Image hiding by optimal LSB substitution and genetic algorithm RZ Wang, CF Lin, JC Lin Pattern recognition 34 (3), 671-683, 2001 | 1012 | 2001 |
Sharing multiple secrets in visual cryptography SJ Shyu, SY Huang, YK Lee, RZ Wang, K Chen Pattern recognition 40 (12), 3633-3651, 2007 | 299 | 2007 |
Secret image sharing with smaller shadow images RZ Wang, CH Su Pattern Recognition Letters 27 (6), 551-555, 2006 | 275 | 2006 |
Hiding data in images by optimal moderately-significant-bit replacement RZ Wang, CF Lin, JC Lin Electronics Letters 36 (25), 2069-2070, 2000 | 206 | 2000 |
Scalable secret image sharing RZ Wang, SJ Shyu Signal processing: Image communication 22 (4), 363-373, 2007 | 159 | 2007 |
Region incrementing visual cryptography RZ Wang IEEE Signal Processing Letters 16 (8), 659-662, 2009 | 123 | 2009 |
High-payload image steganography using two-way block matching RZ Wang, YS Chen IEEE Signal Processing Letters 13 (3), 161-164, 2006 | 104 | 2006 |
Incrementing visual cryptography using random grids RZ Wang, YC Lan, YK Lee, SY Huang, SJ Shyu, TL Chia Optics Communications 283 (21), 4242-4249, 2010 | 79 | 2010 |
An image-hiding method with high hiding capacity based on best-block matching and k-means clustering RZ Wang, YD Tsai Pattern Recognition 40 (2), 398-409, 2007 | 65 | 2007 |
Scalable secret image sharing with smaller shadow images YY Lin, RZ Wang IEEE Signal Processing Letters 17 (3), 316-319, 2009 | 59 | 2009 |
Tagged Visual Cryptography RZ Wang, SF Hsu Signal Processing Letters, IEEE 18 (11), 627-630, 2011 | 45 | 2011 |
Method for generating color QR code PY Lin, WC Liao, RZ Wang US Patent 9,760,820, 2017 | 36 | 2017 |
The nested QR code GJ Chou, RZ Wang IEEE Signal Processing Letters 27, 1230-1234, 2020 | 34 | 2020 |
Blind QR code steganographic approach based upon error correction capability YJ Chiang, PY Lin, RZ Wang, YH Chen KSII Transactions on Internet and Information Systems (TIIS) 7 (10), 2527-2543, 2013 | 30 | 2013 |
An integrated edge detection method using mathematical morphology CP Huang, RZ Wang Pattern Recognition and Image Analysis 16, 406-412, 2006 | 29 | 2006 |
Steganalysis of reversible contrast mapping watermarking YS Chen, RZ Wang IEEE signal processing letters 16 (2), 125-128, 2009 | 28 | 2009 |
Prevention of cheating in visual cryptography by using coherent patterns PY Lin, RZ Wang, YJ Chang, WP Fang Information Sciences 301, 61-74, 2015 | 23 | 2015 |
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering YJ Chang, RZ Wang, JC Lin EURASIP journal on advances in signal processing 2008, 1-17, 2009 | 22 | 2009 |
Reversible authentication and cross-recovery of images using (t, n)-threshold and modified-RCM watermarking YS Chen, RZ Wang Optics Communications 284 (12), 2711-2719, 2011 | 21 | 2011 |
Multilevel visual secret sharing RZ Wang, YK Lee, SY Huang, TL Chia Second International Conference on Innovative Computing, Informatio and …, 2007 | 20 | 2007 |