• Taiwan

Research Output 1992 2019

Filter
Conference contribution
2019

Dual image reversible data hiding based on modified LSB matching method

Tseng, H. W., Lu, H. X. & Leng, H-S., 2019 Jan 1, Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Tsai, P-W., Ito, A., Jain, L. C., Jain, L. C., Pan, J-S. & Jain, L. C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 256-263 8 p. (Smart Innovation, Systems and Technologies; vol. 109).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pixels
Image quality
Imaging techniques
Matching method
2018

A new data hiding strategy based on pixel-value-differencing method

Leng, H-S., 2018 Jan 1, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,. Pan, J-S., Tsai, P-W., Jain, L. C. & Watada, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 21-28 8 p. (Smart Innovation, Systems and Technologies; vol. 81).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pixels
Optimal design
1 Citation (Scopus)

Data hiding scheme based on regular octagon-shaped shells

Leng, H-S., 2018 Jan 1, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,. Pan, J-S., Tsai, P-W., Jain, L. C. & Watada, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 29-35 7 p. (Smart Innovation, Systems and Technologies; vol. 81).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pixels
Shell
Disadvantage

Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

Tseng, Y-M., Wu, J. D., Hung, R. W. & Chien, H. Y., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 251-256 6 p. 8517196. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Cryptography
certification
Equipment and Supplies
energy consumption
2 Citations (Scopus)

Maximizing the payload of the octagon-shaped shell-based data hiding scheme

Leng, H-S. & Tseng, H. W., 2018 Jan 12, Proceedings - 2017 IEEE 8th International Conference on Awareness Science and Technology, iCAST 2017. Institute of Electrical and Electronics Engineers Inc., p. 45-49 5 p. (Proceedings - 2017 IEEE 8th International Conference on Awareness Science and Technology, iCAST 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Octagon
Data Hiding
Shell
Heuristic methods
Human Visual System
1 Citation (Scopus)

Some Study of Applying Infra-Red in Agriculture IoT

Chien, H. Y., Tseng, Y-M. & Hung, R. W., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 241-245 5 p. 8517239. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Agriculture
Internet
agriculture
Infrared radiation
Facility Regulation and Control
2017

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

Tsai, T. T., Tseng, Y-M., Hung, Y. H. & Huang, S-S., 2017 Aug 10, Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. Tsai, P-W., Watada, J. & Kubota, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 56-59 4 p. 8008639. (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

attack
integrity
logarithms
Attack
Data integrity
1 Citation (Scopus)

High payload data hiding based on just noticeable distortion profile and LSB substitution

Leng, H-S. & Tseng, H. W., 2017 Jan 1, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2016. Huang, H-C., Pan, J-S. & Tsai, P-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 59-66 8 p. (Smart Innovation, Systems and Technologies; vol. 63).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Substitution reactions
Conveying
Image quality
Pixels
Internet
1 Citation (Scopus)

Secure certificateless signature resisting to continual leakage attacks

Tseng, Y-M., Huang, S-S. & Wu, J. D., 2017 Jul 21, Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017. Meen, T-H., Lam, A. D. K-T. & Prior, S. D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1263-1266 4 p. 7988127

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key cryptography
cryptography
attack
leakage
signatures
2014

An efficient and simplified data hiding technique based on 2's complement

Lu, T. C., Tseng, C. Y., Chen, C. M., Leng, H-S. & Huang, Y. H., 2014 Jan 1, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Institute of Electrical and Electronics Engineers Inc., p. 126-129 4 p. 6998284

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pixels
Costs

Data hiding scheme based on edge detection and triangular mirroring

Lu, T. C., Tseng, C. Y., Leng, H-S. & Huang, C. C., 2014 Jan 1, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 142-145 4 p. 6998288. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Edge detection
Interpolation
Detectors
5 Citations (Scopus)

Efficient anonymous multi-receiver ID-based encryption with constant decryption cost

Tseng, Y. M., Tsai, T. T., Huang, S. S. & Chien, H. Y., 2014 Nov 5, Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Li, S., Cheng, Y., Dai, Y. & Jiang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 131-137 7 p. 6948083. (Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Costs
2012
12 Citations (Scopus)

CCA-secure anonymous multi-receiver ID-based encryption

Tseng, Y-M., Huang, Y. H. & Chang, H. J., 2012 May 14, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 177-182 6 p. 6185119. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
10 Citations (Scopus)

Revocable ID-based signature scheme with batch verifications

Wu, T. Y., Tsai, T. T. & Tseng, Y. M., 2012 Oct 11, Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012. p. 49-54 6 p. 6274399. (Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Network protocols
2011
1 Citation (Scopus)

A convinced commitment scheme for bilinear Diffie-Hellman problem

Tseng, Y-M., Wu, T. Y. & Tsai, T. T., 2011 Sep 1, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 156-161 6 p. 5967536

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2010
2 Citations (Scopus)

A novel convinced diffie-hellman computation scheme and its cryptographic application

Tseng, Y. M. & Wu, T. Y., 2010 May 20, Computational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings. PART 4 ed. p. 225-235 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6019 LNCS, no. PART 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Diffie-Hellman
Group Key Agreement
Key Agreement Protocol
Fault tolerance
Cryptography
2009
6 Citations (Scopus)

Towards efficient ID-based signature schemes with batch verifications from bilinear pairings

Tseng, Y-M., Wu, T. Y. & Wu, J. D., 2009 Oct 12, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 935-940 6 p. 5066590. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Costs
2007
10 Citations (Scopus)

A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices

Tseng, Y. M., Wu, T. Y. & Wu, J. D., 2007 Dec 31, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007. p. 700-705 6 p. 4291197. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Wireless networks
Smart cards
Servers
Costs
2006
5 Citations (Scopus)

On the security of two group key agreement protocols for mobile devices

Tseng, Y-M., 2006 Nov 21, 7th International Conference on Mobile Data Management, 2006. MDM 2006. Vol. 2006. 1630633

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Wireless networks
Network protocols
2004
6 Citations (Scopus)

An efficient authentication protocol for integrating WLAN and cellular networks

Tseng, Y-M., Yang, C. C. & Su, J. H., 2004 Jun 28, 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. p. 416-420 5 p. (6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless local area networks (WLAN)
Authentication
Network protocols
Quality of service
Internet
1999
17 Citations (Scopus)

New digital signature with subliminal channels based on the discrete logarithm problem

Jan, J. K. & Tseng, Y-M., 1999 Jan 1, Proceedings - 1999 lnternational Workshops on Parallel Processing, ICPP 1999. Institute of Electrical and Electronics Engineers Inc., Vol. 1999-September. p. 198-203 6 p. 800062

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm Problem
Electronic document identification systems
Digital Signature
Receiver
Discrete Logarithm
1998
22 Citations (Scopus)

ID-based cryptographic schemes using a non-interactive public-key distribution system

Tseng, Y. M. & Jan, J. K., 1998 Jan 1, Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, p. 237-243 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Cryptography
Composite materials