The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chun-Shien Lu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chun-Shien Lu
    Audio fingerprinting based on analyzing time-frequency localization of signals. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:174-177 [Conf]
  2. Chun-Shien Lu
    Characterization of abrupt/gradual video shot transitions as unsmoothed/smoothed singularity. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:202-205 [Conf]
  3. Chun-Shien Lu
    Wireless multimedia error resilience via a data hiding technique. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:316-319 [Conf]
  4. Chun-Shien Lu, Hong-Yuan Mark Liao
    Oblivious Cocktail Watermarking by Sparse Code Shrinkage: A Regional- and Global-Based Scheme. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  5. Chun-Shien Lu, Wen-Liang Hwang, Pau-Choo Chung
    Segmentation of 3-D Textured Images Using Continuous Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1997, pp:235-238 [Conf]
  6. Chun-Shien Lu, Hong-Yuan Mark Liao
    Video object-based watermarking: a rotation and flipping resilient scheme. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2001, pp:483-486 [Conf]
  7. Chwen-Jye Sze, Hong-Yuan Mark Liao, Shih-Kun Huang, Chun-Shien Lu
    Dyadic Wavelet-Based Nonlinear Conduction Equation: Theory and Applications. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  8. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao
    A message-based cocktail watermarking system. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:1035-1038 [Conf]
  9. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao, Jang-Ping Sheu
    Mean Quantization Blind Watermarking for Image Authentication. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  10. Chun-Shien Lu, Chao-Yong Hsu
    Content-dependent multipurpose watermarking resistant against generalized copy attack. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2039-2042 [Conf]
  11. Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, Pao-Chi Chang
    Robust mesh-based hashing for copy detection and tracing of images. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:731-734 [Conf]
  12. Chun-Shien Lu, Hong-Yuan Mark Liao, Chwen-Jye Sze
    Combined Watermarking for Image Authentication and Protection. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (III), 2000, pp:1415-1418 [Conf]
  13. Chun-Shien Lu
    Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2002, pp:1001-1004 [Conf]
  14. Chun-Shien Lu, Jan-Ru Chen, Hong-Yuan Mark Liao, Kuo-Chin Fan
    Real-Time MPEG2 Video Watermarking in the VLC Domain. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2002, pp:552-0 [Conf]
  15. Chun-Shien Lu, Hong-Yuan Mark Liao, Liang-Hua Chen
    Multipurpose Audio Watermarking. [Citation Graph (0, 0)][DBLP]
    ICPR, 2000, pp:3286-3289 [Conf]
  16. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze
    Cocktail Watermarking on Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:333-347 [Conf]
  17. Chao-Yong Hsu, Chun-Shien Lu
    Near-perfect cover image recovery anti-multiple watermark embedding approaches. [Citation Graph (0, 0)][DBLP]
    ISCAS (6), 2005, pp:5517-5520 [Conf]
  18. Chun-Shien Lu
    On the security of structural information extraction/embedding for images. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:169-172 [Conf]
  19. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze
    Highly Robust Image Watermarking Using Complementary Modulations. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:136-153 [Conf]
  20. Chun-Shien Lu, Hong-Yuan Mark Liao
    An Oblivious And Robust Watermarking Scheme Using Communications-With-Side-Information Mechanism. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:103-107 [Conf]
  21. Hsueh-Yi Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin
    Authentication of 3-D Polygonal Meshes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:168-183 [Conf]
  22. Chun-Shien Lu, Chao-Yong Hsu
    Content-Dependent Anti-disclosure Image Watermark. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:61-76 [Conf]
  23. Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei
    Joint Screening Halftoning and Visual Cryptography for Image Protection. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:212-225 [Conf]
  24. Chun-Shien Lu, Hong-Yuan Mark Liao
    Structural digital signature for image authentication: an incidental distortion resistant scheme. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia Workshops, 2000, pp:115-118 [Conf]
  25. Chun-Shien Lu, Hong-Yuan Mark Liao
    Digital Watermarking: A Communications with Side Information Perspective. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:927-932 [Conf]
  26. Chun-Shien Lu, Shih-Wei Sun, Pao-Chi Chang
    Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:147-163 [Conf]
  27. Chun-Shien Lu, Chao-Yong Hsu
    Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:159-173 [Journal]
  28. Chun-Shien Lu, Pau-Choo Chung, Chih F. Chen
    Unsupervised texture segmentation via wavelet transform. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1997, v:30, n:5, pp:729-742 [Journal]
  29. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao
    A message-based cocktail watermarking system. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2003, v:36, n:4, pp:957-968 [Journal]
  30. Wen-Liang Hwang, Chun-Shien Lu, Pau-Choo Chung
    Shape from texture: estimation of planar surface orientation through the ridge surfaces of continuous wavelet transform. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1998, v:7, n:5, pp:773-780 [Journal]
  31. Chun-Shien Lu, Hong-Yuan Mark Liao
    Multipurpose watermarking for image authentication and protection. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2001, v:10, n:10, pp:1579-1592 [Journal]
  32. Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter
    Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2002, v:11, n:3, pp:280-292 [Journal]
  33. Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao, Chun-Shien Lu
    A new iterated two-band diffusion equation: theory and its application. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2003, v:12, n:4, pp:466-476 [Journal]
  34. Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin
    Fragile watermarking for authenticating 3-D polygonal meshes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:6, pp:997-1006 [Journal]
  35. Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, Hong-Yuan Mark Liao
    Cocktail Watermarking for Digital Image Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2000, v:2, n:4, pp:209-224 [Journal]
  36. Chun-Shien Lu, Hong-Yuan Mark Liao
    Structural digital signature for image authentication: an incidental distortion resistant scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2003, v:5, n:2, pp:161-173 [Journal]
  37. Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo
    Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:18- [Conf]
  38. Li-Wei Kang, Chun-Shien Lu
    Wyner-Ziv Video Coding with Coding Mode-Aided Motion Compensation. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:237-240 [Conf]
  39. Chia-Mu Yu, Chun-Shien Lu
    Robust non-interactive zero-knowledge watermarking scheme against cheating prover. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:103-110 [Conf]
  40. Chao-Yong Hsu, Chun-Shien Lu
    Geometric distortion-resilient image hashing system and its application scalability. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:81-92 [Conf]

  41. Multi-View Distributed Video Coding with Low-Complexity Inter-Sensor Communication Over Wireless Video Sensor Networks. [Citation Graph (, )][DBLP]


  42. Compression of halftone video for electronic paper. [Citation Graph (, )][DBLP]


  43. Secure image hashing via minimum distortion estimation. [Citation Graph (, )][DBLP]


  44. Compressive sensing-based image hashing. [Citation Graph (, )][DBLP]


  45. On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks. [Citation Graph (, )][DBLP]


  46. Joint Image Halftoning and Watermarking in High-Resolution Digital Form. [Citation Graph (, )][DBLP]


  47. Video Halftoning Preserving Temporal Consistency. [Citation Graph (, )][DBLP]


  48. Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions. [Citation Graph (, )][DBLP]


  49. Power-scalable multi-layer halftone video display for electronic paper. [Citation Graph (, )][DBLP]


  50. Unequal authenticity protection of video multicasting. [Citation Graph (, )][DBLP]


  51. Secure SIFT-based sparse representation for image copy detection and recognition. [Citation Graph (, )][DBLP]


  52. Secure and robust SIFT. [Citation Graph (, )][DBLP]


  53. A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  54. A DoS-resilient en-route filtering scheme for sensor networks. [Citation Graph (, )][DBLP]


  55. Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  56. Mobile Sensor Network Resilient Against Node Replication Attacks. [Citation Graph (, )][DBLP]


  57. A constrained function based message authentication scheme for sensor networks. [Citation Graph (, )][DBLP]


  58. Distributed compressive video sensing. [Citation Graph (, )][DBLP]


  59. Secure Multidimensional Queries in Tiered Sensor Networks [Citation Graph (, )][DBLP]


  60. Constrained Function Based En-Route Filtering for Sensor Networks [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002