default search action
Wien Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j45]Wien Hong, Guan-Zhong Su, Wei-Ling Lin, Tung-Shou Chen:
Virtualized three-dimensional reference tables for efficient data embedding. J. Vis. Commun. Image Represent. 107: 104351 (2025) - 2024
- [j44]Xiaoyu Zhou, Wien Hong, Tung-Shou Chen, Guangsong Yang, Cheng-Han Lin:
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing. J. Inf. Secur. Appl. 86: 103886 (2024) - [j43]Wien Hong, Guan-Zhong Su, Tung-Shou Chen, Jeanne Chen:
On the bitmap compression for joint coding and data hiding of AMBTC compressed images. Multim. Tools Appl. 83(35): 82131-82148 (2024) - 2023
- [j42]Xiaoyu Zhou, Wien Hong, Tung-Shou Chen, Guangsong Yang:
Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques. J. Inf. Secur. Appl. 73: 103425 (2023) - [j41]Xiaoyu Zhou, Wien Hong, Guangsong Yang, Tung-Shou Chen, Jeanne Chen:
An unsolvable pixel reduced authentication method for color images with grayscale invariance. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101726 (2023) - [j40]Xiaoyu Zhou, Guangsong Yang, Wien Hong, Kia Sheng Chen, Tung-Shou Chen:
An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique. Multim. Tools Appl. 82(10): 15593-15612 (2023) - [c11]Xiaoyu Zhou, Guangsong Yang, Tung-Shou Chen, Guan-Zhong Su, Wien Hong:
A Data Hiding Scheme for JPEG Images Based on EMD with Coefficient Selection Strategy. ICMSSP 2023: 19-24 - 2022
- [j39]Tiancong Zhang, Shaowei Weng, Zhijie Wu, Juan Lin, Wien Hong:
Adaptive encoding based lossless data hiding method for VQ compressed images using tabu search. Inf. Sci. 602: 128-142 (2022) - 2021
- [j38]Wien Hong, Jeanne Chen, Peishih Chang, Jie Wu, Tung-Shou Chen, Jason Lin:
A Color Image Authentication Scheme With Grayscale Invariance. IEEE Access 9: 6522-6535 (2021) - [j37]Wien Hong, Jie Wu, Der-Chyuan Lou, Xiaoyu Zhou, Jeanne Chen:
An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match. IEEE Access 9: 133746-133761 (2021) - 2020
- [j36]Haishan Chen, Junying Yuan, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement. Comput. J. 63(10): 1584-1596 (2020) - [j35]Xiaoyu Zhou, Wien Hong, Shaowei Weng, Tung-Shou Chen, Jeanne Chen:
Reversible and recoverable authentication method for demosaiced images using adaptive coding technique. J. Inf. Secur. Appl. 55: 102629 (2020) - [j34]Wien Hong, Xiaoyu Zhou, Tung-Shou Chen, Chun-Hung Hsieh:
An efficient reversible authentication scheme for demosaiced images with improved detectability. Signal Process. Image Commun. 80 (2020)
2010 – 2019
- 2019
- [j33]Wien Hong, Shuozhen Zheng, Xiaoyu Zhou:
On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism. Int. J. Netw. Secur. 21(2): 230-235 (2019) - [j32]Chuan Qin, Xiaokang Qian, Wien Hong, Xinpeng Zhang:
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487: 176-192 (2019) - [j31]Shaowei Weng, Yunqing Shi, Wien Hong, Ye Yao:
Dynamic improved pixel value ordering reversible data hiding. Inf. Sci. 489: 136-154 (2019) - [j30]Chih-Wei Shiu, Yu-Chi Chen, Wien Hong:
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. KSII Trans. Internet Inf. Syst. 13(2): 1020-1042 (2019) - [j29]Wien Hong, Yizhen Li, Shaowei Weng:
A difference matching technique for data embedment based on absolute moment block truncation coding. Multim. Tools Appl. 78(10): 13987-14006 (2019) - [j28]Shaowei Weng, Yi Chen, Wien Hong, Jeng-Shyang Pan, Chin-Chen Chang, Yijun Liu:
An Improved Integer Transform Combining with an Irregular Block Partition. Symmetry 11(1): 49 (2019) - 2018
- [j27]Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Tung-Shou Chen, Yuyang Li:
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques. Inf. Sci. 463-464: 245-260 (2018) - [j26]Wien Hong, Meijin Chen, Tung-Shou Chen, Chien-Che Huang:
An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multim. Tools Appl. 77(4): 4677-4695 (2018) - [j25]Wien Hong:
Efficient Data Hiding Based on Block Truncation Coding Using Pixel Pair Matching Technique. Symmetry 10(2): 36 (2018) - [j24]Wien Hong, Xiaoyu Zhou, Shaowei Weng:
Joint Adaptive Coding and Reversible Data Hiding for AMBTC Compressed Images. Symmetry 10(7): 254 (2018) - [j23]Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang, Cancan Peng:
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images. Symmetry 10(8): 318 (2018) - [c10]Xiaoyu Zhou, Wien Hong, Cancan Peng, Tung-Shou Chen, Yujing Zhai:
A Reversible Data Hiding Scheme for AMBTC Images Using Gray Code and Exclusive-OR Approaches. CISP-BMEI 2018: 1-5 - [c9]Haishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
Reversible Data Hiding in Partially-Encrypted Images. ICCCS (3) 2018: 670-679 - [c8]Chih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji:
Data Hiding for Color Image by Rubik's Cube. SSIC 2018: 1-5 - 2017
- [j22]Wien Hong, Tung-Shou Chen, Zhao-Xia Yin, Bin Luo, Yuanbo Ma:
Data hiding in AMBTC images using quantization level modification and perturbation technique. Multim. Tools Appl. 76(3): 3761-3782 (2017) - [j21]Wien Hong, Yuan-bo Ma, Hung-Che Wu, Tung-Shou Chen:
An efficient reversible data hiding method for AMBTC compressed images. Multim. Tools Appl. 76(4): 5441-5460 (2017) - [j20]Wien Hong, Meijin Chen, Tung-Shou Chen:
An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process. Image Commun. 58: 111-122 (2017) - [j19]Haishan Chen, Jiangqun Ni, Wien Hong, Tung-Shou Chen:
High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction. IEEE Signal Process. Lett. 24(5): 574-578 (2017) - 2016
- [j18]Zhao-Xia Yin, Wien Hong, Jin Tang, Bin Luo:
High capacity reversible steganography in encrypted images based on feature mining in plaintext domain. Int. J. Embed. Syst. 8(2/3): 249-257 (2016) - [j17]Wien Hong, Shuozhen Zheng, Tung-Shou Chen, Chien-Che Huang:
Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting. KSII Trans. Internet Inf. Syst. 10(6): 2817-2834 (2016) - [j16]Haishan Chen, Jiangqun Ni, Wien Hong, Tung-Shou Chen:
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Signal Process. Image Commun. 46: 1-16 (2016) - [c7]Haishan Chen, Wien Hong, Jiangqun Ni, Junying Yuan:
A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement. ICCCS (1) 2016: 134-144 - 2015
- [j15]Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen:
Reversible Steganographic Method Using Complexity Control and Human Visual System. Comput. J. 58(10): 2583-2594 (2015) - [j14]Yuan-bo Ma, Quan-si Wen, Wien Hong, Ze-ming Lin, Tung-Shou Chen:
A High Visual Quality Embedding Method in Edges Based on Pixel Pair Difference. EAI Endorsed Trans. Creative Technol. 2(4): e1 (2015) - [j13]Wien Hong, Tung-Shou Chen, Jeanne Chen:
Reversible data hiding using Delaunay triangulation and selective embedment. Inf. Sci. 308: 140-154 (2015) - [j12]Chih-Wei Shiu, Yu-Chi Chen, Wien Hong:
Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process. Image Commun. 39: 226-233 (2015) - 2014
- [j11]Jeanne Chen, Tung-Shou Chen, Wien Hong, Gwoboa Horng, Han-Yan Wu, Chih-Wei Shiu:
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map. KSII Trans. Internet Inf. Syst. 8(3): 1105-1118 (2014) - 2013
- [j10]Wien Hong:
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf. Sci. 221: 473-489 (2013) - [c6]Jeanne Chen, Tung-Shou Chen, Wien Hong, Chi-Nan Lin, Mei-Chen Wu, Han-Yan Wu:
A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording. ITQM 2013: 229-236 - [c5]Wien Hong, Tung-Shou Chen, Jeanne Chen, Yu-Hsin Kao, Han-Yan Wu, Mei-Chen Wu:
Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping. ICSI (2) 2013: 208-214 - 2012
- [j9]Wien Hong, Tung-Shou Chen, Chih-Wei Luo:
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85(5): 1166-1175 (2012) - [j8]Wien Hong:
Human visual system based data embedding method using quadtree partitioning. Signal Process. Image Commun. 27(10): 1123-1133 (2012) - [j7]Wien Hong, Tung-Shou Chen, Han-Yan Wu:
An Improved Reversible Data Hiding in Encrypted Images Using Side Match. IEEE Signal Process. Lett. 19(4): 199-202 (2012) - [j6]Wien Hong, Tung-Shou Chen:
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Trans. Inf. Forensics Secur. 7(1): 176-184 (2012) - [c4]Wien Hong, Jeanne Chen, Mei-Chen Wu, Chih-Wei Shiu:
A secure data hiding method based on preservation of saturated pixels. ICDIP 2012: 83342Z - [c3]Wien Hong, Tung-Shou Chen, Han-Yan Wu, Hsun-Li Chang:
An enhanced smoothness evaluation for reversible data hiding in encrypted images. ICDIP 2012: 833434 - 2011
- [j5]Wien Hong, Tung-Shou Chen:
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J. Vis. Commun. Image Represent. 22(2): 131-140 (2011) - [c2]Wien Hong, Yeon-Kang Wang, Kai-Yung Lin, Mei-Chen Wu:
An Improved Image Data Hiding Method Using Two-Layer Embedment Strategy. AICI (2) 2011: 439-443 - 2010
- [j4]Wien Hong:
An Efficient Prediction-and-Shifting Embedding Technique for High Quality Reversible Data Hiding. EURASIP J. Adv. Signal Process. 2010 (2010) - [j3]Wien Hong, Tung-Shou Chen:
A local variance-controlled reversible data hiding method using prediction and histogram-shifting. J. Syst. Softw. 83(12): 2653-2663 (2010) - [j2]Wien Hong, Tung-Shou Chen, Yu-Ping Chang, Chih-Wei Shiu:
A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification. Signal Process. 90(11): 2911-2922 (2010)
2000 – 2009
- 2009
- [j1]Wien Hong, Tung-Shou Chen, Chih-Wei Shiu:
Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Softw. 82(11): 1833-1842 (2009) - 2008
- [c1]Wien Hong, Chih-Wei Shiu, Tung-Shou Chen:
A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding. ISDA (3) 2008: 183-187
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint