Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions., and . ICIAR (1), volume 4141 of Lecture Notes in Computer Science, page 468-479. Springer, (2006)New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size., and . ICCSA (1), volume 3480 of Lecture Notes in Computer Science, page 19-28. Springer, (2005)Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook Training., , and . ICITA (2), page 634-637. IEEE Computer Society, (2005)New Steganography Scheme in Halftone Images., , , and . IIH-MSP, page 1520-1523. IEEE Computer Society, (2008)Work Stress and Subsequent Risk of Internet Addiction Among Information Technology Engineers in Taiwan., , , , , and . Cyberpsychology Behav. Soc. Netw., 17 (8): 542-550 (2014)City Eyes: An Unified Computational Framework for Intelligent Video Surveillance in Cloud Environment., , , , , and . iThings/GreenCom/CPSCom, page 324-327. IEEE Computer Society, (2014)Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels., and . ICIAR, volume 3656 of Lecture Notes in Computer Science, page 1184-1191. Springer, (2005)Real Perfect Contrast Visual Secret Sharing Schemes with Reversing., , and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 433-447. (2006)An algorithm to enumerate codewords for third-order spectral-null codes., and . ISIT, page 88. IEEE, (2004)Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion., and . Pattern Recognit. Lett., 26 (2): 193-206 (2005)