default search action
Hsien-Chu Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Chwei-Shyong Tsai, Hsien-Chu Wu, Wei-Ting Chen, Josh Jia-Ching Ying:
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification. Multim. Tools Appl. 83(12): 36797-36822 (2024) - 2022
- [j25]Hsien-Chu Wu, Wen-Li Fan, Chwei-Shyong Tsai, Josh Jia-Ching Ying:
An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multim. Tools Appl. 81(14): 19351-19375 (2022) - [j24]Lo-Yao Yeh, Chih-Ya Shen, Wei-Chiao Huang, Wan-Hsin Hsu, Hsien-Chu Wu:
GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain. IEEE Syst. J. 16(4): 5234-5245 (2022) - 2021
- [j23]Chwei-Shyong Tsai, Hsin-Liang Chen, Hsien-Chu Wu, Josh Jia-Ching Ying:
A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code. Symmetry 13(10): 1896 (2021) - [j22]Chwei-Shyong Tsai, Hsien-Chu Wu, Yu-Wen Li, Josh Jia-Ching Ying:
Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques. Symmetry 13(12): 2438 (2021) - [c15]Ming-Chu Ho, Yu-Cing Chen, Chih-Chieh Hung, Hsien-Chu Wu:
Deep Ensemble Learning Model for Long-Term Travel Time Prediction on Highways. AIKE 2021: 129-130 - [c14]Ming-Chu Ho, Yu-Cing Chen, Chih-Chieh Hung, Hsien-Chu Wu:
A Hybrid Deep Learning Network for Long-Term Travel Time Prediction in Freeways. TAAI 2021: 78-83 - 2020
- [j21]Lo-Yao Yeh, Hsien-Chu Wu:
Efficient Extraction of Target Users for Package Promotion in Big Social Networks. IEEE Trans. Comput. Soc. Syst. 7(5): 1111-1122 (2020)
2010 – 2019
- 2013
- [j20]Chiu-Mei Chen, Chiao-Min Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images. J. Syst. Softw. 86(1): 38-46 (2013) - 2011
- [j19]Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32(3): 118-134 (2011) - [j18]Hsien-Chu Wu, Hao-Cheng Wang, Chung-Ming Wang, Chwei-Shyong Tsai:
Coloured visual cryptography using fixed size meaningful share. Int. J. Comput. Math. 88(6): 1239-1255 (2011) - [j17]Yu-Chi Liu, Hsien-Chu Wu, Shyr-Shen Yu:
Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multim. Tools Appl. 52(2-3): 263-276 (2011) - 2010
- [j16]Hsien-Chu Wu, Hao-Cheng Wang, Chwei-Shyong Tsai, Chung-Ming Wang:
Reversible image steganographic scheme via predictive coding. Displays 31(1): 35-43 (2010) - [c13]Ruey-Ming Chao, Ching-Hao Lai, Hsien-Chu Wu:
A novel color palette image authentication scheme. ICUIMC 2010: 16
2000 – 2009
- 2009
- [j15]Yu-An Ho, Yung-Kuan Chan, Hsien-Chu Wu, Yen-Ping Chu:
High-capacity reversible data hiding in binary images using pattern substitution. Comput. Stand. Interfaces 31(4): 787-794 (2009) - [j14]Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:
A high capacity reversible data hiding scheme with edge prediction and difference expansion. J. Syst. Softw. 82(12): 1966-1973 (2009) - [c12]Ruey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen:
Image segmentation by automatic histogram thresholding. ICIS 2009: 136-141 - [c11]Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. ICIS 2009: 155-160 - 2008
- [j13]Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognit. 41(6): 2097-2106 (2008) - [j12]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu:
Visual secret sharing for multiple secrets. Pattern Recognit. 41(12): 3572-3581 (2008) - [c10]Hsien-Chu Wu, Hao-Cheng Wang, Rui-Wen Yu:
Color Visual Cryptography Scheme Using Meaningful Shares. ISDA (3) 2008: 173-178 - [c9]Hsien-Chu Wu, Fang-Yu Hsu, Hwang-Yu Chen:
Tamper Detection of Relational Database Based on SVR Predictive Difference. ISDA (3) 2008: 403-408 - [c8]Hsien-Chu Wu, Yu-Chi Liu, Kuo-Ching Liu, Chwei-Shyong Tsai:
A Block-Based Authentication Watermarking Technique for Binary Images. ISDA (3) 2008: 513-518 - [c7]Hsien-Chu Wu, Kuo-Ching Liu, Jun-Dong Chang, Ching-Hui Huang:
An Image Steganographic Scheme Based on Support Vector Regression. ISDA (3) 2008: 519-524 - [c6]Ching-Hui Huang, Chih-Chiang Lee, Hsien-Chu Wu, Chung-Ming Wang:
Lossless Data Hiding for Color Images. ISDA (3) 2008: 632-637 - 2007
- [j11]Hsien-Chu Wu, Chin-Chen Chang:
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. Fundam. Informaticae 76(4): 481-493 (2007) - [c5]Meng-Hsiun Tsai, Fang-Yu Hsu, Jun-Dong Chang, Hsien-Chu Wu:
Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression. IIH-MSP 2007: 493-496 - 2006
- [j10]Yung-Kuan Chan, Duan-Li Liau, Yung-fu Chen, Hsien-Chu Wu, Yen-Ping Chu:
A minute lossy method for 2D-gel images compression. Int. J. Imaging Syst. Technol. 16(1): 1-8 (2006) - [c4]Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai:
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. ICCSA (3) 2006: 406-415 - [c3]Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu:
A DCT-based Recoverable Image Authentication. JCIS 2006 - [c2]Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang:
Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. JCIS 2006 - 2005
- [j9]Hsien-Chu Wu, Chin-Chen Chang:
A novel digital image watermarking scheme based on the vector quantization technique. Comput. Secur. 24(6): 460-471 (2005) - [j8]Hsien-Chu Wu, Chin-Chen Chang:
Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28(1): 123-135 (2005) - [j7]Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu:
A Secure Strong-Password Authentication Protocol. Fundam. Informaticae 68(4): 399-406 (2005) - [j6]Song-Kong Chong, Hsien-Chu Wu, Chia-Chun Wu:
A Scheme for Key Management on Alternate Temporal Key Hash. Int. J. Netw. Secur. 1(1): 8-13 (2005) - [j5]Hsien-Chu Wu, Chi-Yu Liu, Shu-Fen Chiou:
Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications. Int. J. Netw. Secur. 1(2): 74-76 (2005) - [j4]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
A new multi-secret images sharing scheme using Largrange's interpolation. J. Syst. Softw. 76(3): 327-339 (2005) - [r1]Yung-Kuan Chan, Yu-An Ho, Hsien-Chu Wu, Yen-Ping Chu:
A Duplicate Chinese Document Image Retrieval System. Encyclopedia of Information Science and Technology (I) 2005: 1-6 - 2004
- [j3]Hsien-Chu Wu, Chin-Chen Chang:
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. Fundam. Informaticae 63(1): 89-106 (2004) - 2003
- [j2]Hsien-Chu Wu, Chin-Chen Chang:
Hiding Digital Watermarks Using Fractal Compression Technique. Fundam. Informaticae 58(2): 189-202 (2003) - 2002
- [j1]Hsien-Chu Wu, Chin-Chen Chang:
Detection and restoration of tampered JPEG compressed images. J. Syst. Softw. 64(2): 151-161 (2002) - 2000
- [c1]Chin-Chen Chang, Hsien-Chu Wu:
Computing watermarks from images using quadtrees. ICPADS Workshops 2000: 123-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint