Chih-Yang Lin
Chih-Yang Lin
Geverifieerd e-mailadres voor saturn.yzu.edu.tw - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Reversible steganography for VQ-compressed images using side matching and relocation
CC Chang, CY Lin
IEEE Transactions on Information Forensics and Security 1 (4), 493-501, 2006
1342006
Lossless data hiding for color images based on block truncation coding
CC Chang, CY Lin, YH Fan
Pattern Recognition 41 (7), 2347-2357, 2008
1332008
Haze effect removal from image via haze density estimation in optical model
CH Yeh, LW Kang, MS Lee, CY Lin
Optics express 21 (22), 27127-27141, 2013
1062013
New image steganographic methods using run-length approach
CC Chang, CY Lin, YZ Wang
Information Sciences 176 (22), 3393-3408, 2006
1012006
Reversible steganographic method using SMVQ approach based on declustering
CC Chang, CY Lin
Information Sciences 177 (8), 1796-1805, 2007
782007
Feature-based sparse representation for image similarity assessment
LW Kang, CY Hsu, HW Chen, CS Lu, CY Lin, SC Pei
IEEE Transactions on multimedia 13 (5), 1019-1030, 2011
732011
A two-phase fuzzy mining and learning algorithm for adaptive learning environment
CJ Tsai, SS Tseng, CY Lin
International Conference on Computational Science, 429-438, 2001
722001
Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
CC Chang, YP Hsieh, CY Lin
IEEE Transactions on Information Forensics and Security 2 (3), 341-349, 2007
612007
Real-time background modeling based on a multi-level texture description
CH Yeh, CY Lin, K Muchtar, LW Kang
Information Sciences 269, 106-127, 2014
472014
Three-pronged compensation and hysteresis thresholding for moving object detection in real-time video surveillance
CH Yeh, CY Lin, K Muchtar, HE Lai, MT Sun
IEEE Transactions on Industrial Electronics 64 (6), 4945-4955, 2017
432017
Reversible steganographic method with high payload for JPEG images
CY Lin, CC Chang, YZ Wang
IEICE transactions on information and systems 91 (3), 836-845, 2008
382008
Perfect hashing schemes for mining association rules
CC Chang, CY Lin
The Computer Journal 48 (2), 168-179, 2005
362005
A new density-based scheme for clustering based on genetic algorithm
CY Lin, CC Chang, CC Lin
Fundamenta Informaticae 68 (4), 315-331, 2005
312005
Secret image hiding and sharing based on the (t, n)-threshold
CC Chang, CY Lin, CS Tseng
Fundamenta Informaticae 76 (4), 399-411, 2007
292007
An abandoned objects management system based on the gaussian mixture model
CY Lin, WH Wang
2008 International Conference on Convergence and Hybrid Information …, 2008
282008
Comparative study of leaf image recognition with a novel learning-based approach
JK Hsiao, LW Kang, CL Chang, CY Lin
2014 Science and Information Conference, 389-393, 2014
272014
Joint fingerprinting and decryption with noise-resistant for vector quantization images
CY Lin, P Prangjarote, LW Kang, WL Huang, TH Chen
Signal Processing 92 (9), 2159-2171, 2012
272012
Hiding data in VQ-compressed images using dissimilar pairs
CY Lin, CC Chang
Journal of Computers 17 (2), 3-10, 2006
272006
Efficient image/video dehazing through haze density analysis based on pixel-based dark channel prior
CH Yeh, LW Kang, CY Lin, CY Lin
Information Security and Intelligence Control (ISIC), 2012 International …, 2012
252012
Identification and tracking of players in sport videos
CW Lu, CY Lin, CY Hsu, MF Weng, LW Kang, HYM Liao
Proceedings of the Fifth International Conference on Internet Multimedia …, 2013
242013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20