• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4627407)   Today's Articles (1073)   Subscriber (49595)
For: Chen TS, Chang CC, Hwang MS. A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 1998;7:1485-1488. [PMID: 18276214 DOI: 10.1109/83.718488] [Citation(s) in RCA: 22] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/25/2023]
Number Cited by Other Article(s)
1
Chang CC, Wu HC. A copyright protection scheme of images based on visual cryptography. IMAGING SCIENCE JOURNAL 2016. [DOI: 10.1080/13682199.2001.11784377] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
2
Khashan OA, Zin AM, Sundararajan EA. Performance study of selective encryption in comparison to full encryption for still visual images. ACTA ACUST UNITED AC 2014. [DOI: 10.1631/jzus.c1300262] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
3
Chiou SF, Lu YC, Liao IE, Hwang MS. An efficient reversible data hiding scheme based on SMVQ. THE IMAGING SCIENCE JOURNAL 2013. [DOI: 10.1179/1743131x12y.0000000035] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
4
Lee WB, Chen TH, Lee CC. Security of new encryption algorithm for image cryptosystems. IMAGING SCIENCE JOURNAL 2013. [DOI: 10.1179/174313106x93723] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
5
Qi L, Zhang Y, Zhang X, Wang S, Xie F. Statistical behavior analysis and precision optimization for the laser stripe center detector based on Steger's algorithm. OPTICS EXPRESS 2013;21:13442-13449. [PMID: 23736597 DOI: 10.1364/oe.21.013442] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
6
Chun HY, Son J, Jung H, Kim MT, Kim TY, Kim KG, Kim JH. Load and speed effects on thyroid ultrasonography. Biomed Eng Lett 2013. [DOI: 10.1007/s13534-013-0089-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]  Open
7
Ohsawa Y, Yamaguchi K, Ichikawa T, Sakamoto Y. Computer-generated holograms using multiview images captured by a small number of sparsely arranged cameras. APPLIED OPTICS 2013;52:A167-A176. [PMID: 23292389 DOI: 10.1364/ao.52.00a167] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/09/2012] [Accepted: 10/04/2012] [Indexed: 06/01/2023]
8
A New Chaos-Based Image-Encryption and Compression Algorithm. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING 2012. [DOI: 10.1155/2012/179693] [Citation(s) in RCA: 33] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
9
HU YUCHEN, LIN MINHUI. SECURE IMAGE HIDING SCHEME BASED UPON VECTOR QUANTIZATION. INT J PATTERN RECOGN 2011. [DOI: 10.1142/s0218001404003526] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
10
Shie SC, Lin SD, Jiang JH. Visually imperceptible image hiding scheme based on vector quantization. Inf Process Manag 2010. [DOI: 10.1016/j.ipm.2009.07.001] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
11
Chen TH, Wu CS. Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf Sci (N Y) 2010. [DOI: 10.1016/j.ins.2009.12.021] [Citation(s) in RCA: 37] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
12
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Comput Secur 2009. [DOI: 10.1016/j.cose.2009.03.006] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
13
A novel secret image sharing scheme for true-color images with size constraint. Inf Sci (N Y) 2009. [DOI: 10.1016/j.ins.2009.05.020] [Citation(s) in RCA: 41] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
14
Rahim F, Keikhaei B, Ebadi A. Clinical Manifestation of Pulmonary Dysfunction in β-Thalassemia Major. JOURNAL OF MEDICAL SCIENCES 2008. [DOI: 10.3923/jms.2008.484.490] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]  Open
15
Chang CC, Wu WC. Fast planar-oriented ripple search algorithm for hyperspace VQ codebook. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2007;16:1538-47. [PMID: 17547132 DOI: 10.1109/tip.2007.894256] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/15/2023]
16
Chang CC, Chou H, Lin CC. Colour image-hiding scheme using human visual system. THE IMAGING SCIENCE JOURNAL 2006. [DOI: 10.1179/174313106x93750] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
17
Chang CC, Chan CS, Tai WL. Hiding a halftone secret image in two camouflaged halftone images. PATTERN RECOGNITION AND IMAGE ANALYSIS 2006. [DOI: 10.1134/s1054661806030163] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
18
Wu HC, Wu NI, Tsai CS, Hwang MS. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. ACTA ACUST UNITED AC 2005. [DOI: 10.1049/ip-vis:20059022] [Citation(s) in RCA: 314] [Impact Index Per Article: 16.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
19
An iterative method of palette-based image steganography. Pattern Recognit Lett 2004. [DOI: 10.1016/j.patrec.2003.10.013] [Citation(s) in RCA: 27] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
20
Yeh CH, Chang HT, Chien HC, Kuo CJ. Design of cascaded phase keys for a hierarchical security system. APPLIED OPTICS 2002;41:6128-6134. [PMID: 12389981 DOI: 10.1364/ao.41.006128] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/23/2023]
21
A steganographic method based upon JPEG and quantization table modification. Inf Sci (N Y) 2002. [DOI: 10.1016/s0020-0255(01)00194-3] [Citation(s) in RCA: 193] [Impact Index Per Article: 8.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
22
Lossy Compression Tolerant Steganography. ACTA ACUST UNITED AC 2001. [DOI: 10.1007/3-540-47749-7_34] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register]
23
A novel SVD- and VQ-based image hiding scheme. Pattern Recognit Lett 2001. [DOI: 10.1016/s0167-8655(01)00044-7] [Citation(s) in RCA: 91] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
24
Tsai CS, Chang CC, Chen TS. Image steganography using vector quantization and discrete cosine transform. THE IMAGING SCIENCE JOURNAL 2000. [DOI: 10.1080/13682199.2000.11784363] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA