The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeng-Shyang Pan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan
    An Efficient K -Medoids-Based Algorithm Using Previous Medoid Index, Triangular Inequality Elimination Criteria, and Partial Distance Search. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2002, pp:63-72 [Conf]
  2. Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan
    A Novel VQ-Based Watermarking Scheme with Genetic Codebook Partition. [Citation Graph (0, 0)][DBLP]
    HIS, 2003, pp:1003-1012 [Conf]
  3. J. S. Pan, Z. M. Lu, S. H. Sun
    VQ Image Coding Using Sub-Vector Techniques. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  4. Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan
    Hadamard transform based equal-average equal-variance equal-norm nearest neighbor codeword search algorithm. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:671-674 [Conf]
  5. Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun
    Improved partial distance search for k nearest-neighbor classification. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1275-1278 [Conf]
  6. Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan
    Design of hierarchical keys for a multi-user-based watermarking system. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:919-922 [Conf]
  7. Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain, Hsiang-Cheh Huang
    A VQ-based image-in-image data hiding scheme. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2191-2194 [Conf]
  8. Fan Gu, Zhe-Ming Lu, Jeng-Shyang Pan
    Multipurpose image watermarking in DCT domain using subsampling. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2005, pp:4417-4420 [Conf]
  9. Jeng-Shyang Pan, Min-Tsang Sung, Hsiang-Cheh Huang, Bin-Yih Liao
    Robust VQ-based digital watermarking for memoryless binary symmetric channel. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:580-583 [Conf]
  10. Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain
    Shadow watermark embedding system. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2005, pp:4975-4978 [Conf]
  11. Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan, Che-Jen Su
    Parallel Ant Colony Systems. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2003, pp:279-284 [Conf]
  12. Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan
    A Multi-user Based Watermarking System with Two-Security-Level Keys. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:40-50 [Conf]
  13. Zhe-Ming Lu, Hao Luo, Jeng-Shyang Pan
    Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:71-81 [Conf]
  14. Jeng-Shyang Pan, Feng-Hsing Wang, Lakhmi C. Jain, Nikhil Ichalkaranje
    A Multistage VQ Based Watermarking Technique with Fake Watermarks. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:81-90 [Conf]
  15. Ping Chen, Kagenori Nagao, Yao Zhao, Jeng-Shyang Pan
    Print and Generation Copy Image Watermarking Based on Spread Spectrum Technique. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1076-1082 [Conf]
  16. Hsiang-Cheh Huang, Kang K. Yen, Yu-Hsiu Huang, Jeng-Shyang Pan, Kuang-Chih Huang
    Improved Image Coding with Classified VQ and Side-Match VQ. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:411-417 [Conf]
  17. Ping-Sung Liao, Jeng-Shyang Pan, Yen-Hung Chen, Bin-Yih Liao
    A Lossless Watermarking Technique for Halftone Images. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:593-599 [Conf]
  18. Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun
    An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:353-358 [Conf]
  19. Feng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan
    Shadow Watermark Extraction System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1115-1121 [Conf]
  20. YongJie Wang, Yao Zhao, Jeng-Shyang Pan, ShaoWei Weng
    A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1168-1174 [Conf]
  21. ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan
    Reversible Watermarking Based on Improved Patchwork Algorithm and Symmetric Modulo Operation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:317-323 [Conf]
  22. Bin Yan, Zhe-Ming Lu, Sheng-He Sun, Jeng-Shyang Pan
    Speech Authentication by Semi-fragile Watermarking. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:497-504 [Conf]
  23. J. S. Pan, Z. M. Lu, S. H. Sun
    Image Coding Using SMVQ with Two-level Block Classifier. [Citation Graph (0, 0)][DBLP]
    ISMSE, 2000, pp:276-282 [Conf]
  24. Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain, Hsiang-Cheh Huang
    VQ-Based Gray Watermark Hiding Scheme and Genetic Index Assignment. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2004, pp:73-80 [Conf]
  25. Shu-Chuan Chu, John F. Roddick, Che-Jen Su, Jeng-Shyang Pan
    Constrained Ant Colony Optimization for Data Clustering. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2004, pp:534-543 [Conf]
  26. Shu-Chuan Chu, Pei-wei Tsai, Jeng-Shyang Pan
    Cat Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2006, pp:854-858 [Conf]
  27. Ping Chen, Yao Zhao, Jeng-Shyang Pan
    Image Watermarking Robust to Print and Generation Copy. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:496-500 [Conf]
  28. Yue-Nan Li, Chun-He Liu, Zhe-Ming Lu, Jeng-Shyang Pan
    Robust Image Watermarking Algorithm Based on Predictive Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:491-494 [Conf]
  29. Chao-Chin Chang, Chin-Shiuh Shieh, Jeng-Shyang Pan, Bin-Yih Liao, Lin Hong
    An Improved Digital Watermarking Scheme in the Domain of Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:483-486 [Conf]
  30. Chuang Lin, Jeng-Shyang Pan
    Robust VQ-Based Digital Image Watermarking for Noisy Channel. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:673-676 [Conf]
  31. Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao
    A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:113-116 [Conf]
  32. Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Bin-Yih Liao
    Joint Halftoning and Visible Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:109-112 [Conf]
  33. Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu, Hsiang-Cheh Huang
    Reversible Data Hiding for 3D Point Cloud Model. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:487-490 [Conf]
  34. Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan, Jiun-Huei Ho
    A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:305-308 [Conf]
  35. Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin
    A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:47-50 [Conf]
  36. Jun-Bao Li, Shu-Chuan Chu, Jung-Chou Harry Chang, Jeng-Shyang Pan
    Discriminant Feature Fusion Strategy for Supervised Learning. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:301-304 [Conf]
  37. Ping-Sung Liao, Cheng-Yi Chen, Chun-Chi Chen, Jeng-Shyang Pan
    Interlacing Domain Partition for Fractal Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:441-444 [Conf]
  38. Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi
    An Information Hiding Scheme for OFDM Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:51-54 [Conf]
  39. Ping-He Huang, Jing-Yong Su, Zhe-Ming Lu, Jeng-Shyang Pan
    A Fire-Alarming Method Based on Video Processing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:359-364 [Conf]
  40. Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan
    A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:282-285 [Journal]
  41. Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan
    Vq-Based Gray Watermark Embedding Scheme With Genetic Index Assignment. [Citation Graph (0, 0)][DBLP]
    International Journal of Computational Intelligence and Applications, 2004, v:4, n:2, pp:165-181 [Journal]
  42. Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan
    Ant colony system with communication strategies. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2004, v:167, n:1-4, pp:63-76 [Journal]
  43. Magdi S. Mahmoud, Peng Shi, Jianqiang Yi, Jeng-Shyang Pan
    Robust observers for neutral jumping systems with uncertain information. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:16, pp:2355-2385 [Journal]
  44. Shu-Chuan Chu, Zhe-Ming Lu, Jeng-Shyang Pan
    Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:3, pp:734-746 [Journal]
  45. Jui-Fang Chang, Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan
    A Parallel Particle Swarm Optimization Algorithm with Communication Strategies. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:4, pp:809-818 [Journal]
  46. Tsong-Yi Chen, Xiao-Dan Mei, Jeng-Shyang Pan, Sheng-He Sun
    Optimization of HMM by the Tabu Search Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:5, pp:949-957 [Journal]
  47. Hsiang-Cheh Huang, Shu-Chuan Chu, Jeng-Shyang Pan, Zhe-Ming Lu
    A Tabu Seach Based Maximum Descent Algorithm for VQ Codebook Design. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:5, pp:753-762 [Journal]
  48. Jeng-Shyang Pan
    A Training Approach for Efficient VQ Codeword Search. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:3, pp:375-382 [Journal]
  49. Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan
    An Embedding Algorithm for Multiple Watermarks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:2, pp:381-395 [Journal]
  50. Jeng-Shyang Pan, Fergus R. McInnes, Mervyn A. Jack
    Fast clustering algorithms for vector quantization. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1996, v:29, n:3, pp:511-518 [Journal]
  51. Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan
    Genetic watermarking based on transform-domain techniques. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2004, v:37, n:3, pp:555-565 [Journal]
  52. Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun
    An efficient encoding algorithm for vector quantization based on subvector technique. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2003, v:12, n:3, pp:265-270 [Journal]
  53. Hsiang-Cheh Huang, Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun, Hsueh-Ming Hang
    Vector quantization based on genetic simulated annealing. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:7, pp:1513-1523 [Journal]
  54. Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan
    A Criterion for Learning the Data-Dependent Kernel for Classification. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:365-376 [Conf]
  55. Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan
    Locally Discriminant Projection with Kernels for Feature Extraction. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:586-593 [Conf]
  56. Jun-Bao Li, Jeng-Shyang Pan, Zhe-Ming Lu, Jung-Chou Harry Chang
    Complete Kernel Fisher discriminant analysis of Gabor features with fractional power polynomial models for face recognition. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  57. Jun-Bao Li, Jeng-Shyang Pan, Shu-Chuan Chu
    Face Recognition from a Single Image per Person Using Common Subfaces Method. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:905-912 [Conf]
  58. Feng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan
    Multiuser-based shadow watermark extraction system. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:12, pp:2522-2532 [Journal]
  59. Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan
    VQ-based watermarking scheme with genetic codebook partition. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:4-23 [Journal]

  60. A Double Domain Based Robust Digital Image Watermarking Scheme. [Citation Graph (, )][DBLP]


  61. Image Segmentation Based on GC-CV. [Citation Graph (, )][DBLP]


  62. A Particle Swarm Optimization with Feasibility-Based Rules for Mixed-Variable Optimization Problems. [Citation Graph (, )][DBLP]


  63. RBF Neural Network Based on Fuzzy Evolution Kalman Filtering and Application in Mine Safety Monitoring. [Citation Graph (, )][DBLP]


  64. A Novel Reversible Watermarking Based on an Integer Transform. [Citation Graph (, )][DBLP]


  65. MRS-MIL: Minimum reference set based multiple instance learning for automatic image annotation. [Citation Graph (, )][DBLP]


  66. Reversible watermarking based on PMO of triplets. [Citation Graph (, )][DBLP]


  67. A Novel High-Capacity Reversiblewatermarking Scheme. [Citation Graph (, )][DBLP]


  68. High capacity watermark embedding based on local invariant features. [Citation Graph (, )][DBLP]


  69. An Improved Particle Swarm Optimization with Feasibility-Based Rules for Constrained Optimization Problems. [Citation Graph (, )][DBLP]


  70. Hiding watermark in watermark [image watermarking]. [Citation Graph (, )][DBLP]


  71. Multiple description watermarking for lossy network. [Citation Graph (, )][DBLP]


  72. Robust Image Watermarking Using Mean Quantization in DTCWT Domain. [Citation Graph (, )][DBLP]


  73. Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding. [Citation Graph (, )][DBLP]


  74. A Novel Image Annotation Scheme Based on Neural Network. [Citation Graph (, )][DBLP]


  75. Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHT. [Citation Graph (, )][DBLP]


  76. Reversible Watermarking Based on the Invariant Sum Value. [Citation Graph (, )][DBLP]


  77. A GA-Based Image Halftoning Technique. [Citation Graph (, )][DBLP]


  78. A Robust Audio Watermarking Algorithm Based on DCT and Vector Quantization. [Citation Graph (, )][DBLP]


  79. Lossless and Lossy Image Secret Sharing for Data Transmission. [Citation Graph (, )][DBLP]


  80. Multiple Watermarking in Visual Cryptography. [Citation Graph (, )][DBLP]


  81. Scale-Space Feature Based Image Watermarking in Contourlet Domain. [Citation Graph (, )][DBLP]


  82. Non-redundant VQ channel coding using modified tabu search approach with simulated annealing. [Citation Graph (, )][DBLP]


  83. Evaluation of fuzzy rule bases under delayed reinforcement. [Citation Graph (, )][DBLP]


  84. A new inequality for VQ image coding. [Citation Graph (, )][DBLP]


  85. A fast image coding algorithm using variable-rate mean-match correlation vector quantization. [Citation Graph (, )][DBLP]


  86. Research and Implementation of Service-oriented Architecture Supporting Locationbased Services on Sensor Networks. [Citation Graph (, )][DBLP]


  87. The triple-watermarking algorithm with multiple description coding over lossy communication networks. [Citation Graph (, )][DBLP]


  88. Evolutionary Feature Selection for Texture Classification Using Multiwavelets. [Citation Graph (, )][DBLP]


  89. 2-D Non-Separable Wavelet Bases for Texture Classification with Genetic Feature Selection. [Citation Graph (, )][DBLP]


  90. The Application and Study of Graph Cut in Motion Segmentation. [Citation Graph (, )][DBLP]


  91. Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning. [Citation Graph (, )][DBLP]


  92. A New Vector Particle Swarm Optimization for Constrained Optimization Problems. [Citation Graph (, )][DBLP]


  93. An Efficient Reformative Kernel Discriminant Analysis for Face Recognition. [Citation Graph (, )][DBLP]


Search in 1.252secs, Finished in 1.255secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002