Cheng-Yu Ku
Cheng-Yu Ku
Professor, Department of Harbor and River Engineering, National Taiwan Ocean University
在 的電子郵件地址已通過驗證 - 首頁
Wireless communications
A Goldsmith
Cambridge university press, 2005
From chaos to order: methodologies, perspectives and applications
C Guanrong, D Xiaoning
World Scientific, 1998
Reversible data hiding based on histogram modification of pixel differences
WL Tai, CM Yeh, CC Chang
IEEE transactions on circuits and systems for video technology 19 (6), 906-910, 2009
Crystal structure of an avian influenza polymerase PA N reveals an endonuclease active site
P Yuan, M Bartlam, Z Lou, S Chen, J Zhou, X He, Z Lv, R Ge, X Li, T Deng, ...
Nature 458 (7240), 909-913, 2009
A steganographic method based upon JPEG and quantization table modification
CC Chang, TS Chen, LZ Chung
Information Sciences 141 (1-2), 123-138, 2002
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
CC Chang, JY Hsiao, CS Chan
Pattern Recognition 36 (7), 1583-1595, 2003
SVD-based digital image watermarking scheme
CC Chang, P Tsai, CC Lin
Pattern Recognition Letters 26 (10), 1577-1586, 2005
Multilevel reversible data hiding based on histogram modification of difference images
CC Lin, WL Tai, CC Chang
Pattern Recognition 41 (12), 3582-3591, 2008
A new encryption algorithm for image cryptosystems
CC Chang, MS Hwang, TS Chen
Journal of Systems and Software 58 (2), 83-91, 2001
Reversible hiding in DCT-based compressed images
CC Chang, CC Lin, CS Tseng, WL Tai
Information Sciences 177 (13), 2768-2786, 2007
A steganographic method for digital images using side match
CC Chang, HW Tseng
Pattern Recognition Letters 25 (12), 1431-1437, 2004
Isolated items discarding strategy for discovering high utility itemsets
YC Li, JS Yeh, CC Chang
Data & Knowledge Engineering 64 (1), 198-217, 2008
A virtual image cryptosystem based upon vector quantization
TS Chen, CC Chang, MS Hwang
IEEE transactions on Image Processing 7 (10), 1485-1488, 1998
Theoretical modeling of thermoelectricity in Bi nanowires
X Sun, Z Zhang, G Dresselhaus, MS Dresselhaus, JY Ying, G Chen
MRS Online Proceedings Library Archive 545, 1998
Sharing secrets in stego images with authentication
CC Chang, YP Hsieh, CH Lin
Pattern Recognition 41 (10), 3130-3137, 2008
A reversible data hiding scheme based on side match vector quantization
CC Chang, WL Tai, CC Lin
IEEE Transactions on Circuits and Systems for Video Technology 16 (10), 1301 …, 2006
An Amorphous Noble‐Metal‐Free Electrocatalyst that Enables Nitrogen Fixation under Ambient Conditions
C Lv, C Yan, G Chen, Y Ding, J Sun, Y Zhou, G Yu
Angewandte Chemie International Edition 57 (21), 6073-6076, 2018
Observation of the rare Bs0→ µ+ µ− decay from the combined analysis of CMS and LHCb data
CMS collaboration, LHCb Collaboration
Nature 522 (7554), 68-72, 2015
Search for a Higgs boson decaying into a b-quark pair and produced in association with b quarks in proton–proton collisions at 7 TeV
S Chatrchyan, V Khachatryan, AM Sirunyan, A Tumasyan, W Adam, ...
Physics Letters B 722 (4-5), 207-232, 2013
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
JH Yang, CC Chang
Computers & security 28 (3-4), 138-143, 2009
文章 1–20