The SCEAS System
Navigation Menu

Search the dblp DataBase


Chwei-Shyong Tsai: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Min-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai
    On the Security of an Enhanced Authentication Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:160-163 [Conf]
  2. Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai
    A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:406-415 [Conf]
  3. Chin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen
    A New Scheme for Sharing Secret Color Images in Computer Network. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2000, pp:21-27 [Conf]
  4. Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu
    Robust Image Hiding Method. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  5. Wen-Ling Chan, Yen-Ping Chu, Yung-fu Chen, Chwei-Shyong Tsai, Jan-Gowth Chang
    Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling. [Citation Graph (0, 0)][DBLP]
    METMBS, 2004, pp:271-275 [Conf]
  6. Chwei-Shyong Tsai, Chin-Chen Chang
    A Generalized Secret Image Sharing and Recovery Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:963-968 [Conf]
  7. Chwei-Shyong Tsai, Chin-Chen Chang
    An Improvement to Image Segment Based on Human Visual System for Object-based Coding. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:167-178 [Journal]
  8. Chwei-Shyong Tsai, Chin-Chen Chang
    A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:179-188 [Journal]
  9. Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang
    Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:3, pp:393-402 [Journal]
  10. Chin-Chen Chang, Chwei-Shyong Tsai
    A Technique for Computing Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2000, v:24, n:3, pp:- [Journal]
  11. Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu
    A new multi-secret images sharing scheme using Largrange's interpolation. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:3, pp:327-339 [Journal]
  12. Chwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen
    Sharing multiple secrets in digital images. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:64, n:2, pp:163-170 [Journal]

  13. A Block-Based Authentication Watermarking Technique for Binary Images. [Citation Graph (, )][DBLP]

  14. Multi-level visual secret sharing scheme with smooth-looking. [Citation Graph (, )][DBLP]

  15. A new authenticated group key agreement in a mobile environment. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002