A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact
Lin, Chia-Chen, Zhang, Bohan, Tai, Wei-Liang, Shiu, Pei-Feng, Jan, Jinn-Ke
Published in Symmetry (Basel) (01.01.2024)
Published in Symmetry (Basel) (01.01.2024)
Get full text
Journal Article
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images
Shiu, Pei-Feng, Tai, Wei-Liang, Jan, Jinn-Ke, Chang, Chin-Chen, Lin, Chia-Chen
Published in Signal processing. Image communication (01.05.2019)
Published in Signal processing. Image communication (01.05.2019)
Get full text
Journal Article
The UMTS-AKA Protocols for Intelligent Transportation Systems
Ou, Hsia-Hung, Hwang, Min-Shiang, Jan, Jinn-Ke
Published in EURASIP journal on wireless communications and networking (01.01.2009)
Published in EURASIP journal on wireless communications and networking (01.01.2009)
Get full text
Journal Article
A fair and secure mobile billing system
Chen, Yu-Yi, Jan, Jinn-Ke, Chen, Chin-Ling
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.07.2005)
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.07.2005)
Get full text
Journal Article
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS
Ou, Hsia-Hung, Lin, Iuon-Chang, Hwang, Min-Shiang, Jan, Jinn-Ke
Published in International journal of network management (01.07.2009)
Published in International journal of network management (01.07.2009)
Get full text
Journal Article
A Novel RFID Application for Preventing Train-jumping
Chen, Chin-ling, Chong, Mei-li, Jan, Jinn-ke
Published in Asia Pacific Management Review (01.12.2011)
Get full text
Published in Asia Pacific Management Review (01.12.2011)
Journal Article
Towards secure and efficient user authentication scheme using smart card for multi-server environments
Chen, Te-Yu, Lee, Cheng-Chi, Hwang, Min-Shiang, Jan, Jinn-Ke
Published in The Journal of supercomputing (01.11.2013)
Published in The Journal of supercomputing (01.11.2013)
Get full text
Journal Article
A new approach of lossy image compression based on hybrid image resizing techniques
Shen, Jau Ji, Yeh, Chun Hsiu, Jan, Jinn Ke
Published in International arab journal of information technology (01.03.2019)
Get full text
Published in International arab journal of information technology (01.03.2019)
Journal Article
A modified remote login authentication scheme based on geometric approach
Chien, Hung-Yu, Jan, Jinn-Ke, Tseng, Yuh-Min
Published in The Journal of systems and software (15.01.2001)
Published in The Journal of systems and software (15.01.2001)
Get full text
Journal Article
A high capacity data hiding scheme for binary images based on block patterns
Wang, Chung-Chuan, Chang, Ya-Fen, Chang, Chin-Chen, Jan, Jinn-Ke, Lin, Chia-Chen
Published in The Journal of systems and software (01.07.2014)
Published in The Journal of systems and software (01.07.2014)
Get full text
Journal Article
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Ou, Hsia-Hung, Hwang, Min-Shiang, Jan, Jinn-Ke
Published in The Journal of systems and software (01.02.2010)
Published in The Journal of systems and software (01.02.2010)
Get full text
Journal Article