|
English
|
正體中文
|
简体中文
|
2818748
|
|
???header.visitor??? :
28330099
???header.onlineuser??? :
494
???header.sponsordeclaration???
|
|
|
???tair.name??? >
???browser.page.title.author???
|
"mao qian mao qian"???jsp.browse.items-by-author.description???
Showing items 1-5 of 5 (1 Page(s) Totally) 1 View [10|25|50] records per page
亞洲大學 |
2016-05 |
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method
|
Li), Fan Li(Fan;Mao), Qian Mao(Qian;CHang)*, 張真誠(Chin-Chen |
亞洲大學 |
2015-10 |
Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding
|
Mao), Qian Mao(Qian;Li), Fan Li(Fan;CHang)*, 張真誠(Chin-Chen |
亞洲大學 |
2015-09 |
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images
|
Zhai), Shengyun Zha(Shengyun;Li), Fan Li(Fan;CHang)*, 張真誠(Chin-Chen;Mao), Qian Mao(Qian |
亞洲大學 |
2015-08 |
A Proxy User Authentication Protocol Using Source-Based Image Morphing
|
Mao), Qian Mao(Qian;Bharanitharan), K. Bharanith(K.;CHang)*, 張真誠(Chin-Chen |
亞洲大學 |
2015-05 |
An Image-Based Key Agreement Protocol Using the Morphing Technique
|
Mao), Qian Mao(Qian;CHang)*, 張真誠(Chin-Chen;Harn), Lein Harn(Lein;Chang), Shih-Chang C(Shih-Chang |
Showing items 1-5 of 5 (1 Page(s) Totally) 1 View [10|25|50] records per page
|