default search action
Yanjun Liu 0002
Person information
- affiliation: Feng Chia University, Department of Information Engineering and Computer Science, Taichung, Taiwan
- affiliation (former): Anhui University, School of Computer Science and Technology, China
- affiliation (PhD 2010): University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
Other persons with the same name
- Yanjun Liu (aka: Yan-Jun Liu, Yan-jun Liu, Yan Jun Liu) — disambiguation page
- Yanjun Liu 0001 — Jiangnan University, School of IoT Engineering, Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education) Wuxi, China (and 1 more)
- Yan-Jun Liu 0003 (aka: Yanjun Liu 0003) — Liaoning University of Technology, College of Science, Jinzhou, China (and 2 more)
- Yanjun Liu 0004 — Hohai University, College of Computer Science and Technology, Nanjing, China
- Yanjun Liu 0005 — Capital Normal University, Beijing, China
- Yanjun Liu 0006 — Beihang University, School of Engineering Medicine, Beijing, China
- Yanjun Liu 0007 — Shandong University, School of Mechanical Engineering, Jinan, China
- Yanjun Liu 0008 — Chongqing Normal University, School of Mathematical Sciences, China
- Yanjun Liu 0009 (aka: Yan-jun Liu 0009) — Northeastern University, School of Information Science and Engineering, Shenyang, China
- Yanjun Liu 0010 — University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j53]Yung-Hui Li, Ching-Chun Chang, Guo-Dong Su, Kai-Lin Yang, Muhammad Saqlain Aslam, Yanjun Liu:
Coverless image steganography using morphed face recognition based on convolutional neural network. EURASIP J. Wirel. Commun. Netw. 2022(1): 28 (2022) - 2021
- [j52]Shuying Xu, Chin-Chen Chang, Yanjun Liu:
A novel image compression technology based on vector quantisation and linear regression prediction. Connect. Sci. 33(2): 219-236 (2021) - [j51]Hengxiao Chi, Chin-Chen Chang, Yanjun Liu:
An SMVQ compressed data hiding scheme based on multiple linear regression prediction. Connect. Sci. 33(3): 495-514 (2021) - [j50]Kai Gao, Chin-Chen Chang, Yanjun Liu:
Predicting missing data for data integrity based on the linear regression model. Int. J. Embed. Syst. 14(4): 355-362 (2021) - [j49]Peng-Cheng Huang, Chinchen Chang, Yung-Hui Li, Yanjun Liu:
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism. J. Inf. Secur. Appl. 58: 102719 (2021) - [j48]Juan Lin, Ji-Hwei Horng, Yanjun Liu, Chin-Chen Chang:
An anisotropic reference matrix for image steganography. J. Vis. Commun. Image Represent. 74: 102969 (2021) - [j47]Shuying Xu, Chin-Chen Chang, Yanjun Liu:
A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction. Multim. Tools Appl. 80(13): 20307-20325 (2021) - [j46]Xiaoping Li, Ching-Chun Chang, Yanjun Liu:
A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network. Telecommun. Syst. 78(1): 49-56 (2021) - 2020
- [j45]Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
Efficient QR Code Secret Embedding Mechanism Based on Hamming Code. IEEE Access 8: 86706-86714 (2020) - [j44]Kai Gao, Ji-Hwei Horng, Yanjun Liu, Chin-Chen Chang:
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix. IEEE Access 8: 130405-130416 (2020) - [j43]Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu:
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding. Int. J. Netw. Secur. 22(4): 575-583 (2020) - [j42]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
One-Code-Pass User Authentication Based on QR Code and Secret Sharing. Int. J. Netw. Secur. 22(5): 752-762 (2020) - [j41]Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. Secur. Commun. Networks 2020: 6073721:1-6073721:8 (2020)
2010 – 2019
- 2019
- [j40]Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang:
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares. IEEE Access 7: 118249-118258 (2019) - [j39]Mingze He, Yanjun Liu, Chin-Chen Chang, Mingxing He:
A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload. IEEE Access 7: 141414-141425 (2019) - [j38]Yanjun Liu, Chin-Chen Chang:
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing. Int. J. Netw. Secur. 21(2): 211-220 (2019) - [j37]Chin-Chen Chang, Wai-Kong Lee, Yanjun Liu, Bok-Min Goi, Raphael C.-W. Phan:
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU. IEEE Internet Things J. 6(3): 4448-4461 (2019) - [j36]Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
Efficient secret sharing scheme with cheater identification based on QR code. KSII Trans. Internet Inf. Syst. 13(10): 5144-5160 (2019) - [j35]Ching-Chun Chang, Yanjun Liu, Xiao-Qian Yang:
A Novel Image Compression Method Using Turtle-Shell-Shaped Codewords with Less Blocking Artifact. J. Inf. Hiding Multim. Signal Process. 10(1): 156-166 (2019) - [j34]Ching-Chun Chang, Yanjun Liu:
Fast turtle shell-based data embedding mechanisms with good visual quality. J. Real Time Image Process. 16(3): 589-599 (2019) - [j33]Jiang-Yi Lin, Yanjun Liu, Chin-Chen Chang:
A real-time dual-image-based reversible data hiding scheme using turtle shells. J. Real Time Image Process. 16(3): 673-684 (2019) - [j32]Ching-Chun Chang, Yanjun Liu, Kaimeng Chen:
Real-time adaptive visual secret sharing with reversibility and high capacity. J. Real Time Image Process. 16(4): 871-881 (2019) - [j31]Guo-Dong Su, Yanjun Liu, Chin-Chen Chang:
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images. J. Vis. Commun. Image Represent. 64 (2019) - [j30]Xiaozhu Xie, Yanjun Liu, Chin-Chen Chang:
Extended squared magic matrix for embedding secret information with large payload. Multim. Tools Appl. 78(14): 19045-19059 (2019) - [j29]Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
High-payload secret hiding mechanism for QR codes. Multim. Tools Appl. 78(16): 22331-22350 (2019) - [j28]Peng-Cheng Huang, Yung-Hui Li, Chin-Chen Chang, Yanjun Liu:
Efficient QR code authentication mechanism based on Sudoku. Multim. Tools Appl. 78(18): 26023-26045 (2019) - 2018
- [j27]Yanjun Liu, Chin-Chen Chang:
Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients. Displays 51: 51-56 (2018) - [j26]Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu:
An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes. Int. J. Netw. Secur. 20(3): 478-488 (2018) - [j25]Peng-Cheng Huang, Yung-Hui Li, Chin-Chen Chang, Yanjun Liu:
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. KSII Trans. Internet Inf. Syst. 12(5): 2348-2365 (2018) - [j24]Ngoc-Tu Huynh, K. Bharanitharan, Chin-Chen Chang, Yanjun Liu:
Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 77(5): 5767-5783 (2018) - [j23]Chin-Chen Chang, Tung-Shou Chen, Yu-Kai Wang, Yanjun Liu:
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator. Multim. Tools Appl. 77(7): 9039-9053 (2018) - [j22]Yanjun Liu, Chin-Chen Chang:
A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multim. Tools Appl. 77(19): 25295-25310 (2018) - [j21]Peng-Cheng Huang, Alan Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
Efficient access control system based on aesthetic QR code. Pers. Ubiquitous Comput. 22(1): 81-91 (2018) - [j20]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang, Cheng-Yi Hsu:
Efficient Information Hiding Based on Theory of Numbers. Symmetry 10(1): 19 (2018) - 2017
- [j19]Junlan Bai, Chin-Chen Chang, Thai-Son Nguyen, Ce Zhu, Yanjun Liu:
A high payload steganographic algorithm based on edge detection. Displays 46: 42-51 (2017) - [j18]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient and Secure Smart Card Based Password Authentication Scheme. Int. J. Netw. Secur. 19(1): 1-10 (2017) - [j17]Yanjun Liu, Chin-Chen Chang:
A one-card-pass user authentication scheme using image morphing. Multim. Tools Appl. 76(20): 21247-21264 (2017) - [c5]Chin-Chen Chang, Iuon-Chang Lin, Yu-Wei Su, Yanjun Liu:
A Digital Gift Certificate Scheme with Conditional Anonymity. ICMSS 2017: 139-144 - [c4]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
Extended Exploiting-Modification-Direction Data Hiding with High Capacity. ICVIP 2017: 151-155 - [c3]Chin-Chen Chang, Thai-Son Nguyen, Yanjun Liu:
A reversible data hiding scheme for image interpolation based on reference matrix. IWBF 2017: 1-6 - [c2]Chin-Chen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu:
An offline user-verifiable electronic traveler's check system. IWBF 2017: 1-6 - 2016
- [j16]Yanjun Liu, Ching-Chun Chang, Thai-Son Nguyen:
High capacity turtle shell-based data hiding. IET Image Process. 10(2): 130-137 (2016) - [j15]Ching-Chun Chang, Yanjun Liu, Hsiao-Ling Wu:
Distortion-free secret image sharing method with two meaningful shadows. IET Image Process. 10(8): 590-597 (2016) - [j14]Yanjun Liu, Chin-Chen Chang:
An Integratable Verifiable Secret Sharing Mechanism. Int. J. Netw. Secur. 18(4): 617-624 (2016) - [j13]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics". Int. J. Netw. Secur. 18(5): 997-1000 (2016) - [j12]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing. J. Inf. Hiding Multim. Signal Process. 7(4): 741-753 (2016) - 2015
- [j11]Yanjun Liu, Lein Harn, Chin-Chen Chang:
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. Int. J. Commun. Syst. 28(7): 1282-1292 (2015) - [j10]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management. J. Inf. Hiding Multim. Signal Process. 6(1): 140-153 (2015) - [j9]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Secure and Efficient Scheme for Digital Gift Certificates. J. Inf. Hiding Multim. Signal Process. 6(3): 416-429 (2015) - 2014
- [j8]Yanjun Liu, Lein Harn, Chin-Chen Chang:
An authenticated group key distribution mechanism using theory of numbers. Int. J. Commun. Syst. 27(11): 3502-3512 (2014) - [j7]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. Int. J. Netw. Secur. 16(1): 58-64 (2014) - [j6]Xingyi Zhang, Yanjun Liu, Bin Luo, Linqiang Pan:
Computational power of tissue P systems for generating control languages. Inf. Sci. 278: 285-297 (2014) - [j5]Yanjun Liu, Hsiao-Ling Wu, Chin-Chen Chang:
A Fast and Secure Scheme for Data Outsourcing in the Cloud. KSII Trans. Internet Inf. Syst. 8(8): 2708-2722 (2014) - [j4]Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:
(k, n)-Image Reversible Data Hiding. J. Inf. Hiding Multim. Signal Process. 5(2): 152-164 (2014) - [j3]Yanjun Liu, Chin-Chen Chang:
A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem. J. Inf. Hiding Multim. Signal Process. 5(4): 603-613 (2014) - [j2]Yanjun Liu, Chin-Chen Chang:
A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem. J. Inf. Hiding Multim. Signal Process. 5(4): 709-718 (2014) - [c1]Ching-Chun Chang, Yanjun Liu, Thai-Son Nguyen:
A Novel Turtle Shell Based Scheme for Data Hiding. IIH-MSP 2014: 89-93 - 2013
- [j1]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient Oblivious Transfer Protocol Using Residue Number System. Int. J. Netw. Secur. 15(3): 212-218 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint