Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
2012 | Content Authentication of Halftone Video via Flickering as Sparse Signal | Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang | | | | |
2003 | Content-Dependent Anti-Disclosure Image Watermark | Lu, Chun-Shien; Hsu, Chao-Yong | | | | |
2004 | Content-Dependent Multipurpose Watermarking Resistant Against Generalized Copy Attack | Lu, Chun-Shien; Hsu, Chao-Yong | | | | |
2002 | Denoising and Copy Attacks Resilient Watermarking by Exploiting Knowledge at Detector | Lu, Chun-Shien; Liao, Hong-Yuan Mark; Kutter, Martin | IEEE Trans. on Image Processing 11 | | | |
2010 | Dictionary Learning-based Distributed Compressive Video Sensing | Chen, Hung-Wei; Kang, Li-Wei; Lu, Chun-Shien | | | | |
2001 | Digital Watermarking: A Communications with Side Information Perspective | Lu, Chun-Shien; Liao, Hong-Yuan Mark | | | | |
2009 | Distributed Compressive Video Sensing | Kang, Li-Wei; Lu, Chun-Shien | | | | |
2003 | Dual Security-based Image Steganography | Lu, Chun-Shien | | | | |
2000 | Dyadic Wavelet-based Nonlinear Conduction Equation: Theory and Applications | Sze, Chwen-Jye; Liao, Hong-Yuan Mark; Huang, Shih-Kun; Lu, Chun-Shien | | | | |
2010 | Dynamic Measurement Rate Allocation for Distributed Compressive Video Sensing | Chen, Hung-Wei; Kang, Li-Wei; Lu, Chun-Shien | | | | |
2009 | Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2011 | Fast Compressive Sensing Recovery with Transform-based Sampling | Chen, Hung-Wei; Lu, Chun-Shien; Pei, Soo-Chang | | | | |
2005 | Fragile Watermarking for Authenticating 3-D Polygonal Meshes | Lin, H. Y.; Liao, H. Y. Mark; Lu, Chun-Shien; Lin, J. C. | IEEE Transactions on Multimedia 7, 997-1006 | | | |
1994 | Fuzzified Probabilistic Relaxation for Textured Image Segmentation | Lu, Chun-Shien; Chung, Pau-Choo | | | | |
2005 | Geometric Distortion-Resilient Image Hashing Scheme and Its Applications on Copy Detection and Authentication | Lu, Chun-Shien; Hsu, Chao-Yong | ACM Multimedia Systems Journal, special issue on Multimedia and Security 11 | | | |
2007 | Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
1999 | Highly Robust Image Watermarking Using Complementary Modulations | Lu, Chun-Shien; Liao, Hong-Yuan Mark; Huang, Shih-Kun; Sze, Chwen-Jye | | | | |
2011 | Homomorphic Encryption-based Secure SIFT for Privacy-Preserving Feature Extraction | Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang | | | | |
2012 | Image Feature Extraction in Encrypted Domain with Privacy-Preserving SIFT | Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang | IEEE Trans. on Image Processing 21, 4593-4607 | | | |
2006 | Informed Authentication Watermarking via Stego Data Reconstruction | Hsu, Chao-Yong; Lu, Chun-Shien | | | | |