| 1 |
Yu-An Ho, Yung-Kuan Chan, Chwei-Shyong Tsai, Yen-Ping Chu(朱延平) and Hsien-Chu Wu, Jan.2012. “A Binary Image Hiding-Compression Method Using BFT Linear Quadtree and Logic-Spectra.” International Journal of Innovative Computing Information and Control, Vol. 8, No. 1(A), pp. 329-345. |
| 2 |
Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang and Yen-Ping Chu(朱延平), Dec. 2010. “A Secure and Efficient ECC-Based AKA Protocol for Wireless Mobile Communications.” International Journal of Innovative Computing Information and Control, Vol. 6, No. 11, pp. 5249-5258. NSC 95-2218-E-001-001. |
| 3 |
Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang and Yen-Ping Chu(朱延平), Dec. 2010. “An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks.” Journal of Internet Technology, Vol. 11, No. 7, pp. 997-1004. NSC 98-2221-E-005-050-MY3. |
| 4 |
Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu(朱延平) and Shyh-Chang Tsaur, Jul. 2010. “Resampling Halftone Images Using Interpolation and Error-Diffusion.” Computer Journal, Vol. 53, No. 6, pp. 802-813. |
| 5 |
Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu(朱延平) and Hung-Ruei Chen, Dec. 2009. “A high capacity reversible data hiding scheme with edge prediction and difference expansion.” Journal of Systems and Software, Vol. 82, No. 12, pp. 1966-1973. |
| 6 |
Chun-Ta Li, Min-Shiang Hwang and Yen-Ping Chu(朱延平), Aug. 2009. “An Efficient Sensor-to-sensor Authenticated Path-key Establishment Scheme for Secure Communications in Wireless Sensor Networks.” International Journal of Innovative Computing Information and Control, Vol. 5, No. 8, pp. 2107-2124. NSC 97-2219-E-009-006. |
| 7 |
M.H. Tsai, C.K. Chen, Y.F. Chen, Y.K. Chan, K.C. Chen and Y.P. Chu(朱延平), Aug. 2008. “Secret image sharing scheme based solely on ADDITION.” Imaging Science Journal, Vol. 56, No. 4, pp. 183-188. |
| 8 |
Chun-Ta Li, Min-Shiang Hwang and Yen-Ping Chu(朱延平), Jul. 2008. “A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.” Computer Communications, Vol. 31, No. 12, pp. 2803-2814. |
| 9 |
Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai and Yen-Ping Chu(朱延平), Jun. 2008. “Adaptive lossless steganographic scheme with centralized difference expansion.” Pattern Recognition, Vol. 41, No. 6, pp. 2097-2106. |
| 10 |
?Chua-Ta Li, Min-Shiang Hwang and Yen-Ping Chu(朱延平), May. 2008. “Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.” Computer Systems Science & Engineering, Vol. 23, No. 3, pp. 227-234. |
| 11 |
Ho,Yu-An, Yung-Kuan Chan, Chwei-Shyong Tsai and Yen-Ping Chu(朱延平)., “A BST-based robust image hiding method.”, Imaging Science Journal, Vol.56(6) , 351-359, December 2008., (SCI) |
| 12 |
Ho, Yu-An, Yung-Kuan Chan, Hsien-Chu Wu and Yen-Ping Chu (朱延平)., “High-capacity reversible data hiding in binary image using pattern substitution.”, Computer Standards & Interfaces, Vol.31(4), 787-794, June 2009., (SCI) |
| 13 |
Chan, Yung-Kuan, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai and Yen-Ping Chu, (朱延平)., “A HDWT-based reversible data hiding method.”, Journal of Systems and Software, Vol.82(3), 411-421, March 2009., (SCI) |
| 14 |
Li, Chun-Ta, Min-Shiang Hwang and Yen-Ping Chu (朱延平)., "Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.", Computer Communications, Vol.31(18), 4255-4258, December 2008., (SCI/EI) |
| 15 |
Feng, Jen-Bang, Hsien-Chu Wu, Ya-Fen Chang, Chwei-Shyong Tsai and Yen-Ping Chu (朱延平). , “Visual secret sharing for multiple secrets.”, Pattern Recognition, Vol.41(12), 3572-3581, December 2008., (SCI) |
| 16 |
Chang, Ya-Fen, Jen-Bang Feng, Chwei-Shyong Tsai and Yen-Ping Chu. (朱延平)., “A new data hiding scheme using pixel swapping for halftone images.”, Imaging Science Journal, Vol.56(5), 279-290, October 2008., (SCI) |
| 17 |
Li, Chun-Ta and Yen-Ping Chu(朱延平). , "Cryptanalysis of threshold password authentication against guessing attakcs in Ad Hoc networks.", International Journal of Network Security, Vol.8(2), 166-168, Mar. 2009 |
| 18 |
Yi-Hung Huang, Kuan-Cheng Lin, Chao-Yu Kuo, Chin-Hsing Chen, Yen-Ping Chu(朱延平), Jan.2008, "Enhancement of fairness in a DiffServ network using a novel queuing algorithm," Computer Standards & Interfaces, Vol.30, Nol.1-2, pp.52-61, (SCI). |
| 19 |
Shys-Fan Yang-Mao, Yung-Kuan Chan, Yen-Ping Chu(朱延平), Apl.2008, "Edge Enhancement Nucleus and Cytoplast Contour Detector of Cervical Smear Images," IEEE Transactions on Systems, Man and Cybernetics, Vol.38, Nol.2, pp.353-366, (SCI). |
| 20 |
Shys-Fan Yang-Mao, Yung-Fu Chen, Yung-Kuan Chan, Yen-Ping Chu(朱延平), Dec.2007, "Gradient Direction Edge Enhancement Based Nucleus and Cytoplasm Contour Detector of Cervical Smear Images," Lecture Notes in Computer Science, Vol.4901, pp.290-297, (EI). |
| 21 |
Hui-Chieh Lu, Yen-Ping Chu(朱延平), Ruey-Kai Sheu, and Win-Tsung Lo, Mar.2008, "A generic application sharing architecture based on message-oriented middleware platform," Computer Standards & Interfaces, Vol.30, Nol.3, pp.191-199, (SCI). |
| 22 |
Lun-Chi Chen, Ruey-Kai Sheu, Hui-Chieh Lu, Win-Tsung Lo and Yen-Ping Chu. (朱延平), 2006. “Object Finding System Based on RFID Technology.” Lecture Notes in Computer Science, vol. 3842, 383-396. (SCI) |
| 23 |
Min-Shiang Hwang, Jung-wen Lo, Shu-Yin Hsiao and Yen-Pin Chu. (朱延平) 2006. “Improvement of Authenticated Encryption Scheme with Message Linkage for Message Flow.” IEICE Transactions on Information and Systems, E89-D: 4, 1575-1577. (SCI) |
| 24 |
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu. (朱延平) 2006. “Reversible Watermarking: Current Status and Key Issues.” International Journal of Network Security, Vol. 2, No. 3161-170. (SCI) |
| 25 |
Y. K. Chan, D. L. Liau, Y. F. Chen, H. C. Wu*, and Y. P. Chu. (朱延平) 2006. “A Minute Lossy Method for 2D-Gel Images Compression.” International Journal of Imaging Systems and Technology Volume 16, Issue 11 – 8. (SCI) |
| 26 |
Hui-Chieh Lu, Yen-Ping Chu (朱延平)and Min-Shiang Hwang. 2006/9”New Steganographic Method of Pixel-Value Differencing.” Journal of Imaging Science and Technology, vol. 50, no. 5424-426. |