• Taiwan

Research Output

Filter
Conference contribution
2019

Dual image reversible data hiding based on modified LSB matching method

Tseng, H. W., Lu, H. X. & Leng, H. S., 2019 Jan 1, Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Tsai, P-W., Ito, A., Jain, L. C., Jain, L. C., Pan, J-S. & Jain, L. C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 256-263 8 p. (Smart Innovation, Systems and Technologies; vol. 109).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Exploration of Fast Edible Oil Classification Using Infrared Spectrum, Machine Learning, and Chemometrics

Chien, H. Y., Shih, A. T. & Tseng, Y. M., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923564. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Finding Longest (s, t)-paths of O-shaped Supergrid Graphs in Linear Time

Hung, R. W., Keshavarz-Kohjerdi, F., Tseng, Y. M. & Qiu, G. H., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923400. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A new data hiding strategy based on pixel-value-differencing method

Leng, H. S., 2018 Jan 1, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,. Pan, J-S., Tsai, P-W., Jain, L. C. & Watada, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 21-28 8 p. (Smart Innovation, Systems and Technologies; vol. 81).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data hiding scheme based on regular octagon-shaped shells

Leng, H. S., 2018 Jan 1, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,. Pan, J-S., Tsai, P-W., Jain, L. C. & Watada, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 29-35 7 p. (Smart Innovation, Systems and Technologies; vol. 81).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

Tseng, Y. M., Wu, J. D., Hung, R. W. & Chien, H. Y., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 251-256 6 p. 8517196. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Some Study of Applying Infra-Red in Agriculture IoT

Chien, H. Y., Tseng, Y. M. & Hung, R. W., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 241-245 5 p. 8517239. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2017

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

Tsai, T. T., Tseng, Y. M., Hung, Y. H. & Huang, S. S., 2017 Aug 10, Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. Tsai, P-W., Watada, J. & Kubota, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 56-59 4 p. 8008639. (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

High payload data hiding based on just noticeable distortion profile and LSB substitution

Leng, H. S. & Tseng, H. W., 2017 Jan 1, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2016. Huang, H-C., Pan, J-S. & Tsai, P-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 59-66 8 p. (Smart Innovation, Systems and Technologies; vol. 63).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Maximizing the payload of the octagon-shaped shell-based data hiding scheme

Leng, H. S. & Tseng, H. W., 2017 Jul 1, Proceedings - 2017 IEEE 8th International Conference on Awareness Science and Technology, iCAST 2017. Institute of Electrical and Electronics Engineers Inc., p. 45-49 5 p. (Proceedings - 2017 IEEE 8th International Conference on Awareness Science and Technology, iCAST 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Secure certificateless signature resisting to continual leakage attacks

Tseng, Y. M., Huang, S. S. & Wu, J. D., 2017 Jul 21, Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017. Meen, T-H., Lam, A. D. K-T. & Prior, S. D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1263-1266 4 p. 7988127. (Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2014

An efficient and simplified data hiding technique based on 2's complement

Lu, T. C., Tseng, C. Y., Chen, C. M., Leng, H. S. & Huang, Y. H., 2014 Dec 24, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 126-129 4 p. 6998284. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data hiding scheme based on edge detection and triangular mirroring

Lu, T. C., Tseng, C. Y., Leng, H. S. & Huang, C. C., 2014 Dec 24, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 142-145 4 p. 6998288. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient anonymous multi-receiver ID-based encryption with constant decryption cost

Tseng, Y. M., Tsai, T. T., Huang, S. S. & Chien, H. Y., 2014 Nov 5, Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Li, S., Cheng, Y., Dai, Y. & Jiang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 131-137 7 p. 6948083. (Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2012

CCA-secure anonymous multi-receiver ID-based encryption

Tseng, Y-M., Huang, Y. H. & Chang, H. J., 2012 May 14, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 177-182 6 p. 6185119. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Revocable ID-based signature scheme with batch verifications

Wu, T. Y., Tsai, T. T. & Tseng, Y. M., 2012, Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012. p. 49-54 6 p. 6274399. (Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)
2011

A convinced commitment scheme for bilinear Diffie-Hellman problem

Tseng, Y-M., Wu, T. Y. & Tsai, T. T., 2011 Sep 1, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 156-161 6 p. 5967536

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2010

A novel convinced diffie-hellman computation scheme and its cryptographic application

Tseng, Y. M. & Wu, T. Y., 2010 May 20, Computational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings. PART 4 ed. p. 225-235 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6019 LNCS, no. PART 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2009

Towards efficient ID-based signature schemes with batch verifications from bilinear pairings

Tseng, Y-M., Wu, T. Y. & Wu, J. D., 2009 Oct 12, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 935-940 6 p. 5066590. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2007

A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices

Tseng, Y. M., Wu, T. Y. & Wu, J. D., 2007 Dec 31, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007. p. 700-705 6 p. 4291197. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)
2006

On the security of two group key agreement protocols for mobile devices

Tseng, Y. M., 2006 Nov 21, 7th International Conference on Mobile Data Management, 2006. MDM 2006. 1630633. (Proceedings - IEEE International Conference on Mobile Data Management; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2004

An efficient authentication protocol for integrating WLAN and cellular networks

Tseng, Y-M., Yang, C. C. & Su, J. H., 2004 Jun 28, 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. p. 416-420 5 p. (6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
1999

New digital signature with subliminal channels based on the discrete logarithm problem

Jan, J. K. & Tseng, Y. M., 1999 Jan 1, Proceedings - 1999 lnternational Workshops on Parallel Processing, ICPP 1999. Institute of Electrical and Electronics Engineers Inc., p. 198-203 6 p. 800062. (Proceedings of the International Conference on Parallel Processing; vol. 1999-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)
1998

ID-based cryptographic schemes using a non-interactive public-key distribution system

Tseng, Y. M. & Jan, J. K., 1998 Jan 1, Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, p. 237-243 7 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)