The SCEAS System
Navigation Menu

Search the dblp DataBase


Hsien-Chu Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai
    A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:406-415 [Conf]
  2. Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu
    A DCT-based Recoverable Image Authentication. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  3. Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang
    Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  4. Hsien-Chu Wu, Chin-Chen Chang
    A novel digital image watermarking scheme based on the vector quantization technique. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:460-471 [Journal]
  5. Hsien-Chu Wu, Chin-Chen Chang
    Hiding Digital Watermarks Using Fractal Compression Technique. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:189-202 [Journal]
  6. Hsien-Chu Wu, Chin-Chen Chang
    Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:63, n:1, pp:89-106 [Journal]
  7. Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu
    A Secure Strong-Password Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:68, n:4, pp:399-406 [Journal]
  8. Hsien-Chu Wu, Chin-Chen Chang
    An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:4, pp:481-493 [Journal]
  9. Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu
    A new multi-secret images sharing scheme using Largrange's interpolation. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:3, pp:327-339 [Journal]
  10. Hsien-Chu Wu, Chin-Chen Chang
    Detection and restoration of tampered JPEG compressed images. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:64, n:2, pp:151-161 [Journal]

  11. A Block-Based Authentication Watermarking Technique for Binary Images. [Citation Graph (, )][DBLP]

  12. Tamper Detection of Relational Database Based on SVR Predictive Difference. [Citation Graph (, )][DBLP]

  13. An Image Steganographic Scheme Based on Support Vector Regression. [Citation Graph (, )][DBLP]

  14. Lossless Data Hiding for Color Images. [Citation Graph (, )][DBLP]

  15. Color Visual Cryptography Scheme Using Meaningful Shares. [Citation Graph (, )][DBLP]

  16. Multi-level visual secret sharing scheme with smooth-looking. [Citation Graph (, )][DBLP]

  17. Image segmentation by automatic histogram thresholding. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002