| 淡江大學 |
2004-09 |
A new scheme to protect confidential Images
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2004-07 |
A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho |
| 淡江大學 |
2004-03-23 |
An agent-based consumer recommendation mechanism
|
Wang, Ying-hong; Hwang, Ren-junn; Wang, Wen-nan |
| 淡江大學 |
2004-03 |
An agent-based consumer recommendation mechanism
|
Wang, Ying-hong; Hwang, Ren-junn; Wang, Wen-nan |
| 淡江大學 |
2003-10 |
Implementing the RSA Algorithm on the TI TMS320C55x Family
|
Hwang, Ren-Junn; Su, Feng-Fu; Huang, Loang-Shing; Peng, Jen-Kang |
| 淡江大學 |
2003-07 |
A method for sending confidential messages to a group without trusted parties
|
黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2003-07 |
Key agreement in ad hoc networks
|
黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2003-01 |
The improvement of steganography capacity
|
黃仁俊; Hwang, Ren-junn; Kao, Chuan-ho |
| 淡江大學 |
2002-11 |
Watermark in color image
|
Hwang, Ren-junn; Kao, Chuan-ho; Chang, Rong-chi |
| 淡江大學 |
2002-03 |
Digital watermarking based on pixels relationships
|
Hwang, Ren-junn; Chang, Rong-chi; Shiau, Sheng-hua; Chang, Tsung-ming |
| 淡江大學 |
2002 |
Future Multimedia Databases and Research Directions
|
Chang, Chin-chen; Hung, Yi-ping; Hwang, Ren-junn; Shih, Timothy |
| 淡江大學 |
2001-09 |
Using a mouse as the login device for a visual cryptography oriented password authentication scheme
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn; Chen, Tung-shou |
| 淡江大學 |
2001-07-01 |
Lossy compression tolerant steganography
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho; Chang, Tsung-ming |
| 淡江大學 |
2001-07 |
Lossy compression tolerant steganography
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho; Chang, Tsung-ming |
| 淡江大學 |
2001-03 |
Hiding a picture in two pictures
|
黃仁俊; Hwang, Ren-junn; Chang, Chin-chen |
| 淡江大學 |
1999 |
A Concept of Designing Cheater Identification Methods for Secret Sharing
|
Hwang, Ren-junn; 黃仁俊; Lee, W. B.; Chang, C. C. |
| 淡江大學 |
1999 |
An improved threshold scheme based on modular arithmetic
|
Hwang, Ren-junn; 黃仁俊 |
| 淡江大學 |
1999 |
A concept of designing cheater identification methods for secret sharing
|
Hwang, Ren-junn; 黃仁俊 |
| 淡江大學 |
1998-11 |
Sharing secret images using shadow codebooks
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
1998-09 |
An on-line secret sharing scheme for multi-secrets
|
Hwang, Ren-junn; 黃仁俊; Chang, Chin-chen |
| 淡江大學 |
1998 |
A simple picture hiding scheme
|
Hwang, Ren-junn; 黃仁俊 |
| 淡江大學 |
1997 |
An efficient cheater identification method for threshold scheme
|
Hwang, Ren-junn; 黃仁俊 |
| 淡江大學 |
1993 |
Master keys for an M3 cryptoscheme
|
黃仁俊; Hwang, Ren-junn; Chang, Chin-chen |
| 淡江大學 |
1992-05 |
Cryptographic key assignment scheme for access control in a hierarchy
|
Chang, Chin Chen; Hwang, Ren-junn; Wu, Tzong-Chen |
| 淡江大學 |
1991-01 |
A strategy to transform public key cryptosystems to ID-based public key cryptosystems
|
Hwang, Ren-junn; 黃仁俊 |