| 亞洲大學 |
2013-12 |
基於布林運算的多秘密分享機制
|
黃教智;詹啟祥;陳宜惠;Huang, Chiao-Chih; |
| 亞洲大學 |
2013 |
Block-Based Image Authentication Scheme with Located and Repairable Mechanisms
|
陳宜惠;Chen, Yi-Hui;Wanutchaporn;Sirakriengkrai, Wanutchaporn;Weng, I-Chun;Weng, I-Chun;林智揚;Lin, Chih-Yang |
| 亞洲大學 |
2013 |
Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism
|
林珮瑜;Lin, Pei-Yu;陳宜惠;Chen, Yi-Hui;張真誠;Chang, Chin-Chen;李榮三;Lee, Jung-San |
| 亞洲大學 |
2013 |
細緻化影像之存取控制機制
|
陳宜惠 |
| 亞洲大學 |
2012-09 |
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
|
張真誠;Chang, Chin-Chen;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2012-08 |
An Image Hiding Method by Linking Multiple Pixels with XOR Operator
|
陳宜惠;Chen, Yi-Hui;蔡淵裕;Tsai, Yuan-Yu;詹啟祥;Chan, Chi-Shiang |
| 亞洲大學 |
2012-05 |
RDF-Chord: A Semantic-based P2P System for RDF Queries
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2012-03 |
Using Queried Keywords or Full-text Extracted Keywords in Blog Mining
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2012-02 |
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy
|
陳宜惠;Chen, Yi-Hui;張真誠;Chang, Chin-Chen |
| 亞洲大學 |
2012 |
A self-authentication mechanism for a (3,3)-threshold secret sharing scheme
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011.10 |
A Privacy Reinforcement Approach against De-identified Dataset
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011.10 |
Data Hiding Scheme based on Features of Chinese Text
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011.09 |
A Two-Layer Steganography Scheme Using Sudoku for Digital Images
|
陳宜惠;Chen, Yi-Hui;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011.08 |
A Verifiable Visual Cryptography Scheme
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011.04 |
以數獨為基礎的雙層偽裝技術
|
陳宜惠;Chen, Yi-Hui;張鈞豪;Huao, Chang Chuan |
| 亞洲大學 |
2011-12 |
A Double-Layer Data Embedding Scheme Based on Three-Pixel Differences
|
陳宜惠;Chen, Yi-Hui;詹啟祥;Chan, Chi-Shiang |
| 亞洲大學 |
2011-10 |
A Privacy Reinforcement Approach against De-identified Dataset
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011-10 |
Data Hiding Scheme based on Features of Chinese Text
|
陳宜惠;Chen, Yi-Hui;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011-10 |
Java 101 物件導向程式與設計
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011-09 |
A Two-Layer Steganography Scheme Using Sudoku for Digital Images
|
陳宜惠;Chen, Yi-Hui;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011-08 |
A Verifiable Visual Cryptography Scheme
|
陳宜惠;Chen, Yi-Hui;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011-04 |
以數獨為基礎的雙層偽裝技術
|
陳宜惠;Chen, Yi-Hui;陳宜惠;Chen, Yi-Hui;張鈞豪;Huao, Chang Chuan |
| 亞洲大學 |
2011-04 |
Meaningful Secret Sharing Technique with Authentication and Remedy Abilities
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011-01 |
調色盤彩色影像之可逆式浮水印技術
|
陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011 |
Intelligent Projector System base on Computer Vision
|
林智揚;Lin, Chih-Yang;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011 |
Multimedia Privacy Protection System for Mobil Environments
|
林智揚;Lin, Chih-Yang;陳宜惠;Chen, Yi-Hui |
| 亞洲大學 |
2011 |
可驗證及還原之秘密影像分享機制
|
陳宜惠 |
| 亞洲大學 |
2011 |
有效且安全的XML存取控制機制
|
陳宜惠 |
| 修平科技大學 |
2009-12-10 |
愛讓心更靠近-台中育嬰院志工巡禮
|
陳宜惠; 李怡瑩; 陳怡臻; 劉郁君 |
| 朝陽科技大學 |
2004-12-31 |
一個為Web為主的資訊系統提供有效的委任授權機制的研究
|
陳宜惠; Chen, Yi-Hui |