追蹤
Ran-Zan Wang
Ran-Zan Wang
在 saturn.yzu.edu.tw 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
Image hiding by optimal LSB substitution and genetic algorithm
RZ Wang, CF Lin, JC Lin
Pattern recognition 34 (3), 671-683, 2001
10122001
Sharing multiple secrets in visual cryptography
SJ Shyu, SY Huang, YK Lee, RZ Wang, K Chen
Pattern recognition 40 (12), 3633-3651, 2007
2992007
Secret image sharing with smaller shadow images
RZ Wang, CH Su
Pattern Recognition Letters 27 (6), 551-555, 2006
2752006
Hiding data in images by optimal moderately-significant-bit replacement
RZ Wang, CF Lin, JC Lin
Electronics Letters 36 (25), 2069-2070, 2000
2062000
Scalable secret image sharing
RZ Wang, SJ Shyu
Signal processing: Image communication 22 (4), 363-373, 2007
1592007
Region incrementing visual cryptography
RZ Wang
IEEE Signal Processing Letters 16 (8), 659-662, 2009
1232009
High-payload image steganography using two-way block matching
RZ Wang, YS Chen
IEEE Signal Processing Letters 13 (3), 161-164, 2006
1042006
Incrementing visual cryptography using random grids
RZ Wang, YC Lan, YK Lee, SY Huang, SJ Shyu, TL Chia
Optics Communications 283 (21), 4242-4249, 2010
792010
An image-hiding method with high hiding capacity based on best-block matching and k-means clustering
RZ Wang, YD Tsai
Pattern Recognition 40 (2), 398-409, 2007
652007
Scalable secret image sharing with smaller shadow images
YY Lin, RZ Wang
IEEE Signal Processing Letters 17 (3), 316-319, 2009
592009
Tagged Visual Cryptography
RZ Wang, SF Hsu
Signal Processing Letters, IEEE 18 (11), 627-630, 2011
452011
Method for generating color QR code
PY Lin, WC Liao, RZ Wang
US Patent 9,760,820, 2017
362017
The nested QR code
GJ Chou, RZ Wang
IEEE Signal Processing Letters 27, 1230-1234, 2020
342020
Blind QR code steganographic approach based upon error correction capability
YJ Chiang, PY Lin, RZ Wang, YH Chen
KSII Transactions on Internet and Information Systems (TIIS) 7 (10), 2527-2543, 2013
302013
An integrated edge detection method using mathematical morphology
CP Huang, RZ Wang
Pattern Recognition and Image Analysis 16, 406-412, 2006
292006
Steganalysis of reversible contrast mapping watermarking
YS Chen, RZ Wang
IEEE signal processing letters 16 (2), 125-128, 2009
282009
Prevention of cheating in visual cryptography by using coherent patterns
PY Lin, RZ Wang, YJ Chang, WP Fang
Information Sciences 301, 61-74, 2015
232015
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
YJ Chang, RZ Wang, JC Lin
EURASIP journal on advances in signal processing 2008, 1-17, 2009
222009
Reversible authentication and cross-recovery of images using (t, n)-threshold and modified-RCM watermarking
YS Chen, RZ Wang
Optics Communications 284 (12), 2711-2719, 2011
212011
Multilevel visual secret sharing
RZ Wang, YK Lee, SY Huang, TL Chia
Second International Conference on Innovative Computing, Informatio and …, 2007
202007
系統目前無法執行作業,請稍後再試。
文章 1–20