Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Jiexuan Ding
Claudia Calabrese
A. P. Santhakumaran
Razali Ngah
Hao Mao
Peter Malec
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
DER-CHYUAN LOU
Author Info
Open Visualization
Name
Affiliation
Papers
DER-CHYUAN LOU
Department of Computer Science and Information Engineering, Chang Gung University, Kweishan, Taoyuan 33302, Taiwan, ROC
53
Collaborators
Citations
PageRank
56
468
37.88
Referers
Referees
References
933
744
532
Search Limit
100
933
Publications (53 rows)
Collaborators (56 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.
0
0.34
2018
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
1
0.34
2018
Special issue on applied cryptography for information and communication networks
0
0.34
2014
High Performance Reversible Data Hiding For Mobile Applications And Human Interaction
1
0.39
2013
Active steganalysis for interpolation-error based reversible data hiding
5
0.45
2013
Efficient Mobile Conference Scheme for Wireless Communication
1
0.41
2013
Medical image protection using secret sharing scheme
1
0.35
2012
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
21
0.98
2012
Efficient three-party password-based key exchange scheme
15
0.71
2011
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares.
6
0.48
2011
Fast modular multiplication based on complement representation and canonical recoding
3
0.39
2010
A novel adaptive steganography based on local complexity and human vision sensitivity
13
0.63
2010
A low-complexity LUT-based squaring algorithm
2
0.38
2009
Secret Sharing Method for Gray-level Images
0
0.34
2009
On the security of a copyright protection scheme based on visual cryptography
15
0.79
2009
Computational Reduction Of Wilson'S Primality Test For Modern Cryptosystems
0
0.34
2009
Multiple layer data hiding scheme for medical images
31
1.53
2009
Message estimation for universal steganalysis using multi-classification support vector machine
1
0.35
2009
Fast Modular Multiplication for E-Commerce Cryptosystem
0
0.34
2008
An Efficient Montgomery Exponentiation Algorithm For Public-Key Cryptosystems
4
0.47
2008
A Lossless Secret Image Sharing Method
1
0.41
2008
Fast modular multi-exponentiation using modified complex arithmetic
7
0.81
2007
Integer Factorization For Rsa Cryptosystem Under A Pvm Environment
0
0.34
2007
An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques
8
0.53
2007
Fast binary multiplication by performing dot counting and complement recoding
2
0.40
2007
A copyright protection scheme for digital images using visual cryptography technique
37
2.10
2007
Reversible Data Embedding Using Reduced Difference Expansion
2
0.42
2007
Dual-wrapped digital watermarking scheme for image copyright protection
9
0.67
2007
Length Estimation for Embedded Message Using Support Vector Machine
0
0.34
2007
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
12
1.13
2006
A Robust Buyer-Seller Watermarking Scheme Based On Dwt
4
0.41
2006
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
14
1.10
2006
A robust watermarking scheme using self-reference image
37
2.05
2006
Erratum to “On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA)” [The Journal of Systems and Software 79 (2006) 253–258]
0
0.34
2006
A semi-blind digital watermarking scheme based on singular value decomposition
51
2.00
2006
A robust watermarking scheme for digital image using self similarity
0
0.34
2005
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications
7
0.63
2005
A two-stage reconfigurable image processing system
1
0.37
2005
A steganographic scheme for secure communications based on the chaos and euler Theorem
25
1.78
2004
Parallel Exponentiation Using Common-Multiplicand-Multiplication And Signed-Digit-Folding Techniques
4
0.42
2004
Parallel Modular Exponentiation Using Signed-Digit-Folding Technique.
1
0.38
2004
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture
18
1.44
2003
Fast Exponentiation By Folding The Signed-Digit Exponent In Half
9
0.61
2003
An Efficient Steganographic Approach
0
0.34
2002
Steganographic Method for Secure Communications
21
1.33
2002
Parallel distance transforms on a linear array architecture
2
0.40
2002
Application Of Parallel Virtual Machine Framework To The Strong Prime Problem
1
0.36
2002
Spatial database with each picture self-contained multiscape and access control in a hierarchy
3
0.38
2001
Fault resilient and compression tolerant digital signature for image authentication
46
3.02
2000
An adaptive exponentiation method
2
0.50
1998
1
2
50 / page