Chih-Yang Lin
Citata da
Citata da
Lossless data hiding for color images based on block truncation coding
CC Chang, CY Lin, YH Fan
Pattern Recognition 41 (7), 2347-2357, 2008
Reversible steganography for VQ-compressed images using side matching and relocation
CC Chang, CY Lin
IEEE Transactions on Information Forensics and Security 1 (4), 493-501, 2006
Haze effect removal from image via haze density estimation in optical model
CH Yeh, LW Kang, MS Lee, CY Lin
Optics express 21 (22), 27127-27141, 2013
New image steganographic methods using run-length approach
CC Chang, CY Lin, YZ Wang
Information Sciences 176 (22), 3393-3408, 2006
Reversible steganographic method using SMVQ approach based on declustering
CC Chang, CY Lin
Information Sciences 177 (8), 1796-1805, 2007
Feature-based sparse representation for image similarity assessment
LW Kang, CY Hsu, HW Chen, CS Lu, CY Lin, SC Pei
IEEE Transactions on multimedia 13 (5), 1019-1030, 2011
A two-phase fuzzy mining and learning algorithm for adaptive learning environment
CJ Tsai, SS Tseng, CY Lin
International Conference on Computational Science, 429-438, 2001
Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
CC Chang, YP Hsieh, CY Lin
IEEE Transactions on Information Forensics and Security 2 (3), 341-349, 2007
Real-time background modeling based on a multi-level texture description
CH Yeh, CY Lin, K Muchtar, LW Kang
Information Sciences 269, 106-127, 2014
Three-pronged compensation and hysteresis thresholding for moving object detection in real-time video surveillance
CH Yeh, CY Lin, K Muchtar, HE Lai, MT Sun
IEEE Transactions on Industrial Electronics 64 (6), 4945-4955, 2017
Reversible steganographic method with high payload for JPEG images
CY Lin, CC Chang, YZ Wang
IEICE transactions on information and systems 91 (3), 836-845, 2008
Perfect hashing schemes for mining association rules
CC Chang, CY Lin
The Computer Journal 48 (2), 168-179, 2005
A new density-based scheme for clustering based on genetic algorithm
CY Lin, CC Chang, CC Lin
Fundamenta Informaticae 68 (4), 315-331, 2005
Comparative study of leaf image recognition with a novel learning-based approach
JK Hsiao, LW Kang, CL Chang, CY Lin
2014 Science and Information Conference, 389-393, 2014
Secret image hiding and sharing based on the (t, n)-threshold
CC Chang, CY Lin, CS Tseng
Fundamenta Informaticae 76 (4), 399-411, 2007
An abandoned objects management system based on the gaussian mixture model
CY Lin, WH Wang
2008 International Conference on Convergence and Hybrid Information …, 2008
Joint fingerprinting and decryption with noise-resistant for vector quantization images
CY Lin, P Prangjarote, LW Kang, WL Huang, TH Chen
Signal Processing 92 (9), 2159-2171, 2012
Hiding data in VQ-compressed images using dissimilar pairs
CY Lin, CC Chang
Journal of Computers 17 (2), 3-10, 2006
Efficient image/video dehazing through haze density analysis based on pixel-based dark channel prior
CH Yeh, LW Kang, CY Lin, CY Lin
Information Security and Intelligence Control (ISIC), 2012 International …, 2012
Identification and tracking of players in sport videos
CW Lu, CY Lin, CY Hsu, MF Weng, LW Kang, HYM Liao
Proceedings of the Fifth International Conference on Internet Multimedia …, 2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20