Author of the publication

A secure data hiding method based on preservation of saturated pixels.

, , , and . ICDIP, volume 8334 of SPIE Proceedings, page 83342Z. SPIE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Discovery of Financial Market Behavior Integrated Data Mining on ETF in Taiwan., , , , and . ICHSA, volume 382 of Advances in Intelligent Systems and Computing, page 285-294. Springer, (2015)Data Mining Application to Financial Market to Discover the Behavior of Entry Point - A Case Study of Taiwan Index Futures Market., , , , and . ICHSA, volume 382 of Advances in Intelligent Systems and Computing, page 295-303. Springer, (2015)Interpretable Stock Anomaly Detection Based on Spatio-Temporal Relation Networks With Genetic Algorithm., , and . IEEE Access, (2021)A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording., , , , , and . ITQM, volume 17 of Procedia Computer Science, page 229-236. Elsevier, (2013)Momentum portfolio selection based on learning-to-rank algorithms with heterogeneous knowledge graphs., , and . Appl. Intell., 54 (5): 4189-4209 (March 2024)Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping., , , , , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 208-214. Springer, (2013)A secure data hiding method based on preservation of saturated pixels., , , and . ICDIP, volume 8334 of SPIE Proceedings, page 83342Z. SPIE, (2012)An Improved Image Data Hiding Method Using Two-Layer Embedment Strategy., , , and . AICI (2), volume 7003 of Lecture Notes in Computer Science, page 439-443. Springer, (2011)Error Detection and Correction Based on Chinese Phonemic Alphabet in Chinese Text., , and . MDAI, volume 4617 of Lecture Notes in Computer Science, page 463-476. Springer, (2007)