Follow
Tzung-Her Chen
Title
Cited by
Cited by
Year
Efficient multi-secret image sharing based on Boolean operations
TH Chen, CS Wu
Signal Processing 91 (1), 90-97, 2011
2432011
Threshold visual secret sharing by random grids
TH Chen, KH Tsao
Journal of Systems and Software 84 (7), 1197-1208, 2011
2382011
Visual secret sharing by random grids revisited
TH Chen, KH Tsao
Pattern recognition 42 (9), 2203-2217, 2009
2252009
Cheating in visual cryptography
G Horng, T Chen, DS Tsai
Designs, Codes and Cryptography 38, 219-236, 2006
2132006
User-friendly random-grid-based visual secret sharing
TH Chen, KH Tsao
IEEE Transactions on Circuits and Systems for Video Technology 21 (11), 1693 …, 2011
1372011
A publicly verifiable copyright-proving scheme resistant to malicious attacks
TH Chen, G Horng, WB Lee
IEEE Transactions on industrial electronics 52 (1), 327-334, 2005
1372005
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
DS Tsai, TH Chen, G Horng
Pattern Recognition 40 (8), 2356-2366, 2007
1062007
A novel secret image sharing scheme for true-color images with size constraint
DS Tsai, G Horng, TH Chen, YT Huang
Information Sciences 179 (19), 3247-3254, 2009
1032009
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes
FG Jeng, WL Huang, TH Chen
Signal processing: Image communication 34, 45-51, 2015
962015
A self-verification authentication mechanism for mobile satellite communication systems
TH Chen, WB Lee, HB Chen
Computers & Electrical Engineering 35 (1), 41-48, 2009
952009
Multi-image encryption by circular random grids
TH Chen, KC Li
Information Sciences 189, 255-265, 2012
842012
Multiple-image encryption by rotating random grids
TH Chen, KH Tsao, KC Wei
2008 Eighth International Conference on Intelligent Systems Design and …, 2008
742008
A round-and computation-efficient three-party authenticated key exchange protocol
TH Chen, WB Lee, HB Chen
Journal of Systems and Software 81 (9), 1581-1590, 2008
742008
Compression-unimpaired batch-image encryption combining vector quantization and index compression
TH Chen, CS Wu
Information Sciences 180 (9), 1690-1701, 2010
702010
Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol
TH Chen, DS Tsai
Pattern Recognition 39 (8), 1530-1541, 2006
612006
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
HB Chen, TH Chen, WB Lee, CC Chang
Computer Standards & Interfaces 30 (1-2), 95-99, 2008
562008
A new method for using hash functions to solve remote user authentication
TH Chen, WB Lee
Computers & Electrical Engineering 34 (1), 53-62, 2008
522008
On generating meaningful shares in visual secret sharing scheme
DS Tsai, T Chen, G Horng
The Imaging Science Journal 56 (1), 49-55, 2008
492008
On the security of a copyright protection scheme based on visual cryptography
TH Chen, CC Chang, CS Wu, DC Lou
Computer Standards & Interfaces 31 (1), 1-5, 2009
472009
Yet another multiple-image encryption by rotating random grids
TH Chen, KH Tsao, YS Lee
Signal Processing 92 (9), 2229-2237, 2012
452012
The system can't perform the operation now. Try again later.
Articles 1–20