Name
Affiliation
Papers
DER-CHYUAN LOU
Department of Computer Science and Information Engineering, Chang Gung University, Kweishan, Taoyuan 33302, Taiwan, ROC
53
Collaborators
Citations 
PageRank 
56
468
37.88
Referers 
Referees 
References 
933
744
532
Search Limit
100933
Title
Citations
PageRank
Year
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.00.342018
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.10.342018
Special issue on applied cryptography for information and communication networks00.342014
High Performance Reversible Data Hiding For Mobile Applications And Human Interaction10.392013
Active steganalysis for interpolation-error based reversible data hiding50.452013
Efficient Mobile Conference Scheme for Wireless Communication10.412013
Medical image protection using secret sharing scheme10.352012
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis210.982012
Efficient three-party password-based key exchange scheme150.712011
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.60.482011
Fast modular multiplication based on complement representation and canonical recoding30.392010
A novel adaptive steganography based on local complexity and human vision sensitivity130.632010
A low-complexity LUT-based squaring algorithm20.382009
Secret Sharing Method for Gray-level Images00.342009
On the security of a copyright protection scheme based on visual cryptography150.792009
Computational Reduction Of Wilson'S Primality Test For Modern Cryptosystems00.342009
Multiple layer data hiding scheme for medical images311.532009
Message estimation for universal steganalysis using multi-classification support vector machine10.352009
Fast Modular Multiplication for E-Commerce Cryptosystem00.342008
An Efficient Montgomery Exponentiation Algorithm For Public-Key Cryptosystems40.472008
A Lossless Secret Image Sharing Method10.412008
Fast modular multi-exponentiation using modified complex arithmetic70.812007
Integer Factorization For Rsa Cryptosystem Under A Pvm Environment00.342007
An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques80.532007
Fast binary multiplication by performing dot counting and complement recoding20.402007
A copyright protection scheme for digital images using visual cryptography technique372.102007
Reversible Data Embedding Using Reduced Difference Expansion20.422007
Dual-wrapped digital watermarking scheme for image copyright protection90.672007
Length Estimation for Embedded Message Using Support Vector Machine00.342007
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)121.132006
A Robust Buyer-Seller Watermarking Scheme Based On Dwt40.412006
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem141.102006
A robust watermarking scheme using self-reference image372.052006
Erratum to “On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA)” [The Journal of Systems and Software 79 (2006) 253–258]00.342006
A semi-blind digital watermarking scheme based on singular value decomposition512.002006
A robust watermarking scheme for digital image using self similarity00.342005
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications70.632005
A two-stage reconfigurable image processing system10.372005
A steganographic scheme for secure communications based on the chaos and euler Theorem251.782004
Parallel Exponentiation Using Common-Multiplicand-Multiplication And Signed-Digit-Folding Techniques40.422004
Parallel Modular Exponentiation Using Signed-Digit-Folding Technique.10.382004
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture181.442003
Fast Exponentiation By Folding The Signed-Digit Exponent In Half90.612003
An Efficient Steganographic Approach00.342002
Steganographic Method for Secure Communications211.332002
Parallel distance transforms on a linear array architecture20.402002
Application Of Parallel Virtual Machine Framework To The Strong Prime Problem10.362002
Spatial database with each picture self-contained multiscape and access control in a hierarchy30.382001
Fault resilient and compression tolerant digital signature for image authentication463.022000
An adaptive exponentiation method20.501998
  • 1
  • 2