default search action
Tzung-Her Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Xi-Wen Wu, Tzung-Her Chen:
Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares. Multim. Tools Appl. 83(10): 28913-28926 (2024) - [c19]Tzung-Her Chen:
Multiparty Quantum Key Agreement Protocol Based on 2-Qubit Grover Search with swapping. IIAI-AAI 2024: 671-672 - 2023
- [j62]Chien-Ding Lee, Jhih-Hong Li, Tzung-Her Chen:
A Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids. IEEE Access 11: 85202-85213 (2023) - [c18]Tzung-Her Chen, Jing-Ya Yan:
A Security-enhanced Steganography Scheme for RGBE-format HDR Images. IIAI-AAI 2023: 719-720 - 2022
- [j61]Chien-Ding Lee, Zhen-Hong Liao, Tzung-Her Chen:
Medical cooperative authenticated key agreement schemes with involvement of personal care assistant in telemedicine. Comput. Methods Programs Biomed. 221: 106809 (2022) - 2021
- [j60]Tzung-Her Chen, Tzu-Ching Chang, Ting-Le Zhu:
Security-enhanced cloud-based image secret sharing and authentication using POB number system. Multim. Tools Appl. 80(2): 1901-1924 (2021) - [j59]Tzung-Her Chen, Jing-Ya Yan:
Commutative encryption and authentication for OpenEXR high dynamic range images. Multim. Tools Appl. 80(18): 27807-27828 (2021) - [j58]Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung Wang:
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains. Secur. Commun. Networks 2021: 6637402:1-6637402:13 (2021) - [j57]Tzung-Her Chen, Wei-Bin Lee, Hsing-Bai Chen, Chien-Lung Wang:
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security. Symmetry 13(5): 855 (2021) - [j56]Chien-Ding Lee, Tzung-Her Chen:
New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy. Symmetry 13(7): 1144 (2021) - [c17]Ting-Le Zhu, Tzung-Her Chen:
A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain. DSC 2021: 1-5 - 2020
- [j55]Tzung-Her Chen, Xi-Wen Wu:
Multiple secret image sharing with general access structure. Multim. Tools Appl. 79(19-20): 13247-13265 (2020)
2010 – 2019
- 2019
- [j54]Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Tzungher Chen:
Secure and efficient protection for HTTP cookies with self-verification. Int. J. Commun. Syst. 32(2) (2019) - [j53]Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her Chen:
On the security of threshold random grid-based visual secret sharing. Multim. Tools Appl. 78(8): 10157-10180 (2019) - 2018
- [j52]Tzung-Her Chen, Kai-Siang Lin, Chih-Hung Lin:
On the design of a two-decoding-option image secret sharing scheme. Multim. Tools Appl. 77(7): 7865-7881 (2018) - [j51]Tzung-Her Chen, Tzu-Ching Chang:
On the security of a BTC-based-compression image authentication scheme. Multim. Tools Appl. 77(10): 12979-12989 (2018) - [j50]Hsing-Bai Chen, Wei-Bin Lee, Tzungher Chen:
A novel DRM scheme for accommodating expectations of personal use. Multim. Tools Appl. 77(18): 23099-23114 (2018) - [c16]Tai-Yuan Tu, Tzung-Her Chen, Ji-Min Yang, Chih-Hung Wang:
A Weighted Threshold Visual Cryptography. ICS 2018: 580-589 - 2017
- [j49]I-Chun Weng, Tzung-Her Chen:
A Novel Weighted Visual Cryptography Scheme with High Visual Quality. Int. J. Netw. Secur. 19(6): 922-928 (2017) - [j48]Jyun-Ci Huang, Fuh-Gwo Jeng, Tzung-Her Chen:
A new buyer-seller watermarking protocol without multiple watermarks insertion. Multim. Tools Appl. 76(7): 9667-9679 (2017) - 2016
- [j47]Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen:
On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services. Int. J. Netw. Secur. 18(3): 597-600 (2016) - [j46]Fuh-Gwo Jeng, Jyun-Ci Huang, Tzung-Her Chen:
An Improved Anonymous Buyer-Reseller Watermarking Protocol. Int. J. Netw. Secur. 18(4): 728-735 (2016) - [j45]Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her Chen:
A multi-watermarking protocol for health information management. Multim. Tools Appl. 75(14): 8123-8135 (2016) - [j44]Tzung-Her Chen, Yao-Sheng Lee, Chih-Hung Lin:
On the difficulty of aligning VSS random grids. Signal Process. Image Commun. 44: 101-107 (2016) - 2015
- [j43]Kai-Hsiang Tsao, Shyong Jian Shyu, Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen:
Visual multiple-secret sharing for flexible general access structure by random grids. Displays 39: 80-92 (2015) - [j42]Ci-Lin Li, Chih-Yang Lin, Tzung-Her Chen:
Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC. Int. J. Netw. Secur. 17(3): 282-289 (2015) - [j41]Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen:
Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J. Vis. Commun. Image Represent. 33: 31-41 (2015) - [j40]Fuh-Gwo Jeng, Wei-Lun Huang, Tzung-Her Chen:
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process. Image Commun. 34: 45-51 (2015) - 2014
- [j39]Jia-Hong Li, Tzungher Chen, Wei-Bin Lee:
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication. Int. J. Digit. Crime Forensics 6(3): 30-46 (2014) - [j38]Kai-Siang Lin, Chih-Hung Lin, Tzung-Her Chen:
Distortionless visual multi-secret sharing based on random grid. Inf. Sci. 288: 330-346 (2014) - [j37]Chih-Hung Lin, Tzung-Her Chen, Yan-Ting Wu, Kai-Hsiang Tsao, Kai-Siang Lin:
Multi-factor cheating prevention in visual secret sharing by hybrid codebooks. J. Vis. Commun. Image Represent. 25(7): 1543-1557 (2014) - [c15]Wei-Bin Lee, Tzungher Chen, Wei-Rung Sun, Kevin I.-J. Ho:
An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter. AINA Workshops 2014: 281-286 - 2013
- [j36]Chih-Hung Lin, Tzung-Her Chen, Chun-Wei Chiu:
Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern. Displays 34(1): 59-68 (2013) - [j35]Tzung-Her Chen, Bing-Jian Wang, Yao-Sheng Lee:
A random grid-based cyclic access structure VSS scheme for multiple secret images. Displays 34(5): 380-387 (2013) - [j34]Yao-Sheng Lee, Bing-Jian Wang, Tzung-Her Chen:
Quality-improved threshold visual secret sharing scheme by random grids. IET Image Process. 7(2): 137-143 (2013) - [j33]Tzung-Her Chen, Yao-Sheng Lee, Wei-Lun Huang, Justie Su-tzu Juan, Ying-Yu Chen, Ming-Jheng Li:
Quality-adaptive visual secret sharing by random grids. J. Syst. Softw. 86(5): 1267-1274 (2013) - [j32]Chih-Hung Lin, Tzung-Her Chen, Chang-Sian Wu:
A batch image encryption scheme based on chaining random grids. Sci. Iran. 20(3): 670-681 (2013) - [j31]Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung Wang:
A security-enhanced key agreement protocol based on chaotic maps. Secur. Commun. Networks 6(1): 108-114 (2013) - [c14]Chih-Hung Lin, Shu-Yuan Lin, Tzung-Her Chen:
Dynamic range optimization by flexible local contrast enhancement using luminance map. ICDIP 2013: 88780O - [c13]Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen, Kai-Siang Lin:
Robust Watermarking for Multiple Images and Users Based on Visual Cryptography. ICGEC 2013: 175-182 - [c12]Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, Sheng-Shiang Chang:
A Tailor-Made Encryption Scheme for High-Dynamic Range Images. ICGEC 2013: 183-192 - [c11]Jing-Ya Yan, Tzung-Her Chen, Chih-Hung Lin:
Encryption in High Dynamic Range Images for RGBE Format. IIH-MSP 2013: 493-496 - 2012
- [j30]Tzung-Her Chen, Kuang-Che Li:
Multi-image encryption by circular random grids. Inf. Sci. 189: 255-265 (2012) - [j29]Yao-Sheng Lee, Tzung-Her Chen:
Insight into collusion attacks in random-grid-based visual secret sharing. Signal Process. 92(3): 727-736 (2012) - [j28]Chih-Yang Lin, Panyaporn Prangjarote, Li-Wei Kang, Wei-Lun Huang, Tzung-Her Chen:
Joint fingerprinting and decryption with noise-resistant for vector quantization images. Signal Process. 92(9): 2159-2171 (2012) - [j27]Tzung-Her Chen, Kai-Hsiang Tsao, Yao-Sheng Lee:
Yet another multiple-image encryption by rotating random grids. Signal Process. 92(9): 2229-2237 (2012) - 2011
- [j26]Tzung-Her Chen, Kai-Hsiang Tsao:
Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7): 1197-1208 (2011) - [j25]Tzungher Chen, Chang-Sian Wu:
Efficient multi-secret image sharing based on Boolean operations. Signal Process. 91(1): 90-97 (2011) - [j24]Tzung-Her Chen, Kai-Hsiang Tsao:
User-Friendly Random-Grid-Based Visual Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 21(11): 1693-1703 (2011) - 2010
- [j23]Tzungher Chen, Chang-Sian Wu:
Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf. Sci. 180(9): 1690-1701 (2010) - [j22]Tzung-Her Chen, Jyun-Ci Huang:
A novel user-participating authentication scheme. J. Syst. Softw. 83(5): 861-867 (2010) - [j21]Tzung-Her Chen, Yan-Ting Wu:
A new protocol of wide use for e-mail with perfect forward secrecy. J. Zhejiang Univ. Sci. C 11(1): 74-78 (2010) - [c10]Tzung-Her Chen, Yao-Sheng Lee, Ci-Lin Li:
High-Capacity Multi-secret Sharing by Random Grid. BWCCA 2010: 459-462 - [c9]Chih-Yang Lin, Wei-Lun Huang, Tzung-Her Chen:
Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization. BWCCA 2010: 463-468 - [c8]Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin:
Chaos-Based Image Integrity Authentication Code. IIH-MSP 2010: 13-16
2000 – 2009
- 2009
- [j20]Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A self-verification authentication mechanism for mobile satellite communication systems. Comput. Electr. Eng. 35(1): 41-48 (2009) - [j19]Tzungher Chen, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou:
On the security of a copyright protection scheme based on visual cryptography. Comput. Stand. Interfaces 31(1): 1-5 (2009) - [j18]Chin-Chen Chang, Tzungher Chen, Li-Jen Liu:
Preventing Cheating in Computational Visual Cryptography. Fundam. Informaticae 92(1-2): 27-42 (2009) - [j17]Tzung-Her Chen, Kai-Hsiang Tsao, Yan-Ting Yang:
Friendly Color Visual Secret Sharing by Random Grids. Fundam. Informaticae 96(1-2): 61-70 (2009) - [j16]Du-shiau Tsai, Gwoboa Horng, Tzungher Chen, Yao-Te Huang:
A novel secret image sharing scheme for true-color images with size constraint. Inf. Sci. 179(19): 3247-3254 (2009) - [j15]Tzungher Chen, Shu-Chen Yeh, Kuan-Chieh Liao, Wei-Bin Lee:
A Practical and Efficient Electronic Checkbook. J. Organ. Comput. Electron. Commer. 19(4): 285-293 (2009) - [j14]Tzung-Her Chen, Kai-Hsiang Tsao:
Visual secret sharing by random grids revisited. Pattern Recognit. 42(9): 2203-2217 (2009) - [c7]Tzung-Her Chen, Yao-Sheng Lee:
Yet Another Friendly Progressive Visual Secret Sharing Scheme. IIH-MSP 2009: 353-356 - [c6]Tzung-Her Chen, Yan-Ting Wu, Yue-Rong Lin:
Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression. IIH-MSP 2009: 889-892 - 2008
- [j13]Tzungher Chen, Wei-Bin Lee:
A new method for using hash functions to solve remote user authentication. Comput. Electr. Eng. 34(1): 53-62 (2008) - [j12]Hsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang:
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Comput. Stand. Interfaces 30(1-2): 95-99 (2008) - [j11]Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang:
Public Key Authentication Schemes for Local Area Networks. Informatica 19(1): 3-16 (2008) - [j10]Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A round- and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9): 1581-1590 (2008) - [c5]Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, Tzungher Chen:
Assigning Keys in a Hierarchy. IIH-MSP 2008: 1363-1366 - [c4]Tzung-Her Chen, Kai-Hsiang Tsao, Kuo-Chen Wei:
Multiple-Image Encryption by Rotating Random Grids. ISDA (3) 2008: 252-256 - 2007
- [j9]Tzungher Chen, Gwoboa Horng:
A lightweight and anonymous copyright-protection protocol. Comput. Stand. Interfaces 29(2): 229-237 (2007) - [j8]Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu:
A Secure YS-Like User Authentication Scheme. Informatica 18(1): 27-36 (2007) - [j7]Du-shiau Tsai, Tzungher Chen, Gwoboa Horng:
A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognit. 40(8): 2356-2366 (2007) - [c3]Chiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee:
Security enhancement of a novel proxy key generation protocol. COMPSAC (2) 2007: 681-688 - [c2]Tzungher Chen, Chang-Sian Wu, Wei-Bin Lee:
A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding. IIH-MSP 2007: 421-424 - 2006
- [j6]Gwoboa Horng, Tzungher Chen, Du-shiau Tsai:
Cheating in Visual Cryptography. Des. Codes Cryptogr. 38(2): 219-236 (2006) - [j5]Tzungher Chen, Du-shiau Tsai:
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognit. 39(8): 1530-1541 (2006) - 2005
- [j4]Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Remarks on some signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 169(2): 1070-1075 (2005) - [j3]Tzungher Chen, Gwoboa Horng, Wei-Bin Lee:
A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Trans. Ind. Electron. 52(1): 327-334 (2005) - [c1]Dahua Xie, Tzung-Her Chen, C.-C. Jay Kuo:
Distortion-Aware Multimedia Authentication using an Enhanced Hash Function. MMSP 2005: 1-4 - 2004
- [j2]Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Secure SAS-like password authentication schemes. Comput. Stand. Interfaces 27(1): 25-31 (2004) - 2002
- [j1]Wei-Bin Lee, Tzungher Chen:
A public verifiable copy protection technique for still images. J. Syst. Softw. 62(3): 195-204 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint