eds.)/ Springer-Verlag GmbH/2005-04-01/pp. 338-349/None
- Li, Y. C., Chang, C. C. and Yeh, J. S./A Fast Algorithm for Mining Share-Frequent Itemsets/Proceedings of the Seventh Asia Pacific Web Conference (APWeb'05), (Zhang, Y., Tanaka, K., Yu, X. et al. Eds.)/ Springer-Verlag/2005-03-01/pp. 417-428/-
- Chan, Y. K. and Chang, C. C./Content-Based Retrieval Concept/Encyclopedia of Information Science and Technology, Vol. I-V, (Mehdi, K. P. Ed.)/ Idea Group/2005-02-01/Vol. I, pp. 564-568./None
- Chang, C. C. and Lin, I. C./A Perceptually Tuned Watermarking Scheme for Digital Images Using Support Vector Machnies/Intelligent Watermarking Techniques, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Series on Innovative Intelligence/2004-06-01/Vol. 7, 2004, pp. 429-458/
- Chang, C. C. and Lin, I. C./Robust Image Watermarking Systems Using Neural Networks/Intelligent Watermarking Techniques, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Series on Innovative Intelligence/2004-06-01/Vol. 7, 2004, pp. 395-428/
- Chang, C. C. and Lin, I. C./Robust Image Watermarking Systems Using Neural Networks/Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.)/ World Scientific Publishing Company, Singapore/2004-06-01/2004, Chapter 14, pp. 395-428/
- Chang, C. C. and Lin, I. C./A Perceptually Tuned Watermarking Scheme for Digital Images Using Support Vector Machines/Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.)/ World Scientific Publishing Company, Singapore/2004-06-01/2004, Chapter 15, pp. 429-458/
- Hwang, K. F. and Chang, C. C./Recent Development of Visual Cryptography/Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.)/ World Scientific Publishing Company, Singapore/2004-06-01/Chapter 16, 2004, pp. 459-480/
- Chang, C. C., Chuang, J. C. and Hu Y. S./Image Feature Based on Wavelet Transformation for Similar Image Retrieval/Proceedings of the Third International Conference on Wavelet Analysis and Its Applications, (J. P. Li, V. Wickerhauser, Y. Y. Tang, J. Daugman, L. Peng, and J. Zhao Eds.)/ World Scientific/2003-06-01/Vol. 1, 2003, pp. 294-302/
- Huang, H. F. and Chang, C. C./An Efficient Convertible Authenticated Encryption Scheme and Its Variant/Lecture Notes in Computer Science- Information and Communications Security (ICICS 2003), (S. Qing, D. Gollmann, J. Zhou Eds.)/ Springer Verlag, Germany/2003-06-01/2003, pp. 382-392/
- Hwang, R. J. and Chang, C. C./A Method for Sending Confidential Messages to a Group without Trusted Parties/ Lecture Notes in Computer Science- Parallel and Distributed Processing and Applications, (M. Guo and L. T. Yang Eds.)/ Springer Verlag, Germany/2003-06-01/Vol. 2745, 2003, pp. 375-381/
- Hung, K. L., Chang, C. C./A Robust and Recoverable Tamper Proofing Technique for Image Authentication/Lecture Notes in Computer Science- Web and Communication Technologies and Internet-Related Social Issues-HSI 2003, (C. W. Chung, C. K. Kim, W. Kim, T. W. Ling, and K. H. Song Eds.)/ Springer Verlag, Germany/2003-06-01/2003, pp. 44-53/
- Chang, C. C., Hsiao, J. Y. and Chiang, C. L./A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang and C. T. Hsu Eds.)/ Springer Verlag, Germany/2002-06-01/2002, pp.393-400/
- Chang, C. C., Hsieh, C. P. and Hsiao, J. Y./A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang and C. T. Hsu Eds.)/ Springer Verlag, Germany/2002-06-01/2002, pp.386-392/
- Chang, C. C. and Su, Y. Y/A Dynamic Color Palette for Color Images Coding/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang and C. T. Hsu Eds.)/ Springer Verlag, Germany/2002-06-01/2002, pp.369-376/
- Chang, C. C., Chan, C. S, and Hsiao, J. Y./A Color Image Retrieve Method Based on Local Histogram/ Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.)/ Springer Verlag, Germany/2001-06-01/2001, pp. 831-836/
- Tsai, C. S. and Chang, C. C./A Generalized Secret Image Sharing and Recovery Scheme/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.)/ Springer Verlag, Germany/2001-06-01/2001, pp. 963-968/
- Chang, C. C., Yeh, J. C. and Hsiao, J. Y./A Novel Scheme for Securing Image Steganography/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.)/ Springer-Verlag, Germany/2001-06-01/2001, pp. 804-811/
- Chang, C. C., Hsia, H. C. and Chen, T. S./A New Progressive Image Transmission Scheme Based on Block Truncation Coding/The Human. Society @ Internet, (W. Kim, T. W. Ling, Y. J. Lee and S. S. Park Ed.)/ Springer-Verlage, Germany/2001-06-01/2001, pp. 383-397/
- Chang, C. C. and Lin, I. C./Cryptanalysis of the Improved User Efficient Blind Signatures/Lecture Notes in Computer Science - Information and Communications Security, (S. Qing and T. Okamoto Eds.)/ Springer-Verlag/2001-06-01/ 2001, pp. 42-46/
- Chang, C. C. and Hwang, K. F./Towards the Forgery of a Group Signature without Knowing the Group Center's Secret/Lecture Notes in Computer Science - Information and Communications Security, (S. Qing and T. Okamoto Eds.)/ Springer-Verlag/2001-06-01/2001, pp. 47-51/
- Chang, C. C., Chen, T. S. and Xiao, G. X./A Simple Prediction Method for Progressive Image Transmission/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 16/
- Chang, C. C. and Hwang, K. F./Hiding Images Using Dynamic Bit-replacement and Human Visual System/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 12/
- Tsai, C. S., Chang, C. C., Chen, T. S. and Chen M. H./Embedding Robust Gray-level Watermarks in an Image Using Discrete Cosine Transformation/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 13/
- Chang, C. C., Hung, Y. P., Shih, T. K. and Hwang, R. J./Future Multimedia Databases and Research Directions/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 22/
- Chang, C. C., Chan, Y. K., Chou, A. Y. H. and Yang, W. P./Representing Symbolic Pictures Using Iconic Indexing/Design and Management of Multimedia Information Systems: Opportunities and Challenges, (M. R. Syed Editor)/ Idea Group Publishing Company, U. S. A/2001-06-01/pp. 64-79/
- Shen, J. J., Chang, C. C. and Lee, C. H./Normalization Cannot Make Profit for Query Processing in ROODB/ Database, Web and Cooperative Systems, Vol. I, (G. Lasker, and Y. Zhang Eds)/ The International Institute for Advanced Studies in Systems Research and Cybernetics, Canada/1999-06-01/pp. 137-144/
- Chang, C. C., Leu, J. J., Hwang, P. C. and Lee, W. B./A Scheme for Obtaining a Message from the Digital Multisignature/Lecture Notes in Computer Science: Public Key Cryptography, (H. Imai and Y. Zheng Eds.)/ Springer-Verlag, Germany/1998-06-01/pp.154-163/
- Chang, C. C./Computer Science Education at Universities in Taiwan/Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company, Singapore/1997-06-01/pp. 5-10/
- Lee, C. F. and Chang, C. C./Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme/Advanced Database Research and Development Series, Vol. 7, Cooperative Database and Applications, (Y. Kambayashi and K.Yokota Eds.)/ World Scientific Publishing Company, Singapore/1997-06-01/pp. 526-529/
- Chang, C. C. and Jiang, J. H./General Multilevel Signature Method for Data Filtering in Mobile Environments/ Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 385-391/
- Chang, C. C. and Lee, C. F./An Efficient Data Filter for Orthogonal Range Searching on Multiattribute Files/Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 261-264/
- Chen, T. S. and Chang, C. C./Progressive Image Transmission Using Side Match Method/Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 191-198/
- Chang. C. C. and Lee, C. F./An Efficient Indexing Scheme for Temporal Join in Relational Environment/Digital Media Information Base, (M. Yoshikawa, S. Uemura, and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 176-181/
- Jiang, J. H., Chang. C. C. and Chen, T. S./Selective Progressive Image Transmission Using Diagonal Sampling Technique/Digital Media Information Base, (M. Yoshikawa, S. Uemura, and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 59-67/
- Chang, C. C., Lee, W. T. and Kuo, C. L./A Fast Image Encoding Scheme Using Vector Quantization/ Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 143-150/
- Chen, C. Y., Chang, C. C., Lee, R. C. T. and Lin, D. C./A Temporal Join Mechanism Based on Trie-ranking Data Structure/Advanced Database Research and Development Series, Vol. 7, Cooperative Database and Applications, (Y. Kambayashi and K.Yokota Eds.)/ World Scientific publishing Company/1997-06-01/pp. 428-435/
- Hwang, S. J., Chang, C. C. and Yang, W. P./Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation/Proceedings of Cryptography: Policy and Algorithms, Vol. 1029, (Dawson, E. and Golic, J. Eds.)/ Springer Berlin / Heidelberg, Germany/1996-06-01/pp. 215-227/
- Lin, C. H., Wang, C. T. and Chang, C. C./A Group-Oriented (t, n) Undeniable Signature Scheme without Trusted Center/ Information Security and Privacy, (G. Goos, J. Harfmanis, and J. Leeuwen Eds.)/ Springer-Verlag/1996-06-01/pp. 266-274/
- Buehrer, D. J., Chang, C. C. and Ling, S. M./Using 2D String Decision Trees for Symbolic Picture Retrieval/Chapter 10 in Intelligent Image Database Systems: Spatial Reasoning, Image Indexing and Retrieval Using Symbolic Projections, (S. K. Chang, E. Jungert, and G. Tortora Eds.)/ World Scientific Publishing Co./1996-06-01/pp. 219-228/
- Buehrer, D. J. and Chang, C. C./Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval/Advances in Spatial Databases, Lecture Notes in Computer Science, (D. Abel and B. C. Ooi Eds.)/ Springer-Verlag/1993-06-01/ pp. 437-442/
- Liang, J. and Chang, C. C./Similarity Retrieval on Pictorial Databases Based upon Module Operation/Advanced Database Research and Development Series-Vol.4, Database Systems for Advanced Applications'93, (S. C. Moon and H. Ikeda Eds.)/ World Scientific Publishing Company/1993-06-01/pp. 19-26/
- Chang, C. C., Wu, T. C. and Chen, C. P./The Design of a Conference Key Distribution Systems/Advances in Cryptology - Proceedings of AUSCRYPT '92, Lecture Notes in Computer Science Series, Vol. 718, (J. Seberry and Y. Zheng Eds.)/ Springer-Verlag/1993-06-01/pp. 459-466/
- Chang, C. C. and Buehrer, D. J./De-clustering Image Databases/Future Databases'92, Advanced Database Research and Development Series, Vol. 3, (W. Kim and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1992-06-01/pp. 142-145/
- Chang, C. C. and Buehrer, D. J./A Survey of Some Spatial Match Query Algorithms/Advanced Database Research and Development Series, Vol. 1, Database Systems for Next-Generation Applications – Practice, (W. Kim and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1992-06-01/pp. 218-223/
- Chang, C. C. and Chen, C. Y./Orthogonal Range Retrieval Using Bucket Address Hashing/Statistical and Scientific Database Management, Lecture Notes in Computer Science, Vol. 339, (G. Goos, J. Hartmanis, M. Rafanelli, J. C. Klensin, and P. Svensson Eds.)/ Springer-Verlag/1988-06-01/pp. 133-140/
- Chang, C. C./The Study of a Letter Oriented Minimal Perfect Hashing Scheme/ Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 91-99/
- Chang, C. C. and Lian, L. S./On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems/Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 159-175./
- Chang, C. C. and Shen, J. J./Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems/Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 113-124/
- Chang, C. C. and Shieh, J. C./On the Complexity of File Allocation Problem/Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 177-181/
- The Practice of Deep Learning and TensorFlow, Posts & Telecom Press Co., LTD., China (with Jianjun Li and Ximing Wang and Mian Pan and ShuoGui Xu and Dexing Kong), December 2017
- Steganography and Watermarking, Nova Science Publishers Inc., USA(with Ching-Nung Yang and Chia-Chen Lin), April 2013
- A Challenge to Image Processing-Digital Watermarking Techniques), Mcgraw-Hill International Enterprises LCC Taiwan Branch, Taiwan (with Jeng-Shyang Pan and Yung-Chang Lin), July 2007
- Multimedia Security Techniques, Chuan Hwa Book Co., Taiwan (with Tzu-Chun Lu and Zheming Lu), July 2007
- Data Compressing Techniques and Applications, Chuan Hwa Book Co., Taiwan (with Wen-Hui Tsai and Chia-Chen Lin), June 2007
- Introduction to C Programming Language and Design Examples, Chuan Hwa Book Co., Taiwan (with Tzu-Chun Lu and Wen-Hui Tsai), May 2006
- A Challenge to Java Programming Language, Chuan Hwa Book Co., Taiwan(with Wen-Hui Tsai and Tzu-Chun Lu), December 2005
- Technologies and Applications for Information Security, Chuan Hwa Book Co., Taiwan (with Chu-Hsing Lin ), January 2006
- Fundamentals of Data Structures Using JAVA, Chuan Hwa Book Co., Taiwan (with Wen-Hui Tsai and Chia-Chen Lin), May 2005
- Introduction to Data Structures-Concepts and Applications Using C, Chuan Hwa Book Co., Taiwan (with Wen-Hui Tsai and Yu-Cheng Hu), December 2003
- Digital Image Processing, Flag Publishing CO., LTD. (with Tung-Shou Chen and Kuo-Feng Huang), May 2003
- Electronic Imaging Techniques, Flag Publishing CO., LTD., Taiwan (with Kuo-Feng Huang and Tung-Shou Chen), March 2003
- Security Technologies and Applications in Electronic Commerce, Flag Publishing CO., LTD., Taiwan (with Chu-Hsing Lin ), February 2003
- A Challenge to Database Management Systems, Flag Publishing CO., LTD., Taiwan (with Wen-Hui Tsai and Min-Hui Lin), February 2003
- Introduction to Information and Communication Security, Science and Technology Information Center, Taiwan (with Chin-Chen Chang), December 2002
- Discovering Information and Computers, Flag Publishing CO., LTD., Taiwan (with Tung-Shou Chen, Wen-Kuang Chou, Kerin Ho and Min-Hui Lin), September 2002
- A Challenge to C++ Programming Language, China Machine Press, China (with Wen-Hui Tsai and Kuo-Feng Huang), August 2002
- Fundamentals of Data Structures and Their Applications Using C++, Flag Publishing CO., LTD.(with Wen-Hui Tsai), July 2002
- Contemporary Concepts and Applications in Computer Sciences, Flag Publishing CO., LTD., Taiwan (with Wen-Hui Tsai and Chen-Cheng Liu), July 2002
- A Challenge to C++ Programming Language), Flag Publishing CO.,LTD., Taiwan (with Wen-Hui Tsai and Kuo-Feng Huang), January 2002
- Computer cryptography and its application, National Defense Industrial, China (with Chi-Sung Laih and Lein Harn), July 2001
- Discovering Information and Computers,Pine Digital Technology CO., Taiwan (with Tung-Shou Chen, Wen-Kuang Chou, Kuo-Feng Huang and Min-Hui Lin), June 2001
- Digital Image Processing Techniques, Unalis Co., Taiwan (with Tung-Shou Chen and Kuo-Feng Huang), January 2001
- Electronic Imaging Techniques, Unalis Co., Taiwan (with Kuo-Feng Huang and Tung-Shou Chen), December 2000
- Data Security for Electronic Commerce, Unalis Co., Taiwan (with Chu-Hsing Lin and Chi-Han Chiang), January 2000
- Contemporary Cryptography and Its Applications, Unalis Co., Taiwan (with Chi-Sung Laih and Lein Harn), September 1995
- Data Compressions-Theories and Practice, Unalis Co., Taiwan (with Wen-Hui Tsai), October 1994
- UNIX Operation Systems and Its Network Security, Unalis Co., Taiwan (with Horng-Chin Lee、Sheng-Hsiung Hsu), May 1994
- CLIPPER5. In depth study of X combinatorial language,Unalis Co., Taiwan (with Horng-Chin Lee), March 1994
- Cocoon-A Vaccine for Computer Viruses, Unalis Co., Taiwan (with Wei-Bin Lee and Chih-Hung Wang), October 1992
- Lotus of Heavenly Mountain-An Open De-Virus System, Unalis Co., Taiwan (with Horng-Chin Lee and Wei-Bin Lee), August 1992
- Introduction to Computer Science, Unalis Co., Taiwan (with Wen-Hui Tsai), March 1992
- Data Structures-Theories and Applications, Unalis Co., Taiwan (with Wen-Hui Tsai), March 1992
- Applications of Relational Database Systems, Unalis Co., Taiwan (with Sheng-Yu Tsai), April 1991
- Database Systems Design, Unalis Co., Taiwan (with Chin-Chen Chang), July 1990
- Computer Center Management-Practice and Experience,Unalis Co., Taiwan (with Shou-Du Shen), July 1990
- Data Engineering Techniques, Unalis Co., Taiwan (with Chin-Chen Chang), August 1998
- Computer Cryptography and Information Security, Unalis Co., Taiwan (with Chin-Chen Chang), August 1998
- Privacy Security Technologies for Digital Images Based on Deep Learning (1/3) / 2023.08.01-2024.07.31 / National Science Council / Principle Investigator / MOST 112-2221-E-035-054-MY3
- A Study of Facial Biometric Protection using Artificial Intelligence Techniques (1/3) / 2023.08.01-2024.07.31 / National Science Council / Principle Investigator / MOST 112-2221-E-035-048-MY3
- Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images (3/3) / 2022.08.01-2023.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-060-MY3
- Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images (2/3) / 2021.08.01-2022.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-060-MY3
- Secret Sharing Techniques on High-Payload QR Codes, Visually Cryptographic QR Codes, and Rich QR Codes (2/2) / 2021.08.01-2022.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-059-MY2
- Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images (1/3) / 2020.08.01-2021.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-060-MY3
- Secret Sharing Techniques on High-Payload QR Codes, Visually Cryptographic QR Codes, and Rich QR Codes (1/2) / 2020.08.01-2021.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-059-MY2
- Research on Reversible Data Hiding in Encryption Domain (3/3) / 2019.08.01-2020.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -018 -MY3
- Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (3/3) / 2019.08.01-2020.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -013 -MY3
- Research on Reversible Data Hiding in Encryption Domain (2/3) / 2018.08.01-2019.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -018 -MY3
- Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (2/3) / 2018.08.01-2019.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -013 -MY3
- Research on Reversible Data Hiding in Encryption Domain (1/3) / 2017.08.01-2018.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -018 -MY3
- Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (1/3) / 2017.08.01-2018.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -013 -MY3
- Reversible Information Hiding Techniques Based on Coding Strategy / 2016.08.01-2017.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 105-2221-E-035-051-
- Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (3/3) / 2015.08.01-2016.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -102 -MY3
- The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (2/2) / 2015.08.01-2016.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -102 -MY2
- Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (2/3) / 2015.08.01-2016.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -046 -MY3
- The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (1/2) / 2014.08.01-2015.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -102 -MY2
- Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (1/3) / 2014.08.01-2015.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -046 -MY3
- The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (3/3) / 2013.08.01-2014.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-093-MY3
- The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (3/3) / 2013.08.01-2014.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-049-MY3
- The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (2/3) / 2012.08.01-2013.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-093-MY3
- The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (2/3) / 2012.08.01-2013.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-049-MY3
- The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (1/3) / 2011.08.01-2012.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-093-MY3
- The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (1/3) / 2011.08.01-2012.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-049-MY3
- Reversible and Removable Data Embedding Techniques for Digital Images (3/3) / 2010.08.01-2011.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-084-MY3
- The Study of Secure Electronic Transaction Mechanisms in Internet (3/3) / 2010.08.01-2011.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-039-MY3
- Reversible and Removable Data Embedding Techniques for Digital Images (2/3) / 2009.08.01-2010.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-084-MY3
- The Study of Secure Electronic Transaction Mechanisms in Internet (2/3) / 2009.08.01-2010.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-039-MY3
- Reversible and Removable Data Embedding Techniques for Digital Images (1/3) / 2008.08.01-2009.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-084-MY3
- The Study of Secure Electronic Transaction Mechanisms in Internet (1/3) / 2008.08.01-2009.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-039-MY3
- The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (3/3) / 2007.08.01-2008.07.31 / National Science Council / Principle Investigator / NSC 96-2221-E-035-010
- Information Hiding Techniques for Various Data Compression mechanisms (3/3) / 2007.08.01-2008.07.31 / National Science Council / Principle Investigator / NSC 96-2221-E-035-009
- The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (2/3) / 2006.08.01-2007.07.31 / National Science Council / Principle Investigator / NSC95-2221-E-035-141
- Information Hiding Techniques for Various Data Compression mechanisms (2/3) / 2006.08.01-2007.07.31 / National Science Council / Principle Investigator / NSC95-2221-E-035-140
- The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (1/3) / 2005.08.01-2006.07.31 / National Science Council / Principle Investigator / NSC94-2213-E-194-039
- Information Hiding Techniques for Various Data Compression mechanisms (1/3) / 2005.08.01-2006.07.31 / National Science Council / Principle Investigator / NSC94-2213-E-194-038
- A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (3/3) / 2004.08.01-2005.07.31 / National Science Council / Principle Investigator / NSC93-2213-E-194-003
- A Study on Information Hiding Techniques for Various Types of Digital Images (3/3) / 2004.08.01-2005.07.31 / National Science Council / Principle Investigator / NSC93-2213-E-194-004
- A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (2/3) / 2003.08.01-2004.07.31 / National Science Council / Principle Investigator / NSC92-2213-E-194-004
- A Study on Information Hiding Techniques for Various Types of Digital Images (2/3) / 2003.08.01-2004.07.31 / National Science Council / Principle Investigator / NSC92-2213-E-194-005
- A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (1/3) / 2002.08.01-2003.07.31 / National Science Council / Principle Investigator / NSC91-2213-E-194-017
- A Study on Information Hiding Techniques for Various Types of Digital Images (1/3) / 2002.08.01-2003.07.31 / National Science Council / Principle Investigator / NSC91-2213-E-194-016
- The Study of Some Image Compression Mechanisms (3/3) / 2001.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC90-2213-E-194-013
- A Study of Image Compression Schemes with Error Correction Capability / 2001.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC90-2213-E-194-041
- A study of Similar Color Image Retrieval Using RCM-Wavelet-Based Features / 2001.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC90-2213-E-194-026
- A Video Retrieval Technique Based on Piecewise Matching Method / 2000.08.01-2001.07.31 / National Science Council / Principle Investigator / NSC89-2218-E-194-008
- The Study of Some Image Compression Mechanisms (3/2) / 2000.08.01-2001.07.31 / National Science Council / Principle Investigator / NSC89-2218-E-194-012
- A Study on Color Image Cryptosystems / 2000.08.01-2001.07.31 / National Science Council / Principle Investigator / NSC89-2218-E-194-007
- Speeding up the Computations of Lucas Function and Elliptic Curve Cryptosystems / 1999.08.01-2000.07.31 / National Science Council / Principle Investigator / NSC89-2213-E-194-002
- Spatial Similarity Retrieval in Video Database / 1999.08.01-2000.07.31 / National Science Council / Principle Investigator / NSC89-2213-E-194-003
- The Study of Some Image Compression Mechanisms (3/1) / 1999.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC89-2213-E-194-020
- The Study of Secret Sharing Schemes for Secret Image and Cheater Identification Scheme / 1998.08.01-1999.07.31 / National Science Council / Principle Investigator / NSC88-2213-E-194-003
- Towards Indexing and Normalizing of Iconics for Image Similarity Retrieval / 1998.08.01-1999.07.31 / National Science Council / Principle Investigator / NSC88-2213-E-194-005
- The Design of Compression Method for Large Sparse Matrices / 1997.08.01-1998.07.31 / National Science Council / Principle Investigator / NSC87-2213-E-194-001
- The Design of Large Pictorial Database System / 1997.08.01-1998.07.31 / National Science Council / Principle Investigator / NSC87-2213-E-194-003
- A Study on Encryption and Decryption Technologies in Satellite Communications / 1996.08.01-1997.07.31 / National Space Program Office/ Principle Investigator / NSC86-NSPO(A)-PC-FA06-02
- Toward the Research and Development of Key Technology for RSA-type Public Key Cryptoschemes / 1996.08.01-1999.07.31 / National Science Council / Principle Investigator / NSC86-2213-E-194-001
- A Design of Spatial Data Structure and Spatial Data Filters / 1996.08.01-1997.07.31 / National Science Council / Principle Investigator / NSC86-2213-E-194-003
- The Computation of the Modular Multi-Exponentiation / 1995.08.01-1996.07.31 / National Science Council / Principle Investigator / NSC85-2213-E-194-010
- The Study of a Fast Cascade Exponentiation Evaluating Scheme / 1994.08.01-1995.07.31 / National Science Council / Principle Investigator / NSC84-2213-E-194-001
- The Study of a Secret Voting System on Computer Networks / 1994.02.01-1995.07.31 / National Science Council / Principle Investigator / NSC83-0408-E-194-013 / NSC84-0408-E-194-006
- The Resource Allocations in Multi-processor Systems / 1994.02.01-1995.07.31 / National Science Council / Co-Investigator
- The Study of Compressing in Chinese Computing Environment / 1993.08.01-1994.07.31 / National Science Council / Principle Investigator / NSC82-0408-E-194-002
- The Study of Generalized Group-Oriented Secret Sharing / 1993.02.01-1994.01.31 / National Science Council / Principle Investigator / NSC82-0408-E-194-027
- Digital Signature Based on the Error-Correcting Codes / 1992.08.01-1993.07.31 / National Science Council / Co-Investigator / NSC82-0408-E-194-003
- The Study of a Storage and Retrieval Scheme for Chinese Multi-Character Words / 1992.08.01-1993.07.31 / National Science Council / Principle Investigator / NSC82-0408-E-194-009
- Identity-Based Cryptosystem Design and Implementation / 1992.08.01-1993.07.31 / National Science Council / Co-Investigator
- New Concepts for Multiple Stack System: Born and Reborn / 1992.02.01-1993.01.31 / National Science Council / Principle Investigator / NSC81-0K08-E-194-507
- On Research and Development of a Content-Independent Data Compression Scheme / 1991.08.01-1992.07.31 / National Science Council / Principle Investigator / NSC81-0408-E-194-03
- Parallel Computation-Theories , Systems and Applications / 1991.08.01-1994.07.31 / National Science Council / Co-Investigator
- On Research and Development of Dictionary Compressing and Searching Technologies / 1991.02.01-1992.01.31 / National Science Council / Principle Investigator / NSC80-0408-E194-12
- Planning the Computer Cryptological Research / 1990.08.01-1990.12.31 / National Science Council / Principle Investigator / NSC80-0408-E194-06
- The Study of Dynamic Key-Lock-Pair Access Control Schemes / 1990.08.01-1991.07.31 / National Science Council / Co-Investigato
- Design and Performance Comparison of Some Signature Extraction Schemes for Symbolic Pictures / 1990.08.01--1991.07.31 / National Science Council / Principle Investigator / NSC80-0408-E194-02
- On the Design of Password Authentication Systems / 1990.02.01-1991.01.31 / National Science Council / Principle Investigator / NSC79-0408-E194-03
- The Studies of Designing Optimal Multi-attribute File Systems by the MMI Method for Orthogonal Range Retrieval / 1990.02.01-1991.01.31 / National Science Council / Co-Investigator
- A Compression Method for Chinese and English Data / 1989.08.01-1990.07.31 / National Science Council / Principle Investigator / NSC79-0408-E194-01
- Some Cryptosystems Based upon Euclidean Geometry / 1988.12.01-1990.01.31 / National Science Council / Principle Investigator / NSC78-0408-E005-02
- The Study of Data Compression in Chinese Textual Files / 1989.02.01-1990.01.31 / National Science Council / Co-Investigator / NSC78-0408-E005-03
- The Study of Information Security Schemes / 1988.08.01-1989.07.31 / National Science Council / Principle Investigator / NSC78-0408-E005-01
- The Studies of Pattern Near-Matching Both in Chinese and in English / 1988.04.01-1989.03.31 / National Science Council / Co-Investigator / NSC77-0408-E005-04
- Visual Form Conversion Expert System-Design and Development / 1988.01.01-1989.03.31 / National Science Council / Co-Investigator / NSC77-0408-E005-03
- Applying Multi-variant Analysis Techniques to Information Storage and Retrieval / 1987.12.01-1988.11.30 / National Science Council / Principle Investigator / NSC77-0408-E005-02
- Some Properties of Multi-attribute File Systems for Orthogonal Range Retrieval / 1987.12.01-1988.11.30 / National Science Council / Co-Investigator / NSC77-0408-E035-02
- The Study of a Dynamic Access Control Scheme / 1987.08.01-1988.07.31 / National Science Council / Principle Investigator / NSC77-0408-E005-01
- The Study of Retrieving Techniques of Phonetic Syllables / 1987.04.01-1988.03.31 / National Science Council / Co-Investigator / NSC76-0408-E005-04
- On the Design and Analysis of Multi-disk File Allocation Method for Concurrent Retrieval / 1987.01.01-1988.03.31 / National Science Council / Co-Investigator / NSC76-0408-E035-03
- The Study of Inductive Question Answering and Data Integrity / 1986.12.01-1987.11.30 / National Science Council / Co-Investigator / NSC76-0408-E005-03
- The Study and Development of Approximate Patten Matching in Large Textual Files / 1986.12.01-1987.11.30 / National Science Council / Co-Investigator / NSC76-0408-E035-01
- The Difficulty of Construction Perfect Hashing Functions / 1986.12.01-1987.11.30 / National Science Council / Principle Investigator / NSC76-0408-E005-02
- The Development and Evaluation of a Secure Broadcasting System / 1986.08.01-1987.07.31 / National Science Council / Principle Investigator / NSC76-0408-E005-01
- The Study of Allocating Multiple Key Hashing File System Among Multiple Disks / 1986.04.01-1987.03.31 / National Science Council / Principle Investigator / NSC75-0408-E005-04
- Optimal Cartesian Product Files for Concurrent Disk Accessing / 1986.04.01-1987.03.31 / National Science Council / Co-Investigator / NSC75-0408-E035-02
- The Development of a CAI System for Structured Assembly Language Programming / 1985.12.01-1986.11.30 / National Science Council / Co-Investigator / NSC75-0408-E005-03
- Symbolic Solver for Recurrence Relations / 1985.08.31-1986.07.31 / National Science Council / Principle Investigator / NSC75-0408-E005-02
- An Information Protection Scheme Based upon Number Theory / 1985.08.01-1986.07.31 / National Science Council / Principle Investigator / NSC75-0408-E005-01
- The Study of an Letter-oriented Minimal Perfect Hashing Scheme / 1984.11.01-1985.10.31 / National Science Council / Principle Investigator / NSC74-0408-E005-02
- Some Design and Allocation Problems for Concurrent Disk Accessing / 1984.08.01-1985.07.31 / National Science Council / Principle Investigator / NSC74-0408-E005-01
- Optimal Multi-attribute Hashing Scheme when Quires are not Ran / 1983.08.01-1984.05.31 / National Science Council / Principle Investigator / NSC73-0208-M005-01
- Minimal Perfect Hashing Scheme Based Upon Number Theory / 1982.12.20-1983.11.19 / National Science Council / Principle Investigator / NSC72-0404-E009-013
- The Intellectual Property Rights University Campus Visit Project / 2007.04.01-2007.09.30 / Ministry of Education / Co-Investigator
- Multi-function digital watermarking system / 2003.09.01-2004.08.31 / CHENG LIN INFORMATION CO., LTD. / Principle Investigator
- A Mechanism of Treating Emergent Events of Information Security for E-Government / 1998.09.01-1999.02.28 / Research, Development and Evaluation Commission, Executive Yuan / Co-Investigator
- On the Study and Development of Technical Rule, Management Mechanism and Validation for Cryptographic Modules in Communication Security / 1998.08.01-1999.05.31 / Directorate General of Telecommunications, Ministry of Transportation and Communications / Associate Program Director
- Planning the Draft Proposal of Information Security Standards / 1998.08.01-1999.05.31 / National Bureau of Standards, Ministry of Economic Affairs / Researcher
- The Proposal of Information Security Standards / 1997.09.01-1998.05.31 / National Bureau of Standards, Ministry of Economic Affairs / Principle Investigator
- The Proposal of Information Security Management for Government Organization / 1997.03.01-1997.06.30 / Research, Development, and Evaluation Commission, Taiwan Provincial Government / Principle Investigator
- The Editing of Outlines of Localized Teaching Materials for Contemporary Computer Cryptography / 1994.12.01-1995.05.31 / Advisory Office, Ministry of Education / Principle Investigator / Taiwan (84) 005535
- Setting High Speed Network and the Application Platform for National Chung Cheng University / 1994.12.01-1995.06.30 / Ministry of Education / Co-Investigator
- The Development of a New Digital Multisignature System / 1994.07.01-1995.06.30 / Chung-Shan Institute of Science and Technology / Principle Investigator / CS84-0210-D-194-001
- An Information Management System for Middle and Long-term Projects of Province Affairs / 1994.08.01-1995.05.31 / Research, Development, and Evaluation Commission, Taiwan Provincial Government / Principle Investigator
- The Study of an Open De-Virus System / 1991.09.01-1992.06.30 / Ministry of Education / Principle Investigator / MOECC81-A003
- The Design of a Database for Service Control Points / 1991.07.01-1992.06.30 / Chunghwa Telecom Laboratories, Ministry of Transportation and Communications / Principle Investigator / TL-81-1101
- The Status and Requirements of Computer System Security / 1991.03.01-1991.06.30 / Institute for Information Industry / Principle Investigator
- A Secure Broadcasted System for Military Secret Data / 1991.02.01-1992.01.31 / Chung-Shan Institute of Science and Technology / Principle Investigator / CS80-0210-D194-01
- A Design of Security Architecture on Message Handing System and Directory System / 1990.08.01-1991.07.31 / Directorate General of Telecommunications, Ministry of Transportation and Communications / Principle Investigator / TL-81-3201
- A Study of Advanced Communication Protocol for Its Security and Verification / 1990.08.01-1991.07.31 / Directorate General of Telecommunications, Ministry of Transportation and Communications / Principle Investigator / TL-81-3105
- The Research and Development of a Palm Carried Electronic Memory Card / 1989.12.01-1990.05.31 / Pusan Technology Cooperation / Principle Investigator
- Planning the County Government Information System for Taitung County Government / 1990.11.01-1991.06.30 / Taitung Country Government / Principle Investigator
- The Study of Chinese Computing Technology and the Development of Chinese Information System / 1988.07.01-1989.04.30 / Chung-Shan Institute of Science and Technology / Principle Investigator
- Planning the City Government Information System for Taichung City Government / 1988.07.01-1989.06.30 / Taichung City Government / Principle Investigator
- The Application of Computers to Courses Agriculture / 1988.01.01-1988.07.20 / Department Taiwan Provincial Government of Education / Principle Investigator
- The Application of Computers to Courses for Home Economics / 1988.01.01-1988.07.20 / Department Taiwan Provincial Government of Education / Principle Investigator
- The Design of an Automatic Terrain Map Generator / 1987.10.01-1988.09.30 / Control Data Cooperation, Taiwan / Principle Investigator
- The Design and Development of a Chinese Visual Form Oriented Programming System / 1985.08.01-1986.07.31 / Control Data Cooperation, Taiwan / Principle Investigator
- The Design and Implementation of a Database Management System / 1983.06.01-1984.05.31 / Control Data Cooperation, Taiwan / Principle Investigator
- (2023) Awarded the HONORARY PH-D DEGREE IN ENGINEERING, National Chung Cheng University, Taiwan.
- (2021) Stanford University released the list of the top 2% of the world's top scientists in 2021. Professor Chang's career influence ranks 189th in the world among more than 255,000 scientists in the field of Artificial Intelligence and Image Processing.
- (2021) Awarded the title of AAIA Fellow by the Asia-Pacific Artificial Intelligence Association in 2021. /*The Asia-Pacific Artificial Intelligence Association was founded in 2021. A total of 400 top scientists were elected as fellows in the first year, and only five scientists from Taiwan were awarded this honor. */
- (2020) Awarded the honorary title of CS Fellow by the Computer Society of the Republic of China in 2020. /*The Computer Society of the Republic of China was founded in June 1966. Since 2013, the title of CS Fellow, when awarded, is awarded annually to the person from academia or industry who has made the most significant contribution to Taiwan's IT. Previously, three academicians of the Academia Sinica of Taiwan, two Chief Executive of the Executive Yuan, two university presidents, and the chairman of Acer Computer, of Heshuo United Technology, and of ASUS Computer have received this honor. */
- (2020) The Best Paper Award of International Conference on Innovation and Management, Feb. 2020.
- (2019) Four publications were recognized as "Highly Cited Paper" by Essential Science Indicators (i.e., citation rate is ranked as 1% in the world): [1] Chang, Chin-Chen, and Hai-Duong Le. "A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks." IEEE Transactions on Wireless Communications 15.1 (2015): 357-366. [2] Qin, Chuan, Chin-Chen Chang, and Tai-Jung Hsu. "Reversible data hiding scheme based on exploiting modification direction with two steganographic images." Multimedia Tools and Applications 74.15 (2015): 5861-5872. [3] Qin, Chuan, Chin-Chen Chang, and Yi-Ping Chiu. "A novel joint data-hiding and compression scheme based on SMVQ and image inpainting." IEEE Transactions on Image Processing 23.3 (2013): 969-978. [4] Qin, C, Chang, C. C, Huang, Y. H, and Liao, L. T. (2012). "An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism." IEEE Transactions on Circuits and Systems for Video Technology, 23. 7 (2012): 1109-1118.
- (2019, 05) The Best Paper Award of 4th Cryptology and Information Security Conference, May. 2019.
- (2018, 06) The honorable mention award of the 4th International Conference on Cloud Computing and Securityce, Jun. 2018.
- (2017, 08) Ranked the top computer scientist in Taiwan by Guide2Research which released the world-class 1,000 top scientists in the computer field in August 2017.
- (2017, 06) The excellent paper award of International management engineering, software engineering and service science conference, Jan. 2017.
- (2015, 10) Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of Taiwanese Association for Consumer Electronics, Oct. 2015.
- (2014, 06) Received the IEEE Reliability Society 2014 Leadership Award.
- (2014, 06) The Best Paper Award of 2014 International Conference on Knowledge Engineering and Applications (ICKEA 2014), Jun. 2014.
- (2013, 12) The Best Paper Award of 2013 National Computer Symposium (NSC 2013), Dec. 2013.
- (2013, 09) Received the first Distinguished Research Award by the IET Society Taipei Branch.
- (2013, 05) Supervised Honorable Mention for MATLAB/Simulink of TeraSoft, May 2013.
- (2013, 01) Awarded the Distinguished Lecturer Medal by the IET Society Taipei Branch.
- (2012, 08) Received the 2012 AsiaJCIS Lifetime Achievement Award. /*This award is given annually to at most one outstanding cryptographic scientist in Asia who is over the age of 60, and Professor Chang is the only recipient of the award who has ever been recommended for this award while under the age of 60.*/
- (2012, 08) The Best Paper Award of the 2012 Seventh Asia Joint Conference on Information Security, Tokyo, Japan, Aug. 2012.
- (2012, 05) Supervised Honorable Mention for MATLAB Programing of TeraSoft, May 2012.
- (2011) Supervised Dissertation Awarded for Outstanding M.S. Dissertation of Taiwanese Association for Consumer Electronics, 2011.
- (2011, 05) The Best Paper Award of 2011 International Conference on Information Management (ICIM 2011), May 2011.
- (2011, 03) Received the Top Cited Paper Award by the 2005-2010 Pattern Recognition Letters Journal.
- (2011, 03) The Top Cited Paper Award of Pattern Recognition Letters, Mar. 2011.
- (2011, 03) Received the "Information Honor Medal of 2010”, the highest honor of the Information Society of the Republic of China. /*Awarded annually in Taiwan to the person who has made the most contribution to Taiwan IT.*/
- (2010, 08) Achieved runner-up status in the Most Prolific DBLP Authors in the world.
- (2009, 06) Selected by the Journal of Systems and Software as the world's top fifteen scholars in the field of systems and software engineering during the years of 2002 and 2006 (published in JSS, Vol. 82, 2009, pp. 1370–1373).
- (2009, 06) Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 2002 and 2006 [Ref: J. Systems and Software, Vol. 82, pp. 1370–1373, 2009], Jun 2009.
- (2009, 02) Chair Professor in Information Security of the National Chung Hsing University, Feb. 1, 2009.
- (2008, 08) The Best Paper Award of the IEEE International Symposium on Electronic Commerce and Security, Aug. 2008.
- (2006, 09) The Best Paper Award of GESTS International Transactions on Computer Science and Engineering by Global Engineering, Science, and Technology Society (GESTS), Sept. 2006.
- (2006, 08) The Best Paper Award of the 2006 International Conference on Innovative Computing, Information and Control, Beijing, China, Aug. 2006.
- (2006, 07) Certificate of Merit for the 2006 IAENG International Workshop on Computer Science (IWCS’06) by International Association of Engineers (IAENG), Hong Kong, Jul. 2006.
- (2006) Year 2006 Top 500 World’s Most Influential Scientist Award by the International Academy of Biographies, 2006.
- (2005, 08) The First Class National Science Council Project Grant within Three Years, Aug. 2005-Jul. 2008.
- (2005, 06) The Outstanding Contribution Award of Chinese Cryptology and Information Security Association, Jun. 2005.
- (2005, 01) Honorary Professor of the National Chung Cheng University, Jan. 2005.
- (2004, 03) The Excellent Paper Award of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Kyusyu, Japan, Mar. 2004.
- (2003, 07) Champion of the 2003 Campus Website Competition in the Teachers Group, National Chung Cheng University, Jul. 2003.
- (2003, 06) Awarded the 2003 Pan Wen-yuan Cultural and Educational Foundation Research Excellence Award. /*This award is given to the most outstanding Chinese computer scientists in the world, with a maximum of 5 people per year; one of the co-winners is Academician Yao Qi-zhi, Turing Award 2000 winner*/
- (2003, 05) Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 1998 and 2002 [Ref: J. Systems and Software, Vol. 68, pp. 77-84, 2003], May 2003.
- (2003, 03) Outstanding Alumni Award of the National Chiao Tung University, Mar. 2003.
- (2003, 01) Merit NSC Research Fellow Award of the National Science Council (NSC) of the Executive Yuan, Jan. 2003.
- (2003) The International Association for Cryptologic Research Gratefully Acknowledges Chin-Chen Chang for His Contribution to the Worldwide Cryptologic Community Through His Role General Chair of AsiaCrypt 2003, Taiwan, 2003.
- (2002, 11) Received the 2002 TECO Technology Award. /*The award is given to at most one person every year who has made outstanding contributions to the development of Electronic Engineering/Computer Engineering/Commutation Engineering in Taiwan. */
- (2002, 05) Selected by the Journal of Systems and Software as the world's top fifteen top scholars in the field of systems and software engineering during the years of 1997 and 2001 (published in JSS, Vol.64, 2002, pp.79-86).
- (2002, 04) Outstanding Alumni Award of the College of Electrical Engineering and Computer Science (EECS), National Tsing Hua University, Apr. 2002.
- (2002, 01) Chair Professor of the National Chung Cheng University, Jan. 18, 2002.
- (2002) TECO Technology Award of the TECO Technology Foundation, 2002.
- (2001) Top Fifteen Scholars in Systems and Software Engineering of the Journal of Systems and Software, 2001.
- (2001) Outstanding Electrical Engineering Professor Award of Chinese Institute of Electrical Engineering, 2001.
- (2001, 09) Best Paper Award at the 2001 International Workshop on Cryptography and Network Security, Sept. 2001.
- (2000, 09) Elected as an IET FELLOW of the British Institution of Electrical Engineers.
- (1999, 11) Awarded "Distinguished Talents Lecturer" by the Li Yuan-zhe, Nobel Prize winner, Outstanding Talents Development Foundation (for five consecutive years since November 1999)
- (1999) Outstanding Engineering Professor Award of Chinese Institute of Engineers of the R.O.C., 1999.
- (1999) Outstanding Scholar Award of Foundation for the Advancement of Outstanding Scholarship, 1999-2003.
- (1999) Outstanding Staff to Promote Information Education of Ministry of Education, 1999.
- (1998, 11) Elected as an IEEE FELLOW.
- (1996) Research Fellow, National Science Council of the R.O.C., 1996-Present.
- (1996) AceR Dragon Award for the Most Ten Outstanding Talents, 1996.\
- (1995) Distinguished Paper Award of the Information and Education Bimonthly, 1995.
- (1994) Outstanding Academic Research Award of the National Chung Cheng University, 1994.
- (1993) Research Achievement Award of the Ministry of Transportation and Communication of the R.O.C., 1993.
- (1992) Outstanding Teaching Materials Award of the Ministry of Education of the R.O.C., 1992.
- (1992) Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of the Xerox Company, 1992.
- (1991) Best Paper Award at the Second International Conference on CISNA Sponsored by British Council, 1991.
- (1990) AceR Dragon Dissertation Award for Outstanding Ph.D. Dissertation Study Supervision, 1990, 1997, 1998.
- (1990) AceR Dragon Thesis Award for Outstanding M.S. Thesis Supervision, 1990, 1991, 1992, 1997.
- (1986 - 1988, 1988 - 1990, 1990 - 1992, 1992 - 1994 and 1994 - 1996) Received five consecutive Outstanding Research Awards (Information Engineering) by the National Science Council of the Executive Yuan. /*Professor Chang is the scholar who has received this award the most times in Taiwan*/
- (1987) Chung-Shan Academic Publication Award of the Chung-Shan Academic Foundation of the R.O.C., 1987, 1997.
- (1984) Awarded the "First National Top Ten Outstanding Information Science Talents" by the Taiwan Ministry of Economic Affairs in 1984.
- (1982) Best Paper Award of the Society of Electrical Engineering of the R.O.C., 1982.
- (1980) Honorary member of the Phi Tau Phi Scholastic Honor Society of the Republic of China, 1980.
- Appilcations of CRT in Information Science/Department of Computer Science, National Chengchi University/2024.04.11
- Full of positive energy, unlimited possibilities for achievement/The College of Management, Chaoyang University of Technology/2024.03.12
- How to do scientific research and write high-quality academic papers/The College of Science and Engineering, National Dong Hwa University/2024.03.08
- Applying De-clustering Concept to Information Hiding/Keynote Speech at 2024 6th Asia Pacific Information Technology Conference (APIT 2024), Bangkok, Thailand/2024.01.29-2024.01.31
- Applying De-clustering Concept to Information Hiding/Keynote Speech at 2024 5th International Conference On Computer Vision and Computation Intelligence (CVCI 2024), Bangkok, Thailand/2024.01.29-2024.01.31
- Sharing Secrets Using Dual Images with Cheating Detection/Keynote Speech at 2023 Asia Symposium on Image and Graphics (ASIG 2023), Shanghai, China/2023.12.22-2023.12.24
- Innovative Information Hiding for Digital Media/Peking University Shenzhen Graduate School/2023.11.29
- Innovative Information Hiding for Digital Media/Jinan University/2023.11.28
- Information Steganography Using Magic Matrix/Guangzhou University Artificial Intelligence and Blockchain Research Institute/2023.11.26
- Information Steganography Using Magic Matrix/Keynote Speech at 2023 6th EAI International Conference on Security and Privacy in New Computing Environments (EAI SPNCE 2023), Guangzhou, China/2023.11.24-2023.11.26
- Information Steganography Using Magic Matrix/Keynote Speech at 2023 4th Asia Service Sciences and Software Engineering Conference(ASS 2023), Aizu-Wakamatsu, Japan/2023.10.27-2023.10.29
- Tips to Success/National Institute of Informatics/2023.10.26
- Chang Quotes-accompanying You on The Road to Success/Department of Electrical Engineering, Department of Information Engineering and Department of Industrial Management, National Quemoy University/2023.10.03
- Full of Positive Energy to Achieve All Possibilities/Department of Electrical Engineering, Department of Information Engineering and Department of Industrial Management, National Quemoy University/2023.10.03
- How to Plan And Complete High-quality College Studies/Department of Electrical Engineering, National Quemoy University/2023.10.02
- How To Be A Successful Graduate Student/Department of Information Management, National Chung Hsing University/2023.09.28
- Sharing Secret Message Using Meaningful Digital Images/Keynote Speech at 2023 Asia Conference on Algorithms, Computing and Image Processing (AACIP 2023), Qingdao, China/2023.09.23
- Applying De-clustering Concept to Information Hiding/Keynote Speech at 2023 2nd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2023), Chengdu, China/2023.09.15-2023.09.17
- Secret Sharing Using Two Images with Authentication/Keynote Speech at 2023 6th International Conference on Data Science and Information Technology (DSIT 2023), Shanghai, China/2023.07.29
- Secret Sharing Using Two Images with Authentication/Keynote Speech at 2023 5th International Electronic Communication Conference (IECC 2023)/2023.07.22
- Sharing Secret Message Using Meaningful Digital Images/Keynote Speech at 2023 6th International Conference on Signal Processing and Machine Learning (SPML 2023)/2023.07.15
- Sharing Successful Experience with University Faculty/Tianjin University of Science and Technology/2023.07.14
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at 2023 International Conference on Algorithms, Computing and Data Processing (ACDP 2023), Qingdao, China/2023.06.23
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at 2023 the 13th International Workshop on Computer Science and Engineering (WCSE 2023), Singapore/2023.06.16
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Wenzhou Institute of Technology/2023.06.03
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection and Its Future Research Directions/National Chung Cheng University/2023.06.01
- Data Compression Based on Indirect Addressing Strategy/NDHU College of Science and Engineering/2023.05.04
- Data Compression Based on Indirect Addressing Strategy/National QueMoy University/2023.04.24
- How to Do Scientific Research/Ningbo University/2023.04.14
- Positive energy creates endless possibilities/National Chung Cheng University/2023.03.14
- Appilcations of CRT in Information Science/Department of Computer Science and Information Engineering, National Chung Cheng University/2023.03.13
- Lossless Compression Schemes of Vector Quantization Indices Using State Codebook/國立雲林科技大學資訊工程系/2023.03.08
- The Design of Computer Password/School of Medical Informatics, Chung Shan Medical University/2023.02.24
- Visual Cryptography/Department of Management Information Systems, National Chung Hsing University/2023.02.23
- Appilcations of CRT in Information Science/College of Informatics, Chaoyang University of Technology/2023.02.21
- A virtual image cryptosystem based upon vector quantization/Keynote Speech at 2023 5th Asia Pacific Information Technology Conference (APIT 2023), Ho Chi Minh City, Vietnam/2023.02.10
- Some Interesting Methods of Cryptography and Steganography/National Chung Hsing University/2022.12.12
- Information Hiding Schemes Based on Magic Matrices/National Central University/2022.12.09
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Wuhan University of Technology/2022.12.08
- How to Do Scientific Research/National Changhua University of Education/2022.12.02
- Applying De-clustering Concept to Information Hiding/Keynote Speech at 2022 International Workshop on Bigdata Intelligence and Security, Wuhan, China/2022.12.01
- Recent Developments of Information Hiding/National Development Management Institute, Bangkok, Thailand/2022.11.18
- Borrowing from nature to conceal information/Keynote Speech at 2022 5th International Conference on Digital Medicine and Image Processing (DMIP 2022), Kyoto, Japan/2022.11.11
- Information Hiding Schemes Based on Magic Matrices/China University of Mining and Technology/2022.10.19
- The Core Technology of Accelerating Encryption and Decryption Operation of Cryptographer/National Quemoy University/2022.09.26
- Information Hiding Schemes Based on Magic Matrices/Keynote Speech at 2022 International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2022), Xi'an, China/2022.09.23
- Nature-Inspired Information Hiding Techniques/Keynote Speech at 2022 5th International Conference on Signal Processing and Machine Learning (SPML 2022), Dalian, China/2022.08.05
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at 2022 4th International Electronics Communication Conference (IECC 2022) Tokyo, Japan/2022.07.08-2022.07.10
- Travel in mainland China to witness the academic development/National QueMoy University/2022.05.02
- Borrowing from Nature to Conceal Information/Keynote Speech at 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML 2022), Hangzhou, China/2022.03.25
- Embedding Secrets Using Magic Matrices/Chung Shan Medical University/2022.03.18
- Information Steganography Using Magic Matrix/Department of Computer Science and Information Engineering, National Chung Cheng University/2022.03.07
- Travel in mainland China to witness the academic development/Chaoyang University of Technology/2022.03.01
- Authenticatable Visual Secret Sharing/Keynote Speech at 3rd Asia Service Sciences and Software Engineering Conference (ASSE 2022), Macau, China/2022.02.25
- The Design of Computer Password/School of Medical Informatics, Chung Shan Medical University/2022.02.24
- Applying De-Clustering Concept to Information Hiding/Keynote Speech at 2022 The Third International Symposium on Future ICT (Future ICT 2022), Taichung, Taiwan/2022.01.17
- The way to success/Fu Jen Catholic University/2021.12.08
- The way to success/Chaoyang University of Technology/2021.12.07
- Borrowing from Nature to Conceal Information/Keynote Speech at 2021 3rd International Conference Big-data Service and Intelligent ComputationㄗBDSIC 2021ㄘ, Xiamen, China/2021.11.19-2021.11.21
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Shanghai Maritime University, Shanghai, China/2021.11.10
- How to do scientific research and write paper/Shanghai Maritime University, Shanghai, China/2021.11.10
- Visual Cryptography/National Quemoy University/2021.11.01
- Applying De-Clustering Concept to Information Hiding/Keynote Speech at 2021 The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2021), Kaohsiung, Taiwan/2021.10.29
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/National Chung Hsing University/2021.09.23
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at the 2021 4th International Conference on Signal Processing and Machine Learning (SPML 2021), Beijing, China/2021.08.18-2021.08.20
- Information Steganography Using Magic Matrix/Yuan Ze University/2021.06.11
- Steganography of image compression code/Keynote Speech at the 2021 itaoi, QueMoy, Taiwan/2021.05.28
- Nature-Inspired Information Hiding Techniques/National Chin-Yi University of Technology/2021.05.11
- Borrowing from Nature to Conceal Information/National Taipei University of Education/2021.05.04
- Steganography of image compression code/National Pingtung University/2021.04.28
- Information Steganography Using Magic Matrix/National Pingtung University/2021.04.27
- Steganography of image compression code/Putian University, Putian, China/2021.04.07
- Applying De-Clustering Concept to Information Hiding/National QueMoy University/2021.03.15
- International travel and my experience/Chaoyang University of Technology/2021.03.09
- De-clustering concept to information hiding/Keynote Speech at the 2021 2nd Asia Service Sciences and Software Engineering Conference (ASSE 2021), Macau, China/2021.02.25
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Harbin Institute of Technology, Harbin, China/2020.12.20
- Applying De-Clustering Concept to Information Hiding/Keynote Speech at 2020 2nd International Conference on Big-data Service and Intelligent Computation (BDSIC 2020), Xiamen, China/2020.12.03-2020.12.05
- How to Do Scientific Research/Fuzhou University, Fuzhou, China/2020.12.02
- The Way to Success/Feng Chia University/2020.11.03
- Knowledge of International Tourism/National Chung Hsing University/2020.10.15
- Embedding Secrets Using Magic Matrices/Tunghai University/2020.10.12
- Embedding Secrets Using Magic Matrices/National Taichung University of Education/2020.10.12
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Asia University/2020.09.30
- Borrowing from Nature to Conceal Informatio/National Central University/2020.09.23
- The Road to Success/National QueMoy University/2020.09.22
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/National QueMoy University/2020.09.21
- Witness the academic development of Taiwan/CSROC/2020.08.28
- Applying De-clustering Concept to Information Hiding/Keynote Speech atInternational Electronics Communication Conference (IECC), Singapore/2020.07.09
- Nature-Inspired Information Hiding Techniques/Keynote Speech at 2020 Asia Service Sciences and Software Engineering Conference (ASSE 2020), Nagoya, Japan/2020.05.13-2020.05.15
- Information Hiding Schemes Based on Magic Matrices/Keynote Speech at 2021 2nd International Symposium on Future Information and Communication Technology (Future ICT 2021), Taichung, Taiwan/2020.02.02
- Information Hiding Techniques Inspired by Nature/Keynote Speech at 2020 The 2nd Asia Pacific Information Technology Conference (APIT 2020), Bali, Indonesia/2020.01.17-2020.01.19
- Borrowing from Nature to Conceal Information/Jiangsu University, Wuxi, China/2019.12.26
- Borrowing from Nature to Conceal Information/Wuhan University, Wuhan, Hubei, China/2019.12.24
- How to do scientific research/Wuhan University, Wuhan, Hubei, China/2019.12.24
- Borrowing from Nature to Conceal Information/Keynote Speech at 2019 IEEE 4th International Conference on Communication and Information Systems (ICCIS 2019&ICSCC), Wuhan, China/2019.12.21-2019.12.23
- Borrowing from Nature to Conceal Information/Wenzhou University, Wenzhou, China/2019.12.20
- How to Do Scientific Research/Wenzhou University, Wenzhou, China/2019.12.20
- Borrowing from Nature to Conceal Information/Jinan University, Guangzhou, China/2019.12.18
- Borrowing from Nature to Conceal Information/Keynote Speech at 2019 2nd International Conference on Signal Processing and Machine Learning (SPML 2019), Hangzhou, China/2019.11.27-2019.11.29
- Embedding Secret Information in Digital Images/Keynote Speech at 2019 the 9th International Conference on Communication and Network Security (ICCNS 2019),Chongqing, China/2019.11.15-2019.11.17
- Sharing Experience in Paper Writing and Paper Submission/School of computer science, Jimei University, Xiamen, China/2019.11.15
- Borrowing from Nature to Conceal Information/National QueMoy University/2019.11.14
- Borrowing from Nature to Conceal Information/School of computer science, Huaqiao University, Xiamen, China/2019.11.14
- Applying De-clustering Concept to Information Hiding/Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology, Hangzhou, China/2019.11.04
- Applying De-Clustering Concept to Information Hiding/Image Research Institute, Hangzhou University of Electronic Science and technology, Hangzhou, China/2019.11.04
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Zhejiang University of Finance and Economics, Hangzhou, China/2019.11.01
- Sharing Experience in Writing and Publishing a Research Paper/School of information management, Central China Normal University, Wuhan, China/2019.10.30
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Keynote Speech at 2019 International Conference on Video, Signal and Image Processing (VSIP 2019),Wuhan, China/2019.10.29-2019.10.31
- Information Hiding Techniques Using Magic Matrix/School of information engineering, Ningbo University, Ningbo, China/2019.10.29
- The Development and Application of Information Security Technique/School of science and technology, Ningbo University, Ningbo, China/2019.10.28
- Information Hiding Techniques Using Magic Matrix/Keynote Speech at 2019 Twelfth International Symposium on Information Processing (ISIP 2019), Shanghai, China/2019.10.26-2019.10.27
- A Steganographic Algorithm Based on (7, 4) Hamming Code/Keynote Speech at 2019 International Conference on Big-data Service and Intelligent Computation (BDSIC 2019), Wuhan, China/2019.10.18-2019.10.20
- Information Hiding Techniques Using Magic Matrix/Wuhan Institute Of Technology, Wuhan, China/2019.10.18
- Information Hiding Techniques Using Magic Matrix/Huazhong University Of Science And Technology, Wuhan, China/2019.10.18
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Department of Information Management, Chaoyang University of Technology/2019.10.08
- Cryptography and Its Applications/National QueMoy University/2019.10.04
- How to Be an Outstanding Young Scholar/Putian University, Putian, China/2019.09.28
- The Recent Development of Information Security/Fujian Polytechnic Normal University, Fuqing, China/2019.09.27
- Information Hiding Techniques Based on ( 7,4) Hamming Code/College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou, China/2019.09.26
- The Recent Development of Information Security/Fujian Police College, Fuzhou, China/2019.09.26
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Fujian University of Technology, Fuzhou, China/2019.09.25
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Fuzhou University, Fuzhou, China/2019.09.24
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Department of Computer Science Information Engineering, National Yunlin University of Science and Technology/2019.09.18
- Appilcations of Chinese Remainder Theorem/Putian University, Putian, China/2019.08.21
- Cryptography and Its Application/Putian University, Putian, China/2019.08.20
- A Color Image Hiding Scheme Based on SMVQ and Modulo Operator/Shangyu Research Institute, Hangzhou University of Electronic Science and Technology/2019.08.19
- How to Do Scientific Research and Write a High-quality Paper/Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology/2019.08.15
- Current Research on Information Hiding/Keynote Speech at International Electronics Communication Conference, Okinawa, Japan/2019.07.08
- Embedding Secret Information in Digital Images Using Magic Turtle Shells/Keynote Speech at 2019 4th International Conference on Image, Vision and Computing, Xiamen, China/2019.07.06
- How to Do Scientific Research and Write a High-quality Paper/Xiamen University, Xiamen, China/2019.07.05
- Experiences in Application for a Project and Writing a Paper/Jimei University, Xiamen, China/2019.07.04
- Information Hiding Technology Based on Declustering Strategy/Sichuan Normal University, Chengdu, China/2019.06.12
- A steganographic method for hiding secret data using side match vector quantization/College of Information and Communication Engineering, University of Electronic Science and Technology/2019.06.11
- Information Hiding Technology Based on Declustering Strategy/Xihua University, Chengdu, China/2019.06.11
- Digital Image Recognition Technology/Central Police University/2019.05.21
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Beijing University of Technology, Beijing, China/2019.05.15
- Authenticatable Visual Secret Sharing/Taiyuan University of Science and Technology, Taiyuan, China/2019.05.13
- A Color Image Hiding Scheme Based on SMVQ and Modulo Operator/Taiyuan University of Science and Technology, Taiyuan, China/2019.05.13
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Guangdong University of Technology, Guangzhou, China/2019.05.11
- The Application of Chinese Remainder Theorem in Information Science/Jimei university, Xiamen, China/2019.04.24
- A Self-Reference Watermarking Scheme based on Wet Paper Coding/Department of Computer Science, Huaqiao University, Xiamen, China/2019.04.24
- The Application of Chinese Remainder Theorem in Information Science/National Quemoy university/2019.04.22
- How to transmit information safely and effectively/Department of Computer Science & Communication Engineering, Providence university/2019.04.12
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Department of computer science, Tunghai university/2019.03.27
- The Application of Chinese Remainder Theorem in Information Science/Putian University, Putian, China/2019.03.22
- Information Hiding Technology Based on Declustering Strategy/Fujian Polytechnic Normal University, Fuqing, China/2019.03.21
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Fujian University of Technology, Fuzhou, China/2019.03.20
- Steganography based on magic matrix/Minjiang University/2019.03.20
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Fuzhou University, Fuzhou, China/2019.03.19
- Authenticatable Visual Secret Sharing/Fujian normal university, Fuzhou, China/2019.03.19
- How to Conduct Scientific Research and Write a High-quality Paper/Fujian Police College, Fuzhou, China/2019.03.18
- Turtle Shell Based Information Hiding Mechanism/Macau University of Science and Technology, Macau, China/2019.03.14
- A Steganographic Algorithm Based on ( 7,4) Hamming Code/Keynote Speech at 2019 Asia Pacific Information Technology Conference (APIT 2019) Jeju Island, Korea/2019.01.25- 2019.01.27
- Sharing Secrets Using Authenticatable Digital Images/Keynote Speech at 2019 the 4th International Conference on Multimedia and Image Processing (ICMIP 2019), Kuala Lumpur, Malaysia/2019.01.20
- How to Conduct Scientific Research and Write a High-quality Paper/School of Computer Science and Engineering, Wuhan University of Engineering/2019.01.14
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Keynote Speech at 2019 the 3rd International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2019)/2019.01.13
- Information Hiding Techniques Based on ( 7,4) Hamming Code/School of Computer Science, Hubei University of Technology, Wuhan, China/2019.01.12
- Turtle Shell Based Information Hiding Mechanism/National Engineering Research Center for E-Learnning, Central China Normal University, Wuhan, China/2019.01.11
- Essentials of Research, Contribution and Publication for Papers/National Engineering Research Center for E-Learnning, Central China Normal University, Wuhan, China/2019.01.11
- How to Conduct Scientific Research and Write a High-quality Paper/College of Science, Hubei University of Technology, Wuhan, China/2019.01.11
- How to be an Outstanding Young Scholar/School of Information Management, Central China Normal University, Wuhan, China/2019.01.10
- How to Conduct Scientific Research and Write a High-quality Paper/Wuhan University of Technology, Wuhan, China/2019.01.10
- How to be an Outstanding Young Scholar/College of Information and Electrical Engineering, Feng Chia University/2019.01.08
- Sharing Secrets Using Authenticatable Digital Images/Keynote Speech at the 2nd International Conference on Video and Image Processing(ICVIP 2018), Hongkong, China/2018.12.29- 2018.12.31
- Turtle Shell Based Information Hiding Mechanism/Putian University, Putian, China/2018.12.21
- How to Do Scientific Research and Write a High-quality Paper/Fujian Agriculture and Forestry University, Fuzhou, China/2018.12.20
- How to Conduct Scientific Research and Write a High-quality Paper/Fujian University of Technology, Fuzhou, China/2018.12.19
- How to Conduct Scientific Research and Write a High-quality Paper/Fujian Polytechnic Normal University, Fuqing, China/2018.12.18
- How to be an Outstanding Young Scholar/Fujian Polytechnic Normal University, Fuqing, China/2018.12.18
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Fujian Normal University, Fuzhou, China/2018.12.17
- Turtle Shell Based Information Hiding Mechanism/East China Normal University, Shanghai, China/2018.11.30
- How to Conduct Scientific Research and Write a High-quality Paper/University of Shanghai for Science and Technology, Shanghai, China/2018.11.30
- Information Hiding Technologyㄩ Current Research and Future Trend/Keynote Speech at the International Conference on Signal Processing and Machine Learning, Shanghai, China/2018.11.28- 2018.11.30
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Beijing University of Technology, Beijing, China/2018.11.27
- How to Conduct Scientific Research and Write a High-quality Paper/Minzu University of China, Beijing, China/2018.11.26
- Steganography based on magic matrix/Minzu University of China, Beijing, China/2018.11.26
- Information Hiding Techniques Based on ( 7,4) Hamming Code/National QueMoy University/2018.11.19
- How to Conduct Scientific Research/Guangdong University of Technology, Guangzhou, China/2018.10.26
- Turtle Shell Based Information Hiding Mechanism/Shenzhen University, School of Information Engineering, Shenzhen, China/2018.10.25
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Harbin Institute of Technology, Shenzhen, China/2018.10.25
- Steganography Based on Magic Matrix/Neusoft Institute Guangdong, Foshan, China/2018.10.24
- Current Research on Information Hiding/National Taitung University, Department of Information Engineering and Computer Science/2018.10.19
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Providence University, Department of Computer Science and Information Management/2018.10.17
- Authenticatable Visual Secret Sharing/Computer Engineering College, Jimei University, Xiamen, China/2018.10.12
- Current Research on Information Hiding/Software School of Xiamen University, Xiamen, China/2018.10.11
- How to Do Scientific Research and Write a High-quality Paper/Xiamen University of Technology, Xiamen, China/2018.10.10
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Department of Information Management, Chaoyang University of Technology/2018.10.09
- Current Research on Information Hiding/Department of Information Engineering and Computer Science, Feng Chia University/2018.10.04
- Current Research on Information Hiding/Keynote Speech at the 2018 IEEE Conference on Information,Communication and Engineering (ICICE 2018), Xiamen, China/2018.09.29
- Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at the International Symposium on Image Processing (ISIP 2018),Shanghai/2018.09.22
- Turtle Shell Based Information Hiding Mechanism/University of Science & Technology Beijing/2018.07.30
- Applying De-clustering Concept to Information Hiding/Keynote Speech at the 2nd International Conference on Algorithms, Computing and Systems (ICACS 2018), Beijing, China/2018.07.27-2018.07.29
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Keynote Speech at the 3rd IEEE International Conference on Image, Vision and Computing (ICIVC 2018),Chongqing, China/2018.06.28
- Steganography Based on Turtle Shell/Chongqing University of Posts and Telecommunications, School of Cyberspace Security and Information Law/2018.06.28
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Xihua University, Chengdu, China/2018.06.26
- Using Meaningful Digital Shadow Images to Recover a Secret Message/University of Electronic Science and Technology of China/2018.06.26
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Sichuan Normal University, Chengdu, China/2018.06.25
- Using Meaningful Digital Shadow Images to Recover a Secret Message/Fujian Normal University, Fuzhou, China/2018.05.24
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Fujian Agriculture and Forestry University, Fuzhou, China/2018.05.24
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/FuJian University of Technology, Fuzhou, China/2018.05.23
- Steganography Based on Magic Matrix/Fujian Polytechnic Normal University, Fuqing, China/2018.05.23
- Using Meaningful Digital Shadow Images to Recover a Secret Message/Taiyuan University of Science and Technology, Taiyuan, China/2018.05.16
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Taiyuan University of Science and Technology, School of Electronic Information Engineering, Taiyuan, China/2018.05.15
- A Digital Watermarking Scheme Based on VQ/Taiyuan University of Science and Technology, School of Electronic Information Engineering, Taiyuan, China/2018.05.15
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/University of Shanghai for Science and Technology, Shanghai, China/2018.05.14
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Keynote Speech at the 10th International Conference on Digital Image Processing (ICDIP 2018), Shanghai, China/2018.05.12
- Steganography Based on Turtle Shell/National QUEMOY University, Department of Information Engineering/2018.05.07
- Applying De-clustering Concept to Information Hiding/Keynote Speech at the 3rd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2018), Shenzhen, China/2018.04.28-2018.04.30
- Steganography Based on Magic Matrix/Guangdong University of Technology, Guangzhou, China/2018.04.22
- Steganography Based on Magic Matrix/Hangzhou Dianzi University, School of Computer Science and Technology, Hangzhou, China/2018.04.18
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Zhejiang University of Finance & Economics, School of information management and Engineering, Hangzhou, China/2018.04.18
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Hangzhou Dianzi University, Institute of image technology, Hangzhou, China/2018.04.17
- An Information Hiding Scheme Using Turtle Shells/Hangzhou Dianzi University, School of Computer Science and Technology, Hangzhou, China/2018.04.17
- News of International Tourism/Hangzhou Dianzi University, School of Computer Science and Technology, Hangzhou, China/2018.04.17
- Information Hiding Technology Based on De-clustering Strategy/Huaqiao University, Xiamen, China/2018.03.29
- Using Meaningful Digital Shadow Images to Recover a Secret Message/Xiamen University of Technology, School of computer and Information Engineering, Xiamen, China/2018.03.29
- Steganography Based on Turtle Shell/Jimei University, Xiamen, China/2018.03.28
- Current Research on Information Hiding/Keynote Speech at the 3rd International Conference on Multimedia and Image Processing (ICMIP 2018), Guiyang, China/2018.03.17
- Turtle Shell Based Information Hiding Mechanism/Feng Chia University, Department of Information Engineering and Computer Science/2018.02.08
- Extended Exploiting-Modification-Direction Data Hiding with High Embedding Capacity/Keynote Speech at the International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2018), Wuhan, China/2018.01.13-2018.01.15
- A Data Hiding Scheme Based on a Reference Matrix and a Location Table/Keynote Speech at the 2017 International Conference on Video and Image Processing (ICVIP 2017), Singapore/2017.12.28
- The Way to Success/China Medical University/2017.12.26
- Turtle Shell Based Information Hiding Mechanism/Keynote Speech at the 12th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2017), Providence University/2017.12.18
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Keynote Speech at the 6st International Conference on Network, Communication and Computing (ICNCC 2017), Kunming, China/2017.12.08-2017.12.10
- Embedding Secrets Using Magic Matrices/Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology/2017.11.22
- Turtle Shell Based Information Hiding Mechanism/"Master party" salon, College Of Computer Science, South-Central University for Nationalities/2017.11.08
- Information Hiding Technology : Current Research and Future Trend/Keynote Speech at the 2nd International Conference on Communication and Information Systems (ICCIS 2017), Wuhan, China/2017.11.07-2017.11.09
- Rambling on about Research Methods/Department of Information Management, Chaoyang University of Technology/2017.10.31
- Rambling on about Research Methods/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2017.10.24
- Information Security Professional Outlet/Undergraduate professional of Information Security, Huaqiao University, Xiamen, China/2017.10.24
- Rambling on about Research Methods/Computer Engineering College, Jimei University, Xiamen, China/2017.10.24
- Turtle Shell Based Information Hiding Mechanism/Huaqiao University, Xiamen, China/2017.10.23
- Turtle Shell Based Information Hiding Mechanism/College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou, China/2017.10.20
- Rambling on about Research Methods/College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China/2017.10.20
- Authenticatable Visual Secret Sharing/Fujian University of Technology, Fuzhou, China/2017.10.18
- Authenticatable Visual Secret Sharing/School of Information, Zhejiang University of Finance & Economics, Hangzhou, China/2017.10.17
- Authenticatable Visual Secret Sharing/School of Computer Science, Hangzhou Dianzi University, Hangzhou, China/2017.10.15
- Information Hiding Technology : Current Research and Future Trend/School of Information & Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China/2017.10.14
- Turtle Shell Based Information Hiding Mechanism/Hangzhou Dianzi University, Hangzhou, China/2017.10.14
- Visual Cryptography & Digital Signature Technology/Forensic industry information application theme salon, Ningpo, China/2017.10.13
- News of International Tourism/Department of Civil Engineering and Engineering Management, National Quemoy University/2017.09.22
- Using Meaningful Digital Shadow Images to Recover a Secret Message/Keynote Speech at the 2nd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2017), Taichung/2017.08.14
- Turtle Shell Based Information Hiding Mechanism/Keynote Speech at the 10th International Conference on Advanced Computer Theory and Engineering (ICACTE 2017), Jeju Island, South Korea/2017.08.11
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/School of Computer and Software Engineering, Chengdu, China/2017.06.04
- Information Hiding Techniques Based on ( 7,4) Hamming Code/School of Mathematical Sciences, Sichuan Normal University, Chengdu, China/2017.06.03
- Embedding Important Information in Digital Images Using Magic Turtle Shells/Keynote Speech at the International Conference on Image, Vision and Computing (ICIVC 2017), Chengdu, China/2017.06.02-2017.06.04
- Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China/2017.06.01
- Applying De-Clustering Concept to Information Hiding/Keynote Speech at Cryptology and Information Security Conference 2017 (CISC 2017), I-Shou University/2017.05.25
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/eynote Speech at the International Conference on Digital Image Processing (ICDIP 2017), Hong Kong/2017.05.19-2017.05.22
- Using Genetic Algorithm to Embed Important Information in an Image Compression File/Keynote Speech at the 34th Workshop on Combinatorial Mathematics and Computation Theory, Department of Information Engineering and Computer Science, Feng Chia University/2017.05.19
- How to Be a Successful Graduate Student/Department of Computer Science and Information Engineering, National Chung Cheng University/2017.04.24
- Turtle Shell Based Information Hiding Mechanism/Beijing University of Technology, Beijing, China/2017.04.20
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Beijing Tsinghua University, Beijing, China/2017.04.19
- Information Hiding Techniques Based on ( 7,4) Hamming Code/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2017.04.17
- Turtle Shell Based Information Hiding Mechanism/Department of Computer Science and Information Engineering, Tamkang University/2017.03.30
- News of International Tourism/Department of Information Management, National Taichung University of Science and Technology/2017.03.23
- Turtle Shell Based Information Hiding Mechanism/College of Computer Science, Sichuan University, Chengdu, China/2017.03.21
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/University of Electronic Science and Technology/2017.03.20
- Information Hiding Mechanisms Based on Magic Matrices/Keynote Speaker at the International Conference on Multimedia and Image Processing (ICMIP 2017)/2017.03.18
- Turtle Shell Based Information Hiding Mechanism/College of Computing and Informatics, Hubei University of Technology, Wuhan, China/2017.03.17
- Turtle Shell Based Information Hiding Mechanism/College of Computing and Informatics, Providence University/2017.03.09
- Turtle Shell Based Information Hiding Mechanism/Department of Information Management, Chaoyang University of Technology/2017.03.07
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Department of Medical Informatics, Tzu Chi University/2017.03.03
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Department of Information Engineering, National Dong Hwa University/2017.03.03
- Information Steganography Using Magic Matrix/China University of Geosciences, Wuhan, China/2017.01.16
- A Novel Data Hiding Method to Conceal Secret Data/International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2017) Keynote Speaker/2017.01.15
- Turtle Shell Based Information Hiding Mechanism/The 4th International Conference on Information and Network Security Keynote Speaker/2016.12.29
- Guide for Writing a Project Proposal and Key to Success in Academic Research/Tunku Abdul Rahman University, Malaysia/2016.12.28
- Information Hiding Technology Current Research and Future Trend/Tunku Abdul Rahman University, Malaysia/2016.12.28
- My Research Projects/Tunku Abdul Rahman University, Malaysia/2016.12.28
- Turtle Shell Based Information Hiding Mechanism/Chiayi, Taiwan, International Computer Symposium (ICS 2016), Keynote speaker/2016.12.16
- Some Steganographic Methods for Delivering Secret Messages Using Cover Media/National Taichung University of Science and Technology/2016.12.09
- How to Publish IEEE Journal Papers/Chaoyang University of Technology/2016.11.29
- How to Write a Plan of Ministry of Science and Technology/Central Taiwan University of Science and Technology/2016.11.25
- Some Steganographic Methods for Delivering Secret Messages Using Cover Media/Kaohsiung, Taiwan, The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2016), Keynote speaker/2016.11.21
- Applying De-clustering Concept to Information Hiding/Fujian University of Technology, Fuzhou, China/2016.11.16
- Applying De-clustering Concept to Information Hiding/Fujian Normal University, Fuzhou, China/2016.11.15
- Steganographic Technique Based on Magic Matrix/Fuzhou University, Fuzhou, China/2016.11.15
- The Application of Chinese Remainder Theorem in Information Science/Fujian University of Technology, Fuzhou, China/2016.11.14
- The Application of Chinese Remainder Theorem in Information Science/Chung Shan Medical University/2016.09.23
- The Application of Chinese Remainder Theorem in Information Science/Beijing Information Science & Technology University, Beijing, China/2016.09.19
- Embedding Secret Messages in Digital Images/New Taipei City, Taiwan, The 2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2016), Keynote speaker/2016.09.04
- Information Hiding Techniques Using Magic Matrix/Beijing, China, The 2016 IEEE International Conference on Signal and Image Processing (ICSIP 2016), Keynote speaker/2016.08.14
- De-clustering and Its Application to Steganography/Taiyuan University of Science and Technology, Taiyuan, China/2016.08.12
- Turtle Shell Based Information Hiding Mechanism/Beijing, China, The 10th Cross Strait Conference on Information Science and Technology(CSCIST 2016), Keynote speaker/2016.07.29
- Using Coding Techniques to Hide Secret Information/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2016.07.28
- Information Steganography Using Magic Matrix/College of Information Engineering, Zhejiang Agriculture and Forestry University, Hangzhou, China/2016.07.07
- How to Be a Successful Graduate Student/School of Computer Science, Hangzhou Dianzi University, Hangzhou, China/2016.07.06
- A Novel Data Hiding Method to Conceal Secret Data/Hangzhou International Forum of Big Data and E-commerce Keynote Speaker, China/2016.07.06
- Rambling on about Research Methods/Computer and Information Science, Southwest University, Chongqing, China/2016.06.06
- Information Steganography Using Magic Matrix/Long in the pulpit, Hubei University of Arts and Science, Xiangyang, China/2016.06.03
- Information Steganography Using Magic Matrix/Computer and Information Science, China Three Gorges University, Yichang, China/2016.06.02
- Turtle Shell Based Information Hiding Mechanism/College of Computer Science, Jingzhou Yangtze University, Jingzhou, China/2016.06.01
- How to Create High Quality Research Papers/College of Computer Science, Jingzhou Yangtze University, Jingzhou, China/2016.05.31
- Exentials of Scientific Paper/College of Computer Science, Jingzhou Yangtze University, Jingzhou, China/2016.05.31
- Information Steganography Using Magic Matrix/Computer Science and Technology, Wuhan University of Technology, Wuhan, China/2016.05.30
- How to Create High Quality Research Papers/School of Information Management, Huazhong Normal University, China/2016.05.30
- Exentials of Scientific Paper/School of Information Management, Huazhong Normal University, China/2016.05.30
- Using Coding Techniques to Hide Secret Information/College of Information Science and Technology, Southwest Jiaotong University, Chengdu, China/2016.05.24
- Information Hiding Technology and Optimal Problem/Chengdu University of Information Technology, Chendu, China/2016.05.23
- Applying De-Clustering Concept to Information Hiding/Chengdu Electronic Engineering, University of Electronic Science and Technology, China/2016.05.23
- Exentials of Scientific Paper/Chengdu Electronic Engineering, University of Electronic Science and Technology, China/2016.05.23
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Chengdu, China, The 8th International Conference on Digital Image Processing (ICDIP 2016), Keynote speaker/2016.05.21
- Rambling on about Research Methods/Computer Science, Northwestern Polytechnical University, Xi’an, China/2016.05.18
- Applying De-Clustering Concept to Information Hiding/Computer Science, Northwestern Polytechnical University, Xi’an, China/2016.05.18
- Authenticatable Visual Secret Sharing/Computer Science, Northwestern Polytechnical University, Xi’an, China/2016.05.18
- Information Hiding Technology and Optimal Problem/Communication and Information Engineering, Xi'an University of Posts and Telecommunications, Xi’an, China/2016.05.16
- How to Create High Quality Research Papers/Chaoyang University of Technology Department of Information Management/2016.05.06
- Exentials of Scientific Paper/Chaoyang University of Technology Department of Information Management/2016.05.06
- Information Hiding Techniques Based on ( 7,4) Hamming Code/National Dong Hwa University Information Engineering/2016.04.29
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Information Engineering, National Sun Yat-sen University/2016.04.22
- Using Coding Techniques to Hide Secret Information/Electronic Engineering, Tsinghua University, Beijing, China/2016.04.20
- How to Create High Quality Research Papers/Optical-Electrical and Computer Engineering, Shanghai Polytechnic University/2016.04.15
- Exentials of Scientific Paper/Optical-Electrical and Computer Engineering, Shanghai Polytechnic University/2016.04.15
- Turtle Shell Based Information Hiding Mechanism/Department of Information Science, National Chengchi University/2016.03.10
- A Steganographic Algorithm Based on ( 7,4) Hamming Code/Taichung, Feng Chia University (Keynote Speech at The First Workshop on Cryptography and Steganography)/2016.02.25
- The experience sharing of paper writting and proposal editing/Mingdao University/2015.11.24
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Information Department of Medicine, Chung Shan Medical University/2015.11.13
- Authenticatable Visual Secret Sharing/Hangzhou, China (Keynote Speech at The 9th International Conference on Management of e-Commerce and e-Government (ICMeCG2015)/2015.10.31
- Information Hiding Techniques Based on ( 7,4) Hamming Code/School of Computer Science, Northwestern Polytechnical University, , Xi’an, China/2015.10.28
- An Information Hiding Scheme Using Sudoku/School of Electronic and Information Engineering, Xi'an Jiaotong University, China/2015.10.27
- How to Publish IEEE Papers/Software Northwestern Polytechnical University, China/2015.10.27
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Information Engineering, Chang'an University, Xi’an, China/2015.10.26
- How to Publish IEEE Papers/Information Engineering, Chang'an University, Xi’an, China/2015.10.26
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Department of Electronic Engineering, University of Electronic Science and Technology, China/2015.10.23
- How to Publish IEEE Papers/Southwest Jiaotong University, Chengdu, China/2015.10.22
- Information Hiding Techniques Based on ( 7,4) Hamming Code/China Hangzhou The 16th IEEE International Conference on Communication Technology (ICCT2015) special lecture/2015.10.20
- How to Publish IEEE Papers/Hangzhou University of Electronic Science and Technology China/2015.10.20
- The Road to Success/School of Management, University of Science and GTM/2015.10.15
- Information Hiding Techniques Based on ( 7,4) Hamming Code/Providence University Department of Information Management/2015.10.02
- How to Publish IEEE Papers/Feng Chia University Library/2015.09.23
- Information Steganography Using Magic Matrix/Shenzhen Institutes of Advanced Technology, Chineses Academy of Sciences, Guangzhou, China/2015.07.16
- Rambling on about Research Methods/Guilin University of Electronic Technology, Guilin, China/2015.07.13
- Information Steganography Using Magic Matrix/Fujian University of Technology, Fuzhou, China/2015.07.07
- Information Steganography Using Magic Matrix/Department of Management Information Systems, National Chung Hsing University/2015.06.04
- Information Steganography Using Magic Matrix/College of Computer and Information Engineering, Xiamen University of Technology, Xiamen, China/2015.05.05
- Rambling on about Research Methods/Oriental Institute of Technology/2015.04.22
- An Information Hiding Scheme Using SUDOKU/School of Information, Zhejiang University of Finance & Economics, Hangzhou, China/2015.04.16
- An Information Hiding Scheme Using SUDOKU/School of Electrical and Information Engineering, Tongji University, Shanghai, China/2015.04.13
- An Information Hiding Scheme Using SUDOKU/School of Electrical Information and Engineering, Shanghai Jiao Tong University, Shanghai, China/2015.04.10
- Appilcations of CRT in Information Science/School of Telecommunication and Information Engineering, Shanghai University, Shanghai, China/2015.04.09
- Appilcations of CRT in Information Science/School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China/2015.04.08
- Information Steganography Using Magic Matrix/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2015.03.17
- Rambling on about Research Methods/Peking University, Beijing, China/2015.03.16
- Using Genetic Algorithm to Embed Important Information in an Image Compression File/Hong Kong, China (Keynote Speech at The 2015 2nd International Conference on Electrical Engineering and Information Technology)/2015.03.13
- Turtle Shell Based Information Hiding Mechanism/Department of Computer Science and Information Engineering, National Taipei University/2015.03.04
- Research Methodology for Science and Technology/2014 International Computer Symposium/2014.12.13
- Turtle Shell Based Information Hiding Mechanism/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2014.12.09
- The Design of Computer Password/Huizhou University, Huizhou, China/2014.12.05
- Information Steganography Using Magic Matrix/Department of Management Information Systems, National Pingtung University of Science and Technology/2014.12.03
- Using Genetic Algorithm to Embed Important Information in an Image Compression File/Hangzhou Dianzi University, Hangzhou, China/2014.11.17
- The Design of Computer Password/Zhejiang Gongshang University, Hangzhou, China/2014.11.17
- Visual Cryptography/Jiangsu University, Wuxi, China/2014.11.14
- Turtle Shell Based Information Hiding Mechanism/Anhui University, Hefei, China/2014.11.12
- Hiding Information in a Digital Image/Shenzhen, China (Keynote Speech at The 2014 International Conference on Computer Engineering)/2014.11.10
- Information Hiding Techniques Using Magic Matrix/Taiyuan, Vietnam (Keynote Speech at 2014 International Symposium on GIS and Advanced Technologies)/2014.11.03
- Turtle Shell Based Information Hiding Mechanism/Xi'an, China (Keynote Speech at 2014 7th International Conference on Information Management, Innovation Management and Industrial Engineering)/2014.10.25
- Using Genetic Algorithm to Embed Important Information in an Image Compression File/Chang'an University, Xi’an, China/2014.10.24
- Using Genetic Algorithm to Embed Important Information in an Image Compression File/Northwestern Polytechnical University, Xi’an, China/2014.10.24
- Information Steganography Using Magic Matrix/Xi'an University of Architecture and Technology, Xi’an, China/2014.10.23
- Information Steganography Using Magic Matrix/Northwestern Polytechnical University, Xi’an, China/2014.10.22
- Using Genetic Algorithm to Embed Important Information in an Image Compression File/Nanchang, China (Keynote Speech at The 8th International Conference on Genetic and Evolutionary Computing)/2014.10.18
- A Watermarking Scheme for Categorical Relational Databases/Taipei (Keynote Speech at 2014 The 13th International Workshop on Digital-forensics and Watermarking)/2014.10.02
- The Road to Success/National Chung Cheng University/2014.09.30
- Some Techniques for Sharing Digital Secret Images/Chengdu, China (Keynote Speech at The 2014 International Conference on Information and Computer Technology)/2014.09.07
- Information Steganography Using Magic Matrix/School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China/2014.09.05
- Recent Developments in Information Hiding/Lijiang, China (Keynote Speech at 2014 International Conference on Multimedia and Communication Technologies)/2014.08.15
- Hiding Information in a Digital Image/Hong Kong, China (Keynote Speech at International Conference on Industrial and Applied Electronics)/2014.07.29
- Information Hiding Techniques/Jeju Island, Korea (Keynote Speech at The 3rd International Conference on Knowledge and Education Technology)/2014.07.04
- Key to High Quality Research/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2014.06.18
- Hiding Information in a Digital Image/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2014.06.18
- Quotations from Professor Chang/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2014.06.18
- Authenticatable Visual Secret Sharing/Hong Kong, China (Keynote Speech at The 2014 International Conference on Knowledge Engineering and Applications)/2014.06.15
- Authenticatable Visual Secret Sharing/Tiachung, Taiwan (Keynote Speech at The First International Conference on Trustworthy System)/2014.06.09
- Digital Watermarking and Its Applications/Communication University of Zhejiang, Hangzhou, China/2014.05.23
- How to Create High Quality Research Paper/Hangzhou Dianzi University, Hangzhou, China/2014.05.22
- Professor Chang’s Sayings/Hangzhou Dianzi University, Hangzhou, China/2014.05.22
- Information Steganography Using Magic Matrix/Beijing Tsinghua University, Beijing, China/2014.05.21
- Information Steganography Using Magic Matrix/State Key Laboratory Of Information Security, Chinese Academy of Sciences, Beijing, China/2014.05.20
- Decluster and Its Application to Steganography/Beijing Jiaotong University, Beijing, China/2014.05.19
- Information Steganography Using Magic Matrix/North China Institute of Aerospace Engineering, Langfang, China/2014.05.19
- Rambling on about Research Methods/Taiyuan University of Science and Technology, Taiyuan, China/2014.05.16
- Information Steganography Using Magic Matrix/HuangHuai University, Zhumadian, China/2014.05.14
- Information Steganography Using Magic Matrix/Jeju Island, Korea (Keynote Speech at The 2014 3rd International Conference on Network and Computing Technology)/2014.04.12
- The Recent Developments in Visual Secret Sharing/Manila, Philippines (Keynote Speech at The 2014 International Conference on Circuits and Systems)/2014.03.21
- Information Steganography Using Magic Matrix/Department of Computer Science and Information Engineering, National Chung Cheng University/2014.03.10
- A Virtual Image Cryptosystem Based upon Vector Quantization/National Chung Hsing University-Information Security Seminar/2014.01.02
- Authenticatable Visual Secret Sharing/Department of Management Information Systems, National Chung Hsing University/2014.01.02
- Appilcations of CRT in Information Science/Jishou University, Jishou, China/2013.12.11
- Appilcations of CRT in Information Science/Hunan University of Technology(Young Computer Scientists & Engineers Forum), Hunan, China/2013.12.09
- Information Steganography Using Magic Matrix/XiangTan University(The College of Information Engineering) , XiangTan, China/2013.12.07
- Appilcations of CRT in Information Science/University of Electronic Science and Technology of China, Chengdu, China/2013.12.05
- Authenticatable Visual Secret Sharing/University of Electronic Science and Technology of China, Chengdu, China/2013.12.03
- Hiding Information in a Digital Image/Xidian, China (Keynote Speech at The 2013 5th International Conference on Information Management and Engineering), Xian, China/2013.12.02
- Appilcations of CRT in Information Science/Northwestern Polytechnical University(School of Computer Science), Xi’an, China/2013.11.25
- Information Steganography Using Magic Matrix/College of Communications Engineering , Xidian University(School of Computer Science), Xian, China/2013.11.25
- Authenticatable Visual Secret Sharing/Xidian, China (Keynote Speech at The 2013 International Conference on Information Management, Innovation Management and Industrial Engineering)/2013.11.23
- Information Steganography Using Magic Matrix/Chang'an University(School of Information Engineering), Xi’an, China/2013.11.22
- Appilcations of CRT in Information Science/School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China/2013.11.20
- The Design of Computer Password/Providence University/2013.11.19
- Information Steganography Using Magic Matrix/Central Police University/2013.11.08
- Recent Developments in Information Hiding/National Chung Hsing University-Information Security Seminar/2013.11.01
- Hiding Information in a Digital Image/Guilin University of Electronic Technology(College of Mathematics & Computer Science) , Guilin, China/2013.10.28
- Visual Cryptography/Hong Kong, China (Keynote Speech at The 2013 5th International Conference on Graphic and Image Processing)/2013.10.27
- Rambling on about Research Methods/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2013.10.25
- Appilcations of CRT in Information Science/Taiyuan University of Science and Technology, Taiyuan, China/2013.10.21
- Appilcations of CRT in Information Science/Fujian Normal University(School of Mathematics and Computer Science) , Fuzhou, China/2013.10.10
- Rambling on about Research Methods/Department of Information Engineering and Computer Science, Feng Chia University/2013.09.19
- The Road to Success/Department of Information Engineering and Computer Science, Feng Chia University/2013.09.12
- Learning and Growing for a Graduate Student/Department of Information Engineering and Computer Science, Feng Chia University/2013.09.05
- Information Steganography Using Magic Matrix/Department of Information Engineering and Computer Science, Feng Chia University/2013.08.22
- Embedding Secrets in Digital Images/Seoul, Korea (Keynote Speech at The 2013 8th Asia Joint Conference on Information Security)/2013.07.25
- Emoticon-Based Text Steganography in Online Chat tools/Anhui University(School of Computer Scince and Technology), Hefei, China/2013.07.23
- Embedding Secrets Using Magic Matrices/University of Science and Technology of China(School of Computer Scince and Technology) , Suzhou, China/2013.07.23
- Embedding Secrets in Digital Images/Chengdu, China (Keynote Speech at The 2013 2nd International Conference on Information and Knowledge Management)/2013.07.21
- How to Create High Quality Research Papers/School of Information Science & Technology Southwest JiaoTong University, Chengdu, China/2013.07.19
- Visual Cryptography and Information Steganography/Hong Kong, China (Keynote Speech at The 2013 4th International Conference on Signal and Information Processing)/2013.07.07
- Embedding Secrets Using Magic Matrices/Internet of Things, Jiangsu University, Wuxi, China/2013.05.29
- Appilcations of Chinese Remainder Theorem/Internet of Things, Jiangsu University, Wuxi, China/2013.05.29
- Rambling on about Research Methods/Internet of Things, Jiangsu University, Wuxi, China/2013.05.28
- Professor Chang’s Sayings/Internet of Things, Jiangsu University, Wuxi, China/2013.05.28
- Professor Chang’s Sayings/Internet of Things, Jiangnan University, Wuxi, China/2013.05.26
- Professor Chang’s Sayings/School of Computer Science and Technology, Hangzhou Dianzi University/2013.05.24
- Digital Watermarking and Its Applications/School of Media and Design, Hangzhou Dianzi University/2013.05.24
- Hiding Information in a Digital Image/Beijing, China (Keynote Speech at The 2013 International Conference on Electrical Engineering and Computer Sciences)/2013.05.22
- Appilcations of CRT in Information Science/Department of Information Engineering and Computer Science, Feng Chia University/2013.05.16
- Sharing Academic Work and Proposal Writing/Feng Chia University Libraries/2013.04.30
- Recent Developments in Information Hiding/Beijing, China (Keynote Speech at The 2013 5th International Conference on Digital Image Processing)/2013.04.22
- Recent Development of Information Hiding Steganography/School of Computer Science and Engineering, University of Electronic Science and Technology/2013.04.18
- Information Steganography Using Magic Matrix/School of Information Science & Technology Southwest JiaoTong University, Chengdu, China/2013.04.17
- Appilcations of CRT in Information Science/Department of Management Information Systems, National Chung Hsing University/2013.03.18
- Digital Watermarking and Its Applications/Xiamen, China (Keynote Speech at The 2013 3rd International Conference on Advanced Measurement and Test)/2013.03.13
- Embedding Secrets Using Magic Matrices/Software School of Xiamen University, Xiamen, China/2013.03.13
- Recent Developments in Information Hiding/Singapore (Keynote Speech at The 2013 International Conference on Innovation and Information Management)/2013.01.20
- Hiding Information in a Digital Image/National Taichung University of Science and Technology, IET Distinguished Lecture Series/2013.01.03
- Sharing Academic Work and Proposal Writing/2012 International Computer Symposium/2012.12.13
- Hiding Information in a Digital Image/Department of Medical Informatics, TZU CHI University/2012.12.13
- Recent Developments in Information Hiding/Bangkok, Thailand (Keynote Speech at The 2012 International Conference on Networks and Information)/2012.11.25
- Sharing Academic Work and Proposal Writing/College of Computer Science, Asia University/2012.11.22
- Appilcations of CRT in Information Science/Providence University, IET Distinguished Lecture Series/2012.11.20
- Appilcations of CRT in Information Science/Shenzhen University, Shenzhen, China/2012.11.15
- Appilcations of CRT in Information Science/GuangZhou Institutes of Advanced Technology, Chinese Academy of Sciences, Beijing, China/2012.11.14
- Embedding Secrets in Digital Images/Guangzhou University, Guangzhou, China/2012.11.13
- Appilcations of CRT in Information Science/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2012.11.12
- Self-growth of Young Scholar/Department of Computer Science and Information Engineering, Hungkuang University/2012.11.07
- Professor Chang’s Sayings/Department of Computer Science and Information Engineering, Hungkuang University/2012.11.07
- Recent Developments in Information Steganography/School of Medical Informatics, Chung Shan Medical University/2012.11.02
- Professor Chang’s Sayings/School of Medical Informatics, Chung Shan Medical University/2012.11.02
- Using Table Look-up Methods to Hide Secret Information/Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Information Communication and Management)/2012.10.27
- Visual Cryptography and Information Steganography/Department of Computer Science Information Engineering, National Yunlin University of Science and Technology/2012.10.24
- Professor Chang’s Sayings/Department of Computer Science Information Engineering, National Yunlin University of Science and Technology/2012.10.24
- Recent Developments in Information Hiding/Sanya, China (Keynote Speech at The 2012 International Conference on Information Management, Innovation Management and Industrial Engineering)/2012.10.20
- Visual Cryptography/Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Advanced Materials and Information Technology Processing)/2012.10.17
- Appilcations of CRT in Information Science/School of Information Science and Technology, University of Science and Technology of China, Suzhou, China/2012.10.11
- Appilcations of CRT in Information Science/Anhui University, Hefei, China/2012.10.10
- Embedding Secrets in Digital Images/Dalian, China (Keynote Speech at The 2012 International Conference on Applied Physics and Materials Science)/2012.10.05
- Embedding Messages in Digital Images/Beijing, China (Keynote Speech at The 2012 The 4th International Conference on Advanced Science and Technology)/2012.09.27
- Appilcations of CRT in Information Science/The College of Information Engineering on XiangTan University, XiangTan, China/2012.09.25
- Table Look-up Methods for Storing and Retrieving Secret Messages/Beijing, China (Keynote Speech at The 2012 International Conference on Information and Computer Technology)/2012.09.16
- Information Hiding Technology and Optimal Problem/Beijing University of Chemical Technology, School of Management, Beijing, China/2012.09.15
- Appilcations of CRT in Information Science/Beijing Jiaotong University, Beijing, China/2012.09.13
- Some Steganographic Methods for Delivering Secret Messages Using Cover Media/Qingdao, China (Keynote Speech at The 2012 3rd International Conference on Information Technology for Manufacturing Systems)/2012.09.08
- Hiding Information in a Digital Image/Phuket Island, Thailand (Keynote Speech at The 2012 International Conference on Computer Design and Engineering)/2012.09.02
- Steganographic Systems for Secret Messages/Shanghai, China (Keynote Speech at The 2012 International Conference on Image, Vision and Computing)/2012.08.26
- Embedding Secrets Using Magic Matrices/Weihai, China (Keynote Speech at The 2012 3rd International Conference on Electronics and Information Engineering)/2012.08.25
- Recent Developments in Hiding Information/Hangzhou, China (Keynote Speech at The 2012 International Conference on Networking and Technology)/2012.08.24
- Rambling on about Research Methods/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2012.08.23
- Hiding Secrets in a Digital Image/Seoul, Korea (Keynote Speech at The 2012 4th International Conference on Awareness Science and Technology)/2012.08.21
- Visual Cryptography and Information Steganography/Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Signal, Image Processing and Applications)/2012.08.04
- The Design of Visual Cryptosystems/Taiyuan, China (Keynote Speech at The 2012 International Conference on Computing Measurement Control and Sensor Network)/2012.07.07
- Digital Watermarking and Its Applications/Zhengzhou, China (Keynote Speech at The 2012 International Conference on Computer and Communication Devices)/2012.06.03
- Emoticon-Based Text Steganography in Online Chat tools/Zhengzhou University of Light Industry, Zhengzhou, China/2012.06.03
- Digital Watermarking and Its Applications/Shanghai, China (Keynote Speech at The 2012 2nd International Conference on Future Computers in Education)/2012.06.01
- Embedding Secret Messages in Texts/Cebu, Philippines (Keynote Speech at The 2012 International Conference on Information Science and Industrial Applications)/2012.05.30
- Emoticon-Based Text Steganography in Online Chat tools/Department Computer Science and Information Engineering, National Taichung University of Scienceand Technology/2012.05.24
- Emoticon-Based Text Steganography in Online Chat tools/Department of Management Information Systems, National Chung Hsing University/2012.05.17
- Information Steganography Using Magic Matrix/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2012.05.14
- Embedding Secret Messages in Texts/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2012.05.14
- Visual Cryptography and Information Steganography/Guangzhou, China (Keynote Speech at The 2012 2nd International Conference on Business Management and Electronic Information)/2012.05.12
- Information Steganography Using Magic Matrix/Fujian Polytechnic Normal University (School of Mathematics and Computer Science), Fuqing, China/2012.05.10
- Information Steganography Using Magic Matrix/Fujian Normal University(School of Mathematics and Computer Science), Fuzhou, China/2012.05.09
- Recent Developments in Information Hiding/Nanchang, China (Keynote Speech at The 2012 2nd International Conference on Materials, Mechatronics and Automation)/2012.05.07
- Recent Developments in Hiding Information/Chengdu, China (Keynote Speech at The 2012 International Conference on Network and Computing Technology)/2012.05.06
- Secret Sharing Using Digital Image Shadows/Shanghai, China (Keynote Speech at The 2012 The 6th International Conference on Information Security and Assurance)/2012.04.28
- Rambling on about Research Methods/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2012.03.26
- Secret Image Sharing Systems/Shenzhen, China(Keynote Speech at The 2012 International Conference on Information and Industrial Electronics)/2012.03.25
- Information Steganography Using Magic Matrix/Department of Computer Science and Information Engineering, National Dong Hwa University/2012.03.16
- Recent Developments in Information Steganography/Asia University, Taiwan (Keynote Speech at The 2012 Information Security Workshop)/2012.03.15
- Rambling on about Research Methods/National Central University, Department of Computer Science and Information Engineering/2012.03.14
- Professor Chang’s Sayings/National Central University, Department of Computer Science and Information Engineering/2012.03.14
- Secret Sharing Using Digital Image Shadows/Hong Kong, China (Keynote Speech at The 2012 International Conference on Security Science and Technology)/2012.03.11
- Secret Sharing Using Digital Image Shadows/Macao, China (Keynote Speech at The 2012 International Conference on Innovative Computing, Information and Automation)/2012.03.02
- Authenticatable Visual Secret Sharing/Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Affective Computing and Intelligent Interaction)/2012.02.27
- Steganographic Methods Using Table Lookup Techniques/Sanya, China (Keynote Speech at The 2012 International Conference on Future Electrical Power and Energy Systems)/2012.02.22
- Steganographic Methods Using Table Lookup Techniques/Hong Kong, China (Keynote Speech at The 2012 International Conference on Information and Computer Applications)/2012.02.18
- Information Steganography Using Magic Matrix/Chengdu, China (Keynote Speech at The 2012 International Conference on Innovation and Information Management)/2012.01.08
- Rambling on about Research Methods/School of Information Science & Technology Southwest JiaoTong University, Chengdu, China/2012.01.06
- Information Steganography Using Magic Matrix/Department of Information Management National Chin-Yi University of Technology/2012.01.04
- A Genetic Algorithm for Density-Based Vector Quantization/Bangkok, Thailand (Keynote Speech at The 2011 2nd International Conference on Advances in Energy Engineering)/2011.12.27
- Information Steganography Using Magic Matrix/Department of Computer Science and Engineering, National Sun Yat-Sen University/2011.12.09
- Some Steganographic Methods Using Table Lookup Techniques/Chengdu, China (Keynote Speech at The 2011 International Conference on Networks and Information)/2011.11.26
- Secret Sharing Using Digital Image Shadows/Taichung, Taiwan (Keynote Speech at The 2011 Workshop on Consumer Electronics)/2011.11.11
- An Information Hiding Scheme Using Sudoku/Management Information Systems, National Chung-Hsing University/2011.11.10
- Secret Sharing Using Digital Image Shadows/Beijing, China (Keynote Speech at The 2011 SSITE International Conference on Computers and Advanced Technology in Education)/2011.11.03
- Introduction to Visual Cryptography/Department of Information Management, National United University/2011.10.27
- Professor Chang’s Sayings/Department of Information Management, National United University/2011.10.27
- Authenticatable Visual Secret Sharing/Wuhan, China (Keynote Speech at The 2011 International Symposium on Intelligence Information Processing and Trusted Computing)/2011.10.22
- The Road to Success/Shandong Technology and Business University, Yantai, China/2011.10.18
- Recent Developments in Information Hiding/Shandong Technology and Business University, Yantai, China/2011.10.18
- Authenticatable Visual Secret Sharing/Dalian, China (Keynote Speech at The 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing)/2011.10.14
- Information Steganography Using Magic Matrix/Intelligent Network Forum, Providence University/2011.10.07
- Recent Developments in Secret Image Sharing/Hong Kong, China (Keynote Speech at The 2011 International Conference on Internet Computing and Information Services)/2011.09.17
- An Information Hiding Scheme Using Sudoku/Tianjin, China (Keynote Speech at The 2011 2nd International Conference on electronics and Information Engineering)/2011.09.10
- Professor Chang’s Sayings/Beijing Jiaotong University, Beijing, China/2011.09.08
- Authenticatable Visual Secret Sharing/Beijing Jiaotong University, Beijing, China/2011.09.08
- Applying De-Clustering Concept to Information Hiding/Dalian University of Technology, Dalian, China/2011.08.30
- Professor Chang’s Sayings/Dalian University of Technology, Dalian, China/2011.08.30
- Information Steganography Using Magic Matrix/Yantai, China (Keynote Speech at The 2011 3rd International Conference on Signal Processing Systems)/2011.08.28
- Rapid Development of University Academics in China/Department Computer Science and Information Engineering, National Taichung Institite of Technology/2011.08.13
- Professor Chang’s Sayings/Department Computer Science and Information Engineering, National Taichung Institite of Technology/2011.08.13
- How to Create High Qualituy Academic Papers/Lanzhou University, Lanzhou, China/2011.08.02
- Scientific and Technological Paper Writing, Contributing, Publishing Essentials/Lanzhou University, Lanzhou, China/2011.08.02
- Professor Chang’s Sayings/Lanzhou University, Lanzhou, China/2011.08.02
- Authenticatable Visual Secret Sharing/Huangshi, China (Keynote Speech at The 2011 The 3rd International Conference on Information Technology and Computer Science)/2011.07.23
- Professor Chang’s Sayings/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2011.07.21
- Information Steganography Using Magic Matrix/Xiamen, China (Keynote Speech at The 2011 International Conference on Intelligent Information Processing)/2011.07.08
- Embedding Secret Messages in Digital Images/Zhengzhou, China (Keynote Speech at The 2011 International Conference on Computer and Network Engineering)/2011.06.18
- Authenticatable Visual Secret Sharing/Chengdu, China (Keynote Speech at The 2011 4th IEEE International Conference on Computer Science and Information Technology)/2011.06.10
- Walk the Two Sides to See the Academic Rise of the Mainland/Management Information Systems, National Chung-Hsing University/2011.05.19
- Professor Chang’s Sayings/Management Information Systems, National Chung-Hsing University/2011.05.19
- An Information Hiding Scheme Using Sudoku/Guangzhou, China (Keynote Speech at The 2011 The International Conference on Business Management and Electronic Information)/2011.05.14
- Secret Sharing Using Digital Image Shadows/Shanghai, China (Keynote Speech at The 2011 International Conference on Information Technology for Manufacturing Systems)/2011.05.07
- Embedding Secret Messages in Digital Images/Beijing, China (Keynote Speech at The 2011 The 1st International Conference on High Performance Structures and Materials Engineering)/2011.05.05
- Authenticatable Visual Secret Sharing/Northeastern University at Qinhuangdao(Institute of Internet of Things and Information Security), Panyang, China/2011.05.04
- Embedding Secret Messages in Texts/Chengdu, China (Keynote Speech at The 2011 International Conference on Advanced Materials and Computer Science)/2011.05.01
- Information Hiding Scheme Using Sudoku/Wuhan, China (Keynote Speech at The 2011 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing)/2011.04.23
- Transmission of Secret Messages Using Chat Tools/West Anhui University, Lu’an, China/2011.04.21
- Authenticatable Visual Secret Sharing/School of Computer Science and Technology, Anhui University, Hefei, China/2011.04.21
- Applying De-Clustering Concept to Information Hiding/Computer Science and Technology, Nanjing University of Information Science and Technology, Nanjing, China/2011.04.19
- Information Steganography Using Magic Matrix/Xianning, China (Keynote Speech at The 2011 The International Conference on Consumer Electronics, Communications and Networks)/2011.04.17
- Introduction to Visual Cryptography/Department of Computer Science and Information Engineering, National Chung Cheng University/2011.04.11
- How to Create High Quality Research Papers/I-Shou University/2011.03.23
- Visual Cryptography/Shanghai, China (Keynote Speech at The 2011 3rd International Conference on Computer Research and Development)/2011.03.12
- Recent Developments in Visual Cryptography/Macao, China (Keynote Speech at The 2011 2nd International Conference on Innovative Computing and Communication and 2011 2nd Asia-Pacific Conference on Information Technology and Ocean Engineering)/2011.03.06
- Introduction to Visual Cryptography/Taichung, Taiwan (Keynote Speech at The 2011 Information Education and Technological Application Conference)/2011.03.04
- Information Steganography Using Reference Matrices/National Central University, Department of Computer Science & Information Engineering/2011.03.02
- Information Steganography Using Reference Matrices/Hong Kong, China (Keynote Speech at The 2011 International Conference on Fuzzy Systems and Neural Computing)/2011.02.21
- Introduction to Visual Cryptography/Department of Computer Science and Engineering, National Chung-Hsing University/2011.01.14
- Visual Cryptography/Shanghai, China (Keynote Speech at The 2010 Second IITA International Joint Conference on Artificial Intelligence)/2010.12.26
- Applying De-Clustering Concept to Information Hiding/Chengdu, China (Keynote Speech at The 2010 International Conference on Information Security and Artificial Intelligence)/2010.12.18
- Visual Secret Sharing/Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China/2010.12.17
- Authenticatable Visual Secret Sharing/Chongqing, China (Keynote Speech at The 2010 International Conference on Parallel and Distributed Computing and Networks)/2010.12.13
- Visual Cryptography/Sanya, China (Keynote Speech at The 2010 International Conference on Future Information Technology and Computing)/2010.12.10
- An Information Hiding Scheme Using Sudoku/Nanning, China(Keynote Speech at The 2010 International Conference on Future Computer, Control and Communication)/2010.12.10
- Applying De-Clustering Concept to Information Hiding/The College of Information Engineering on XiangTan University, XiangTan, China/2010.12.09
- Visual Secret Sharing/The College of Information Engineering on XiangTan University, XiangTan, China/2010.12.09
- Authenticatable Visual Secret Sharing/Hangzhou, China (Keynote Speech at The 2010 2nd International Conference on Information Science and Engineering)/2010.12.05
- Information Steganography Using Magic Matrix/Wuhan, China (Keynote Speech at The 2010 3rd International Conference on Computational Intelligence and Industrial Application)/2010.12.04
- Authenticatable Visual Secret Sharing/Chiayi, Taiwan (Keynote Speech at The 2010 International Conference on Information Security Management)/2010.11.26
- How to Create High Quality Research Papers/Feng Chia University Libraries/2010.11.25
- Applying De-Clustering Concept to Information Hiding/Shenzhen, China (Keynote Speech at The 2010 International Conference on Circuit and Signal Processing)/2010.11.21
- Recent Developments in Visual Cryptography/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2010.11.20
- College Students’ Learning Experience and Career Planning/Guilin University of Technology, Guilin, China/2010.11.19
- Recent Developments in Visual Cryptography/Guilin, China (Keynote Speech at The 2010 Third Pacific-Asia Conference on Web Mining and Web-based Application)/2010.11.18
- How to Create High Quality Research Papers/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2010.11.18
- Visual Secret Sharing/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2010.11.18
- Emotion-based Text Steganography in Chat/Chengdu, China (Keynote Speech at The 2010 The 3rd International Conference on Computer and Electrical Engineering)/2010.11.17
- How to Create High Quality Research Papers/College of Computer Science Of Chongqing University, Chongqing, China/2010.11.15
- Visual Secret Sharing/College of Computer Science Of Chongqing University, Chongqing, China/2010.11.15
- Embedding Secret Information in Digital Images/Qingdao, China (Keynote Speech at The 2010 The Third International Symposium on Information Processing)/2010.11.13
- Embedding Secret Information in Digital Images/Qingdao University of Science and Technology, College of Information Science and Technology, Qingdao, China/2010.11.13
- Embedding Secret Information in Digital Images/Guangzhou, China (Keynote Speech at The 2010 International Symposium on Information and Automation)/2010.11.11
- Applying De-Clustering Concept to Information Hiding/Kaohsiung, Taiwan (Keynote Speech at The 2010 2nd International Conference on Computational Collective Intelligence)/2010.11.10
- Information Steganography Using Magic Matrix/Qinhuangdao, China (Keynote Speech at The 4th International Conference on Intelligent Information Technology Application)/2010.11.06
- Recent Developments in Information Hiding/Xiamen, China (Keynote Speech at The 2010 International Conference on Bio-inspired Systems and Signal Processing)/2010.10.26
- A Survey of Linguistic Steganography/Huanggang, China (Keynote Speech at The 2010 International Symposium on Intelligence Information Processing and Trusted Computing)/2010.10.24
- Authenticatable Visual Secret Sharing/Taiyuan, China (Keynote Speech at The 2010 International Conference on Computer Application and System Modeling)/2010.10.23
- Information Steganography Using Magic Matrix/Taiyuan University of Science and Technology, Taiyuan, China/2010.10.22
- Delivering Secret Message Using Chat Tools/Kunming, China (Keynote Speech at The 2010 International Conference on Management Science)/2010.10.19
- Delivering Secret Message Using Chat Tools/Kunming, China (Keynote Speech at The 2010 International Conference on Software and Computing Technology)/2010.10.18
- The New Developments in Message Embedding/Wuhan, China (Keynote Speech at 2010 International Conference on Information,Communication and Edcuation Application)/2010.10.17
- How to Create High Quality Research Papers/Department of Information Management, National Taichung Institite of Technology/2010.10.14
- Teaching Experience Sharing/Department of Information Management, National Taichung Institite of Technology/2010.10.14
- Recent Developments in Visual Cryptography/Taiyuan, China (Keynote Speech at 2010 International Conference on Computational Aspects of Social Networks)/2010.09.27
- Authenticatable Visual Secret Sharing/Chongqing, China (Keynote Speech at 2010 International Conference on Educational and Information Technology)/2010.09.18
- Authenticatable Visual Secret Sharing/Nanchang, China (Keynote Speech at The Second Asia-Pacific Conference on Information Processings)/2010.09.17
- How to Be a Successful Graduate Student/Department of Management Information Systems, National Chung Hsing University/2010.08.31
- Delivering Secret Messages Using Chat Tools/Changchun China (Keynote Speech at 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering)/2010.08.25
- Authenticatable Visual Secret Sharing/Yangzhou China (Keynote Speech at 2010 International Colloquium on Computing, Communication, Control, and Management)/2010.08.21
- Visual Cryptography/Jiaozuo, China (Keynote Speech at 2010 The Third International SymposiumComputer Science and Computational Technology)/2010.08.14
- How to Be a Successful Graduate Student/Department of Information Management, National Taichung Institute of Technology/2010.08.09
- Authenticatable Visual Secret Sharing/Taichung, Taiwan (Keynote Speech at 2010 The IET International Conference on Frontier Computing)/2010.08.04
- Visual Cryptography/Beijing, China (Keynote Speech at 2010 Second Pacific-Asia Conference on Circuits,Communications and System)/2010.08.02
- Visual Cryptography/Huangshan, China (Keynote Speech at 2010 The Third International Symposium on Electronic Commerce and Security)/2010.07.29
- An Information Hiding Scheme Using Sudoku/Qingdao, China (Keynote Speech at 2010 The IITA International Conference on Nanotechnology and Computer Engineering)/2010.07.21
- Sharing Secrets Using Visual Cryptography/Dalian, China (Keynote Speech at 2010 The International Joint Conference on Artificial Intelligence)/2010.07.11
- Authenticatable Visual Secret Sharing/Zhejiang, China (Keynote Speech at 2010 TThe 3rd IEEE International Conference on Ubi-media Computing)/2010.07.07
- Authenticatable Visual Secret Sharing/Hangzhou Dianzi University, Hangzhou, China/2010.07.05
- De-clustering and Its Application to Steganography/Hongkong, China (Keynote Speech at 2010 The Second International Conference on Communication Systems, Networks and Applications)/2010.06.30
- Recent Developments in Text Steganography/Qinhuangdao, China (Keynote Speech at 2010 The International Conference on Computer Design and Applications)/2010.06.26
- An Information Hiding Scheme Using Sudoku/Shanghai, China (Keynote Speech at 2010 The 2nd International Conference on Education Technology and Computer)/2010.06.23
- Rambling on about Research Methods/Shanghai Ocean University, Shanghai, China/2010.06.22
- Scientific and Technological Paper Writing, Contributing, Publishing Essentials/Optical-Electrical and Computer Engineering, Unversity of Shanghai for Science and Technology/2010.06.21
- Authenticatable Visual Secret Sharing/Chengdu, China (Keynote Speech at 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering)/2010.06.13
- The Road to Success/Kainan University/2010.06.07
- Embedding Information in Cover Digital Images Using Magic Matrices/Wuhan, China (Keynote Speech at 2010 International Conference on the Development of Educational Science and Computer Technology)/2010.05.30
- Self-growth of Young Scholars/Asia University/2010.05.27
- Recent Developments in Text Steganography/National Kinmen Institute of Technology/2010.05.21
- Visual Cryptography/Sanya, China (Keynote Speech at 2010 The 2nd International Conference on Modeling, Simulation and Visualization Methods)/2010.05.15
- Recent Developments of Visual Cryptography/Guangdong University of Finance and Economics, Foshan, China/2010.05.11
- An Information Hiding Scheme Using Sudoku/Wuhan, China (Keynote Speech at 2010 The IIS 2nd International Conference on Signal Processing, Robotics and Automation)/2010.05.10
- Emoticon-Based Text Steganography in Online Chat tools/Taiwan (Keynote Speech at 2010 The Forum of Consumer Electronics)/2010.05.07
- Image Steganography Using Magic Matrix/Tainan, Taiwan (Keynote Speech at 2010 International Symposium on Computer, Communication, Control and Automation)/2010.05.06
- New Developments in Visual Crypography/School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China/2010.04.27
- Rambling on about Research Methods/School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China/2010.04.27
- De-clustering and Its Application to Information Hiding/Kaifeng, China (Keynote Speech at 2010 International Conference on Machine Vision and Human-Machine Interface)/2010.04.25
- Recent Developments in Visual Cryptography/Wuhan, China (Keynote Speech at 2010 International Conference on Biomedical Engineering and Computer Science)/2010.04.24
- Self-growth of Young Scholars/School of Computer, Wuhan University, Wuhan, Hubei, China/2010.04.23
- Self-growth of Young Scholars/The School Physics and Telecommunication Englineering, South China Normal University, Guangzhou, China/2010.04.22
- Information Steganography Using Magic Matrix/The School Physics and Telecommunication Englineering, South China Normal University, Guangzhou, China/2010.04.22
- The Road to Success/School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou, China/2010.04.21
- Rambling on about Research Methods/Shunde Polytechnic, Foshan, China/2010.04.20
- Scientific and Technological Paper Writing, Contributing, Publishing Essentials/School of Electronics and Information Engineering, South China University of Technology, Guangzhou, China/2010.04.19
- Rambling on about Research Methods/School of Electronics and Information Engineering, South China University of Technology, Guangzhou, China/2010.04.19
- Recent Developments in Text Steganography/Shenzhen, China (Keynote Speech at 2010 Asia-Pacific Conference on Wearable Computing Systems)/2010.04.18
- Recent Developments in Information Hiding/Chengdu, China (Keynote Speech at 2010 The 2nd IEEE International Conference on Information Management and Engineering)/2010.04.17
- Recent Developments in Visual Cryptography/Jinggangshan, China (Keynote Speech at 2010 Third International Symposium on Intelligent Information Technology and Security Informatics)/2010.04.03
- The Road to Success/Jinggangshan University, Ji’an, China/2010.04.02
- A Technique of Embedding Digital Data in an Image Compression Code Reversibly/National Taichung Institute of Technology, Department of Information Management/2010.03.18
- A Virtual Image Cryptosystem Based upon Vector Quantization/Wuhan, China (Keynote Speech at 2010 International Conference on Challenges in Environmental Science and Computer Engineering)/2010.03.05
- De-clustering and Its Application to Steganography/Macao, China (Keynote Speech at 2010 International Conference on Information Technology for Manufacturing Systems)/2010.01.30
- A Technique of Embedding Digital Data in an Image Compression Code Reversibly/Sanya, China (Keynote Speech at the 2nd International Conference on Computer Modeling and Simulation)/2010.01.22
- A Technique of Embedding Digital Data in an Image Compression Code Reversibly/SKKU, Suwon, Korea (Keynote Speech at the 4th International Conference on Ubiquitous Information Management and Communication )/2010.01.14
- Recent Developments in Text Stegnography/Shanghai, China (Keynote Speech at the Second International Symposium on Information Science and Engineering)/2009.12.27
- Recent Developments in Information Hiding/Huangshan, China (Keynote Speech at the 2nd International Symposium Computer Science and Computational Technology)/2009.12.26
- A Data Hiding Method for Text Documents Using Multiple-Base Encoding/Sanya, China (Keynote Speech at 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science)/2009.12.12
- Steganographic Scheme Using Heuristic Codeword Assignment and Cascade-Shifting on VQ Image/Taipei, Taiwan (Keynote Speech at 2009 The 2nd IEEE International Conference on Ubi-media Computing)/2009.12.04
- Emoticon-Based Text Steganography in Online Chat tools/Wuhan, China (Keynote Speech at 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications)/2009.11.28
- Emoticon-Based Text Steganography in Online Chat tools/Huanggang Normal University, Huanggang, China/2009.11.28
- Recent Development of Information Hiding Steganography/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2009.11.26
- Embedding Data in a Wet Digital Image/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2009.11.26
- Emoticon-Based Text Steganography in Online Chat tools/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2009.11.26
- Emoticon-Based Text Steganography in Online Chat tools/Guangdong University of Finance and Economics, Foshan, China/2009.11.24
- Recent Development of Information Hiding Steganography/Guangdong University of Finance and Economics, Foshan, China/2009.11.24
- Rambling on about Research Methods/Guangdong University of Finance and Economics, Foshan, China/2009.11.24
- Emoticon-Based Text Steganography in Online Chat tools/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2009.11.23
- A Wet Image Data Hiding Scheme Based on Coordinate Modifications/Nanchang, China (Keynote Speech at the 3rd International Conference on Intelligent Information Technology Application)/2009.11.21
- Rambling on about Research Methods/Nanchang Hangkong University, Nanchang, China/2009.11.21
- Recent Development of Information Hiding Steganography/College of Electrical Science and Technology, Anhui University, Hefei, China/2009.11.19
- Emoticon-Based Text Steganography in Online Chat tools/College of Software, Dalian University of Technology, Dalian, China/2009.11.17
- Learning and Growing for a Graduate Student/College of Software, Dalian University of Technology, Dalian, China/2009.11.17
- Hiding Data in a Color Palette Image with Hybrid Strategies/College of Software, Dalian University of Technology, Dalian, China/2009.11.17
- Embedding Data in a Wet Digital Image/Department of Computer Science and Engineering, National Chung Hsing University/2009.11.13
- Recent Development of Information Hiding Steganography/Taichung, Taiwan (Keynote Speech at 2009 Workshop on Consumer Electronics)/2009.11.06
- Hiding Information in VQ Index Tables with Reversibility/Qingdao, China (Keynote Speech at the Second International Workshop on Computer Science and Engineering)/2009.10.29
- Recent Development of Information Hiding Steganography/College of Computer Engineering Institute, Qingdao University of Technology, Qingdao, China/2009.10.28
- Recent Development of Information Hiding Steganographysibility/Department of Management Information Systems, National Chung Hsing University/2009.10.23
- An Ingenious Data Hiding Scheme for Color Retinal Images/Guilin, China (Keynote Speech at the 3rd International Conference on Genetic and Evolutionary Computing)/2009.10.14
- Recent Development of Information Hiding Steganographysibility/Guilin University of Electronic Technology, Guilin, China/2009.10.14
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/College of Software, Dalian University of Technology, Dalian, China/2009.10.12
- Scientific and Technological Paper Writing, Contributing, Publishing Essentials/College of Software, Dalian University of Technology, Dalian, China/2009.10.12
- An Ingenious Data Hiding Scheme for Color Retinal Images/College of Software, Dalian University of Technology, Dalian, China/2009.10.12
- Recent Development of Information Hiding Steganography/College of Computer Science, Asia University/2009.09.24
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Department of Computer Science and Technology, Shanghai Jiao Tong University, Shanghai, China/2009.08.18
- Security Technologies on Communication Networks and Their Applications to Electronic Business/Forum on Future Computing, Nanjing/2009.08.15
- A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Shenyang, China (Keynote Speech at the Ninth International Conference on Hybrid Intelligent System)/2009.08.12
- An Image Authentication Scheme Using Magic Square/Beijing, China (Keynote Speech at the 2nd IEEE International Conference on Computer Science and Information Technology)/2009.08.08
- A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data/Sanya, China (Keynote Speech at the 2009 ETP/IITA World Congress in Applied Computing,Computer Science, and Computer Engineering)/2009.08.07
- Embedding Data in a Wet Digital Image Using Fully Exploiting Modification Directions/Kaohsiung, Taiwan (Keynote Speech at the 4th Joint Workshop on Information Security)/2009.08.06
- A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables/Shenzhen, China (Keynote Speech at Asia-Pacific Conference on Information Processing)/2009.07.18
- A Quadratic-residue-based Fragile Watermarking Scheme/Zhangjiajie, China (Keynote Speech at 2009 IITA International Conference on Services Science, Management and Engineering)/2009.07.11
- A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images/College of Software, Dalian University of Technology, Dalian, China/2009.06.09
- Rambling on About Research Methods/College of Software, Dalian University of Technology, Dalian, China/2009.06.09
- Recent Development of Information Hiding Steganography/College of Software, Dalian University of Technology, Dalian, China/2009.06.08
- A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes/College of Software, Dalian University of Technology, Dalian, China/2009.06.08
- A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes/Wuhan, China (Keynote Speech at International Conference on Computational Intelligence and Natural Computing)/2009.06.06
- A New Classification Mechanism for Retinal Images/Wuhan, China (Keynote Speech at the 2009 International Workshop on Intelligent Systems and Applications)/2009.05.24
- Hiding Information in Region-based Wet Images/Nanchang, China (Keynote Speech at International Symposium on Electronic Commerce and Security)/2009.05.22
- Self-growth of Young Scholars/School of Computer Science and Technology , Anhui University, Hefei, China/2009.05.21
- Recent Development of Information Hiding Steganography/Fuyang Normal College, Fuyang, China/2009.05.20
- A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes/School of Computer and Information, Hefei University of Technology, Heifei, China/2009.05.19
- Learning and Growing Together for Young Scholars/School of Computer and Information, Hefei University of Technology, Heifei, China/2009.05.19
- A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images/Chengdu, China (Keynote Speech at the 2009 International Symposium on Intelligent Ubiquitous Computing and Education)/2009.05.15
- Cheating Resistence for Secret Sharing/Wuhan, China (Keynote Speech at International Conference on Networdks Security, Wireless Communications and Trusted Computing)/2009.04.25
- Recent Development of Information Hiding Steganography/College of Computer Science, Yangtze University, Jingzhou, China/2009.04.23
- Cheating Resistence for Secret Sharing/College of Computer Science, Shanghai University, Shanghai, China/2009.04.21
- The New Developments in Information Hiding/Suzhou Institute for Advanced Study of University of Science and Technology of China, The 3rd Ph.D. Student Workshop ( invited speaker ), Suzhou, China/2009.04.16
- Hiding Data in a Color Palette Image with Hybrid Strategies/The Department of Electronic Engineering, National Kaohsiung University/2009.04.06
- Graduate Students’ Learning and Growth/The Department of Computer Science and Engineering, National Chung-Hsing University/2009.03.27
- Recent Development of Information Hiding Steganography/Computer Science and Information Engineering University/2009.03.20
- Recent Development of Information Hiding Steganography/Department of Information Management, Southern Taiwan University/2009.03.18
- Recent Development of Information Hiding Steganography/National Chung Cheng University/2009.03.11
- Graduate Students’ Learning and Growth/Department of Computer Science & Information Management, Providence University/2009.02.27
- Recent Development of Information Hiding Steganography/School of Information technology, Ming Chuan University/2009.02.20
- A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images/Nha Trang, Vietnam (Keynote Speech at the Second International Conference on Theories and Applications of Computer Science)/2009.02.06
- The Design of E-Traveler's Check with Efficiency and Mutual Authentication/Sung Kyun Kwan University (Keynote Speech at the First International Conference on Ubiquitous Information Management and Communication)/2009.01.15
- Recent Development of Information Hiding Steganography/Fudan University, Shanghai, China/2008.12.23
- Recent Development of Information Hiding Steganography/University of Shanghai for Science and Technology, Shanghai, China/2008.12.23
- Rambling on About Research Methods/University of Shanghai for Science and Technology, Shanghai, China/2008.12.23
- A High Capacity Reversible Data Hiding Scheme for Annotation/Shanghai, China (Keynote Speech at the 2008 IEEE International Symposium on Intelligent Information Technology Application)/2008.12.22
- Recent Development of Information Hiding Steganography/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2008.12.22
- Lossless Compression Schemes of Vector Quantization Indices Using State Codebook/Shanghai, China (Keynote Speech at the 2008 International Symposium on Computer Science and Computational Technology)/2008.12.21
- Secret Image Sharing with Reversible Steganography/Wuhan, China (Keynote Speech at the 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application)/2008.12.19
- Steganographic Mechanisms with Reversibility and Irreversibility/Department of Computer Science and Information Engineering, National Chung Cheng University/2008.11.17
- Self-growth of Young Scholars/Department of Computer Science and Information Engineering, National Chung Cheng University/2008.11.17
- A Restricted Region-based Data-hiding Scheme/Hangzhou, China (Keynote Speech at the 11th International Conference on Communication Technologies)/2008.11.10
- Key to Be a Successful Graduate Student/Anhui University, Hefei, China/2008.11.07
- Recent Development of Information Hiding Steganography/West Anhui University, Luan, China/2008.11.07
- Rambling on About Research Methods/Hefei University of Technology, Heifei, China/2008.11.06
- Recent Development of Information Hiding Steganography/Hefei University of Technology, Heifei, China/2008.11.06
- Science and Technology Research Methodology/Renmin University of China, Beijing, China/2008.11.05
- Recent Development of Information Hiding Steganography/Renmin University of China, Beijing, China/2008.11.05
- Hiding Data in a Color Palette Image with Hybrid Strategies/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2008.11.04
- How to Be a Successful Graduate Student/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2008.11.04
- Recent Development of Information Hiding Steganography/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2008.11.04
- Recent Development of Information Hiding Steganography/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2008.11.04
- Security and Privacy in Pervasive/Ubiquitous Computing Systems/Forum on Future Computing, Beijing, China/2008.11.01
- Recent Development of Information Hiding Steganography/Forum on Future Computing, Beijing, China/2008.11.01
- Recent Development of Information Hiding Steganography/College of Computing and Informatics, Providence University/2008.10.24
- Recent Development of Information Hiding Steganography/Department of Information Management, Chang Gung University/2008.10.18
- Clustering and Its Applications to Steganography/Department of Information Management, Chang Gung University/2008.10.18
- De-clustering and Its Applications to Steganography/Department of Information Management, Chang Gung University/2008.10.18
- Rambling on About Research Methods/Department of Information Management, Chang Gung University/2008.10.18
- Hiding Data in a Color Palette Image with Hybrid Strategies/Department of Computer Science and Engineering, National Chung Hsing University/2008.10.17
- Rambling on About Research Methods/Yuan Ze University/2008.10.15
- Recent Development of Information Hiding Steganography/Overseas Chinese Institute of Technology/2008.10.14
- An Innovative Steganographic Scheme Based on Vector Quantization/Yangtze University (Keynote Speech at the Second International Conference on Genetic and Evolutionary Computing), Jingzhou, China/2008.09.25
- Hiding Data in a Color Palette Image with Hybrid Strategies/Wuhan University, Wuhan, Hubei, China/2008.09.24
- Recent Developments on Image Steganography/Wuhan University, Wuhan, Hubei, China/2008.09.24
- Recent Development of Information Hiding Steganography/Jiaxing University, Jiaxing, China/2008.09.22
- The Road to Success/Department of Management Information Systems, National Chung Hsing University/2008.09.19
- Hiding Data in a Color Palette Image with Hybrid Strategies/Department of Information Management, Chang Gung University/2008.09.16
- Some Novel Steganographic Methods for Digital Images/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2008.08.07
- A High Payload Steganographic Scheme Based on (7, 4) Hamming Codes for Digital Images/Guangzhou, China (Keynote Speech at International Symposium on Electronic Commerce and Security)/2008.08.04
- Innovative Information Hiding for Digital Media/Lanzhou, China (Keynote Speech at the First International Conference on Ubi-media)/2008.07.16
- Rambling on About Research Methods/School of Information Science and Engineering, Lanzhou University, Lanzhou, China/2008.07.15
- Graduate Students’ Learning and Growth/School of Information Science and Engineering, Lanzhou University, Lanzhou, China/2008.07.15
- Image Hiding Technology/School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China/2008.06.18.
- An Information Hiding Scheme Using Sudoku/Dalian, China (Plenary Speech at The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008))/2008.06.18
- Rambling on About Research Methods/School of Computer Science and Technology, Anhui University, Hefei, China/2008.06.16
- Rambling on About Research Methods/Institute of Mechanical and Electro-Mechanical Engineering, National Formosa University/2008.06.11
- College Students’ Learning Experience and Career Planning/College of Engineering, Da-Yeh University/2008.05.21
- Sharing Experience about The Academic Achievements for Young Scholars/Department of Information Engineering and Computer Science, Feng Chia University/2008.04.22
- Improving Research Efficiency: the Strategy and Skills/Taiwan Assessment and Evaluation Association (National Taiwan University of Science and Technology)/2008.04.11
- Rambling on About Research Methods/Department of Computer Science and Information Engineering, Tamkang University/2008.04.09
- Rambling on About Research Methods/Department of Computer & Information Science, Aletheia University/2008.04.09
- How to Improve Research Efficiency and Skills/College of Informatics, Chaoyang University of Technology/2008.04.08
- How to Be Successful Information Technology People/Department of Information Management Science, Chung Shan Medical University/2008.03.17
- Using Nearest Cover Codes to Embed Secret Information in Gray-scale Images/Sungkyunkwan University, Seoul, Korea/2008.01.31
- An Image Compression Scheme Based on Locally Adaptive Coding/Asia University (Keynote Speech at IEEE International Symposium on Multimedia)/2007.12.10
- Rambling on About Research Methods/Department of Information Management, Dayeh University/2007.11.29
- Rambling on About Research Methods/Graduate Institute of Information and Computer Education, National Kaohsiung Normal University/2007.11.26
- How to Be Successful Information Technology People/Department of Computer Science and Information Engineering, National Chin-Yi University of Technology/2007.11.22
- Graduate Students’ Learning and Growth/College of Engineering, National Chin-Yi University of Technology/2007.11.21
- Reversible Data Hiding Scheme Using Two Steganography Images/Taipei International Convention Center (Invited Speech at IEEE TENCO 2007)/2007.10.31
- A Low Bit Rate Vector Quantization Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking/School of Computer Science & Technology, Anhui University, Hefei, China/2007.10.17
- Information Hiding Techniques/School of Computer Science & Technology, Anhui University, Hefei, China/2007.10.17
- A Low Bit Rate Vector Quantization Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking/Shandong University, China (Keynote Speech at the 3rd Joint Conference on Harmonious Human Machine Environment)/2007.10.15
- College Students’ Learning Experience and Career Planning/National Kaohsiung University/2007.10.09
- Hashing Technology: Past, Now and the Future/Department of Computer Science & Information Management, Providence University/2007.10.05
- Hashing Technology: Past, Now and the Future/College of Computer Science, Asia University/2007.10.04
- Introduction to Lossless Watermarking Technology/Department of Computer Science and Information Engineering, National Chung Cheng University/2007.10.01
- Image Hiding Technology/Department of Computer Science and Information Engineering, National Taichung University/2007.09.28
- Image Hiding Technology/Department of Information Management Science, Chung Shan Medical University/2007.09.21
- The Development of File Structures/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.23
- A Data Hiding Scheme Based upon Block Truncation Coding/School of Information Technology, University of Natural Sciences in Ho Chi Minh City, Vietnam/2007.07.23
- A Robust and Recoverable Tamper Proofing Technique for Image Authentication/School of Information Technology, University of Natural Sciences in Ho Chi Minh City, Vietnam/2007.07.23
- Declustering and Its Application to Information Hiding/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.20
- Hiding Secret Information in Color Images/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.20
- Hashing Technology: Past, Now and Future/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.19
- Information Hiding Techniques/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2007.06.28
- Rambling on About Research Methods/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2007.06.28
- Information Hiding Techniques/School of Computer Science, Beihang University, Beijing, China/2007.06.26
- Rambling on About Research Methods/School of Computer Science, Beihang University, Beijing, China/2007.06.26
- Innovative Steganography for Digital Media/Forum on Future Computing, Beijing, China/2007.06.24
- Information Hiding Techniques/Department of Computer Science and Technology, Beijing Tsinghua University, Beijing, China/2007.06.22
- Hiding Secret Information in Color Images/School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China/2007.06.22
- Innovative Steganography for Digital Media/School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China/2007.06.22
- An Information Hiding Technique Based on De-clustering/International Web Intelligence Consortium (WIC) Institute, Beijing University of Technology, Beijing, China/2007.06.21
- The Outlet for Undergraduates Majoring in Information Security/Department of Computer Science, Sun Yat-Sen University, Guangzhou, China/2007.06.20
- Hiding Secret Information in Color Images/School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China/2007.06.19
- Innovative Steganography for Digital Media/School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China/2007.06.19
- Self-growth of Young Scholars/College of Informatics, Chaoyang University of Technology/2007.06.12
- College Students’ Learning Experience and Career Planning/Feng Chia University/2007.06.04
- The Recent Development of Information Security/Central Taiwan University of Science and Technology/2007.05.16
- Science and Technology Research Methodology/College of Engineering, National Chin-Yi University of Technology/2007.04.18
- Introduction to Color Image Hiding Technology/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
- Introduction to Visual Cryptography/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
- Introduction to Secret Image Sharing Technology/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
- Digital Watermark Technology/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
- Self-growth of Young Scholars/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
- Introduction to Color Image Hiding Technology/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2007.04.10
- Introduction to Color Image Hiding Technology/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
- Introduction to Visual Cryptography/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
- Introduction to Secret Image Sharing Technology/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
- Digital Watermarking Technology/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
- Introduction to Color Image Hiding Technology/College of Computer Science and Technology, Zhejiang University, Hangzhou, China/2007.04.06
- Introdiction to Lossless Watermarking Technology/Department of Computer Science and Information Engineering, Tamkang University/2007.03.15
- How to Balance Teaching and Research/National Kaohsiung Normal University/2007.03.09
- Introdiction to Lossless Watermarking Technology/Department of Electronics Engineering, National Kaohsiung University of Applied Sciences/2007.03.09
- Graduate Student Learning and Growth/Leader University/2007.03.07
- How to Be Successful Information Technology People/Kun Shan University/2007.03.07
- Hiding Secret Information in a Color Palette Image with Hybrid Strategies/Sung Kyun Kwan University(Keynote Speech at First International Conference on Ubiquitous Information Management and Communication ) /2007.02.08
- Information Hiding Techniques/National University of Singapore/2007.01.12
- Information Hiding Techniques/Nanyang Technological University, Singapore/2007.01.10
- How to Be a Successful Information Systems Manager/Department of Information Management, National Chin-Yi University of Technology/2006.12.28
- How to Be a Successful Graduate Student/Department of Computer Science and Information Engineering, National Chung Cheng University/2006.12.11
- Information Hiding Techniques/Nan Kai Institute of Technology (Keynote Speech at 2006 International Conference on Information Industry)/2006.11.21
- How to Write the Perfect Project /Department of Computer Science and Information Engineering, Da-yeh University/2006.11.09
- Key to Be a Successful Graduate Student/Computer Science and Information Engineering, Tunghai University/2006.11.08
- Information Hiding Technology Based on SMVQ/College of Communications Engineering , Xidian University, Xian, China/2006.10.26
- Graduate Student Learning and Growth/College of Communications Engineering , Xidian University, Xian, China/2006.10.26
- Clustering and Its Applications to Steganography/College of Communications Engineering , Xidian University, Xian, China/2006.10.24
- De-clustering and Its Applications to Information Hiding/College of Communications Engineering , Xidian University, Xian, China/2006.10.24
- Information Hiding Techniques/Department of Computing and Information Technology and Network and Information Engineering Center, Fudan University, Shanghai, China/2006.10.20
- Graduate Student Learning and Growth/Department of Computing and Information Technology and Network and Information Engineering Center, Fudan University, Shanghai, China/2006.10.20
- Information Hiding Tecnique Based on De-clustering/College of Computer Science and Technology, Huazhong University of Science and Technology/2006.10.19
- Graduate Student Learning and Growth/College of Computer Science and Technology, Huazhong University of Science and Technology/2006.10.19
- How to Be a Successful Graduate Student/College of Informatics, Chaoyang University of Technology/2006.10.17
- How to Be a Successful Graduate Student/Department of Computer Science and Information Management, Providence University/2006.10.13
- How to Be a Successful Graduate Student/Graduate Institute of Information and Computer Education, National Kaohsiung Normal University/2006.10.04
- How to Be a Successful Graduate Student/Department of Electronic Engineering, National Kaohsiung University of Applied Sciences/2006.10.04
- The Learning and Growth of Dectoral/College of Busuness, Feng Chia University/2006.09.21
- Clustering and Its Applications to Steganography/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2006.09.02
- De-clustering and Its Applications to Information Hiding/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2006.09.02
- Rambling on about Research Methods/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2006.09.02
- Information Hiding Technology Based on SMVQ/Information Security Research Center, Beijing University of Posts and Telecommunication/2006.08.30
- Information Hiding and Its Applications/Beijing Jiaotong University(Tutorial Speech at 2006 International Conference on Innovative Computing, Information and Control), Beijing, China/2006.08.29
- Rambling on about Research Methods/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2006.08.29
- Recent Researches and Developments on Computer Science and Technology in Taiwan/Department of Computer Science and Technology, Jilin University, Jilin, China/2006.08.12
- Information Hiding Tecnique Based on De-clustering/Harbin Institute of Technology(Keynote Speech at the 6th China Information Hiding and Multimedia Security), Harbin, China/2006.08.07
- Rambling on about Research Methods/Information Security Technique Research Center and Superintendent of Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin, China/2006.08.05
- Clustering and Its Applications to Steganography/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2006.06.19
- De-clustering and Its Applications to Information Hiding/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2006.06.19
- Self-growth of Young Scholars/Department of Information Management, National Taichung Institite of Technology/2006.04.19
- Introduction to the Security of Electronic Business/Hotel National Taichung (Seminar Sponsored by ARES International Corporation)/2006.04.19
- De-clustering and Its Applications to Information Hiding/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2006.04.05
- Information Hiding Technology Based on SMVQ/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2006.04.05
- Introduction to Steganography/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2006.04.05
- De-clustering and Its Applications to Information Hiding/Department of Computer Science and Information Management, Providence University/2006.03.24
- Rambling on about Research Methods/Department of Computer Science and Information Engineering, ChungChou Institute of Technology/2006.03.15
- De-clustering and Its Applications to Information Hiding/Department of Computer Science, National Chung Hsing University/2006.03.10
- Introduction to Image Hiding Technique/Department of Computer Science and Information Engineering, Asia University/2006.03.01
- The Road to Success/Feng Chia University/2005.12.6
- Self-growth of Young Scholars/Department of Computer Communication Engineering, Chienkuo Technology University/2005.12.22
- The Road to Success/Department of Computer Science and Information Management, Providence University/2005.12.20
- De-clustering and Its Applications to Steganography/Department of Information Engineering and Computer Science, Feng Chia University/2005.12.08
- Self-growth of Young Scholars/College of Information and Electrical Engineering, Feng Chia University/2005.12.08
- Introduction to De-clustering and Steganography/Department of Computer Science and Information Technology, National Taichung Institute of Technology/2005.11.16
- De-clustering and Its Applications to Steganography/Department of Electrical Engineering, National Kaohsiung University of Applied Sciences/2005.11.14
- Graduate Study and Growth/The Graduate School of Multimedia Design, National Taichung Institute of Technology/2005.11.08
- Key to Success in Academic Research/Department of Applied Mathematics, National Chung Hsing University/2005.11.03
- My Work Experience/Stella Matutina Girls’ High School/2005.10.13
- Introduction to Color Image Steganography/Department of Computer Science and Information Engineering, National Chiayi University/2005.09.29
- Key to Success in Academic Research/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2005.09.22
- An Adaptive Data Hiding Scheme for Palette Images/The first International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, Hilton on the Park-Melbourne of Australia/2005.09.15
- Introduction to Image Steganography/The Legislative Yuan of Republic of China/2005.09.06
- Introduction to Color Image Steganography/Department of Information Engineering and Computer Science, Feng Chia University /2005.09.05
- Key to Success in Academic Research/Department of Computer Science and Information Engineering, Chung Hua University/2005.05.30
- Start a Bright Life/Department of Computer science and Information Management, Providence University/2005.05.06
- Start a Bright Life/Department of Computer science and Information Management, Providence University/2005.04.26
- Key to Success in Academic Research/Feng Chia University/2005.03.08
- Key to Success in Academic Research/China Medical University/2005.01.19
- Digital Image Steganography/College of Informatics, Chaoyang University of Technology/2005.01.04
- My Work Experience/National United University/2004.12.29
- Digital Image Steganography/Department of Computer Science, National Chengchi University/2004.12.14
- Digital Image Steganography/Department of Computer Science, National Chiao Tung University/2004.12.09
- My Work Experience/Department of Computer Science and Information Management, Providence University/2004.12.07
- Digital Image Steganography/Information Management, National Kaohsiung University of Applied Science/2004.12.06
- Digital Image Steganography/Department of Information and Communication, Southern Taiwan University/2004.12.06
- Digital Signature and Its Applications to Electronic Business/Department of Computer Science and Information Engineering, National Taichung Institute of Technology/2004.11.25
- Introduction to Image Steganography/Computer science and Information Management, Providence University/2004.11.07
- Digital Image Steganography/Department of Electronic Engineering, National Taiwan University of Science and Technology/2004.10.04
- Introduction to Steganography for Multimedia/Department of Computer Science and Information Engineering, National Changhua University of Education /2004.09.24
- Rambling on the Academic Career/Department of Information Management, National Taichung Institute of Technology /2004.08.11
- Hiding a Secret Image in a Cover Image/Ewha Womans University, South Korea/2004.07.12
- Information Hiding Techniques/National Security Bureau/2004.06.23
- Develop a Correct Academic Outlook/College of Science & Technology, National Chi Nan University, Guangzhou, China/2004.06.04
- Information Security Techniques- Steganography/Chang Gung University/2004.05.29
- Information Hiding Techniques- Steganography/Department of Computer Science & Information Management, Providence University/2004.05.28
- Information Hiding Techniques- Steganography/Department of Computer Science, National Tsing Hua University/2004.05.19
- Security Techniques and Applications for Electronic Commerce/Department of Information Management, Tatung Institute of Commerce and Technology/2004.05.06
- Information Hiding Techniques- Steganography/Graduate Institute of Computer Science, National Chung Hsing University/2004.04.02
- Develop a Correct Academic Outlook/Graduate Institute of Computer Science, National Chung Hsing University/2004.04.02
- The Road to Success/National Changhua University of Education/2004.03.26
- Key to Success in Academic Research/Chaoyang University of Technology/2003.12.23
- How to Fast Computation of Exponents/Tsinghua University, Beijing, China/2003.12.19
- Information Hiding Techniques- Steganography/Tsinghua University, Beijing, China/2003.12.18
- A Technique that Takes Care of Image Compression and Information Hiding/Tsinghua University, Beijing, China/2003.12.18
- Rambling on about Research Methods/School of Computer Science and Telecommunications Engineering, JiangSu University, Wuxi, China /2003.12.16
- Information Hiding - Steganography/School of Computer Science and Telecommunications Engineering, JiangSu University, Wuxi, China /2003.12.15
- A Technique that Takes Care of Image Compression and Information Hiding/School of Computer Science and Telecommunications Engineering, JiangSu University, Wuxi, China /2003.12.15
- A Secret Information Hiding Scheme Based on Switching Tree Coding/Institute of Information Science, Academia Sinica/2003.12.05
- The Road to Success/Chungtai Institute of Health Sciences and Technology/2003.11.26
- Look at the Future through College/Department of Information Management, National Huwei Institute of Technology/2003.11.12
- Develop a Correct Academic Outlook/Department of Information Science and Management, Providence University/2003.11.07
- Develop a Correct Academic Outlook/Department of Computer Science and Information Engineering, National Chung Cheng University/2003.09.04
- Digital Watermark Technology/Industrial Technology Research Institute of Taiwan, ROC/2003.08.21
- On research Methodology from Information Hiding/Department of Computer Science & Information Management, Providence University/2003.05.23
- Information Hiding Methodology/National Huwei Institute of Technology/2003.04.30
- On research Methodology from Information Hiding /Department of Computer Science and Information Engineering, National Dong Hwa University/2003.04.25
- The Recent Development of Information Security /Keynote of General Education , National Chung Hsing University/2003.04.11
- From Image Compression to Digital Watermarking/Department of Information Management, National Taichung Institute of Technology/2003.03.21
- Image Compression/Department of Computer Science & Information Management, Providence University/2003.03.18
- The Road to Success/National Huwei Institute of Technology/2003.03.06
- Image Hiding Technology/Department of Information Engineering, National Chiao Tung University/2002.12.26
- The Road to Success/College of Management, Chaoyang University of Technology/2002.12.24
- An Image Database Retrieval Scheme Based upon Multivariate Analysis and Data Mining/2002 International Computer Symposium, National Dong Hwa University(Keynot Speech)/2002.12.20
- Embedded Watermarking/Tsinghua University, Beijing, China/2002.12.12
- Digital Image Authentication/Tsinghua University, Beijing, China/2002.12.12
- Non-embedded Watermarking/Tsinghua University, Beijing, China/2002.12.11
- Visual Cryptography/Tsinghua University, Beijing, China/2002.12.10
- Digital Image Hiding/Tsinghua University, Beijing, China/2002.12.10
- Mathematics and Informational Engineering /Department of Computer Science & Information Engineering, National Chung Cheng University/2002.12.03
- The Road to Success/Department of Computer Science & Information Management, Providence University/2002.11.26
- Image Hiding Techniques/Tokyo Denki University/2002.11.07
- The Road to Success/Department of Computer Science and Information Engineering, Tamkang University/2002.10.31
- Color Visual Cryptography/Department of Computer Science & Information Management, Providence University/2002.05.10
- Application of Mathematics in Computer Science/St. John's & St. Mary's Institute of Technology/2002.04.26
- Digital Image Authentication/Department of Computer Science and Information Engineering, Tamkang University/2002.04.25
- Digital Watermarking Techniques/Department of Computer Science and Information Engineering, Tamkang University/2002.04.24
- Information Hiding Techniques /Department of Computer Science and Information Engineering, Tamkang University/2002.04.23
- The Road to Success/National Chung Cheng University/2002.03.20
- Data Structure and Chinese Remainder Theorem/Department of Computer Science and Information Engineering, Da-Yeh University/2002.03.07
- Issues on Network Security and Crime7/Jean-Nan Primary School/2002.01.23
- Efficient Indexing of Chinese Words by Pinyin/Department of Computer Science & Information Management, Providence University/2002.01.08
- The Road to Success/Mingdao Management College/2001.12.26
- Introduction to Cryptanalysis/Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University/2001.11.30
- Data Structure and Chinese Remainder Theorem/Department of Computer Science & Information Management, Providence University/2001.11.09
- How to Get Ahead/Taichung Healthcare and Management University/2001.11.06
- Experiences in Designing a Simple Database Management System/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2001.10.31
- Key to Success in Academic Research/College of Computer Engineering, Wuhan University, Wuhan, Hubei, China/2001.10.30
- Key to Success in Academic Research/Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology/2001.10.08
- The Road to College/Taichung Second Senior High School/2001.09.26
- Security Issues and Strategies for Electronic Commerce (EC)/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Authentication Mechanisms/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Popular Encryption Schemes/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Digital Signature Technology/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Image Hiding Technology/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Visual Cryptography/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Digital Watermark Technology/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
- Visual Cryptography/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
- Color Image Hiding/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
- Image Hiding Based on Color Difference/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
- Hiding Images Using Dynamic Bit-Replacement and Human Visual System/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
- Hiding Binary Images Using BFT Linear Quadtrees/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
- Hiding Images Using Dynamic Bit-Replacement and Human Visual System/Department of Computer Science and Information Systems, the University of Hong Kong, Hong Kong, China/2001.04.03
- Hiding Images Using Dynamic Bit-Replacement and Human Visual System/National Chi Nan University (China-France Multimedia Conference Keynote Speech), Guangzhou, China/2001.03.20
- Key to Success in Academic Research/Graduate School of Mechanical Engineering, National Chung Hsing University/2001.03.07
- Digital Watermark Technology/National Taichung Institute of Technology/2001.01.05
- Digital Watermark Technology/Department of Computer Science & Information Management, Providence University/2001.01.02
- Some Watermarking Techniques on Internet/National Kaohsiung University of Applied Sciences/2000.12.26
- Digital Watermark Technology/Graduate School of Applied Mathematics, National Chung Hsing University/2000.12.22
- Some Watermarking Techniques on Internet/Department of Computer Science and Engineering, National Sun Yat-Sen University/2000.11.22
- A Method for Protection Digital Images from Being Copied Illegally/Chung-Chou Institute of Technology/2000.11.11
- Key to Success in Academic Research/Department of Computer Science and Information Engineering, National Chiayi University/2000.11.06
- Design of the Fast Chinese Indexing System with Boshiamy Input Method/Department of Information Engineering and Computer Science, Feng Chia University/2000.10.31
- The Development of Internet and Its Applications in Taiwan/Ewha Womans University, South Korea/2000.10.17
- Design of the Fast Chinese Indexing System with Boshiamy Input Method/Department of Computer Science and Information Management, Providence University/2000.10.13
- Some Techniques of Digital Watermarking on Internet/The Institution of Electrical Engineers, Hong Kong/2000.09.28
- An Image Protection Scheme Based on Discrete Cosine Transformation/Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China/2000.09.28
- A New Scheme for Sharing Secret Color Images in Computer Network/2000 IEEE International Conference on Parallel and Distributed System(2000ICPADS) by Iwate Prefectureal University, Japan/2000.07.06
- Security Issues and Strategies for Electronic Commerce (EC)/National Taichung Institute of Technology/2000.06.23
- Image Hiding/Department of Computer Science and Information Engineering, National Chi Nan University, Guangzhou, China/2000.06.02
- Image Hiding and Visual Cryptography/Graduate Institute of Electrical Engineering, National Taiwan University/2000.05.22
- Security Issues and Strategies for Electronic Commerce (EC)/Rotary Club of Taichung Pei-Tuen District (at Hotel National Taichung)/2000.05.19
- Security Issues and Strategies for Electronic Commerce (EC)/Ta-Te Industrial and Home Ecnomical Senior Vocational School/2000.05.15
- Security Issues and Strategies for Electronic Commerce (EC)/United World Chinese Commercial Bank (at Hotel National Taichung)/2000.05.12
- Digital Watermark Technology/Department of Information and Computer, National Taiwan Normal University/2000.05.01
- Key to Success in Academic Research/Department of Computer Science and Information Engineering, Tamkang University/2000.04.18
- Key to Success in Academic Research/Department of Information Management, National Taichung Institute of Technology/2000.04.01
- Present Situation and Prospect of Information Education/Pei-Men Senior Vocational School of Agriculture and Industrial/2000.03.30
- Intellectual Property Protection Techniques for Images/Van-Nung Institute of Technology/2000.03.21
- How to Write a Research Report/Department of Information Management, National Taichung Institute of Technology/2000.01.15
- Digital Watermark Technology/Department of Business Education, National Changhua University of Education/1999.12.15
- Mysterious Red Envelope/BCC- The Words of Wisdom/1999.11.15
- Progressive Image Transimssion Based on Bit-Plane Method/Department of Computer Science & Information Management, Providence University/1999.11.02
- Progressive Image Transmission Technology/Department of Computer Science and Information Engineering, National Cheng Kung University/1999.10.29
- A New Scheme of Progressive Image Transimssion Based on Bit-Plane Method/Beijing University of Posts and Telecommunications, Beijing, China/1999.10.21
- A Block Based Digital Watermarks for Copy Protection of Images/Beijing University of Posts and Telecommunications, Beijing, China/1999.10.21
- A Technique for Image Hiding/Graduate School of Information System, Department of Computer Software, The University of Aizu, Japan/1999.09.21
- Progressive Image Transmission Technology/Department of Chemistry, National Taiwan Normal University/1999.07.19
- Progressive Image Transmission Technology/Department of Computer Science and Information Engineering, National Central University/1999.07.14
- Information and E-commerce/Extension Education Center of Chinese Culture University/1999.06.24
- A Progressive Codebook Training Algorithm for Image Vector Quantization/Central Police University (The Tenth International Conference on Information Management)/1999.06.04
- The Qualities of a Successful Technologist/College of Science and Engineering, I-Shou University/1999.06.02
- Security Issues and Strategies for Electronic Commerce (EC)/Chungtai Institute of Health Science and Technology/1999.05.29
- Image Hiding/Hua-Fan University/1999.05.19
- Watermarking Using Visual Cryptography/Chaoyang University of Technology (National Information Security Conference-Keynote Speech) /1999.05.15
- Image Hiding/Department of Computer Science and Information Engineering, National Chiao Tung University/1999.05.13
- The Road to Success/Ming-Chuan University/1999.05.03
- Secret Sharing of Image Data and Its Applications/Department of Computer Science and Information Engineering, Tamkang University/1999.04.29
- Image Hiding/Tunghai University, Department of Computer Science Information Engineering/1999.04.14
- How to Get Ahead/College of Electrical and Information Engineering, I-Shou University/1999.04.14
- How to Get Ahead/Chin-Yi Institute of Technology and Commerce/1999.04.01
- The Development of Information Education/Department of Business Education, National Changhua University of Education/1999.03.17
- Image Hiding/Department of Information Management, Chaoyang University of Technology/1999.03.12
- Key to Success in Academic Research/Department of Industrial Education, National Taiwan Normal University/1999.03.10
- Image Hiding/Department of Computer Science and Information Management, Providence University/1999.03.02
- Image Hiding Technology/National Security Bureau, Republic of China/1999.02.25
- Key to Success in Academic Research/Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University/1998.12.15
- Chinese Calligraphy Compression Using New S-tree Sructure/Beijing University of Posts and Telecommunications, Beijing, China/1998.11.18
- A Sheme for Obtaining a Message from the Digital Multi-Signature/Beijing University of Posts and Telecommunications, Beijing, China/1998.11.17
- The Road to Success/Department of Electrical Data Processing, National Taichung Institude of Commerce/1998.11.07
- Digital Watermarking/Chang Gung University/1998.10.18
- Applications of Mathematics in Information Science/Ming-Dao High school/1998.10.09
- Digital Watermarking/Kyoto University, Japan/1998.07.03
- Key to Success in Academic Research/Department of Applied Mathematics, National Chung Hsing University/1998.05.21
- Techniques of Designing Digital Watermarks/Workshop on Network Security Technology Sponsored by Industrial Technology Research Institute/1998.05.13
- The Present and Prospect of Information Security Developments/Tung Fang Institute of Industry/1998.05.08
- Progressive Image Transmission/Department of Information Management, National Taiwan University of Science and Technology/1998.04.23
- A Binary Access Control Method Using Prime Factorization/University of Tokyo, Japan/1998.03.27
- An Image Hiding Scheme Based on Vector Quantization/University of Tokyo, Japan/1998.03.27
- Computer Crime and Prevention/National Taiwan Normal University/1998.03.17
- Progressive Image Transmission/Department of Business Education, National Changhua University of Education/1998.03.13
- Image Hiding Technology/Department of Information Science and Management, Providence University/1998.02.26
- Progressive Image Compression/Department of Information Science and Management, Providence University/1998.02.26
- Progressive Image Transmission Using Edge Matching/Department of Computer and Information Science, National Chiao Tung University/1998.02.24
- Image Hiding Technology/Tunghai University(National Computer Symposium)/1997.12.28
- Applications of Chinese Remainder Theorem/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.07
- The Qualities of a Successful Scientist/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.07
- Digital Signatures/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.06
- Image Hiding Technology/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.06
- Secret Sharing/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.05
- Fast Computation of Modulo Exponents/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.05
- The Present and Prospect of Information Education of Universities in Taiwan/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.04
- Hot Issues of International Information Security Research - Theory, Techniques, and Market Trend/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.04
- Evolution of Information Security Technology/National Defense Management College/1997.07.11
- Information Security/Department of Mathematics, Chung Yuan Christian University/1997.06.05
- Evolution of Information Security Technology/National Defense University, Chung Cheng Institute of Technology/1997.05.07
- Efficient Join Operation of Time-domain Databases/Department of Computer Science, National Tsing Hua University/1997.04.16
- The Road to Success/Department of Information Management, Chaoyang University of Technology/1997.03.26
- Efficient Join Operation of Time-domain Databases/Department of Computer Science and Information Engineering, National Chiao Tung University/1996.12.19
- How to Share a Common Secret Document/Department of Information Engineering, Feng Chia University/1996.12.03
- Information Security/Department of Computer Science and Engineering, National Sun Yat-Sen University/1996.08.14
- Information Security/National Changhua University of Education/1996.06.06
- Contemporary Cryptography/Department of Computer Science and Information Engineering, National Cheng Kung University/1996.05.03
- Information Security/Refining & Manufacturing Research Center of Chinese Petroleum Corp/1996.04.19
- Developments of Computer Cryptography/Department of Computer and Information Science, National Chiao Tung University/1995.12.28
- Developments of Computer Cryptography/Department of Computer Science and Information Engineering, National Dong Hwa University/1995.12.20
- The Present and Prospect of Information Security/Department of Applied Mathematics, National Chung Hsing University/1995.11.09
- Information Security/Provincial Training Center of Taiwan Provincial Government/1995.11.03
- Information Security and Management/Taiwan Regional Development Institute/1995.08.06
- Technology and Life/National Chiayi Senior Hight School/1995.07.27
- Image Compression Technology/Department of Information Science and Management, Providence University/1995.04.27
- Towards an Information Society – Let Us Use the Computer Together/National Chung Cheng University/1995.04.24
- Developments of Contemporary Cryptography/Department of Computer Science and Engineering, National Sun Yat-Sen University/1995.03.03
- Information Security/Computer and Information Network Center, National Chung Hsing University/1994.12.17
- Information Security/Department of Information Management, Chaoyang Institute of Technology/1994.12.14
- Introduction to Cryptanalysis/Department of Computer Science and Information Engineering, National Chiao Tung University/1994.11.03
- Efficient Information Retrieval/Graduate Institute of Computer Science, National Chung Hsing University/1994.08.03
- Chinese Database Management Systems/Training Center for High School Teachers/1994.05.25
- Introduction to Cryptanalysis/Department of Industrial Education, National Taiwan Normal University/1994.05.20
- Introduction to Cryptanalysis/Department of Applied Mathematics, Feng Chia University/1994.05.06
- The Design of Computer Password/National Central University/1994.04.30
- How to Get Ahead/Rotary Club of Taichung East District/1994.04.14
- The Design of Computer Password/Wu Feng Institute of Technology/1994.04.13
- Artificial Intelligence/Center of Automated Engineering, Da-Yeh University/1994.04.02
- Artificial Intelligence/Tsau Ton Commercial and Technical Vocational School/1994.03.25
- Group Secret Technology/Department of Computer Science. and Information Engineering, National Taiwan University/1994.03.18
- Planning of Project Information Systems/Research, Development, and Evaluation Commission, Taiwan Province/1994.03.10
- Evolution of Contemporary Cryptography/Chung-Shan Institute of Science and Technology/1994.02.22
- Evaluation of Computer-Aided Instruction (CAI)/Fooyin College of Nursing/1994.01.17
- Applications of Instruction Network and Information Security/Szu-Yu Junior High School/1994.01.07
- Information Security/Provincial Training Center of Taiwan Provincial Government/1993.12.27
- Developments of Computer Cryptography/National Defense University, Chung Cheng Institute of Technology/1993.12.08
- Information Security/Provincial Training Center of Taiwan Provincial Government/1993.12.01
- Career Planning/College of Engineering, National Chung Cheng University (for the students of Department of Business Education, National Changhua University of Education)/1993.11.25
- Planning of Project Information Systems/Research, Development, and Evaluation Commission, Taiwan Provincial Government/1993.11.23
- The Development of Computer Cryptography/Department of Computer Science and Information Engineering, National Chiao Tung University/1993.11.18
- Information Searching Techniques/National Chung Cheng University/1993.10.29
- Military Information Security/National Defense Management College/1993.09.07
- Introduction to Computer Passwords/Taichung Home Economical and Commercial Senior Vocational School/1993.06.10
- A Master Key for an M3 Cryptoscheme/Department of Electrical Engineering, National Defense University, Chung Cheng Institute of Technology/1993.06.08
- Information Security/Department of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C./1993.06.02
- How to Get Ahead/Chia-Yi Home Vocational School/1993.05.24
- Information Security/Department of Information Science and Management, Providence University/1993.05.04
- An Image Similar Retrieval Method Based on Modulo Arithmetics/Workshop on Computer Applications Sponsored by National Chung Hsing University/1993.04.23
- Chinese Retrieval and Searching/Provincial Chang-Hua Senior School of Commerence/1993.03.24
- How to Get Ahead/Department of Information Management, National Taiwan Institute of Technology/1993.03.04
- A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.02.11
- A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.02.04
- A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.01.14
- A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.01.07
- Career Planning of Computer People/Department of Computer Science and Information Engineering, National Chung Cheng University/1992.12.07
- Developments of Contemporary Cryptology/Taichung Home Economical and Commercial Senior Vocational School/1992.12.01
- Data Compression/Provincial Chang-Hua Senior School of Commerence/1992.11.24
- On the Applications and Development/Department of Mathematics, National Tsing Hua University/1992.11.23
- The Design of Computer Password/Department of Computer Science and Engineering, National Sun Yat-sen University/1992.11.18
- Methodology/Department of Computer and Information Science, National Chiao Tung University/1992.10.28
- Methodology/Department of Information Management, Ming Chuan College/1992.10.22
- Generalized Group Secret Cryptography/National Security Bureau/1992.10.07
- Secret Sharing/Department of Information and Computer Education, National Taiwan Normal University/1992.10.06
- Group Secret Techniques/Department of Electrical Data Processing, National Taichung Institude of Commerce/1992.10.02
- Group Secret Strategies/Computer Science and Engineering Research Center, National Sun Yat-sen University/1992.06.15
- Information Security/Ta Tung Technological College of Commerce/1992.05.18
- Methodology/Tunghai University, Department of Computer Science Information Engineering/1992.05.14
- The Past, Present, and Future Trend of Science and Technology Education/National Chung Cheng University/1992.04.16
- Information Security/Provincial Chang-Hua Senior School of Commerence/1992.04.14
- How to Get Ahead/Taiwan Provincial Wen-Hua Senior High School/1992.03.11
- Introduction to Computer Passwords/Sieh-Chih Industrial and Commercial Senior Vocational School/1992.02.21
- Dynamic Secret Sharing/Department of Applied Mathematics, National Sun Yat-sen University/1992.01.10
- Design of Image Databases/Department of Electrical Data Processing, National Taichung Institude of Commerce/1991.12.04
- The Road to Success/Tunghai University, Department of Computer Science Information Engineering/1991.11.27
- The Application of Cryptography to Computer Security/Department of Computer Science and Information Engineering, National Cheng Kung University/1991.11.09
- On File Systems/Department of Computer Science and Information Engineering, National Cheng Kung University/1991.09.21
- Computers and Passwords/Department of Electronic Engineering, National Taipei Institute of Technology/1991.06.14
- Computer Crime and Prevention/Exhibition Center of Computer Science, National Science Council/1991.04.20
- Office Automation/Computer Center, National Chung Cheng University/1991.03.06
- Design of a Minimal Perfect Hashing Function/Department of Computer Science and Engineering, The Chinese University of Hong Kong (Hong Kong, China)/1991.02.11
- Information Security/YMCA, Chia-Yi/1991.01.22
- Applications of Clustering Technology in Information Science/Department of Electrical Engineering, National Cheng Kung University/1990.12.20
- The Design of Computer Password/Department of Electrical Engineering, National Yunlin Institute of Industry/1990.12.12
- Data Engineering Technology/National Defense Management College/1990.11.28
- Countermesures against Computer Crime and Computer Viruses/Taiwan Cooperative Bank/1990.11.27
- Compression-Based Perfect Hashing Strategies/Department of Computer Science, National Tsing Hua University/1990.11.26
- Computer Crime and Countermeasures/National Chung Cheng University/1990.10.30
- Strategies for Chinese Compression/Department of Computer Science and Information Engineering, National Chiao Tung University/1990.10.18
- Computer Crime and Countermeasures/Department of Computer Science and Information Engineering, National Chiao Tung University/1990.10.18
- Information Access and Control/Department of Applied Mathematics, National Chung Hsing University/1990.09.27
- Management Computerization/National Yunlin Institute of Industry/1990.07.11
- Information Management and Applications/Chia-Yi City Government/1990.06.22
- Information Management and Applications/Chia-Yi City Government/1990.06.04
- Computer Crime and Computer Viruses/Taichung Museum of Art/1990.05.17
- Computer Security/College of Medicine, National Cheng Kung University/1990.04.18
- Data Compression/Taichung Home Economical and Commercial Senior Vocational School/1990.04.14
- Data Encryption/Taichung Home Economical and Commercial Senior Vocational School/1990.04.12
- Information Security/Taichung Home Economical and Commercial Senior Vocational School/1990.04.12
- Design of a Chinese String Searching Machine/Department of Electrical Data Processing, National Taichung Institude of Commerce/1990.03.30
- Data Encryption/Application Mathematics Department, Chinese Culture University/1990.03.28
- Information Security/Department of Electronical Data Processing, Ming Chuan College/1990.03.09
- Data Encryption/Department of Electrical Engineering, Tatung Institute of Technology/1990.03.08
- Computer Cryptology/Department of Information Engineering, Feng Chia University/1990.03.02
- Introduction to the Design of Computer Password/Department of Computer Science and Information Engineering, National Chiao Tung University/1990.03.01
- Information and Computers/Taichung Agricultural Vocational Senior High School/1990.02.06
- Information Security/Department of Mathematics and Science Education, National Chiayi Teachers College/1989.12.11
- Clustering Analysis and Its Applications/Institute of Information Science, Academia Sinica/1989.12.08
- Computer Crime and Countermeasures/Tunghai University, Department of Computer Science Information Engineering/1989.11.01
- Computer Crime and Computer Viruses/Taiwan Provincial Taichung Library/1989.10.15
- Data Compression/Department of Engineering Science, National Cheng Kung University/1989.10.05
- Workshop on Data Engineering Technology/Center of Public and Business Administration Education, National Chengchi University/1989.08.28/08.30
- Information Security/National Chung Hsing University/1989.06.14
- On Developments of Theory and Techniques/Department of Computer Science and Information Engineering, National Chiao Tung University/1989.06.09
- Information and Computers/National Chung Hsing University/1989.06.07
- Data Analysis Technology and Its Applications/Department of Industrial Education, National Taiwan Normal University/1989.05.10
- Data Analysis Technology and Its Applications/Department of Computer Science and Information Engineering, National Taiwan University/1989.04.28
- An Experience in Designing a Database Management System/Computer Society of the Republic of China/1989.04.26
- Public-Key Encryption/Aeronautics Developement Center/1989.04.24
- Introduction to Computer Passwords/Department of Electrical Data Processing, National Taichung Institude of Commerce/1989.03.15
- Information Era/Taichung Agricultural Vocational Senior High School/19888.08.18
- Towards Information Society - Universal Information Education for A11/Taichung Girls' Senior High School/1988.12.10
- Towards Information Society - Information Education for A11/Taichung First Senior High School/1988.12.08
- Recent Developments of Information Security Technology/Department of Computer Science and Information Engineering, National Chiao Tung University/1988.12.01
- Workshop on Information System Technology/World Technology Consultant Industry/1988.11.24/11.26
- A User Identification Scheme on Computer Networks/Academia Sinica/1988.11.10
- Approximate String Searching/Department of Computer Science and Information Engineering, National Chiao Tung University/1988.11.01
- Chinese String Searching/Department of Computer Science and Information Engineering/Electrical Engineering, National Central University/1988.10.12
- Database Management Systems/Aeronautic Development Center/1988.10.05
- Information Era/Taichung Home Economical and Commercial Senior Vocational School/1988.08.15
- Database Management System and Office Automation/Taichung Home Economical and Commercial Senior Vocational School/1988.04.20
- Database Management Systems and Office Automation/Yung-Jing Industrial Vocational Senior School/1988.04.18
- Electronic Data Compression/Department of Electrical Data Processing, National Taichung Institude of Commerce/1988.04.14
- Visual Programming/Aeronautic Development Center/1988.04.13
- On Developments of Theory and Techniques/Tunghai University, Department of Computer Science Information Engineering/1988.04.11
- Visual Programming/Department of Industrial Engineering and Enterprise Information, Tunghai University/1988.03.28
- Decentraliged Database Design/Department of Computer Science and Engineering, Tatung Institute of Technology/1988.03.14
- Data Compression/Computer and Information Network Center, National Chung Hsing University/1987.12.16
- A Step to Information Society - Using Computers/Chang-Ann Junior High School, Chang-Hua/1987.12.15
- A Step to Information Society - Using Computers/Feng-Yuan Junior High School, Feng Yuan/1987.12.12
- Clustering Analysis and Its Applications/Department of Computer Science and Information Engineering, National Cheng Kung University/1987.12.08
- Workshop on Compilers/World Technology Consultant Industry/1987.11.30/12.02
- Clustering Analysis and Its Applications/Department of Computer Engineering, National Chiao Tung University/1987.11.26
- System Simulation/Institute of Harbor and Marine Technology/1987.11.10
- Design Principles of an Information Query System/Tunghai University, Department of Computer Science Information Engineering/1987.11.04
- Designing an Information Query System/Institute of Computer and Decision Sciences, National Tsing Hua University/1987.11.02
- Information Access Control Techniques/National Tsing Hua University, Department of Industrial Engineering /1987.10.28
- Workshop on Information Engineering Technology/Chin-Peng Management Consulting Company/1987.09.21/09.23
- Workshop on Information Systems and Information Auditing/Harvard Management Services/1987.08.27/08.28
- Workshop on Data Structures and Data Analyses/World Technology Consultant Industry/1987.08.24/08.26
- Information Security/Aeronautics Developement Center/1987.07.23
- A Database Management System - System-Bee/World Technology Consultant Industry/1987.07.10
- Visual Programming - FORMOSA/World Technology Consultant Industry/1987.07.09
- Information Era/Ming Dao High School/1987.06.23/07.07
- Advanced GPSS/S/Workshop on Software Packages and Application Systems, sponsored by Ministry of Education/1987.05.26/05.27
- Key to the Treasury of Life/Taichung Second Senior High School/1987.05.11
- Information Science - from the Perspective of Dicrete Mathematics/Tunghai University, Department of Computer Science Information Engineering/1987.04.28
- Information Science - from the Perspective of Data Analysis/Aeronautics Developement Center/1987.04.23
- Information Science - from the Perspective of Data Analysis/National Chung Hsing University, Computer and Information Network Center/1987.04.21
- Data Retrieval and Information Security/National Chung Hsing University, Computer and Information Network Center/1987.04.20
- Database Design - from the Perspective of Data Analysis/Computer Society of the Republic of China/1987.04.14
- A Design of Secure Computer Passwords/National Cheng Kung University, Department of Engineering Science/1987.03.26
- The Developments of Information Retrieval Techniques/Tatung Institute of Technology, Department of Computer Science and Engineering/1987.03.24
- Computers and Information/Tunghai University, International Bussiness Administration/1987.03.22
- Computers and Information/Chia-Yi YMCA/1987.03.21
- Advanced GPSS/S/Workshop on Software Packages and Application Systems, sponsored by Ministry of Education/1987.03.17/03.18
- Sun-Tzu as a Computer Scientist/Taiwan Provincial Taichung Libarary/1987.03.15
- Recent Developments of Data Structures and Searching Techniques/National/ Panasonic Taiwan/1987.02.24
- Information Era/Victory High School/1987.01.15
- Making Skill of Course Question Bank for Information Course/Taichung Home Economical and Commercial Senior Vocational School/1986.12.23
- The Past, Present, and Future Trend of Information Technology/National Chin-Yi Institute of Technology/1986.12.22
- Computers and Communications/Taichung County, Ching-Shui Junior High School/1986.12.13
- Computers and Communications/National Taiwan Normal University, Department of Industrial Education/1986.12.12
- Information Access Control Techniques/National Tsing Hua University, Department of Industrial Engineering/1986.12.03
- Recent Developments of Data Structures and Searching Techniques/National Central University, Department of Computer Science and Information Engineering/1986.11.19
- Secure Secret Broadcasting/World Technology Consultant Industry/1986.11.15
- Data Encryption Techniques/World Technology Consultant Industry/1986.11.14
- Information Access Control Techniques/World Technology Consultant Industry/1986.11.14
- Information Security/National Chung Hsing University, Computer and Information Network Center/1986.10.29
- Visual Programming/Department of Electrical Data Processing, National Taichung Institude of Technology/1986.10.21
- Office Automation/Tunghai University, International Bussiness Administration/1986.10.18
- Visual Programming/National Chung Hsing University, Computer and Information Network Center/1986.10.06
- Computers and Passwords/Taiwan Provincial Taichung Libarary/1986.10.05
- Visual Programming/Institude for Information Industry/1986.09.20
- Computers and Data Processing/Tunghai University, International Bussiness Administration/1986.09.13
- Searching Techniques for Static Data/Aeronautics Developement Center/1986.08.20
- Advanced GPSS/S/Workshop on Software Packages and Application Systems, sponsored by Ministry of Education/1986.06.16/06.17
- Public-Key Cryptography/Taiwan Province Government, Electrical Data Processing Center/1986.06.12
- Computers and Data Processing/Tunghai University, International Bussiness Administration/1986.05.04
- Computer Communications Security System/National Chiao Tung University, Department of Computer Science and Information Engineering/1986.04.17
- An Efficient Data Searching Technique/Chung Yuan Christian University, Department of Information and Computer Engineering/1986.03.31
- How to Construct a Symbolic Database/Institute of Computer and Decision Sciences, National Tsing Hua University/1986.03.25
- Recent Developments of Data Structure Techniques/National Taiwan Institute of Technology, Department of Electronic Technology/1986.03.24
- A Chinese Form-oriented Visual Programming System/National Chung Hsing University/1986.03.18
- Recent Developments of Searching Techniques/Providence College of Arts and Sciences for Women, Department of Information Science/1986.03.13
- Recent Developments of Data Structures and Information Security/Chung-Shan Institute of Science and Technology/1986.03.06
- Information Security Systems/Aeronautics Developement Center/1986.01.24
- Information Protection Systems/Academia Sinica, Institute of Information Science/1986.01.23
- Computer and Information Management/Tunghai University, International Bussiness Administration/1985.10.20/10.26
- On Developments of Theory and Techniques/Feng Chia University, Department of Civil Engineering/1985.10.14
- How to Manage Enterprise Databases/YMCA-IMC Workshop on Computer Research and Study/1985.09.10
- How to Design a Symbolic Database/CDC Computer Company: Workshop on Maintenance and Application of the User System/1985.08.02
- Computer Security Technology/Feng Chia University, Department of Information Engineering/1985.06.07
- On Design of a Symbolic Database - from the Perspective of Theory of Numbers/National Chiao Tung University, Department of Computer Science and Information Engineering, and Department of Computer Information and Science/1985.05.02
- Constructing a Symbolic Database and Information Security System/National Cheng Kung University, Department of Electrical Engineering/1985.04.20
- Information Management Techniques/Taichung First Senior High School/1985.04.18
- Methodology of Computer Software Engineering/Providence College of Arts and Sciences for Women, Department of Information Science/1985.03.27
- Recent Developments of Key-Lock Pair Access Control Mechanism/National Taiwan University, Department of Computer Science and Information Engineering/1985.03.15
- Experiences in Designing an Interactive Database Management System/Providence College of Arts and Sciences for Women, Department of Information Science/1984.12.21
- Data Structure and Information Security - from the Perspective of Sun-Tzu Theorem/Department of Electrical Data Processing, National Taichung Institude of Commerce/1984.11.28
- Recent Development of Text Retrieval/National Taiwan University, Department of Computer Science and Information Engineering/1984.10.19
- Designing a Minimal Perfect Hash Function/Institute of Computer and Decision Sciences, National Tsing Hua University/1984.10.08
- Experiences in Designing a Database Management System/Institude for Information Industry/1984.09.22
- Constructing an Optimal Information Retrieval Method/Feng Chia University, Department of Information Engineering/1984.05.11
- Recent Developments of Multi-key Hashing File Systems/National Taiwan University, Department of Electrical Engineering/1984.02.29
- Application of Database Management Systems/Tax Administratration of Taichung Government/1983.11.26
- Recent Developments of of Perfect Hash Functions/National Taiwan University, Department of Computer Science and Information Engineering/1983.04.29
- A Design of a Multi-key File System/Feng Chia University, Department of Applied Math/1982.12.18
- Data Recovery Automation/National Chung Hsing University, Department of Applied Math/1982.12.11
- Design of an Optimal Multi-key File System/Institute for Information Industry/1982.06.19
- Compiler Construction Techniques/National Chung Hsing University, Department of Applied Math/1982.03.11
- A Design of an Efficient Hashing Function/Institute of Computer and Decision Sciences, National Tsing Hua University/1982.01.07
- Cryptosystem for Encrypting Digital Image or Voice File/6023511/ U.S.A./2000.02.08
- An Reversible Data Hiding for AMBTC Images Based on Codes Recompression/ZL 2020 1 0554770.6/ China/2023.02.17
- Reversible Data Hiding Scheme in Encrypted Image using Adaptive Coding/ZL 2021 1 0649073.3/ China/2023.07.14
- A High-Capacity Reversible Data Hiding in Encrypted Images using JPEG-like Compression and Huffman Coding/ZL 2021 1 0303262.5/ China/2023.07.14
- A Reversible Data Hiding Method in Encrypted Images with Flexible Selection and Run-Length Coding/ZL 2021 1 0647259.5/ China/2023.06.20
- A Reversible Information Hiding Method for Encrypted Image Based on Bit Plane Compression/ZL 2021 1 0649080.3/ China/2023.06.20
- 3D Reversible Data Hiding Based on PVO and PEE/ZL 2021 1 0378281.4/ China/2023.05.26
- Authenticable Visual Secret Sharing Based on Insect Matrix/ZL 2020 1 0517743.1/ 中国大陆/2023.05.02
- A steganography for encrypted images with adaptive parametric binary tree labeling/ZL 2021 1 0368362.6/ China/2023.03.07
- A Image Steganography Method Based on Reference Matrix and MSE Evaluation/ZL 2019 1 1393327.9/ China/2022.06.07
- Secret sharing and restoration Scheme for QR code based on (3,1) Hamming code/ZL 2021 1 0320436.9/ China/2022.05.13
- An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix/ZL 2021 1 0320437.3/ China/2022.07.01
- A Hop Sequence-based Reversible Data Hiding Scheme for JPEG Images/ZL 2020 1 0554929.4/ China/2022.06.24
- SMVQ Compressed Data Hiding Based on Multiple Linear Regression Prediction/ZL 2020 1 0518402.6/ China/2022.02.11
- An Efficient Data Hiding Scheme Based on Multi-dimensional Mini-Sudoku/ZL 2020 1 0517768.1/ China/2022.02.22
- An Encryption Device for Digital Image and Voice Files/103202/ R.O.C./1999.05.11
- A Progressive Secret Image Encryption and Sharing Method Based on Sudoku/CN103544674A/ China/2016.04.06
- A Method for Sharing Color Confidential Images/129581/ R.O.C./2001.03.01
- A Secure Protocol for End-to-End Mobile Users with Double Authentication/140313/ R.O.C./2001.07.31
- Feature-Oriented Digital Watermark for Multimedia/140057/ R.O.C./2001.08.01
- A Robust Digital Watermark Method for Multimedia/140692/ R.O.C./2001.08.21
- A Speech Hiding Method Based upon Sub-band Coding/141279/ R.O.C./2001.09.01
- A Digital Watermark Method Based on Neural Networks/145485/ R.O.C./2001.10.21
- A Robust Method of Gray-Scale Watermark Embedding and Retrieval/178825/ R.O.C./2003.05.11
- A Progressive Image Transmission Method Based on Guessing Neighbors/199178/ R.O.C./2004.07.22
- An Irregular Sampling Coding Method Suitable for Image Authentication and Recoverable Tamper Proofing/I248037/ R.O.C./2006.01.21
- A Switching Machine for Digital Watermarks/M319592/ R.O.C./2007.09.21
- A Montgomery Multiplier in Finite Fields/I340915/ R.O.C./2011.04.21
- A (2,2) Circular Sharing Techniques for Two Color Secret Images/I410908/ R.O.C./2013.10.01
- A Meaningful Image Sharing Technique Based on Color Visual Secret Sharing/I434245/ R.O.C./2014.02.21
- An Efficient Medical Image Segmentation Algorithm Based on Game-Theoretic Framework/ZL 2013 1 0452311.7/ China/2015.12.23
General Chair
- 2021 the 7th International Conference on Artificial Intelligence and Security (ICAIS 2021), July, Dublin, Ireland.
- 2020 the 3th International Conference on Data Storage and Data Engineering (DSDE 2020), January 10-12, Barcelona, Spain.
- 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2012), (*Honorary Chair), Athens, Greece.
- 2011 The 3rd International Workshop on IT Service & Cloud Computing (ISCC 2011), Grete, Greece.
- 2010 The Second International Conference on Advances in Future Internet (AFIN 2010), Venice, Italy.
- 2010 The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), (*Honorary Chair), Darmstadt, Germany.
- 2009 The 8th International Workshop on Digital Watermarking (IWDW 2009) (*Region General Chair), University of Surrey, UK.
- 2007 The International Conference of Computational Intelligence and Intelligent Systems (*Co-Chair), London, U.K.
Member of a Delegation
- Deputy leader of a delegation visiting the Czech Republic to report on engineering education for the Ministry of Education of the R.O.C. (Aug. 1999)
- Member of a delegation (consisting of six university presidents from Taiwan) to join the Germany Rector Conference (HRK), and to visit the Hombo Foundation, DAAD (Deutscher Akademischer Austauschdienst), DFS (Deutsche Forschungsgemein Schaft), Technical University of Munich, University of Munich, to report on international university exchange and cooperation for the Ministry of Education of the R.O.C. (Nov. 1 to Nov. 10, 1996)
Recommender
- Recommended Dr. Ching-Yun Chang to work on her Ph.D course under the supervision of Professor Stephen Clark at the University of Cambridge. She is currently an outstanding AI Scientist at Amazon, UK.
- Recommended Dr. Xin Peng Zhang to be a visiting Humboldt Scholar at Konstanz University, Germany, from 2011 to 2012. Dr. Zhang is now an Information Hiding expert working in Fudan University, China.
- Recommended Dr. Zhe Ming Lu to be a visiting Humboldt Scholar at Albert Ludwig University of Frieburg, Germany, from Oct. 2004 to Jan. 2006. Dr. Lu is now a Digital Watermarking expert working in Zhejiang University, China.
International Advisory Committee Member
- 2017 The 6th International Conference on Intelligent Systems and Applications (INTELLI 2017), July 23-17, Nice, France
- The 4-year-long EU Horizon 2020 project – Computer Vision Enabled Multimedia Forensics and People Identification (IDENTITY) (4 industrial and 12 academic participating institutions from 12 countries)
- 2015 GS Multi-International Conference on Computer Science 2015 (GSMIC-CS'15), Ireland, UK
- 2013 The International Conference on International Scientific Academy of Engineering & Technology (ISAET 2013), (*International Scientific Committee Member)
- 2009 The 1st International Conference on Advances in Future Internet (AFIN 2009) (Advisory Chair), Athens, Greece
Advisory Board Member
- 2008 The 5th International Conference on Autonomic and Trusted Computing (ATC-08), Oslo, Norway
- 2006 International Journal of Internet Technology and Secured Transactions, UK
- 2006 The IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vienna
- 2000 The Second International Workshop on Software Engineering and Multimedia Applications, Germany
Program Committee Member
- 2021 the International Workshop on Cyber Security (CSW 2021), August 13-15, Stockholm, Sweden
- 2021 2nd International Conference on Cloud Computing, Security and Blockchain (CLSB 2021), September 18-19, 2021, Copenhagen, Denmark
- 2020 The 3rd International Conference on Data Storage and Data Engineering (DSDE 2020), June 10-12, 2020, Barcelona, Spain
- 2020 The Twelfth International Conference on Emerging Networks and Systems Intelligence (EMERGING 2020), July 26-30, 2020, Nice, France
- 2020 The 6th International Conference on Signal and Image Processing (SIPRO 2020), July 25-26, 2020, London, UK
- 2020 The 6th International Conference on Image Processing and Pattern Recognition (IPPR 2020), June 13-14, 2020, Helsinki, Finland
- 2020 The 9th International Conference on Computational Aspects of Social Networks (CASON 2020), October 19-21, 2020, Thessaloniki, Greece
- 2020 The Ninth International Conference on Intelligent Systems and Applications (INTELLI 2020), June 28 - July 02, 2020, Athens, Greece
- 2020 the 7th International Conference on Signal and Image Processing (SIGL 2020), January 25-26, 2020, Zurich, Switzerland
- 2020 the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) , February 27-29, 2020, Valletta, Malta
- 2019 The 3rd IEEE International Conference on Advanced Information and Communication Technologies (AICT 2019) , July 2-6, 2019, Lviv, Ukraine
- 2019 The Eleventh International Conference on Emerging Networks and Systems Intelligence (EMERGING 2019), September 22 - 26, 2019, Porto, Portugal
- 2019 The International Conference on Advances in Databases, Knowledge, and Data (DBKDA 2019), June 2-6, 2019, Athens, Greece
- 2019 The International Conference on Advances in Signal, Image and Video Processing. Advances in Databases, Knowledge, and Data (SIGNAL 2019), June 2-6, 2019, Athens, Greece
- 2019 The 1st International Conference on Advances in Signal Processing and Artificial Intelligence (ASPAI 2019), March 20-22, Barcelona, Spain
- 2019 The 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP 2019), February 25-27, Prague, Czech Republic
- 2018 The 9th International Conference on Computer Technologies and Development (ICCTD 2018), March 24-26, Istanbul, Turkey
- 2018 The 1st International Conference on Optics, Photonics and Lasers (OPAL 2018), May 10-12, Barcelona, Spain
- 2017 The International Conference on Applied and Theoretical Computing, Control and Electronics (ATCE 2017), September 15-16, Turkey
- 2017 The 9th International Conference on Emerging Networks and Systems Intelligence (EMERGING 2017), November 12-16, Barcelona, Spain
- 2017 The IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2017), July 4-8, Turin, Italy
- 2017 The 6th International Conference on Intelligent Systems and Applications (INTELLI 2017), July 23-27, Nice, France
- 2017 The 12th International Conference on Computer Vision Theory and Applications (VISAPP 2017), February 27 - March 1, Porto, Portugal
- 2016 The 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), 2016, November 21-23, Larnaca, Cyprus
- 2016 The 5th International Conference on Intelligent Systems and Applications, INTELLI 2016, November 13 - 17, Barcelona, Spain
- 2016 The 1st International Conference on Advances in Signal, Image and Video Processing, June 26 - 30, Lisbon, Portugal
- 2016 The 8th International Conference on Emerging Networks and Systems Intelligence, (*Technical Committee Member), Venice, Italy
- 2016 The 8th International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2016), Rome, Italy
- 2016 The 8th International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2016), Rome, Italy
- 2016 The 11th International Conference on Computer Vision Theory and Applications (VISAPP 2016), Rome, Italy
- 2015 The 11th Advanced International Conference on Telecommunications (AICT 2015), Brussels, Belgium
- 2015 The International Conference on Advances in Information and Communication Technologies (ICT 2015), Lviv, Ukraine
- 2015 The Fourth Seventh Conference on Advances in Future Internet (AFIN 2015), Venice, Italy
- 2015 Wireless Sensor Networks: Architectures, Deployments and Trends (WSN-ADT'15), (*Technical Committee Member), Istanbul, Turkey
- 2015 The Seventh International Conference on Emerging Network Intelligence (EMERGING 2015), (*Technical Committee Member), Nice, France
- 2015 The Fourth International Conference on Intelligent Systems and Applications (INTELLI 2015), St. Julians, Malta
- 2015 The Seventh International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2015), Nice, France
- 2015 Science and Information Conference (SAI 2015), (*Technical Committee Member), London, UK
- 2015 The Seventh International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2015), Rome, Italy
- 2014 The 7th FTRA International Conference on Human-centric Ubiquitous Computing and Applications (HumanCom-14), Ostrava, Czech Republic
- 2014 Science and Information Conference (SAI 2014), (*Technical Committee Member), London, UK
- 2014 The Sixth International Conference on Emerging Network Intelligence (EMERGING 2014), (*Technical Committee Member), Rome, Italy
- 2014 The Sixth International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2014), (*Technical Committee Member), Venice, Italy 2014 The Sixth International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2014), (*Technical Committee Member), Venice, Italy
- 2014 The Third International Conference on Intelligent Systems and Applications (INTELLI 2014), (*Technical Committee Member), Seville, Spain
- 2014 The Sixth International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2014), (*Technical Committee Member), Chamonix, France
- 2014 The 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal
- 2013 The Fifth International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2013), Valencia, Spain
- 2013 The Science and Information Conference (SAI 2013), (*Technical Committee Member), London, UK
- 2013 The 10th International Conference on Signal Processing and Multimedia Applications (SIGMAP 2013), Reykjavik, Iceland
- 2013 The 8th International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain
- 2013 The Fifth International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2013), Seville, Spain
- 2013 International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain
- 2012 Wireless Sensor Networks: Architectures, Deployments and Trends (WSN-ADT 2012), Istanbul, Turkey
- 2012 The Fourth International Conference on Emerging Network Intelligence (EMERGING 2012), Barcelona, Spain
- 2012 The Fourth International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2012), Nice, France
- 2012 The First International Conference on Intelligent Systems and Applications (INTELLI 2012), Chamonix/ Mont Blanc, France
- 2012 International Conference on Signal Processing and Multimedia Applications (SIGMAP 2012), Rome, Italy
- 2012 The Fourth International Conference on Advances in Future Internet (AFIN 2012), Rome, Italy
- 2012 International Conference on Computer Vision Theory and Applications (VISAPP 2012), Rome, Italy
- 2012 The 7th International Conference on Signal Image Technoloy & Internet Based Systems (SITIS 2012), Dijon, France
- 2011 The Third International Conference on Advances in Future Internet (AFIN 2011), French Riviera, Nice/Saint Laurent du Var, France
- 2011 The 3rd International Workshop on Wireless Sensor Networks - Theory and Practice (WSN 2011), Paris, France
- 2011 International Conference on Imaging Theory and Applications (IMAGAPP 2011), Algarve, Portugal2011 International Conference on Signal Processing and Multimedia Applications (SIGMAP 2011), Seville, Spain
- 2011 the 3rd Workshop on Reversible Computation (RC 2011), Gent, Belgium
- 2011 International Conference on Security and Cryptography (SECRYPT 2011), Seville, Spain
- 2011 The Third International Conference on Advances in Future Internet (AFIN 2011), French Riviera, France
- 2011 The Third International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2011), St. Maarten, The Netherlands Antilles
- 2010 The International Conference on Soft Computing and Pattern Recognition (SoCPaR 2010), Cergy Pontoise, France
- 2010 The International Conference on Signal Processing and Multimedia Applications (SIGMAP 2010), Athens, Greece
- 2010 The International Conference on Signal Processing and Multimedia Applications (SIGMAP 2010), Athens, Greece
- 2010 The 2nd International Conference on Imaging Theory and Applications (IMAGAPP 2010), Angers, France
- 2010 The 2nd International Conference on Advances in Future Internet (AFIN 2010), Venice, Italy
- 2010 The 20th International Conference on Database and Expert Systems Applications (DEXA 2010), Bilbao, Spain
- 2009 Design, Analysis and Tools for Integrated Circuits and Systems-the International Conference of Mathematical Sciences (DATICS-ICMS 2009), Istanbul, Turkey
- The Second International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2010), Menuires, The Three Valleys, French Alps, France
- The 2009 International Conference on Signal Processing and Multimedia Applications, Milan, Italy
- 2009 International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy
- 2009 The First International Conference on Advances in Future Internet (AFIN 2009), Athens, Greece
- 2009 The First International Conference on Advances in Databases (DB 2009), Gosier, Guadeloupe, France
- 2009 The 2nd International Symposium on Intelligent Interactive Multimedia Systems and Services (IIMSS 2009), University of Milan, Italy
- 2009 The 1st International Conference on Imaging Theory and Applications (IMAGAPP 2009), Lisbon, Portugal
- 2008 The 10th International Conference on Information and Communications Security (ICICS 2008), Birmingham, UK
- 2007 The International Conference of Computer Science and Engineering (ICCSE'07), London, U.K.
- 2007 The International Conference of Data Mining and Knowledge Engineering (ICDMKE'07), London, U.K.
- 2007 The International Conference of Information Security and Internet Engineering (ICISIE'07), London, U.K.
- 2007 The International Conference of Signal and Image Engineering (ICSIE'07), London, U.K.
- 2007 The Second International Conference on Availability, Reliability and Security (AReS 2007), Vienna, Austria
- 2006 The First International Conference on Availability, Reliability and Security (AReS 2006), Vienna, Austria
- 2006 IASTED International Conference on Database and Applications (DBA 2006), Innsbruck, Austria
- 2005 Databases and Applications (DBA 2005), Innsbruck, Austria
- 2005 International Program Committee (IPC) for the IASTED International Conference on Databases and Applications (DBA 2005), Innsbruck, Austria
- 2004 International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain
- 2004 IASTED International Conference on Databases and Applications (DBA 2004), Innsbruck, Austria
- 2002 The 26th IEEE Computer Society International Computer Software and Applications Conference (COMPSAC 2002), UK
International Advisory Board Member of EU Horizon 2020 Project
- The 4-year-long EU Horizon 2020 project – Computer Vision Enabled Multimedia Forensics and People Identification (IDENTITY) scale of the consortium (4 industrial and 12 academic participating institutions from 12 countries)
Conference Presenter
- Chang, C. C., Nguyen, T. S. and Liu, Y., (2017): "A Reversible Data Hiding Scheme for Image Interpolation Based on Reference Matrix," International Workshop on Biometrics and Forensics (IWBF 2017), The University of Warwick, UK, Apr. 2017.
- Chang, C. C., Yang, J. H. and Lai, Y. W. and Liu, Y., (2017): "An Offline User-Verifiable Electronic Traveler's Check System," International Workshop on Biometrics and Forensics (IWBF 2017), The University of Warwick, UK, Apr. 2017.
- Xie, X. Z. and Chang, C. C., (2017): "Reversible Data Hiding in Encrypted Images Using Reformed JPEG Compression," International Workshop on Biometrics and Forensics (IWBF 2017), The University of Warwick, UK, Apr. 2017.
- Chen, C. C., Chen, K. N. and Hsieh, M. H., (2010): "A Robust Public Watermarking Scheme Based on DWT," Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), Darmstadt, Germany, Oct. 2010, pp. 21-26.
- Chang, Y. F. and Chang, C. C., (2006): "Enhanced Anonymous Auction Protocols with Freewheeling Bids," Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), Vol. 1, Vienna, Austria, Apr. 2006, pp. 353-358.
- The computational and applied mathematics congress, Leuven, Belgium, July, 1986.
- 4th International Working Conference on Statistical and Scientific Data Base Management, June, 21-23, 1988, Roma, Italy.
- Chang, C. C., Shih, T. K. and Lin, I. C., (2001): “GBN: An Efficient Progressive Image Transmission Method Based on Guessing by Neighbors,” Multimedia Modeling – Modeling Meltimedia Information and System (L. Rutledge and D. C. A. Bulterman Eds.), CWI, Amsterdam, Netherlands, Nov. 2001, pp. 109-126.
- Chang, C. C. and Tsai, C. S., (2000): “A Robust Intellectual Property Rights Protection Scheme for Digital Images,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 85-89
- Chan, Y. K. and Chang, C. C., (2000): “A Fast Filter of Spatial Video Retrieval,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 42-46.
- Chang, C. C. and Chan, Y. K., (2000): “A Fast Filter of Image Retrieval Based on Color-Spatial Features,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 47-51.
- Chang, C. C. and Wu, H. C., (2000): “An Image Protection Scheme Based on Discrete Cosine Transformation,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Barden-Barden, Germany, Aug. 2000, Vol. 2, pp. 90-94.
- Wu, Y. J. and Chang, C. C., (1999): “National Founding Mechanism of Science and Technology Efucation Project in Taiwan,” Proceedings of 1999 International Conference on Engineering Education, Ostrava, Czech, Aug. 1999, pp. 2410.
- Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1990): “Some File Organizations by the MMI Method for Orthogonal Range Retrieval,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 337-341.
- Chang, C. C. and Wu, T. C. (1990): “The Study of an Irregular Triangular Mesh Generator,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 228-233.
- Chang, C. C. and Wu, T. C., (1990): “A Password Authentication Scheme without Verification Tables,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 202-204.
- Chang, C. C. and Shieh, J. C., (1985): “A Fast Algorithm for Constructing Reciprocal Hashing Functions,” Proceedings of International Symposium on New Directions in Computing, IEEE, Trondheim, Norway, Aug. 1985, pp. 232-236.
- 2021, 09 - Present, Guest editor of Journal of Traffic and Transportation Engineering.
- 2021, 09 - Present, Guest editor of Transportation Research Interdisciplinary Perspectives.
- 2021, 09 - Present, Guest editor of SAE International Journal of Sustainable Transportation, Energy, Environment, & Policy.
- 2021, 09 - Present, Guest editor of Journal of Advanced Transportation.
- 2021, 07 - Present, Associate Editor of Future Internet.
- 2021, 05 - Present, Guest Editor of Special Issue on "Artificial intelligence and information security" Chinese Journal of Electronics, China.
- 2017, 07 - Present, Editorial Board Member of Applied Computing and Informatics
- 2015, 06 - Present, Editorial Board Member of International Journal of Engineering & Applied Sciences
- 2015, 01 - Present, Editorial Board Member of BPIT International Journal of Technology and Management
- 2014, 01 - Present, Editorial Board Member of Smart Computing Review
- 2013, 10 - Present, Editorial Board Member of International Journal of Information Security Science (IJISS)
- 2013, 08 - Present, Editorial Board Member of International Journal of Cloud Computing and Super Computing (IJCS)
- 2013, 07 - Present, Guest Editor of Recent Advances in Information Technology for Scientific World Journal, U.S.A.
- 2013, 06 - Present, Editorial Board Member of Current Advances in Information Security (CAIS)
- 2013, 01 - Present, Co-Editor-in-Chief of International Journal of Network Security
- 2012, 12 - Present, Editorial Board Member of Multimedia Technology (MT)
- 2012, 12 - Present, Advisory Board of FTRA Journal of Convergence
- 2012, 12, Academic Editor of British Journal of Mathematics & Computer Science
- 2012, 05 - Present, Editorial Board Member of Recent Patents on Telecommunications
- 2012, 05 - Present, Editorial Board Member of International Journal of Digital Contents and Applications (IJDCA)
- 2012, 01 - Present, Editorial Board Member of Journal of Information Security and Applications (JISA)
- 2011, 11 - Present, Editorial Board Member of Journal of Information & Communication Technology
- 2011, 06 - Present, Editor of Information Security Letter (ISL)
- 2011, 05 - Present, Associate Editor of Communications in Information Science and Management Engineering (CISME)
- 2011, 03 - Present, Editorial Board Member of International Journal of Communication and Security
- 2011, 01 - Present, Editor of Tamsui Oxford Journal of Information and Mathematical Sciences (TOJIMS)
- 2011, 01 - Present, Editorial Board Member of the Journal of Electronic Science and Technology (JEST)
- 2010, 09 - Present, Editor of International Journal of Engineering and Industries (IJEI)
- 2010, 09 - Present, Associate Editor of International Journal of Advancements in Computing Technology (IJACT)
- 2010, 09 - Present, Associate Editor of the Advances in Information Sciences and Service Sciences (AISS)
- 2010, 07 - Present, Editor of International Journal of Intelligent Information Processing (IJIIP)
- 2010, 07 - 2017, 08, Present, Editorial Board Member of the KSII Transactions on Internet and Information Systems (TIIS)
- 2010, 05 - Present, Editorial Board Member of the Innovative Computing Information and Control - Express Letters, Part B: Applications (ICIC - ELB)
- 2010, 03 - Present, Editorial Board Member of the Journal of Computer Research and Development
- 2009, 12 - Present, Editorial Board Member of the Wireless Engineering and Technology (WET)
- 2009, 10 - Present, Editorial Board Member of the International Journal of Multimedia Intelligence and Security (IJMIS)
- 2009, 10 - Present, Editorial Advisory Board Member of the International Journal of Information Technology, Communications and Convergence (IJITCC)
- 2009, 09 - Present, Associate Editor of the International Journal of Information Sciences and Computer Engineering (IJISCE), Malaysia
- 2009, 08 - Present, Editorial Advisory Committee Member of Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development and Verification, America
- 2009, 06 - Present, Guest Editor for the Special Issue - Recent Advances in Networked Computing for Journal of Networks
- 2009, 01 - Present, Guest Editor for the Special Issue of Journal of Internet Technology
- 2009, 01 - Present, Guest Editor of the Journal of Software
- 2009, 01 - Present, Co-Editor-in-Chief of International Journal of Information Hiding and Multimedia Signal Processing
- 2009, 01 - Present, Editor of the Journal of Future Generation Information Technology, Korea
- 2009, 01 - Present, Editorial Advisory Committee Member of Kansei Engineering and Soft Computing: Theory and Practice
- 2009, 01 - Present, Associate Editor of International Journal on Advances in Internet Technology
- 2008, 08 - Present, Guest Editor of the Special Issue - Electronic Commerce and Security for Journal of Communications, Finland
- 2008, 07 - Present, Advisor of International Journal of Intelligent Information Technology Application, Hong Kong
- 2008, 01 - Present, Guest Editor of Journal of Supercomputing, Korea
- 2008, 01 - Present, Co-editor of the Proceedings of International Conference on Intelligent Systems Design and Applications (ISDA08)
- 2008, 01 - Present, Guest Editor of the Special Issue - Mobile Computing for Journal of Pervasive Computing and Communications (JPCC)
- 2007, 10 - Present, Editorial Board Member of International Journal of Internet Technology and Secured Transactions, Switzerland
- 2007, 10 - Present, Editorial Board Member of International Journal of Knowledge Engineering and Soft Data Paradigms (KESDP), Japan
- 2007, 10 - Present, Editorial Board Member of The Open Information Science Journal
- 2007, 08 - Present, Guest Editor of Journal of Shanghai University: Applied Science, China
- 2007, 02 - Present, Program Committee Member of Journal of Automation, Mobile Robotics and Intelligent Systems, Poland
- 2007, 01, Editor of Antarctica Journal of Mathematics, India
- 2006, 06 - Present, Editorial Advisory Board Member of Recent Patents on Engineering, U.S.A.
- 2006, 03 - 2008, 09, Editor-in-Chief of Journal of Computers of the R.O.C.
- 2006, 01 - Present, Co-Editor-in-Chief of International Journal of Computer Sciences and Engineering Systems, India
- 2005, 11 - Present, Associated Editor of Advisory Board of the International Journal of Autonomic and Trusted Computing
- 2005, 11 - Present, Member of Advisory Board of the International Journal of Innovational Computing and Information Control
- 2005, 01 - Present, Member of Guest Editorial Board of the International Journal of Pervasive Computing and Communications
- 2004, 06 - Present, Editorial and Advisory Board Member of International Journal of Information and Computer Security
- 2003, 12 - Present, Editorial Consultant of Communications of Chinese Cryptography Information Security Association (CCISA)
- 2002, 07 - Present, Associate Editor of Chaoyang Business and Management Review
- 1999, 11 - Present, Advisory Board Member of International Journal of Information Security
- 1994, 01 - 1997, 12, Editor of Information Sciences, U.S.A.
- 1992, 02, Editor of Advance Database Research and Development Series (World Scientific Publishing Co., Singapore) - Vol. 1 Database Systems for Next - Generation Application Principles and Practice; Vol. 2 Database Systems for Advanced Application; Vol. 3 Future Database
- 1990, 12 - Present, Associate Editor of International Journal of Information and Management Science
- 1990, 12 - 1994, 01, Associate Editor and Computer Science Coordinator of Journal of the Chinese Institute of Engineers
- 1989, 01 - Present, Associate Editor of Journal of Computers
- 1989, 01 - 1990, 11, Associate Editor of International Journal of Policy and Information
- 1987, 10 - Present, Editor-in-Chief of Information and Education Bimonthly
- 1987, 01 - 1994, 01, Associate Editor of Journal of the Chinese Institute of Engineers
- 1986, 11 - 1988, 12, Associate Editor of Computer Quarterly
- 1986, 04 - 1993, 01, Associate Editor of Journal of Information Science and Engineering
- 1986, 04 - 1988, 03, Associate Editor of Journal of Electrical Engineering
Ph. D. students
- Meng, Ke-Ju: Randomization based secure secret sharing research in theory and applications (Completion Date: 07, 2021)
- Wang, Rong: Research on Several Problems Related to Privacy-Preserving Microdata Publishing (Completion Date: 03, 2021)
- Xie, Xiao-Zhu: Hiding Messages in Some Digital Image Domains with Reversibility (Completion Date: 01, 2021)
- Huang, Peng-Cheng: The Study of Hiding Data and Sharing Secret Message in QR Codes (Completion Date: 01, 2021)
- Liu, Li: Research on data hiding technology for privacy protection in cloud environment (Completion Date: 03, 2020)
- Zhuang Xu: The Research of Technique on Anti-spamming of Web Page (Completion Date: 03, 2020)
- Nguyen Ngoc Tu: Untraceable Multi-factor Authenticated Key Agreement Protocols for Public Network Communications (Completion Date: 06, 2018)
- Wu, Hsiao-Ling: Secure Authentication Schemes for E-Commerce Applications (Completion Date: 08, 2018)
- Le Hai Duong: Smart Card Based Authenticated Key Agreement Schemes (Completion Date: 08, 2015)
- Huang, Ying-Hsuan: (k, n)-Image Reversible Data Hiding (Completion Date: 07, 2015)
- Huynh, Ngoc-Tu: Verifiable Lossless Multi-Image Sharing Schemes for Secret Image Embedding (Completion Date: 06, 2015)
- Nguyen, Thai-Son: Reversible Information Hiding Techniques and Their Applications in Image Protection (Completion Date: 06, 2015)
- Wang, Xing-Tian: Research on Data Embedding Methods Based on Grayscale Image (Completion Date: 06, 2015)
- Cheng, Ting-Fang: Secure Authentication Protocols and Their Applications (Completion Date: 06, 2013)
- Chang, Shih-Chang: The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce (Completion Date: 06, 2013)
- Chen, Kuo-Nan: Hiding Secret Information in Image Compression Code and Image Protection Techniques (Completion Date: 12, 2011)
- Pai, Pei-Yan: The study of segmentation and hiding techniques for medical images (Completion Date: 04, 2011)
- Wu, Chia-Chi: Security Mechanisms for Electronic Business Applications (Completion Date: 01, 2011)
- Lee, Chia-Yin: Secure Communication Schemes in Network Environments (Completion Date: 12, 2010)
- Tsai, Hao-Chuan: Authentication and Key Agreement Schemes for Network Applications (Completion Date: 12, 2010)
- Chen, Chang-Chu: Efficient Image Encoding and Information Embedding Techniques (Completion Date: 06, 2010)
- Wang, Zhi-Hui: The Research on Reversible Data Embedding Techniques (Completion Date: 04, 2010)
- Wang, Chung-Chuan: The Study of Stegnography and Watermark on Binary Images (Completion Date: 01, 2010)
- Kieu, The Duc: Reversible Information Hiding Techniques for Digital Watermarking and Steganographic Applications (Completion Date: 06, 2009)
- Hsieh, Yi-Pei: Embedding Secrets in Digital Images and Their Compression Codes (Completion Date: 06, 2009)
- Chen, Yi-Hui: Secret Hiding and Retrieval Techniques for Digital Media (Completion Date: 06, 2009)
- Lin, Pei-Yu: Removable Digital Watermarking and Image Protection Mechanisms (Completion Date: 06, 2009)
- Yang, Jen-Ho: Authentication Protocols for E-Commerce Applications (Completion Date: 06, 2009)
- Tai, Wei-Liang: Image Steganography and Reversible Data Embedding Techniques (Completion Date: 12, 2008)
- Chou, Yung-Chen: A Study of Digital Image Coding and Retrieving Techniques (Completion Date: 12, 2008)
- Lee, Jung-San: Security Technologies on Wireless Communications and Applications in Electronic Commerce (Completion Date: 03, 2008)
- Wu, Ming-Ni: Some Information Hiding Schemes for Various Image Types (Completion Date: November 2007)
- Wu, Wen-Chuan: The Study of Vector Quantization and Its Applications to Information Hiding (Completion Date: 07, 2007)
- Lee, Yu-Chiang: Fast Algorithms for Mining Frequent Itemsets (Completion Date: 05, 2007)
- Lin, Chih-Yang: Data Mining and Its Applications to Image Processing (Completion Date: 10, 2006)
- Chan, Chi-Hsiang: The Study of Image Steganography and Digital Watermarking (Completion Date: 12, 2005)
- Chang, Ya-Fen: Authentication and Digital Signature Schemes and Their Applications to E-commerce (Completion Date: 12, 2005)
- Lu, Tzu-Chun: The Study of Information Hiding Mechanisms (Completion Date: 12, 2005)
- Huang, Hui-Feng: The Design and Applications of Some Digital Signatures (Completion Date: 01, 2005)
- Chan, Chao-Wen: The Enhancements of Some Public Key Cryptosystems and Their Applications in Electronic Commerce (Completion Date: 01, 2005)
- Tseng, Hsien-Wen: Image Coding Schemes for Data Hiding and Error Resiliency (Completion Date: 01, 2005)
- Yu, Yuan-Hui: The Study of Digital Image Hiding and Recognition (Completion Date: 01, 2005)
- Chuang, Jun-Chou: Steganography and Watermarking in Digital Images (Completion Date: 10, 2004)
- Lai, Yi-Pong: Fast Exponentiation Computations and Number System Transformations (Completion Date: 07, 2004)
- Lin, Yung-Chang: Data Communication and Security in Mobile Computing Environment (Completion Date: 03, 2004)
- Tsai, Pi-Yu: The Study of Image Protection Mechanisms for Image Hiding and Image Authentication (Completion Date: 01, 2004)
- Huang, Kuo-Feng: Secure Encryption and Authentication Schemes for Text Data and Digital Images (Completion Date: 06, 2002)
- Wu, Hsien-Chu: Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery (Completion Date: 06, 2002)
- Tsai, Chui-Hsiung: A Study of Image Intellectual Property Rights Protection and Image Camouflage (Completion Date: 05, 2002)
- Hung, Kuo-Lung: Block Reconstruction Techniques for Image Recovery (Completion Date: 01, 2002)
- Chan, Yung-Kuan: Similar Image and Video Retrieval Systems Based on Spatial and Color Attributes (Completion Date: 12, 2000)
- Wang, Ching-Te: Designing Some Cryptographic Schemes for Group Communication Systems (Completion Date: 12, 1999)
- Chiang, Chi-Han: Effective Algorithms for Compressing Various Data (Completion Date: 12, 1999)
- Hu, Yu-Cheng: Some Image Encoding Schemes Based on Vector Quantization (Completion Date: 12, 1999)
- Li, Chin-Feng: Some Indexing Design and File Organizations for Spatial Match Retrieval (Completion Date: 06, 1998)
- Huang, Jen-Chun: Some Secret Sharing Schemes and Their Applications (Completion Date: 04, 1998)
- Lee, Wei-Bin: Designing Some Digital Signature Schemes and Extending Their Applications to Information Security Systems (Completion Date: 05, 1997)
- Lou, Te-Chuan: Fast Computations for Some Public Key Cryptosystems (Completion Date: 03, 1997)
- Chen, Chien-Yuan: The Study of Properties and Applications for Public Key Cryptosystem Based on Number Theorem (Completion Date: 04, 1996)
- Huang, Hsin-Chia: The Design and Server-Aided Secret Computation of Digital Signatures (Completion Date: 04, 1996)
- Chen, Chih-Ying: The Study of Properties for Local Queries in Multi-Key File Systems (Completion Date: 06, 1995)
- Shih, Chien-Chin: Some Properties on Vectorial Addition Chains (Completion Date: 12, 1994)
- Wu, Tsung-Cheng: Title: The Study of Encryption and Control Techniques for Information System (Completion Date: 06, 1992)
- Lin, Chu-Hsing: Some Control Mechanisms for Data Security in Computer Systems (Completion Date: 06, 1991)
Master students
- Jhang, R. F.: A Data Hiding Scheme for JPEG Images and Tamper Detection for Medical Images (Completion Date: 12, 2021)
- Kao, W. J.: The Data Hiding Mechanisms for VQ-Compressed Images and Cover Images Using some Innovative Techniques (Completion Date: 12, 2021)
- Shih, C. S.: An Improvement on VQ Compression Method and Hiding Information in VQ Decompressed Images (Completion Date: 07, 2020)
- Li, G. L.: Several Data Hiding Schemes for AMBTC Compressed Codes (Completion Date: 07, 2020)
- Zheng, Y. Z.: Several Authentication Schemes with Anonymity for Open Network Environment (Completion Date: 07, 2020)
- Sun, M.: Research on Copyright Protection Algorithm for Game Character Concept Design (Completion Date: 06, 2020)
- He, M. Z.: Research and Application on Data Hiding in Image (Completion Date: 06, 2020)
- He, M.: Research on Data Hiding Algorithm Based on Absolute Moment Block Truncation Coding (Completion Date: 06, 2020)
- He, S. L.: An Image Authentication Scheme Based on Compessed AMBTC with Restoration (Completion Date: 07, 2019)
- Hu, H. D.: Design of Secret Sharing Schemes and Its Application in Data Backup (Completion Date: 07, 2019)
- Zhuag, R. H.: Research of Searchable Encryption Scheme of Uncertain Data (Completion Date: 07, 2019)
- Li, X. S.: Research on Image Information Hiding Technology Based on Turtle Shell Matrix (Completion Date: 07, 2019)
- Yu, J. E.: Research and Application of QR Code Security Authentication (Completion Date: 03, 2019)
- Zeng, Q. F.: Adaptive Information Hiding with High Embedding Capacity Using Modification of Pixel Prediction Errors (Completion Date: 06, 2018)
- Tang, R.: Reserach of Block Based High Capacity Image Data Hiding Schemes (Completion Date: 05, 2018)
- Zhu, Z. H.: Steganography Based on Guitar Music (Completion Date: 05, 2018)
- Wang, J. Q.: Feature Selection and Detection Performance Improvement for Mining Fraud Web (Completion Date: 05, 2018)
- Lin, J.:Research of Classification Detecion Method for Highly Imbalanced Data of Web Spam(Completion Date: 05, 2018)
- Tan, J. F.: Integrating Cost-Sensitive and Deep Learning for Image Classification (Completion Date: 05, 2018)
- Sun, M. H.: The Reserach of Robust Hash Algorithm for Color Images (Completion Date: 07, 2017)
- Di, Y. F.: Research on Removable and High Robust Watermarking Scheme Based on Transform Domain (Completion Date: 07, 2017)
- Wu, Y. H.: Research of Reversible Data Hiding Algorithm Based on Image (Completion Date: 07, 2017)
- Mao, K.: Research on Image Information Hiding Technology Based on Hamming Code (Completion Date: 04, 2017)
- Hsu, W. L.: Research on Key Technology of Information Hiding Based on Image Space Domain (Completion Date: 04, 2017)
- Kuo, I: Research on Information Hiding Technology for Cloud Computing Security Application (Completion Date: 04, 2017)
- Kuo, P: Research on Multi-Feature Data Routing Strategy in Deduplication (Completion Date: 04, 2017)
- Kao, H: Research on the Application of Digital Watermarking in Privacy in Cloud Environment (Completion Date: 04, 2017)
- Peng, H. H.: Research on Credit Card Authentication Algorithm Based on Secret Sharing and Image Watermarking (Completion Date: 12, 2016)
- Chang, K. L.: QR Code Landscaping Algorithm and Security Mechanism Research (Completion Date: 12, 2016)
- Wu, C. H.: Certificateless Authentication Method on Wireless Body Area Network (Completion Date: 06, 2016)
- Lo, Y. Y.: Research on Key Agreement Authentication Method and Telemedicine Information System Authentication Method Based on Passing Code (Completion Date: 06, 2016)
- Chien, T. I.: Based on Image Sharpening and Image Compression and Encryption (Completion Date: 06, 2016)
- Wang, Y. K.: Embedded Information in the Absence of Distortion Data Compression Code, Compressed Images and Encrypted Image of the Study (Completion Date: 06, 2016)
- Wang, C. M.: Research on Reversible Data Hiding Technology of ABTC-EQ Compression Codes and AMBTC Decompression Images (Completion Date: 06, 2016)
- Hsu, C. I.: Research on Effective Color Image Retrieval Technology Based on Block Truncation Coding (Completion Date: 06, 2016)
- Jin, Q.: Research on optimized block truncation coding and data hiding algorithm based on compressed images (Completion Date: 06, 2016)
- Xia, B. B.: Reversible data hiding based on vector quantization (Completion Date: 06, 2016)
- Bai, J. l.: Some Techniques for Information Hiding in Images (Completion Date: 05, 2016)
- Chang, W. C.: Reversible Data Hiding for Encrypted and Compressed Digital Image (Completion Date: 06, 2015)
- Hsueh, H. S.: Data Hiding Schemes for Still Images and Videos (Completion Date: 06, 2015)
- Shih, T. H.: The Study of Reversible Authentication Techniques for Digital Images (Completion Date: 06, 2015)
- Yang, X. Q.: Semi-fragile Watermarking Algorithms for Tamper Detection and Image Authentication (Completion Date: 06, 2015)
- Li, F.: Reversible Image Hiding Algorithms based on Wavelet Transformation (Completion Date: 12, 2014)
- Hsueh, W. Y.: Multi-Server Remote User Authentication Mechanisms Using Smart Card (Completion Date: 06, 2014)
- Chou, Y. C.: A Study of Group Authentication and Data Protection (Completion Date: 06, 2014)
- Chung, T. F.: Authentication and Data Hiding Schemes for Digital Images (Completion Date: 06, 2014)
- Lin, M. C.: Embedding Secret Information in VQ Index Tables (Completion Date: 06, 2014)
- Yang, H. R.: Study on Data Hiding Algorithms Based on Compression Codes (Completion Date: 06, 2014)
- Jia, X. D.: Research on Privacy-preserving Identity Authentication Protocols in Vehicular Ad Hoc Networks (Completion Date: 06, 2014)
- Hsu, T. J. Some Data Hiding Techniques and Their Applications (Completion Date: 06, 2013)
- Chen, W. Y.: Authentication Protocols for Some E-commerce Applications (Completion Date: 06, 2013)
- Chen, Y. C.: Reversible Data Embedding Schemes for VQ-Compressed Images (Completion Date: 06, 2013)
- Sun, C. Y.: Secure and Efficient Authentication Schemes for Wireless Communications (Completion Date: 06, 2013)
- Tsai, H. Y.: Pixel Unexpanded Visual Cryptography Techniques Based on Meaningful Shadows (Completion Date: 06, 2012)
- Chang, C. H.: Some Smart Card Oriented Authentication Protocols for Mobile Communication (Completion Date: 06, 2012)
- Lin, C. C.: Information Hiding and Visual Secret Sharing Based on Exploiting Modification Direction (Completion Date: 06, 2012)
- Wang, S. T.: Novel Reversible Data Hiding Schemes for Secret Images and Traditional Chinese Text Files (Completion Date: 06, 2012)
- Liao, L. T.: Two Steganographic Schemes for Embedding Large Secret Information (Completion Date: 06, 2012)
- Chiu, Y. P.: The study of Distortion and Distortion free Visual Secret Sharing Scheme (Completion Date: 06, 2012)
- Lin, T. Y.: Information Hiding Techniques for Script Files and Image Files (Completion Date: 06, 2012)
- Yue, S.: Image Data Hiding Scheme Based on Graph Coloring (Completion Date: 06, 2011)
- Cui, S. Y.: Image Data Hiding Based on Voronoi Diagram (Completion Date: 06, 2011)
- Marcos Pizzolatti: The study of some reversible secret sharing schemes (Completion Date: 06, 2011)
- Vo Phuoc Hung: Sharing Secret Messages Using Meaningful Digital Shadow images (Completion Date: 06, 2011)
- Nguyen Thai Son: Reversible Data Hiding Techniques for VQ-compressed Domain (Completion Date: 06, 2011)
- Tsou, P. L.: Perceptual Robust Image Hashing Scheme Based on Halftone Mechanism and Non-Uniform Sampling (Completion Date: 06, 2011)
- Liu, C. M.: Non-Reversible and Reversible Data Hiding Based on Module Operation (Completion Date: 06, 2011)
- Chen, Y. W.: User Authentication and Key Agreement Protocols for Wireless Network Environment (Completion Date: 06, 2011)
- Chen, P. Y.: Reversible High-payload Information Hiding Scheme for Digital Cover Images and VQ Index Tables (Completion Date: 06, 2011)
- Tseng, W. T.: Authentication Protocols for Heterogeneous Communication Network Environment (Completion Date: 06, 2011)
- Yin, Z. X.: Hiding Information in Digital Images (Completion Date: 06, 2010)
- Wu, C. Y.: Reversible Data Hiding Schemes Using Repeatedly Embedding Strategy with High Capacity (Completion Date: 06, 2010)
- Tsai, M. C.: Digital Copyright Protection and Image Authentication Using Watermarking Strategy (Completion Date: 06, 2010)
- Liu, T. C.: The Study of Digital Images Embedding Techniques and Visual Secret Sharing Schemes (Completion Date: 06, 2010)
- Huynh, N. T.: Visual Cryptography for Users Verification (Completion Date: 06, 2010)
- Hsieh, M. H.: Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication Watermarking (Completion Date: 06, 2010)
- Huang, Y. C.: Mobile Conference Mechanism for Wireless Communication Users (Completion Date: 06, 2010)
- Lin, H. C.: Some Secret Embedding Schemes for Different Entities (Completion Date: 06, 2010)
- Li, Q.: A Study on Reversible Watermarking (Completion Date: 06, 2010)
- Liao, C. C.: The Study of Visually Sharing Secret Images (Completion Date: 06, 2009)
- Wang, H. C.: Embedding Secret Information in a Condenced Image and Multiple Image Files (Completion Date: 06, 2009)
- Chen, Y. C.: Segmentation and Classification Techniques for Retinal Images (Completion Date: 06, 2009)
- Chen, C. H.: Illumination-Balance Techniques for Text-photo Images (Completion Date: 06, 2009)
- Wu, Y. C.: Authenticated Communication Systems for E-mail Protocal and Vehicular Ad Hoc Networks (Completion Date: 06, 2009)
- Lai, Y. W.: Message Broadcasting and Electronic Voting Schemes Based on Elliptic Curve Cryptosystem (Completion Date: 06, 2009)
- Le, T. H. N.: Secret Sharing Using Multiple Shadow Images (Completion Date: 06, 2009)
- Liu, L. J.: The Detection of Visual Secret Shadow Cheating and Digital Image Tampering (Completion Date: 06, 2008)
- Wang, Yi-Ran: The Study of Data Hiding Based on Modification Direction Embedding Method (Completion Date: 06, 2008)
- Chuang, Lin-Yi: The Optimal Solution and Improvement of Exploiting Modification Direction Embedding Method (Completion Date: 06, 2008)
- Huang, W. H.: Two Efficient Demosaicking Algorithms for Color Filter Array (Completion Date: 06, 2008)
- Wang, G. H.: The Study of High Quality Stego-image for Large Payload (Completion Date: 06, 2008)
- Yang, S. R.: Scalable Key Assignment Protocols in Internet (Completion Date: 06, 2008)
- Yah, C. M.: Reversible Data Hiding Schemes for Large Payload and Low Distortion (Completion Date: 06, 2008)
- Lin, S. Y.: Key Establishment and Agreement Protocols and Their Application to Internet and Wireless Environments (Completion Date: 06, 2007)
- Li, K. M.: A Predictive SMVQ Scheme and Data Embedding for Digital Images (Completion Date: 06, 2007)
- Chang, K. J.: Authentication Mechanisms and a Payment Protocol for Wireless Environment (Completion Date: 06, 2007)
- Chiu, Y. C.: Some Authentication Schemes and Their Applications to Internet and Wireless Environments (Completion Date: 06, 2007)
- Lin, C. H.: Some Visual Cryptoschemes for Secret Images (Completion Date: 06, 2007)
- Cheng, T. F.: An IC-Card-Based Remote Login Mechanism and a Proxy Raffle System in Computer Networks (Completion Date: 06, 2007)
- Chang, S. C.: A Mutual Authentication Scheme and Its Application to Electronics Traveler Checks (Completion Date: 06, 2007)
- Fan, Y. H.: The Design and Analysis of Information Hiding and Secret Image Sharing Schemes (Completion Date: 06, 2006)
- Cheng, Y. F.: Some Information Security Applications using Symmetric and Asymmetric Crypto Schemes (Completion Date: 06, 2006)
- Shue, Y. W.: Some Key Management Protocols for Insecure Networks (Completion Date: 06, 2006)
- Chang, P. Y.: Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol (Completion Date: 06, 2006)
- Lin, K. C.: Some Efficient Techniques for Secure Peer-to-Peer Networking (Completion Date: 06, 2005)
- Kuo, J. Y.: Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures (Completion Date: 06, 2005)
- Kao, C. L.: On Authentication Protocols for Communication Networks (Completion Date: 06, 2005)
- Yeh, J. B.: Hiding Secrets in Data Compression Codes (Completion Date: 06, 2005)
- Wang, Y. Z.: Some Image Steganography Schemes with High Embedding Capacity (Completion Date: 06, 2005)
- Tseng, C. S.: Various Secret Embedding Schemes for Binary and Gray Level Techniques (Completion Date: 06, 2005)
- Lin, P. Y.: Two Data Hiding Schemes for Grayscale Images and Image Compression Codes (Completion Date: 06, 2004)
- Liu, Y. L.: The Techniques of Digital Image Transmission and Authentication (Completion Date: 06, 2004)
- Tai, Wei-Liang: Hiding a Digital Image into Two Cover Images (Completion Date: 06, 2004)
- Hu, Y. H.: Retrieving Digital Images from Frequency Domain Transformed Databases (Completion Date: 06, 2004)
- Chou, H. C.: Some Studies on Digital Image Steganographic and Watermarking Techniques (Completion Date: 07, 2003)
- Liao, C. T.: Some Image Compression and Data Protection Techniques Using Support Vector Machines (Completion Date: 06, 2003)
- Chen, G. M.: Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding (Completion Date: 06, 2003)
- Wu, Wen-Juan: Data Hiding and Content Retrieval in Digital Image Database (Completion Date: 06, 2003)
- Lee, C. F.: Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees (Completion Date: 06, 2003)
- Su, Y. Y.: Two Color Image Quantization Schemes for Non-true-color Display (Completion Date: 06, 2002)
- Chen, G. I.: TheStudy of Lossless Image Compression an Image Magnification (Completion Date: 06, 2002)
- Chung, C. Y.: Some Protocols for Passing Messages Securely and Protecting Rightful Ownership (Completion Date: 06, 2002)
- Pan,Y. P.: The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy (Completion Date: 06, 2002)
- Yu, T. X.: The Study of Digital Image Ciphering and Hiding Mechanisms (Completion Date: 06, 2001)
- Chan, C. S.: Some Data Hiding Techniques for Digital Images (Completion Date: 06, 2001)
- Yeh, J. C.: The Study of Copyright Protection Schemes for Digital Images (Completion Date: 06, 2001)
- Jiang, J. L.: The Design of Some Filter for Image Denoising (Completion Date: 06, 2001)
- Lu, P. W.: The Application of Vector Quantization Techniques to Digital Image Tamper Proofing (Completion Date: 06, 2001)
- Hsieh, C. P.: The Study of Denoising Technique for Digital Images (Completion Date: 06, 2001)
- Chuang, J. C.: The Study of Image Tampering Detection (Completion Date: 06, 2000)
- Hsia, H.C.: Two Hiding Techniques for Data Security and Image Copyright Protection (Completion Date: 06, 2000)
- Lin, Y.: Image Compression and Copyright Protection Using Edge Detection Methods (Completion Date: 06, 2000)
- Xiao, G. X.: Two Prediction Methods for Image Compression and Progressive Image Transmission (Completion Date: 06, 2000)
- Chung, P. F.: Two Copyright Protection Scheme for Digital Images (Completion Date: 06, 2000)
- Kuo, Y. T.: Fast Algorithm for Some Meta-Operations in Cryptographic Systems (Completion Date: 06, 1999)
- Chen, Kuo-Lun: Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme (Completion Date: 06, 1999)
- Shine, F. C.: Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane (Completion Date: 06, 1998)
- Hwang, P. C.: Accessing Shared Secrets in a Hierarchy (Completion Date: 06, 1998)
- Jau, J. J.: Image Compression and Transmission Using Vector Quantization and S-tree (Completion Date: 06, 1998)
- Chen, L. L.Some Searching Techniques for Block Motion Estimation for Video Compression (Completion Date: 06, 1997)
- Sung, C. H.: Locally Adaptive Schemes for Data Compression Using Multilist Structure (Completion Date: 06, 1997)
- Chou, J. S.: An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook (Completion Date: 06, 1996)
- Kuo, C. L.: Fast Codeword Search Techniques for Vector Quantization (Completion Date: 06, 1995)
- Leu, JJyh-Jong: The Performance Analysis of Bloom and Random Filters (Completion Date: 05, 1995)
- Li, W. T.: A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique (Completion Date: 05, 1995)
- Lin, D. C.: Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters (Completion Date: 05, 1995)
- Horng, W. J.: A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm (Completion Date: 05, 1994)
- Wu, W. B.: A Secure Voting System on a Public Network (Completion Date: 05, 1994)
- Jiang, J. H.: A Spatial Filter for Similarity Retrieval (Completion Date: 05, 1994)
- Tsu, S. M.: An Improvement on a Probabilistic Encryption Scheme and Its Applications (Completion Date: 05, 1994)
- Lee, C. F.: A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems (Completion Date: 05, 1994)
- Lin, T. H.: A Secure Group-Oriented Secret Sharing Scheme (Completion Date: 05, 1993)
- Liao, W. Y.: A Remote password authentication scheme based upon ElGamal's signature scheme (Completion Date: 05, 1993)
- Wang, C. H.: A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters (Completion Date: 05, 1993)
- Liou, F. Y.: A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme (Completion Date: 05, 1993)
- Lee, W. B.: On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses (Completion Date: 05, 1993)
- Kowng, H. C.: A Digital Signature Scheme Based Upon Theory of Quadratic Residues (Completion Date: 05, 1992)
- Chen, Y. W.: A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis (Completion Date: 05, 1992)
- Chen, C. Y.: A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method (Completion Date: 05, 1992)
- Lee, H.C.: A Solution to Generalized Group Oriented Cryptography (Completion Date: 05, 1992)
- Hwang, S. J.: Sharing a Dynamic Secret (Completion Date: 11, 1991)
- Hwang, R. J.: Controlling Access in Hierarchical Structures Using Cryptographic Keys (Completion Date: 11, 1991)
- Wang, S. J.: A Dynamic Key-Lock-Pair Access Control Scheme (Completion Date: 05, 1991)
- Lin, J. F.: A Chinese Syllables Compression Scheme Based Upon Perfect Hashing (Completion Date: 05, 1990)
- Hwang, S. M.: A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid (Completion Date: 05, 1990)
- Chen, D. C.: A Modified Arithmetic Coding Scheme Suitable for Binary Search (Completion Date: 05, 1990)
- Dai, J. Y.: Sharing a Circular Storage for Multiple Stacks (Completion Date: 05, 1990)
- Lin, J. C.: A Fast Spatial Match Accessing Scheme for Symbolic Pictures (Completion Date: 05, 1990)
- Wu, C. H.: The Study of Security Technologies for Broadcasted Network Systems (Completion Date: 05, 1989)
- Wu, L. H.: An Arithmetic Coding Oriented Single Key Access Control Scheme (Completion Date: 05, 1989)
- Liao, H. T.: A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control (Completion Date: 05, 1989)
- Wu, T. C.: The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry (Completion Date: 05, 1989)
- Chow, L. C.: The Study of Visual Form Transformation System (Completion Date: 05, 1989)
- Chou, A. Y. H.: The Study of File Systems Suitable for Queries (Completion Date: 05, 1989)
- Leu, D. F.: Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely (Completion Date: 05, 1988)
- Hsiao, J. Y.: Strings Near-Matching Techniques for Large Textual Files (Completion Date: 05, 1988)
- Chen, C. H.: Organizing Distributed Data Based for Parallel Searching (Completion Date: 05, 1988)
- Chang, S. S.: Optimal Properties of Binary Cartesian Product File System (Completion Date: 05, 1988)
- Mong, I. H.: A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm (Completion Date: 05, 1988)
- Wang, C. T.: The Development of a Computer Assisted Instruction System for Structure Assembly Languages (Completion Date: 05, 1987)
- Wu, H.C.: The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System (Completion Date: 05, 1987)
- Chen, C. H.: The Study of Data Missing and Data Integrity (Completion Date: 05, 1987)
- Chang, C. H.: A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem (Completion Date: 05, 1987)
- Cheng, W. Y.: The Study of a User-Hierarchy Mechanism for Computer System Resources (Completion Date: 05, 1987)
- Lin, C. H.: A Strategy of Information Secure Broadcasting (Completion Date: 05, 1986)
- Lee, Y. P.: A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing (Completion Date: 05, 1986)
- Hsiao, M. D.: The Study of File Allocation Strategies for Concurrent Retrieval (Completion Date: 05, 1986)
- Chen, H. Y.: Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems (Completion Date: 05, 1986)
- Chen, C. P.: A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem (Completion Date: 05, 1986)
- Shieh, J. C.: Hung, M. F.An Access Control Mechanism for Information Protection System (Completion Date: 05, 1986)
- Shieh, J. C.: On the Design of Letter Oriented Minimal Perfect Hashing Functions (Completion Date: 05, 1985)
- Tsai, W. H.: A Branch and Bound Algorithm for Allocating Multi-attribute File Systems (Completion Date: 05, 1985)
- Yuan, S. T.: A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems (Completion Date: 05, 1985)
- Liang, J.: Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions (Completion Date: 05, 1984)
- Lian, L. S.: Toward the Strict Optimality Study on Concurrent Disk Accessing (Completion Date: 05, 1984)
- Su, D. H.: Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries (Completion Date: 05, 1984)
- Shen, Jau-Ji: Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System (Completion Date: 05, 1984)