|
Der-Chyuan Lou¡]°ú¼wÅv¡^ |
¥Dn¾Ç¾ú
²¦·~¾Ç®Õ |
°ê¡@¡@§O |
¥D׾Ǫù¨t©Ò |
¾Ç¡@¡@¦ì |
°_°W¦~¤ë |
°ê¥ß¤¤¥¿¤j¾Ç |
¤¤µØ¥Á°ê |
¸ê°T¤uµ{¬ã¨s©Ò |
¤u¾Ç³Õ¤h |
1993/09¦Ü1997/03 |
°ê¥ß¤¤¤s¤j¾Ç |
¤¤µØ¥Á°ê |
¹q¾÷¤uµ{¬ã¨s©Òpºâ¾÷²Õ |
¤u¾ÇºÓ¤h |
1989/09¦Ü1991/06 |
¤¤¥¿²z¤u¾Ç°| |
¤¤µØ¥Á°ê |
¹q¾÷¨tpºâ¾÷²Õ |
¤u¾Ç¾Ç¤h |
1984/09¦Ü1987/06 |
²{¾»P¸g¾ú
ªA°È¾÷Ãö |
ªA°È³¡ªù/¨t©Ò |
¾¡@¡@ºÙ |
°_°W¦~¤ë |
ªø©°¤j¾Ç |
¸ê ¤u ¨t |
±M¥ô±Ð±Â |
2009/08¨´¤µ |
Journal of
Systems and Software ¡iSCI, EI¡j (Elsevier¤½¥q¥Xª©) |
¦w¥þ§Þ³N |
»â°ì¥D½s |
2003/07¨´¤µ |
°ê¨¾¤j¾Ç²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô±Ð±Â |
2008/10¦Ü2009/07 |
°ê¨¾¤j¾Ç²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô±Ð±ÂÝ |
2006/11¦Ü2008/09 |
°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô±Ð±ÂÝ |
2004/04¦Ü2006/10 |
°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô±Ð±Âݲժø |
2002/02¦Ü2004/03 |
°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô°Æ±Ð±Âݲժø |
2001/06¦Ü2002/01 |
¤¤¥¿²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô°Æ±Ð±Â |
1997/03¦Ü2001/05 |
°ê¥ß¤¤¥¿¤j¾Ç |
¸ê ¤u
¨t |
Ý¥ôÁ¿®v |
1995/08¦Ü1997/02 |
¤¤¥¿²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ôÁ¿®v |
1991/07¦Ü1993/08 |
¤¤¥¿²z¤u¾Ç°| |
¹q ¾÷
¨t |
±M¥ô§U±Ð |
1987/07¦Ü1989/08 |
¬ã¨s»â°ì
1.¦h´CÅé¦w¥þ |
2.¼Æ¦ìª©ÅvºÞ²z |
3.¸ê°TÁôÂà |
4.¸ê°T¦w¥þ |
5.¤À´²¦¡¨t²Î |
¬ã¨spµe
pµe¦WºÙ |
¸É§U³æ¦ì |
¾¡@°È |
°õ¦æ´Á¶¡ |
°g³U°ÝÃD³Ì¨Î¥¦æºtºâªk¤§³]p»P¤ÀªR |
°ê¬ì·|NSC 87-2218-E-014-010- |
¥D«ù¤H |
1997/08/01¦Ü 1998/07/31 |
¸ê®Æ³q°Tºô¸ô¤¤«O±K¸Ë¸m¤§¬ãµo |
¤¤¬ì°| |
¦@¦P¥D«ù¤H |
1997/09/01¦Ü1998/06/30 |
¸ê°T¦w¥þ¸Ë¸m¤¤¨ã°»¿ù¯à¤Oªº±a²Å¸¹§Ö³t¥[ªk¹q¸ô¤§³]p |
°ê¬ì·|NSC
88-2213-E-014-001- |
¥D«ù¤H |
1998/08/01¦Ü1999/07/31 |
³æ¹³Áô§t¦h´º¥B¦Û§t¨Ï¥ÎªÌ¶¥¼h¦s¨ú±±¨îªºªÅ¶¡¸ê®Æ®w¤§¬ãµo |
°ê¬ì·|NSC
88-2213-E-014-002- |
¥D«ù¤H |
1998/08/01¦Ü1999/07/31 |
RSA¤½¶}ª÷°Í±K½X¨t²Î¤¤ª÷°Í§Ö³t²£¥Í¤§¬ã¨s |
°ê¬ì·|NSC
88-2815-C-014-001-E |
¥D«ù¤H |
1998/11/01¦Ü1999/06/30 |
RSA¤½¶}ª÷°Í±K½X¨t²Î¤¤ª÷°Í§Ö³t²£¥Íºtºâªk¤§¬ã¨s |
¤¤¥¿²z¤u¾Ç°|¾Ç³N±MÃD¬ã¨spµe |
¥D«ù¤H |
1999/07/01¦Ü2000/12/31 |
¨ãÅçÃÒ¯à¤O¨Ã¥i°»ª¾¼v¹³¾D¿y§ï³¡¥÷ªº¹ÏÁô§Þ³N¤§³]p»P¹ê§@ |
°ê¬ì·|NSC
89-2213-E-014-003- |
¥D«ù¤H |
1999/08/01¦Ü2000/07/31 |
¹q¸£¯f¬r§Þ³N¤§¥ý´Á¬ã¨s |
¤¤¬ì°| |
¨ó¦P¥D«ù¤H |
2000/07/01¦Ü2000/12/31 |
§C¦ì¤¸°ª¶Ç¯u«×¼v¹³½s½X¨t²Î»P¹ê²{ |
°ê¬ì·|NSC
89-2213-E-014-030- |
¥D«ù¤H |
2000/08/01¦Ü2001/07/31 |
¸ê®Æ¥[¸Ñ±K¡BÁôÂáB¤Î¶Ç¿é¤§¾ã¦X¨t²Îªº¬ã»s |
¤¤¬ì°| |
¥D«ù¤H |
2001/04/02¦Ü2001/12/31 |
°ª¦s¬¡©Ê¼Æ¦ì¯B¤ô¦L§Þ³N¤Î¨ä´ú¸Õ¥¥x¤§¬ãµo(I) |
°ê¬ì·|NSC
90-2213-E-014-007- |
¥D«ù¤H |
2001/08/01¦Ü2002/07/31 |
±KÆ_ºÞ²z¨t²Î¬ã¨s |
°ê¨¾³¡³q¸ê¦¸ªø«Ç |
¦@¦P¥D«ù¤H |
2002/07/01¦Ü2002/11/30 |
°ª¦s¬¡©Ê¼Æ¦ì¯B¤ô¦L§Þ³N¤Î¨ä´ú¸Õ¥¥x¤§¬ãµo(II) |
°ê¬ì·|NSC
91-2219-E-014-003- |
¥D«ù¤H |
2002/08/01¦Ü2003/07/31 |
«D¹ïºÙ«¬¸ê°TÁôÂç޳N¤§¬ãµo(I) |
°ê¬ì·|NSC
92-2213-E-014-013- |
¥D«ù¤H |
2003/08/01¦Ü2004/07/31 |
«D¹ïºÙ«¬¸ê°TÁôÂç޳N¤§¬ãµo(II) |
°ê¬ì·|NSC
93-2213-E-014-014- |
¥D«ù¤H |
2004/08/01¦Ü2005/07/31 |
°ª®e¶qJPEG¸ê°TÁôÂèt²Î¤§¶}µo |
¤¤¥¡¤j¾Ç«e¤³q°T¹êÅç«Ç±M®× |
¥D«ù¤H |
2005/07/01¦Ü2005/12/31 |
³q¥Îª¼¥Ø«¬ÂñK°»ª¾»P¤º®e¤ÀªR§Þ³N¤§¬ãµo(I) |
°ê¬ì·|NSC
95-2221-E-606-032- |
¥D«ù¤H |
2006/08/01¦Ü2007/07/31 |
³q¥Îª¼¥Ø«¬ÂñK°»ª¾»P¤º®e¤ÀªR§Þ³N¤§¬ãµo(II) |
°ê¬ì·|NSC
96-2221-E-606-008- |
¥D«ù¤H |
2007/08/01¦Ü2008/07/31 |
¾AÀ³©Ê³q¥Î«¬¸ê°TÁôÂ𻪾»P¤ÀªR§Þ³N¤§¬ãµo¡X(¨â¦~´Á) |
°ê¬ì·|NSC
98-2221-E-182-066-MY2 |
¥D«ù¤H |
2009/08/01¦Ü2011/07/31 |
´¼¼z«¬µL¥¢¯u¸ê°TÁôÂÃÂñK°»ª¾»P¤ÀªR§Þ³N¤§¬ãµo |
°ê¬ì·|NSC
100-2221-E-182-055- |
¥D«ù¤H |
2011/08/01¦Ü2012/07/31 |
´¼¼z«¬µL¥¢¯u¸ê°TÁôÂÃÂñK°»ª¾»P¤ÀªR§Þ³N¤§¬ãµo(II) |
°ê¬ì·|NSC
101-2221-E-182-070- |
¥D«ù¤H |
2012/08/01¦Ü2013/07/31 |
¤@Ó°ò©óµêÀÀ¾÷¾¹ºÊ±±µ{¦¡¤§¤J«I¨¾¿m¨t²Îªº¬ã¨s»P¹ê§@ |
°ê¬ì·|NSC
101-2221-E-182-075- |
¥D«ù¤H |
2012/08/01¦Ü2013/07/31 |
µÛ§@
Journal Papers |
01
Der-Chyuan Lou and Chin-Chen Chang, ¡§Fast exponentiation method
obtained by folding the exponent in half,¡¨ IEE Electronics Letters, vol. 32, no. 11, pp. 984-985, May 1996. F[ SCI, EI ] 02
Chin-Chen Chang, Der-Chyuan Lou, and Tzong-Chen Wu, ¡§A binary access control
method using prime factorization,¡¨ Information
Sciences, vol. 96, no. 1-2, pp. 15-26, Jan. 1997. F[ SCI, EI ] 03
Chin-Chen Chang and Der-Chyuan Lou, ¡§Parallel computation of the multi-exponentiation
for cryptosystems,¡¨ International
Journal of Computer Mathematics, vol. 63, nos. 1/2, pp. 9-26, Jan. 1997. F[ SCI, EI ] 04
Der-Chyuan Lou and Chin-Chen Chang, ¡§A parallel two-list
algorithm for the knapsack problem,¡¨ Parallel
Computing, vol. 22, no. 14, pp. 1985-1996, March 1997. F[ SCI, EI ] 05
Der-Chyuan Lou and Chin-Chen Chang, ¡§A cost optimal search
technique for the knapsack problem,¡¨ International
Journal of High Speed Computing, vol. 9, no. 1, pp. 1-12, Aug. 1997. F[ SCI, EI ] 06
Der-Chyuan Lou and Chin-Chen Chang, ¡§An adaptive exponentiation
method,¡¨ Journal of Systems and
Software, vol. 42, no. 1, pp. 59-69, July 1998. F[ SCI, EI ] 07
Der-Chyuan Lou and Chin-Chen Chang, ¡§A fast modular
multiplication method,¡¨ International
Journal of Computer Systems Science and Engineering, vol. 13, no. 6, pp.
353-358, Nov. 1998. F[ SCI, EI ] 08
Der-Chyuan Lou and Jiang-Lung Liu, ¡§Fault resilient and
compression tolerant digital signature for image authentication,¡¨ IEEE Transactions on Consumer Electronics,
vol. 46, no. 1, pp. 31-39, Feb. 2000. F[ SCI, EI ] 09
Der-Chyuan Lou and Chin-Chen Chang, ¡§An efficient
divide-and-conquer technique for parallel computation of modular
multi-exponentiation,¡¨ International
Journal of Computer Systems Science and Engineering, vol. 15, no. 2, pp.
111-117, March 2000. F[ SCI, EI ] 10
Der-Chyuan Lou and Te-Lung Yin, ¡§Spatial database with each
picture self-contained multiscape and access control in a hierarchy,¡¨Journal of Systems and Software, vol.
56, no. 2, pp. 153-163, March 2001.
F[ SCI, EI ] 11
Der-Chyuan Lou and Te-Lung Yin, ¡§Adaptive digital watermarking
using fuzzy clustering technique,¡¨ IEICE
Transactions on Fundamentals of Electronics, Communications, and Computer
Sciences, vol. E84-A, no. 8, pp. 2052-2060, Aug. 2001. F[ SCI, EI ] 12
Tsorng-Lin Chia, Kuang-Bor Wang, Zen Chen, and Der-Chyuan Lou, ¡§Parallel distance
transforms on a linear array architecture,¡¨ Information Processing Letters, vol. 88, no. 2, pp. 73-81, April 2002. F[ SCI, EI ] 13
Der-Chyuan Lou, Chia-Long Wu, and Rong-Yi Ou, ¡§Application of
parallel virtual machine framework to the strong prime problem,¡¨ International Journal of Computer
Mathematics, vol. 79, no. 7, pp. 797-806, July 2002. F[ SCI, EI ] 14
Der-Chyuan Lou and Jiang-Lung Liu, ¡§Steganographic method for
secure communications,¡¨ Computers &
Security, vol. 21, no. 5, pp. 449-460, Oct. 2002. F[ SCI, EI ] 15
Der-Chyuan Lou, Te-Lung Yin, and Ming-Chang Chang, ¡§An
efficient steganographic approach,¡¨ International
Journal of Computer Systems Science and Engineering, vol. 17, no. 4/5,
pp. 281-291, July-Sep. 2002. F[ SCI, EI ] 16
Der-Chyuan Lou and Chia-Hung Sung, ¡§Robust watermarking
technique for digital image utilizing invariant relation of vector
quantization indices,¡¨ Imaging Science
Journal, vol. 50, pp. 291-302, Oct. 2002.
F[ SCI] 17
Der-Chyuan Lou and Te-Lung Yin, ¡§Adaptive digital watermarking
using fuzzy logic technique,¡¨ Optical
Engineering, vol. 41, no. 10, pp. 2675-2687, Oct. 2002. F[ SCI, EI ] 18
Chang-Tsun Li, Der-Chyuan Lou, and Jiang-Lung Liu, ¡§Image integrity and
authenticity verification via content-based watermarks and a public key
cryptosystem,¡¨ Journal of the Chinese
Institute of Electrical Engineering (Transactions
of the Chinese Institute of Engineers, Series E), vol. 10, no. 1, pp.
99-106, Feb. 2003. F[ EI ] 19
Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen, and Der-Chyuan Lou, ¡§Parallel execution
of a connected component labeling operation on a linear array architecture,¡¨ Journal of Information Science and
Engineering, vol. 19, no. 2, pp. 353-370, Mar. 2003. F[ SCI, EI ] 20
Der-Chyuan Lou, Chia-Long Wu, and Chin-Yin Chen, ¡§Fast
exponentiation by folding the signed-digit exponent in half,¡¨ International Journal of Computer
Mathematics, vol. 80, no. 10, pp. 1251-1259, Oct. 2003. F[ SCI, EI ] 21
Der-Chyuan Lou and Chia-Hung Sung, ¡§A steganographic scheme for
secure communications based on the chaos and Euler theorem,¡¨ IEEE Transactions on Multimedia, vol.
6, no. 3, pp. 501-509, June 2004. F[ SCI, EI ] 22
Der-Chyuan Lou, Jiang-Lung Liu, and Chang-Tsun Li, ¡§Digital
signature-based image authentication,¡¨ Chun-Shien Lu (Eds.), Multimedia Security: Steganography and
Digital Watermarking Techniques for Protection of Intellectual Property, Idea
Group Publishing (IGP), Chap. VII, pp. 207-230, 2004. (Book Chapter) 23
Der-Chyuan Lou and Chia-Hung Sung, ¡§Asymmetric image
watermarking based on reversible chaotic maps,¡¨ Imaging Science Journal, vol. 52, no.2,
pp. 53-64, June 2004. F[ SCI ] 24
Der-Chyuan Lou and Chia-Long Wu, ¡§Parallel modular
exponentiation using signed-digit-folding technique,¡¨ Informatica ¡V An International Journal of Computing and Informatics,
vol. 28, no. 2, pp. 197-205, July 2004.
F[ SCI, EI ] 25
Der-Chyuan Lou and Chia-Long Wu, ¡§Parallel exponentiation using
common-multiplicand-multiplication and signed-digit-folding techniques,¡¨ International Journal of Computer
Mathematics, vol. 81 no. 10, pp. 1187-1202, Oct. 2004. F[ SCI, EI ] 26
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§An efficient Montgomery
exponentiation algorithm for cryptographic applications,¡¨ Informatica, vol. 16, no. 3, pp.
449-468, 2005. F[ SCI ] 27
Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, and Hao-Kuan Tso, ¡§A robust watermarking scheme using self-reference image,¡¨ Computer Standards & Interfaces,
vol. 28, no. 3, pp. 356-367, Jan. 2006. F[ SCI, EI ] 28
Chengqing Li, Shujun Li, Der-Chyuan Lou, and Dan Zhang, ¡§On the security of the Yen-Guo¡¦s
domino signal encryption algorithm (DSEA),¡¨ Journal of Systems and Software, vol. 79, no. 2, pp. 253-258,
Feb. 2006. F[ SCI, EI ] 29 Der-Chyuan Lou,
Jieh-Ming Shieh, and Hao-Kuan Tso, ¡§A robust buyer-seller watermarking scheme
based on DWT,¡¨ International Journal of
Pattern Recognition and Artificial Intelligence, vol. 20, no. 1, pp.
79-90, Feb. 2006. F[ SCI, EI ] 30 Der-Chyuan Lou,
Jiang-Lung Liu, and Hao-Kuan Tso, ¡§Evolution of information hiding
technology,¡¨ Encyclopedia of
E-Commerce, E-Government and Mobile Commerce, Idea Group Inc.
Encyclopedia, Ed. Dr. Mehdi Khosrow-Pour, pp. 480-487, March 2006. (Book Chapter) 31 Jiang-Lung Liu, Der-Chyuan Lou, and Hao-Kuan Tso, ¡§A copyright protection scheme
for digital image using chaos and fractal compression,¡¨ International Journal of Nonlinear Sciences and Numerical Simulation, vol. 7, no. 2, pp. 197-202, 2006. F[ SCI ] 32 Ji-Chyun Liu, Der-Chyuan Lou, Chin-Yen Liu, Ching-Yang Wu and Tai-Wei Soong,
¡§Precise determinations of the CPW-fed circular fractal slot antenna,¡¨ Microwave and Optical Technology Letters, vol. 48, no. 8, pp. 1586-1592, 2006. F[ SCI ] 33
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang, ¡§Fast parallel
exponentiation algorithm for RSA public-key cryptosystem,¡¨ Informatica ¡X An International Journal, vol. 17, no. 3, 445-462, 2006.
F[ SCI ] 34
Choung-Lii Chao, Tai-An Cheng, Der-Chyuan Lou, and Chung-Woei Chao,
¡§Development of a non-contact tool setting system for precision diamond
turning,¡¨ Journal of Materials Science
Forum, vols. 505-507, pp. 367-372, 2006.
F[ SCI, EI ] 35
Der-Chyuan Lou, Hao-Kuan Tso, and Jiang-Lung Liu, ¡§A robust
copyright protection scheme for digital images using low-band
characteristic,¡¨ Optical Engineering, vol. 45, no. 10,
pp. 107002-1~107002-6, Oct. 2006.
F[ SCI, EI ] 36
Der-Chyuan Lou, Hao-Kuan Tso, and Jiang-Lung Liu, ¡§A copyright
protection scheme for digital images using visual cryptography technique,¡¨ Computer Standards & Interfaces, vol. 29, no.1,
pp. 125-131, Jan. 2007. F[ SCI, EI ] 37
Der-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, and Te-Jen Chang,
¡§An efficient Montgomery exponentiation algorithm by using
signed-digit-recoding and folding techniques,¡¨ Applied Mathematics and Computation, vol. 185, no. 1, pp. 31-44,
Feb. 2007. F[ SCI, EI ] 38
Ming-Chiang
Hu, Der-Chyuan Lou, and Ming-Chang Chang, ¡§Dual-wrapped watermarking
scheme for image copyright protection,¡¨ Computers
& Security,
vol. 26, pp. 319-330, 2007.
F[ SCI, EI ] 39
Chia-Long Wu, Der-Chyuan Lou,
Jui-Chang Lai, and Te-Jen Chang, ¡§Fast modular multi-exponentiation using
modified complex arithmetic,¡¨ Applied
Mathematics and Computation, vol. 186, no. 2
pp. 1065-1074, March 2007. F[ SCI, EI ] 40
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast
binary multiplication by performing dot counting and complement
recoding,¡¨ Applied Mathematics and
Computation, vol. 191, no. 1, pp. 132-139, Aug. 2007. F[ SCI, EI ] 41
Der-Chyuan Lou,
Jiang-Lung Liu, and Hao-Kuan Tso, ¡§Evolution of information hiding
technology,¡¨ Information Security and
Ethics: Concepts, Methodologies, Tools, and Applications, Idea Group Inc.
Encyclopedia, Ed. Dr. Hamid Nemati, pp. 144-154, Aug. 2007. (Book Chapter) 42
Ming-Chiang Hu, Der-Chyuan Lou, and Hao-Kuan
Tso, ¡§A digital watermarking method using compression concept and coefficient
difference,¡¨ Imaging
Science Journal, vol. 55, no. 3, pp. 155-163, Sep. 2007. F[ SCI ] 43
Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang, and Shih-Yun Chen, ¡§Integer
factorization for RSA cryptosystem under a PVM environment,¡¨ International Journal of Computer Systems
Science and Engineering, vol. 22, nos. 1-2, pp. 25-35, Jan.-March 2007. F[ SCI, EI ] 44
Der-Chyuan Lou, Chih-Lin Lin, and
Chiang-Lung Liu, ¡§Universal steganalysis scheme using support
vector machine,¡¨ Optical Engineering,
vol. 46, no. 11, pp. 117002-1~117002-10, Nov. 2007. F[ SCI, EI ] 45
Der-Chyuan Lou, Ming-Chiang Hu,
Jiang-Lung Liu, and Shu-Mei Lee, ¡§Novel healthcare X-rays image hiding scheme
using neural network technique,¡¨ Imaging Science Journal, vol. 56, pp. 1-10, Jan. 2008. F[ SCI ] 46
Der-Chyuan Lou, Chih-Lin Lin, and
Jiang-Lung Liu, ¡§Novel steganalysis schemes for BPCS steganography,¡¨ Imaging Science Journal,
vol. 56, no. 4, pp. 232-242, Aug. 2008. F[ SCI ] 47
Der-Chyuan Lou, Ming-Chiang Hu, and
Chiang-Lung Liu, ¡§Healthcare image watermarking scheme based on human visnal
model and back-propagation network,¡¨ Journal of Chung Cheng Institute of Technology, vol. 37, no. 1, pp. 151-162, Nov. 2008. F[ EI ] 48
Tzung-Her
Chen, Chin-Chen Chang, Chang-Sian Wu, and Der-Chyuan Lou, ¡§On the security of
a copyright protection scheme based on visual cryptography,¡¨ Computer
Standards & Interfaces, vol. 31, no.1, pp. 1-5, Jan. 2009. F[ SCI ] 49
Der-Chyuan Lou, Ming-Chiang Hu, and
Chiang-Lung Liu, ¡§Multiple-layer data hiding scheme for
medical images,¡¨ Computer Standards & Interfaces,
vol. 31, no. 2, pp. 329-335, Feb. 2009.
F[ SCI, EI ] Der-Chyuan Lou, Chiang-Lung Liu, and
Chih-Lin Lin, ¡§Message estimation for universal steganalysis using
multi-classification support vector machine,¡¨ Computer Standards & Interfaces, vol. 31, no. 2, pp. 420-427,
Feb. 2009. F[ SCI, EI ] 50
Te-Jen Chang, Chia-Long Wu, Der-Chyuan Lou, and Ching-Yin Chen, ¡§A low-complexity LUT-based
squaring algorithm,¡¨ Computers and
Mathematics with Applications, vol. 57, no. 9, pp. 1494-1501, May 2009. F[ SCI, EI ] 51
Shuenn-Jyi Wang, Der-Chyuan Lou, Dah-Lih Jeng,
and Chih-Ting Yeh, ¡§Rotation, scaling, and translation resilient digital
image watermarking using log-polar mapping,¡¨ Imaging Science Journal, vol.
57, Issue 4, pp. 177-190, Aug. 2009. F[ SCI, EI ] 52
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Computational reduction of
Wilson's primality test for modern cryptosystems,¡¨ Informatica ¡V An International Journal of Computing and Informatics,
vol. 33, no. 4, pp. 453-458, Dec. 2009. F[ SCI, EI ] 53
Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, and
Chwei-Shyong Tsai, ¡§A novel adaptive steganography based on local complexity
and human vision sensitivity,¡¨ Journal
of Systems and Software, vol. 83, pp.
1236-1248, May 2010. F[ SCI, EI ] 54
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular multiplication
based on complement representation and canonical recoding,¡¨ International Journal of Computer Mathematics, vol.
87, no. 13, pp. 2871-2879, Oct. 2010.
F[ SCI, EI ] 55
Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, ¡§Hybrid
high-capacity data hiding by pixel-value differencing and modulus function,¡¨ Journal of Internet Technology, vol.
12, no. 2, pp. 303-312, March 2011. F[ SCI, EI ] 56
Der-Chyuan Lou and Hui-Feng Huang, ¡§Efficient three-party
password based key exchange scheme,¡¨
International Journal of Communication Systems, vol. 24, Issue 4, pp. 505-512, April 2011. F[ SCI, EI ] 57
Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, and Chwei-Shyong
Tsai, ¡§A novel authenticatable color visual secret sharing scheme using
non-expanded meaningful shares,¡¨
Displays, vol. 32, Issue. 3, pp. 118-134, July 2011. F[ SCI, EI ] 58
Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng
Chiu, ¡§Steganalysis for multilevel reversible data
hiding based on histogram modification of difference images,¡¨ International Journal of Innovative Computing Information and Control, vol. 7, no. 9, pp. 5429-5443, Sep. 2011. F[ SCI, EI ] 59
Der-Chyuan
Lou, Chen-Hao Hu, Chao-Lung Chou, and Chung-Cheng Chiu, ¡§Steganalysis of HMDP
reversible data hiding scheme,¡¨ Optics Communications, vol. 284, issue 23,
pp. 5406-5414, Nov. 2011. F[ SCI, EI ] 60
Der-Chyuan
Lou, Chen-Hao Hu, and Chung-Cheng Chiu, ¡§Steganalysis of histogram
modification reversible data hiding scheme by histogram feature coding,¡¨
International Journal of Innovative Computing Information and Control, vol.
7, no. 11, pp. 6571-6583, Nov. 2011 F[ SCI, EI ] 61
Der-Chyuan Lou and Chen-Hao Hu, ¡§LSB steganographic method
based on reversible histogram transformation function for resisting
statistical steganalysis,¡¨ Information
Sciences, vol.
188, pp. 346-358, April 2012. F[ SCI, EI ] 62
Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng
Chiu, ¡§Active steganalysis for histogram-shifting based reversible data hiding,¡¨
Optics Communications, vol. 285, issue 10-11, pp. 2510-2518, April 2012. F[ SCI, EI ] 63
*Chiang-Lung
Liu, Kai-Ping Wang, and Der-Chyuan
Lou, ¡§Sharing secret images using keyed information hiding technique,¡¨ Journal of Chung Cheng Institute of Technology, vol. 41, no. 2, pp. 11-20, Nov. 2012. F[ EI ] 64
*Kai-Ping Wang, Chiang-Lung Liu, and Der-Chyuan
Lou, ¡§Meaningful color image sharing without pixel expansion problem,¡¨ International Journal of Advancements in
Computing Technology, vol. 4, no. 20, pp. 525-535,
Nov. 2012. F[ EI ] 65
Jeanne Chen, *Wien Hong, Chih-Wei Shiu, Der-Chyuan Lou, Chien-Chung Lee, and
Chiang-Lung Liu, ¡§Prediction error adjustment technique for high quality
reversible data hiding,¡¨ International
Journal of Innovative Computing Information and
Control, vol. 9, no. 2, pp. 1-12, Feb. 2013. F[ SCI, EI ] 66
Der-Chyuan Lou, Kuo-Ching Liu, and *Hui-Feng Huang, ¡§Efficient
mobile conference scheme for wireless communication,¡¨ Informatica, vol. 24, no. 1, pp. 59-70,
April 2013. F[ SCI, EI ] 67
*Kai-Ping Wang, Chiang-Lung Liu, and Der-Chyuan Lou, ¡§Expansion-free grayscale image sharing using
meaningful share images,¡¨ Applied
Mechanics and Materials, vols. 284-287, pp 3413-3417, April 2013. F[ EI ] 68
*Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, and Hui-Feng Huang, ¡§Active steganalysis for interpolation-error based
reversible data hiding,¡¨ Pattern Recognition Letters, vol. 34, issue 9, pp. 1032-1036, July 2013. F[ SCI, EI ] |
Conference Papers |
01
Chang-Tsun
Li and Der-Chyuan Lou, ¡§Edge
detection based on the multiresolution Fourier transform,¡¨ Proceedings of the 1999 IEEE Workshop on
Signal Processing Systems (SiPS ¡¦99): Design and Implementation, Taipei,
Taiwan, R.O.C., Oct. 1999, pp.
686-693. 02
Der-Chyuan Lou and Jiang-Lung Liu,
¡§An adaptive technique for the steganography in spatial domain,¡¨ Proceedings of the 1999 National Computer
Symposium, Taipei, Taiwan, R.O.C., Dec. 1999, vol. III, pp. C253-C259. 03
Chang-Tsun Li, Der-Chyuan Lou, and Tsung-Hsu Chen, ¡§Image authentication via
content-based watermarks and a public key cryptosystem,¡¨ Proceedings of the 2000 IEEE International Conference on Image
Processing (ICIP 2000), British
Columbia, Canada, Sep. 2000, vol.
III, pp. 694-697. 04
Chin-Chen Chang and Der-Chyuan Lou, ¡§An integration of user authentication and
dynamic access control,¡¨ Proceedings of
the 2000 IEEE International Symposium on Consumer Electronics, Hong-Kong,
Dec. 2000, pp. 123-127. 05
Der-Chyuan Lou and Jiang-Lung
Liu, ¡§Perceptually based model for the transparency of digital watermarks,¡¨ Proceedings
of the 2001 Workshop on Consumer
Electronics (WCE 2001),
Taipei, Taiwan, R.O.C., Oct. 2001. 06
Der-Chyuan Lou and Chia-Hung Sung, ¡§Image
authentication using subcodebooks of vector quantization and error control
code,¡¨ Proceedings of the 2001 Workshop on Consumer Electronics (WCE 2001), Taipei, Taiwan,
R.O.C., Oct. 2001. 07
Der-Chyuan Lou and Ming-Chiang Hu, ¡§Digital watermarking for
the copyright protection of SPIHT coded image,¡¨ Proceedings of CVGIP 2002,
Taoyuan, Taiwan, R.O.C., Aug. 2002, pp. 799-805. 08
Der-Chyuan Lou and Ming-Chiang Hu, ¡§Adaptive digital
watermarking using neural network clustering technique,¡¨ Proceedings
of CVGIP 2003, Kinmen,
Taiwan, R.O.C., Aug. 2003, pp. 810-817. 09
Chin-Chen Chang
and Der-Chyuan Lou, ¡§Fast parallel
computation of multi-exponentiation for public key cryptosystems,¡¨ Proceedings of the Fourth IEEE
International Conference on Parallel and Distributed Computing, Applications
and Technologies (PDCAT), Chengdu, China, Aug. 2003, pp.
955-958. 10
Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chiang Hu, ¡§Adaptive
digital watermarking using neural network technique,¡¨ Proceedings of the
IEEE 37th Annual International Carnahan Conference on Security
Technology, Taipei, Taiwan, R.O.C., Oct. 2003,
pp. 325-332. F[ EI ] 11
Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chang Chang, ¡§Digital
watermarking using multiresolution wavelet transform,¡¨ Proceedings of the IEEE 37th Annual International Carnahan Conference
on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 370-377. F[ EI ] 12
Der-Chyuan Lou and Chia-Hung Sung, ¡§Robust image watermarking
based on hybrid transformation,¡¨ Proceedings
of the IEEE 37th Annual International Carnahan Conference on Security
Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 394-399. F[ EI ] 13
Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chang Chang, ¡§Combined
private and public watermarking in wavelet transform domain,¡¨ Proceedings of the 2003 National Computer
Symposium (NCS 2003), Taichung,
Taiwan, R.O.C., Dec. 2003, pp.
1325-1334. 14
Jiang-Lung Liu, Der-Chyuan Lou,
Ming-Chang Chang, and Chao-Lung Chou, and
Chin-Chiang Pan, ¡§A JPEG2000 compatible digital
watermarking scheme,¡¨ Proceedings of The 2004 IEEE International Conference on
Multimedia and Expo (ICME¡¦2004), The Grand
Hotel, Taipei, Taiwan, R.O.C., June 27~30, 2004. 15
Der-Chyuan Lou, Jiang-Lung Liu, Ming-Chang Chang, Chin-Chiang
Pan, and Chao-Lung Chou, ¡§Adaptive DWT-based
watermarking scheme using neighboring mean value relationship,¡¨ Proceedings
of 2004 IEEE Asia-Pacific Conference on Circuits and Systems (APCCAS 2004), Tainan, Taiwan,
R.O.C., Dec. 2004, pp. 589-592. 16
Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§A robust
watermarking scheme using filter and ROI,¡¨ Proceedings of 2004 IEEE
Asia-Pacific Conference on Circuits and Systems, Tainan, Taiwan, R.O.C.,
Dec. 2004, pp. 1137-1140. 17
Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§A robust
watermarking technique for still image using compression concept and
coefficient difference,¡¨ Proceedings
of ICS 2004 ¡V International Computer Symposium 2004, Taipei, Taiwan, R.O.C., Dec 15~17, 2004, pp. 455-460. 18
Yan-Xiang Deng, Chao-Jang Hwang, and Der-Chyuan Lou, ¡§Two-stage
reconfigurable computing system architecture,¡¨ Proceedings of the 18th IEEE International Conference
on Systems Engineering 2005 (ICSEng
2005), University of Nevada, Las Vegas, USA, Aug. 16-18, 2005, pp. 389-394. (No: 63) 19
Der-Chyuan Lou, Jiang-Lung Liu, and
Hao-Kuan Tso, ¡§A
copyright protection scheme based on self-similarity of DWT,¡¨ Proceedings of CVGIP 2005, Taipei, Taiwan, R.O.C.,
Aug. 22~23, 2005, pp. 1075-1081. 20
Der-Chyuan Lou, Jiang-Lung Liu,
Hao-Kuan Tso, and Ming-Chang Chang, ¡§A grayscale watermarking scheme based on pixel mapping,¡¨ Proceedings of
CVGIP 2005, Taipei, Taiwan,
R.O.C., Aug. 22~23, 2005, pp. 1082-1089. 21
Ji-Chyun Liu, Ching-Pin Kuei, Chin-Yen Liu,
Yaw-Shun Hong, and Der-Chyuan
Lou, ¡§Hybrid metal grids/ferrites
FSS screens for broad-band microwave absorber design at C-band,¡¨ Proceedings of the Tenth International Symposium on Microwave and Optical Technology (ISMOT-2005), Fukuoka, Japan, Aug. 2005, pp. 712-715. 22
Ji-Chyun Liu, Shuh-Tai Lu, Ching-Yang
Wu, Ming-Hsun Chiang, and Der-Chyuan Lou, ¡§An inverse Gaussian monocycle pulse generator
with picosecond duration and L/S-band responses for UWB applications,¡¨ Proceedings of the Tenth International Symposium on Microwave and Optical Technology (ISMOT-2005), Fukuoka, Japan, Aug. 2005, pp. 775-778. 23
Yan-Xiang Deng, Chao-Jang Hwang, and Der-Chyuan Lou, ¡§A two-stage
reconfigurable image processing system,¡¨ Proceedings
of the Eighth IEEE International Symposium on Signal Processing and Its
Applications 2005 (ISSPA 2005), Sydney, Australia, Aug.
28~31, 2005, vol. 1, pp. 315-318. 24
Jiang-Lung Liu, Der-Chyuan Lou, Li-Chung Huang, and Chih-Lin Lin, ¡§An image
authentication scheme based on wavelet transform and vector quantization,¡¨ in
Chinese, Proceedings of TANET 2005,
Taichung, Taiwan, R.O.C., Oct.
28, 2005, CD-ROM, F54.pdf. 25
Jiang-Lung Liu, Der-Chyuan Lou, Cheng-Po Kao, and Chih-Lin Lin, ¡§A watermarking
scheme integrated with JPEG 2000 compression scheme,¡¨ in Chinese, Proceedings of TANET 2005, Taichung,
Taiwan, R.O.C., Oct. 28, 2005, CD-ROM, G14.pdf. 26
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast binary multiplication method for modular exponentiation,¡¨ Proceedings of TANET 2005, Taichung,
Taiwan, R.O.C., Oct. 28, 2005, CD-ROM. 27
Jiang-Lung Liu, Der-Chyuan Lou, and Ming-Chiang Hu, ¡§Securing healthcare color
images using neural network,¡¨ Proceedings
of the 12th International Conference on Neural Information Processing
(ICONIP¡¦s 2005), Grand Hotel, Taipei, Taiwan, R.O.C.,
Oct. 30~Nov. 2, 2005, pp. 608-613. 28
Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, Chao-Lung Chou, and Chin-Chiang
Pan, ¡§A JPEG2000 compatible digital watermarking scheme,¡¨ Proceedings of the 2005 Workshop on Consumer Electronics (WCE 2005), Yunlin,
Taiwan, R.O.C., Nov. 17~18, 2005, CD-ROM, 122.pdf. 29
Jiang-Lung Liu, Chih-Lin Lin, and Der-Chyuan Lou, ¡§A JPEG2000-compliant
method for image authentication and recovery,¡¨ Proceedings of the 2005
International Symposium on Communications (ISCOM 2005), Kaohsiung,
Taiwan, R.O.C., Nov. 20~22, 2005, CD-ROM, ISCON05_00071.pdf. 30
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Computational complexity analyses of modular arithmetic for RSA
cryptosystem,¡¨ Proceedings of the 23rd
Workshop on Combinatorial Mathematics and Computation Theory,
Da-Yeh University, Changhua, Taiwan, R.O.C.,
April 2006, pp. 215-224. 31
¼B¦¿Às¡B°ú¼wÅv¡BJ©ú±j¡B§d²K¶¯¡B§õ²Q¬ü¡A¡§À³¥Î¶¥¼h¦¡¸ê°TÁôÂç޳N©óÂå¾Ç¼v¹³«OÅ@¤§¬ã¨s¡¨¡A²Ä¤©¡¨È¤ÓHL7°·±d¸ê°T¥æ´«¼Ð·Ç¬ã°Q·|¡A¥x¥_¡A¥x¤jÂå°|¡A2006¦~07¤ë07¤é¦Ü07¤ë09¤é¡A251-259¶¡C 32
¼B¦¿Às¡B°ú¼wÅv¡B¾¤«TÅï¡A¡§¬Û®e©óMP3¤§µ°TŲ§O§Þ³N¡¨¡A¡u2006³q¸ê¹q§Þ³N»PÀ³¥Î¬ã°Q·|¡v½×¤å¶°¡A°ª¶¯¡A¥xÆW¡A2006¦~10¤ë20¤é¡A²Ä81-86¶¡C 33
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient sliding window binary
exponentiation algorithm using minimal signed digest recording technique,¡¨ Proceedings of Cyberspace 2006:
Cybersecurity, Cybercrime and Cyberlaw, Taipei, Taiwan, R.O.C., Nov. 20, 2006, pp.
490-498. 34
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular exponentiation
using LUT and radix-b signed-digit
recoding,¡¨ Proceedings of 2006
National Symposium on Telecommunications, Kaohsiung, Taiwan, R.O.C., Dec. 01-Dec. 02, 2006. 35
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§An effective sliding-window
strategy for speeding up modular arithmetic,¡¨ Proceedings of 2006 National Symposium on Telecommunications,
Kaohsiung, Taiwan, R.O.C., Dec.
01-Dec. 02, 2006. 36
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient large integers
arithmetic by adopting squaring and complement recoding techniques,¡¨ Proceedings
of the 24th Workshop on Combinatorial Mathematics and Computation
Theory, National Chi Nan University,
Nantou, Taiwan, R.O.C., April
27-28, 2007, pp. 460-464. 37
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient exponentiation
evaluation and complexity analyses for cryptographic applications,¡¨ Proceedings of the 17th Information Security Conference (ISC 2007), Chiayi, Taiwan, R.O.C., June 07-08, 2007, pp. 305-317. 38
Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin, and Shin-Her
Wang, ¡§An efficient
steganalysis scheme based on statistic classification,¡¨ Proceedings of the 17th Information Security Conference (ISC 2007), Chiayi, Taiwan, R.O.C., June 07-08, 2007, pp. 717-727. 39
Der-Chyuan Lou, Chiang-Lung
Liu, and Chih-Lin Lin, and
Shin-Her Wang, ¡§Length estimation for embedded message using support
vector machine,¡¨ Proceedings of
the Third IEEE International Conference on IntelligentInformation Hiding and
Multimedia Signal Processing, Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2007, vol. 1, pp. 437-440. 40
Chiang-Lung Liu, Der-Chyuan Lou, and Chien-Chung Lee, ¡§Reversible data embedding
using reduced difference
expansion,¡¨ Proceedings of the
Third IEEE International Conference on IntelligentInformation Hiding and Multimedia
Signal Processing, Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2007,
vol. 1, pp. 433-436. 41
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient
cryptographical modular exponentiation algorithm design and theoretical
computational analyses,¡¨ Proceedings of Cyberspace 2007: Cybersecurity, Cybercrime and Cyberlaw (Cyber 2007), Taoyuan, Taiwan, R.O.C., Nov. 30, 2007,
pp. 509~517. 42
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient
algorithms design and theoretical computational
complexity analyses on cryptographic applications,¡¨ Proceedings of the 2008
Enterprise Resources Program (ERP 2008), Taoyuan, Taiwan, R.O.C., Jan. 12, 2008, pp. 111-122. 43
Chia-Long Wu, Der-Chyuan
Lou, and Te-Jen Chang, ¡§Efficient hardware and software design for
smart card systems and information security
applications,¡¨ Proceedings of 2008
Intelligent Systems Conference on Engineering Applications (ISC 2008),
Far East University, Tainan, Taiwan, R.O.C., March 20, 2008, pp. 45. 44
Chia-Long Wu, Der-Chyuan
Lou, and Te-Jen Chang, ¡§Fast
squaring algorithm design and Ccomplexity numerical analyses for public-key
cryptosystems,¡¨ Proceedings of the 25th Workshop
on Combinatorial Mathematics and Computation Theory, Chung Hua University, Hsinchu, Taiwan, R.O.C.,
April 25-26, 2008, pp. 154-161. 45
Chia-Long Wu, Der-Chyuan
Lou, and Te-Jen Chang, ¡§An efficient Montgomery exponentiation
algorithm for public-key cryptosystems,¡¨ Proceedings of the The IEEE International Conference on
Intelligence and Security Informatics (ISI 2008), Springer Lecture
Notes in Computer Science (LNCS), Grand
Formosa Regent Hotel, Taipei, Taiwan, June
16-20, 2008, pp. 284-285. 46
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular arithmetic
algorithm design and complexity theoretical analysis for cryptosystems,¡¨ Proceedings of 2008 International Conference of Digital
Technology and Innovation Management (IDTIM 2008), Taipei, Taiwan, R.O.C., June 28, 2008,
pp. 1601-1612. 47
Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular multiplication
for e-commerce cryptosystem,¡¨ Proceedings of the Eighth International
Conference on Intelligent Systems Design and Applications (ISDA 2008),
Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2008, pp. 457-461. F[ EI ] 48
Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, and Chiang-Lung Liu, ¡§A lossless
secret image sharing method,¡¨ Proceedings of the Eighth International
Conference on Intelligent Systems Design and Applications (ISDA 2008),
Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2008, vol. 3, pp. 616-619. F[ EI ] 49
Der-Chyuan Lou, Chen-Hao Hu, Hao-Kuan Tso, and Dah-Lih Jeng,
¡§An enhanced digital image RRS LSB steganographic method based on
reversible histogram transformation functions,¡¨ in Chinese, Proceedings of the 19th National
Conference on Information Security, National Taiwan University of
Science and Technology, Taipei, Taiwan, R.O.C.,
June 04-05, 2009, A401. 50
Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Dah-Lih Jeng, ¡§A secure block-based steganography against
statistical analysis,¡¨ in Chinese, Proceedings
of the 19th National Conference on Information Security, National
Taiwan University of Science and Technology,
Taipei, Taiwan, R.O.C., June 04-05, 2009,
A402. 51
Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, and Chao-Lung Chou, ¡§Secret sharing
method for gray-level images,¡¨ Proceedings
of The Fifth International Conference on Intelligent Information Hiding and
Multimedia Signal Processing (IIHMSP 09), IEEE, Kyoto, Japan, Sep. 12-14,
2009, pp. 295-298. F[ EI ] 52
Chiang-Lung Liu, Chien-Chung Lee, Der-Chyuan Lou, Wien Hong, Jeanne
Chen, and Chih-Wei Shiu, ¡§Reversible data hiding using high-peak prediction
errors,¡¨ Proceedings of the
2009 Workshop on Consumer Electronics
(WCE 2009), National Chin-Yi University of
Technology, Taichung, R.O.C., Nov. 06, 2009, pp. 185-190. ¡i¸ê°T¦w¥þ»â°ì³Ì¨Î½×¤å¡j 53
Chia-Long Wu, Hao-Kuan Tso, and Der-Chyuan Lou, ¡§A novel secret image
sharing method,¡¨ Proceedings of the 7th Pacific Symposium on Flow
Visualization and Image Processing (PSFVIP), National Pingtung
University of Science and Technology, Kaohsiung, Taiwan, R.O.C., Nov. 16-19, 2009, #034. 54
Der-Chyuan Lou and Sheng-Chih Ho, ¡§Hybrid
high-capacity steganography method in spatial domain,¡¨ in Chinese, Proceedings of National Computer Symposium
2009 (NCS 2009), Workshop on Cryptography and Information Security,
National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp.
48-57.
¡i¤J³òIEEE³Ì¨Î¾Ç¥Í½×¤å¡j 55
Shuenn-Jyi Wang, Chang-Kai
Hsieh, Chih-ChiaLin, Der-ChyuanLou,
and Ching-Chuan Chiang, ¡§A video-based abnormal activity detection approach
for a court,¡¨ Proceedings of National Computer Symposium
2009 (NCS 2009), Workshop on Image Processing, Computer Graphics, and
Multimedia Technologies, National Taipei University, Taipei,
Taiwan, R.O.C., Nov. 27-28, 2009, pp. 207-218. 56
Hao-Kuan Tso, Der-Chyuan Lou, and Chia-Long Wu, ¡§Sharing secret
image based on bit plane,¡¨ Proceedings of
National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information
Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov.
27-28, 2009, pp. 567-572. 57
Der-Chyuan Lou, Chen-Hao Hu, Chung-Cheng Chiu, and Te-Jen
Chang, ¡§Detection of reversible data hiding
scheme based on histogram features codes,¡¨ in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009),
Workshop on
Cryptography and Information Security, National Taipei University,
Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 584-588. 58
Der-Chyuan Lou, Chao-Lung Chou, and Chung-Cheng Chiu, ¡§Steganalyses of reversible data hiding
techniques,¡¨ in Chinese, Proceedings
of National Computer Symposium 2009 (NCS 2009), Workshop on
Cryptography and Information Security, National Taipei University,
Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 589-594. 59
Hao-Kuan Tso and Der-Chyuan Lou, ¡§Sharing secret image based on random grids,¡¨ Proceedings of
The Second International Workshop on Multimedia, Information Privacy and
Intelligent Computing Systems (MPIS-2009), Workshop on Computer Science and Its Applications, Jiju, Korea,
Dec. 10-12, 2009, vol. 2, pp.
399-403. 60
¥ª»¨©x¡B§d¹ÅÀs¡B°ú¼wÅv¡A¡§¥b¦â½Õ¼v¹³¤À¨É§Þ³N¡¨¡A2009¼Æ¦ì¤º®e¾Ç³N¬ã°Q·|(The International Conference on Digital Content)¡A®ç¶é¡A¥xÆW¡A2009¦~12¤ë17¤é¡AD3-1¡C 61
Hao-Kuan Tso, Der-Chyuan Lou, and Chung-Cheng Chiu,
¡§Halftone secret sharing method for color images,¡¨ Proceedings of 2010 International Security Technology &
Management Conference, Taipei, Taiwan, R.O.C.
Sep. 08-10, 2010, pp. 70-75. 62
Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu,
¡§Steganalysis of reversible data hiding based on histogram modification of
pixel differences,¡¨ Proceedings of 2010
International Security Technology & Management Conference, Taipei, Taiwan, R.O.C. Sep. 08-10 2010, pp. 118-122. 63
Chia-Long Wu, Der-Chyuan Lou, and Hao-Kuan Tso,
¡§Non-expanded secret sharing method,¡¨ Proceedings of The 2010 International
Symposium on GPS/GNSS (GPS/GNSS 2010), Tainan, Taiwan, R.O.C., Oct.
26-28, 2010. 64
Chao-Lung Chou, Der-Chyuan Lou, and Chung-Cheng Chiu, ¡§Steganalysis of reversible
data hiding using template matching techniques,¡¨ Proceedings of
National Symposium on Telecommunications (NST 2010), Taoyuan, Taiwan, R.O.C., Dec. 03-04, 2010. ¡i¤J³ò³Ì¨Î¾Ç¥Í½×¤å¼ú¡X¦@§ë½Z278½g¡A¤J³ò¤C½g¡C¡j 65
Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, ¡§High
quality steganogrphic method base on MSBs of pixels,¡¨ Proceedings of
National Symposium on Telecommunications (NST 2010), Taoyuan, Taiwan, R.O.C., Dec. 03-04, 2010. 66
Hao-Kuan Tso and Der-Chyuan
Lou, ¡§Information hiding method using sharing
images,¡¨ Proceedings
of The Fourth International
Conference on Genetic and Evolutionary Computing,
Shenzhen, China, Dec.13-15, 2010,
pp. 642-645. 67
Der-Chyuan Lou, Chao-Lung Chou, and Chung-Cheng Chiu, ¡§Active
steganalysis for reversible data hiding based on
histogram-shifting technology,¡¨ Proceedings of 2011 Conference on Network and Information
Security (NIS 2011), Taoyuan, Taiwan,
R.O.C., June 10, 2011, pp. 24-31. 68
Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, ¡§High quality and payload data hiding based on MSBs of
pixels in digital images,¡¨ Proceedings of 2011 Conference on Network and Information
Security (NIS 2011), Taoyuan, Taiwan,
R.O.C., June 10, 2011, pp. 32-40. 69
Hao-Kuan Tso and Der-Chyuan Lou, ¡§¦Ç¶¥µøÄ±±K½X§Þ³N,¡¨ Proceedings of 2011 Conference on Network and Information Security
(NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011,
pp. 41-47. 70
Fong-Hao Liu, Der-Chyuan Lou, and Jun-Te. Su, ¡§°ò©ó¹w´ú»~®t»P¹³¯À®tȪº¥i°f¦¡¸ê°TÁôÂÃ,¡¨ Proceedings of 2011 Conference on Information Technology
and Industrial Application (ITIA2011), Technology and Science Institute of Northern Taiwan, Beitou,
Taipei, Taiwan, R.O.C., June 10, 2011, S06-07-ID65, pp. 01-07. 71
Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng
Chiu, ¡§°w¹ï¥i¦^´_¦¡¨ú¼Ë¼v¹³®tÈÂñK§Þ³N¤§¥D°Ê¦¡ÂñK¤ÀªRªk,¡¨ Proceedings of 2011 Conference on Taiwan
Academic Network (TANET 2011), Ilan, Taiwan, R.O.C., Oct. 24~26, 2011. 72
Hao-Kuan Tso and Der-Chyuan Lou, ¡§µøÄ±±K½X§Þ³N©óÂå¾Ç¼v¹³¤§À³¥Î,¡¨ Proceedings of 2011 Workshop
on Consumer Electronics (WCE 2011), Taichung, Taiwan, R.O.C., Nov. 11, 2011, pp. 1169-1173. 73
Shuenn-Jyi Wang, Chang-Kai Hsieh, Chih-Chia Weng,
and Der-Chyuan Lou, ¡§µL«Å|Àô¹Ò¤§¦hÄá¼v¾÷¤Hû°lÂÜ,¡¨ Proceedings of 2011 Conference on Technologies and
Applications of Artificial Intelligence (TAAI 2011), Taoyuan, Taiwan, R.O.C., Nov. 11~13, 2011, pp. 272-279. 74
Hao-Kuan Tso and
Der-Chyuan Lou, ¡§¶¥¼h¦¡µøÄ±¤À¨É§Þ³N,¡¨ Proceedings of 2011 National Computer Symposium (NCS
2011), Chiayi, Taiwan, R.O.C., Dec. 2~3, 2011, pp. 38-47. 75
Der-Chyuan Lou, Sheng-Chih Ho, Hao-Kuan
Tso, and Chung-Cheng Chiu, ¡§Adaptive steganographic method base on
pixel value,¡¨ Proceedings of 2011 National Computer
Symposium (NCS 2011), Chiayi, Taiwan,
R.O.C., Dec. 2~3, 2011, pp.
58-65. 76
Hao-Kuan Tso and
Der-Chyuan Lou, ¡§Medical image
protection using secret sharing scheme,¡¨ Proceedings of the 6th International
Conference on Ubiquitous Information Management and Communication (ACM ICUIMC
2012), Kuala Lumpur, Malaysia, Feb. 20-22, 2012. (Indexed
by SCOPUS since Dec., 2010) 77
Yu-Shiang Lin, Chun-Yuan Lin, and Der-Chyuan Lou, ¡§Efficient parallel
RSA decryption algorithm for many-core GPUs with CUDA,¡¨ Proceedings of 2012 International Conference on Telecommunication
Systems, Modeling and Analysis (ICTSM2012), American Telecommunications Systems Management Association, Czech
Technical University, Prague, Czech Republic, May 24~26, 2012. 78
*Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan
Tso, and Chung-Cheng Chiu, ¡§Active
steganalysis of reversible data hiding: estimation of parameters,¡¨ Proceedings of the
22nd National Conference on Information Security, National
Chung Hsing University, Taichung, Taiwan, R.O.C.,
May 30-31, 2012. (½×¤å±Ä¥úºÐ¡A¥¼½s¶½X) 79
*Der-Chyuan Lou, Sheng-Chih Ho, Hao-Kuan
Tso, and Chung-Cheng Chiu, ¡§´Ó°ò©ó°ÊºAªùÂeÈ»PÂñK»Ý¨D¤§¾AÀ³©ÊÂñK§Þ³N,¡¨ in Chinese, Proceedings
of the 22nd National Conference on Information Security, National Chung Hsing University, Taichung,
Taiwan, R.O.C., May 30-31, 2012. (½×¤å±Ä¥úºÐ¡A¥¼½s¶½X) 80
*Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§An active steganalysis of
reversible data hiding: estimating key parameters,¡¨ Proceedings of
the International Symposium on Computer, Consumer and Control (IS3C 2012), IEEE,
Taichung, Taiwan, R.O.C., June 04~06, 2012. (½×¤å±Ä¥úºÐ¡A¥¼½s¶½X) F[ EI ] 81
*¥ª»¨©x¡B°ú¼wÅv¡A¡§¸ê°TÁôÂç޳N¤§±´°Q¡¨¡A2012¼Æ¦ì»P¬ì§Þ¥Í¬¡³Ð·sÀ³¥Î¾Ç³N¬ã°Q·|¡A®ç¶é³Ð·s§Þ³N¾Ç°|¸ê¤u¨t¡A¤¤Ãc¡A¥xÆW¡A2012¦~06¤ë21¤é¡C (½×¤å±Ä¥úºÐ¡A¥¼½s¶½X) 82
Kai-Ping Wang, *Chiang-Lung Liu, and Der-Chyuan Lou, ¡§Expansion-free grayscale image sharing using
meaningful share images,¡¨ Proceedings of the 2nd International Conference on Engineering and Technology
Innovation 2012 (ICETI 2012), Kaohsiung,
Taiwan, R.O.C., Nov. 02~06, 2012, pp. 324. (½×¤å±Ä¥úºÐ¡A¥¼½s¶½X) 83
*Kuang-Shyr Wu, Der-Chyuan Lou, Wei-Kuei Chen, and Chien-Ping Chang, ¡§Novel
approach for color secret image sharing,¡¨ Proceedings of the 23rd National Conference on
Information Security, Southern
Taiwan University of Science and Technolog, Tainan, Taiwan, R.O.C., May 23-24, 2013, pp. 115-122. (in Chinese 84
*Jen-Chun Lee, Chien-Ping Chang, Kuang-Shyr Wu,
and Der-Chyuan Lou, ¡§Efficient
palm vein recognition approach for biometrics-based identification systems,¡¨ Proceedings of
the 23rd National Conference on Information Security, Southern Taiwan University of Science and
Technolog, Tainan, Taiwan, R.O.C., May 23-24, 2013,
pp. 123-128. |
¾Ç³N¬¡°Ê
A.¾á¥ô½s¿è©eû |
01
ÀòÁܾá¥ô¤¤µØ¥Á°ê¸ê°T¦w¥þ¾Ç·|¡iCCISA¡FChinese Cryptology and Information
Security Association¡j¡i¸ê°T¦w¥þ³q°T¡j¥Xª©©eû·|½s¿è©eû¡A2003¦~09¤ë¦Ü2006¦~08¤ë¡B2006¦~09¤ë¦Ü2009¦~08¤ë¡C 02
Àò°ê»Ú´Á¥Z¡iJournal of Systems and Software¡XSCI,
EI¡j¥D½s(Editor-in-Chief)ÁܽСA¾á¥ô¸Ó´Á¥Z¡u¦w¥þ§Þ³N»â°ì¥D½s¡v(Area Editor for Security Technology)¡A2003¦~07¤ë¨´¤µ¡C 04
ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|(http://www.csroc.org.tw/)¡i¹q¸£¾Ç¥Z¡XJournal of Computers¡j½s¿è©eû·|©eû(Associate Editor)¡A(¹q)¸u¦w¦r²Ä20¸¹¡A2006¦~03¤ë¨´¤µ¡C 05
ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|(http://www.csroc.org.tw/)¡i¹q¸£¾Ç¥Z¡XJournal of Computers¡j¡uºô¸ô¦w¥þ¯S¥Z¡v«È®y¥D½s¡]Guest Editor¡^¡A2008¦~01¤ë¥X¥Z¡C 06
Àò°ê»Ú´Á¥Z¡iInternational Journal of Digital Crime
and Forensics¡j¥D½sÁܽСA¾á¥ô¸Ó´Á¥Z½s¿è©eû(Associate Editor)¡A2008¦~01¤ë¨´¤µ¡C
http://www.igi-global.com/journals/details.asp?id=7828 07
ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|(http://www.csroc.org.tw/)¡i¹q¸£¾Ç¥Z¡XJournal of Computers¡j¡u¼Æ¦ìª©ÅvºÞ²z¯S¥Z¡v«È®y¥D½s¡]Guest Editor¡^¡A2009¦~04¤ë¥X¥Z¡C 08
Àò°ê»Ú´Á¥Z¡iJournal of Information Hiding and
Multimedia Signal Processing¡XJIH-MSP¡jÁܽСA¾á¥ô¸Ó´Á¥Z½s¿è©eû(Associate
Editor)¡A2009¦~01¤ë¨´¤µ¡C
http://www.jihmsp.org/ 09
ÀòÁܾá¥ô¡i°]¹Îªk¤H°ªµ¥±Ð¨|µûŲ¤¤¤ß¡j99¦~«×¤j¾Ç®Õ°|®Õ°ÈµûŲ©eû¡A2010¦~01¤ë¦Ü2010¦~12¤ë¡C 10
ÀòÁܾá¥ô¡i²Ä¤E©¡©ô§»¬ì¾Ç¼ú¡j¸ê°TÃþµû¼f©eû¡A2010¦~05¤ë¦Ü12¤ë¡C 11
Àò°ê»Ú´Á¥Z¡iISRN Signal Processing¡jÁܽСA¾á¥ô¸Ó´Á¥Z½s¿è©eû(Editor)¡A2010¦~09¤ë¨´¤µ¡C http://www.hindawi.com/isrn/sp/ 12
ÀòÁܾá¥ô¡i°]¹Îªk¤H°ªµ¥±Ð¨|µûŲ¤¤¤ß¡j100¦~«×¤j¾Ç®Õ°|®Õ°ÈµûŲ©eû¡A2011¦~01¤ë¦Ü2011¦~12¤ë¡C 13
ÀòÁܾá¥ô¡iªk°ê¼Ð·Ç¨ó·|¨È¤Ó°ÏÁ`³¡¡X¦ãªk¿Õ¡]AFNOR¡^°ê»ÚªÑ¥÷¦³¤½¥q¡jISMS¡]Information
Security Management System¡^¸ê°T¦w¥þºÞ²z¨t²Î±ÂÃҺʷþ©eû¡A2011¦~08¤ë¦Ü2014¦~07¤ë¡C 14
Àò°ê»Ú´Á¥Z¡iSecurity and Communication Networks¡]Wiley¡^¡XSCI¡jÁܽСA¾á¥ô¸Ó´Á¥Z«È®y½s¿è©eû(Guest
Editor)¡XSpecial Issue on Applied Cryptography
for Information and Communication Networks¡A2011¦~11¤ë¡C |
B.¾á¥ô¼f½Z©eû |
01
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iAdvances in Engineering Software¡j½×¤å¼f¬d©eû¡A2008¦~11¤ë¡C 02
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iAdvances in Multimedia¡j½×¤å¼f¬d©eû¡A2011¦~12¤ë¡C 03
ÀòÁܾá¥ô¤¤µØ¥Á°ê¸ê°T¦w¥þ¾Ç·|¡iCCISA¡FChinese Cryptology and Information Security
Association¡j¥Xª©¤§¥Zª«¡i¸ê°T¦w¥þ³q°T¡j½×¤å¼f¬d©eû¡A2003¦~12¤ë¡B2004¦~02¤ë¡B2005¦~03¤ë¡C 04
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iCircuits, Systems and Signal Processing¡j½×¤å¼f¬d©eû¡A2007¦~11¤ë¡B2008¦~03¤ë¡B2008¦~04¤ë¡B2009¦~11¤ë¡C 05
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iComputers and Electrical Engineering Journal¡j½×¤å¼f¬d©eû¡A2006¦~11¤ë¡B2008¦~07¤ë(¨â½g)¡C 06
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iComputer Journal¡j½×¤å¼f¬d©eû¡A2010¦~03¤ë¡B2010¦~09¤ë¡C 07
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iComputer Standards & Interfaces¡j½×¤å¼f¬d©eû¡A2004¦~07¤ë¡B2007¦~06¤ë¡B2008¦~02¤ë¡B2009¦~03¤ë¡B2011¦~04¤ë¡B2011¦~08¤ë¡C 08
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iDigital Signal Processing¡j½×¤å¼f¬d©eû¡A2012¦~02¤ë¡B2012¦~12¤ë¡C 09
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iDisplays¡j½×¤å¼f¬d©eû¡A2012¦~06¤ë¡B2013¦~02¤ë¡B2013¦~03¤ë¡B2013¦~04¤ë¡C 10
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEE Electronics Letters¡j½×¤å¼f¬d©eû¡A2006¦~10¤ë¡C 11
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEE Proceedings¡XCommunications¡j½×¤å¼f¬d©eû¡A2005¦~01¤ë¡B2005¦~03¤ë¡B2005¦~10¤ë¡C 12
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEE Proceedings¡XVision, Image & Signal
Processing¡j½×¤å¼f¬d©eû¡A2006¦~05¤ë¡B2006¦~06¤ë¡B2006¦~11¤ë(¨â½g)¡C 13
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIET Communications¡j½×¤å¼f¬d©eû¡A2007¦~01¤ë¡C(The Institution of
Electrical Engineers (IEE) and Institution of Incorporated Engineers
(IIE)
to form the Institution of Engineering and Technology (IET)) 14
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Communications Letters¡j½×¤å¼f¬d©eû¡A2004¦~09¤ë¡B2008¦~11¤ë¡C 15
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Circuits and Systems-Part II¡j½×¤å¼f¬d©eû¡A2008¦~10¤ë¡C 16
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Computers¡j½×¤å¼f¬d©eû¡A2005¦~12¤ë¡B2006¦~02¤ë¡C 17
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Dependable and Secure
Computing¡j½×¤å¼f¬d©eû¡A2008¦~12¤ë¡C 18
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Image Processing¡j½×¤å¼f¬d©eû¡A2008¦~12¤ë¡B2012¦~04¤ë¡C 19
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Information Forensics and
Security¡j½×¤å¼f¬d©eû¡A2006¦~04¤ë¡C 20
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Information Technology in
Biomedicine¡j½×¤å¼f¬d©eû¡A2007¦~08¤ë¡C 21
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Knowledge and Data
Engineering¡j½×¤å¼f¬d©eû¡A2006¦~07¤ë¡C 22
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Multimedia¡j½×¤å¼f¬d©eû¡A2002¦~03¤ë¡B2002¦~10¤ë¡B2003¦~09¤ë¡B2003¦~10¤ë¡B2004¦~05¤ë¡B2004¦~09¤ë¡B2004¦~12¤ë¡B2005¦~02¤ë¡B2005¦~03¤ë(¤T½g)¡B2005¦~05¤ë¡B2005¦~10¤ë¡B2005¦~12¤ë¡B2006¦~02¤ë¡B2006¦~06¤ë¡B2006¦~07¤ë¡B2007¦~11¤ë¡B2008¦~02¤ë¡B2008¦~03¤ë¡C 23
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Very Large Scale Integration
Systems¡j½×¤å¼f¬d©eû¡A2006¦~08¤ë¡B2010¦~12¤ë¡C 24
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Security & Privacy¡j½×¤å¼f¬d©eû¡A2004¦~08¤ë¡B2013¦~02¤ë¡C 25
ÀòÁܾá¥ô¡iIEEE Signal Processing Letters¡j½×¤å¼f¬d©eû¡A2007¦~06¤ë10¤é¡C 26
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iImaging Science Journal¡j½×¤å¼f¬d©eû¡A2002¦~02¤ë¡B2002¦~07¤ë¡B2002¦~10¤ë¡B2002¦~12¤ë¡B2003¦~04¤ë¡B2003¦~11¤ë¡B2004¦~01¤ë¡B2004¦~10¤ë¡B2005¦~01¤ë¡B2005¦~02¤ë¡B2005¦~11¤ë¡B2006¦~04¤ë¡B2006¦~08¤ë¡B2009¦~04¤ë¡B2009¦~09¤ë¡B2010¦~04¤ë¡B2011¦~05¤ë¡C 27
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iImage and Vision Computing¡j½×¤å¼f¬d©eû¡A2006¦~02¤ë¡B2008¦~12¤ë¡C 28
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInformatica¡j½×¤å¼f¬d©eû¡A2005¦~10¤ë¡B2006¦~02¤ë¡C 29
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInformation Sciences¡j½×¤å¼f¬d©eû¡A1999¦~11¤ë¡B2001¦~03¤ë¡B2006¦~08¤ë¡B2007¦~05¤ë¡B2007¦~07¤ë¡B2008¦~12¤ë¡B2009¦~02¤ë¡B2009¦~06¤ë(¨â½g)¡B2009¦~07¤ë(¨â½g)¡B2009¦~11¤ë(¨â½g)¡B2010¦~01¤ë¡B2010¦~04¤ë¡B2010¦~08¤ë(¨â½g)¡B2011¦~08¤ë¡B2011¦~11¤ë(¨â½g)¡B2011¦~12¤ë¡B2013¦~02¤ë¡B2013¦~05¤ë¡C 30
ÀòÁܾá¥ô¡iInformation Technology And Control¡j½×¤å¼f¬d©eû¡A2013¦~03¤ë17¤é¡C 31
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Communication Systems¡j½×¤å¼f¬d©eû¡A2012¦~03¤ë¡B2012¦~10¤ë¡B2013¦~01¤ë¡B2013¦~02¤ë¡C 32
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Computer Mathematics¡j½×¤å¼f¬d©eû¡A2006¦~02¤ë¡B2009¦~11¤ë¡B2012¦~11¤ë¡B2012¦~12¤ë¡B2013¦~04¤ë¡B2013¦~05¤ë¡C 33
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Computers and
Applications¡j½×¤å¼f¬d©eû¡A2008¦~12¤ë¡C 34
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Image and Graphics¡j½×¤å¼f¬d©eû¡A2013¦~01¤ë¡C 35
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Information and Computer
Security¡j½×¤å¼f¬d©eû¡A2009¦~03¤ë¡B2009¦~09¤ë¡B2010¦~03¤ë¡B2010¦~04¤ë¡B2010¦~06¤ë¡B2010¦~07¤ë¡B2010¦~08¤ë¡B2011¦~10¤ë¡B2012¦~03¤ë¡B2013¦~01¤ë¡C 36
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Information Security¡j½×¤å¼f¬d©eû¡A2007¦~11¤ë¡B2008¦~04¤ë¡C 37
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Intellectual Property
Management¡j½×¤å¼f¬d©eû¡A2007¦~03¤ë¡C 38
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Multimedia Intelligence
and Security¡j½×¤å¼f¬d©eû¡A2009¦~12¤ë¡C 39
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Pattern Recognition and
Artificial Intelligence¡j½×¤å¼f¬d©eû¡A2007¦~07¤ë12¤é¡B2007¦~08¤ë04¤é¡B2007¦~10¤ë06¤é¡C 40
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iISRN Signal Processing¡j½×¤å¼f¬d©eû¡A2010¦~11¤ë¡B2010¦~12¤ë¡B2011¦~03¤ë¡B2011¦~11¤ë¡B2012¦~03¤ë(¨â½g)¡B2012¦~04¤ë(¤T½g)¡B2012¦~05¤ë¡B2012¦~11¤ë¡B2012¦~12¤ë¡C 41
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of the Chinese Institute of Engineers¡j½×¤å¼f¬d©eû¡A2005¦~11¤ë¡B2009¦~09¤ë¡B2009¦~11¤ë¡B2009¦~12¤ë¡B2010¦~04¤ë¡B2010¦~07¤ë¡B2011¦~02¤ë¡B2011¦~06¤ë¡B2011¦~08¤ë¡B2012¦~02¤ë¡B2012¦~12¤ë¡B2013¦~02¤ë¡C 42
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Computers¡j½×¤å¼f¬d©eû¡A2011¦~01¤ë¡B 43
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Engineering and Computer Innovation¡j½×¤å¼f¬d©eû¡A2008¦~04¤ë¡B2008¦~09¤ë¡B2009¦~12¤ë¡B2010¦~11¤ë¡C 44
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Electromagnetic Waves and Applications¡j½×¤å¼f¬d©eû¡A2008¦~11¤ë¡C 45
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Electronic Imaging¡j½×¤å¼f¬d©eû¡A2010¦~12¤ë¡B2013¦~04¤ë¡C 46
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Information Science and Engineering¡j½×¤å¼f¬d©eû¡A1999¦~04¤ë¡B1999¦~06¤ë¡B2004¦~04¤ë¡B2005¦~04¤ë¡B2005¦~05¤ë¡B2005¦~07¤ë¡B2005¦~10¤ë¡B2006¦~04¤ë¡B2006¦~10¤ë¡B2007¦~02¤ë¡B2008¦~10¤ë¡B2009¦~09¤ë¡C 47
ÀòÁܾá¥ô´Á¥Z¡iJournal of Internet Technology¡j½×¤å¼f¬d©eû¡A2007¦~07¤ë¡B2007¦~10¤ë¡B2009¦~07¤ë¡C 48
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Medical Systems¡j½×¤å¼f¬d©eû¡A2011¦~06¤ë¡B2012¦~09¤ë¡B2012¦~11¤ë¡B2012¦~12¤ë¡C 49
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Organizational Computing and
Electronic Commerce¡j½×¤å¼f¬d©eû¡A2004¦~10¤ë¡B2005¦~12¤ë¡C 50
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Systems and Software¡j½×¤å¼f¬d©eû¡A2000¦~01¤ë¡B2000¦~09¤ë¡B2000¦~12¤ë¡B2001¦~07¤ë¡B2001¦~11¤ë¡B2002¦~01¤ë¡B2002¦~08¤ë¡B2002¦~10¤ë¡C 51
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Zhejiang University¡XScience A¡j½×¤å¼f¬d©eû¡A2008¦~07¤ë¡B2009¦~01¤ë¡C 52
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iKSII Transactions on Internet and Information
Systems¡j½×¤å¼f¬d©eû¡A2012¦~11¤ë¡B2012¦~12¤ë¡C 53
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iMathematical
and Computer Modelling¡j½×¤å¼f¬d©eû¡A2008¦~01¤ë¡C 54
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iMultimedia Tools and Applications¡j½×¤å¼f¬d©eû¡A2008¦~08¤ë¡C 55
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iNonlinear Dynamics¡j½×¤å¼f¬d©eû¡A2012¦~11¤ë¡C 56
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iOptical Engineering¡j½×¤å¼f¬d©eû¡A2000¦~10¤ë¡B2002¦~10¤ë¡B2005¦~12¤ë¡B2006¦~11¤ë¡B2007¦~12¤ë¡B2008¦~03¤ë¡B2009¦~05¤ë¡B2009¦~08¤ë¡B2010¦~12¤ë¡B2011¦~02¤ë¡B2011¦~06¤ë¡B2011¦~07¤ë¡B2012¦~04¤ë¡C 57
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iPhysics Letters A¡j½×¤å¼f¬d©eû¡A2007¦~02¤ë¡C 58
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iSignal Processing¡j½×¤å¼f¬d©eû¡A2010¦~03¤ë¡B2010¦~10¤ë¡B2011¦~03¤ë¡B2011¦~09¤ë¡B2011¦~12¤ë¡C 59
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iSecurity and Communication Networks¡j½×¤å¼f¬d©eû¡A2012¦~03¤ë¡C 60
ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iTelecommunication Systems Journal¡j½×¤å¼f¬d©eû¡A2010¦~05¤ë¡C 61
ÀòÁܾá¥ô¬ü©M§Þ³N¾Ç°|¡i¬ü©M¾Ç³ø¡j½×¤å¼f¬d©eû¡A2006¦~11¤ë¡B2008¦~04¤ë¡C 62
ÀòÁܾá¥ôªÅx¡i¯èªÅ§Þ³N¾Ç°|¾Ç³ø(Journal of Air Force Institute of Technology)¡j½×¤å¼f¬d©eû¡A2008¦~04¤ë(¤T½g)¡B2010¦~03¤ë(¤G½g)¡B2011¦~03¤ë(¤G½g)¡C 63
ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|¡iJournal of Computer¡X¹q¸£¾Ç¥Z¡j½×¤å¼f¬d©eû¡A2006¦~03¤ë¡B2009¦~12¤ë¡B2010¦~08¤ë¡B2011¦~09¤ë(¤G½g)¡C |
C.¾á¥ôijµ{©eû |
01
ÀòÁܾá¥ô¡i²Ä¤K©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤Î¤À³õ·|ij¥D«ù¤H¡A°ª¶¯¡A°ê¥ß¤¤¤s¤j¾Ç¡A1998¦~05¤ë¡C 02
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i1998 International Computer Symposium (ICS 1998)
¢w1998°ê»Úpºâ¾÷·|ij¡j½×¤å¼f¬d©eû¡A1998¦~09¤ë¡C 03
ÀòÁܾá¥ô¡i²Ä¤E©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤Î¤À³õ·|ij¥D«ù¤H¡A¥x¤¤¡A´Â¶§¬ì§Þ¤j¾Ç¡A1999¦~05¤ë¡C 04
ÀòÁܾá¥ô¡i¤¤µØ¥Á°ê²Ä¤K©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j½×¤å¼f¬d©eû¤Î¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A¤¤¥¿²z¤u¾Ç°|¡A1999¦~11¤ë¡C 05
ÀòÁܾá¥ô¡i²Ä¤Q©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¤Î½×¤å¼f¬d©eû¡Aªá½¬¡A°ê¥ßªFµØ¤j¾Ç¡A2000¦~05¤ë¡C 06
ÀòÁܾá¥ô¡i2000¦~°ê»Úpºâ¾÷·|ij¢w2000 International Computer Symposium
(ICS2000)¡jijµ{©eû¤Î½×¤å¼f¬d©eû¡A¹Å¸q¡A°ê¥ß¤¤¥¿¤j¾Ç¡A2000¦~12¤ë¡C 07
ÀòÁܾá¥ô¡i²Ä¤Q¤@©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¤Î½×¤å¼f¬d©eû¡A¥x«n¡A°ê¥ß¦¨¥\¤j¾Ç¡A2001¦~5¤ë¡C 08
ÀòÁܾá¥ô¡i¤¤µØ¥Á°ê²Ä¤Q©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j½×¤å²Õ¥l¶°¤H¡B½×¤å¼f¬d©eû¡B¤Î¤À³õ·|ij¥D«ù¤H¡A¥x¥_¡AºÖµØ°ê»Ú¤å±Ð·|À]¡A2001¦~11¤ë¡C 09
ÀòÁܾá¥ô¡i²Ä¤Q¤G©¡¥þ°ê¸ê°T¦w¥þ·|ij¡j½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A¥x¤¤¡A°·±dº[ºÞ²z¾Ç°|¡A2002¦~05¤ë¡C 10
ÀòÁܾá¥ô¡i²Ä¤Q¤T©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j°õ¦æ©eû¤Î¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A¥xÆW¡A2004¦~10¤ë¡C 11
ÀòÁܾá¥ô¡i²Ä¤Q¤»©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡B¤Î³Ì¨Î½×¤å¼úµû¼f©eû¡A¥x¤¤¡A³{¥Ò¤j¾Ç¡A2006¦~05¤ë¡C 12
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Third International Conference on Intelligent
Information Hiding and Multimedia Signal Processing (IIHMSP 07)¡jijµ{©eû(Program Committee)¡AIEEE¡AKaohsiung¡ATaiwan¡A2007¦~11¤ë26¤é¦Ü28¤é¡C 13
ÀòÁܾá¥ô¡i³°x©x®Õ¤K¤Q¤T¶g¦~®Õ¼y°ò¦¾Ç³N¬ã°Q·|¡j¤À³õ·|ij¥D«ù¤H¡A»ñ¤s¡A°ª¶¯¡A³°xx©x¾Ç®Õ¡A2007/06/01¡C 14
ÀòÁܾá¥ô¡i²Ä¤Q¤C©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A¹Å¸q¡A¹Å¸q¤j¾Ç¡A2007¦~06¤ë07¤é¦Ü08¤é¡C 15
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iICC'08¡XInformation and Network Security Symposium¡j½×¤å¼f¬d©eû¡A2007¦~10¤ë¡C 16
ÀòÁܾá¥ô¡i²Ä¤Q¤K©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡Aªá½¬¡AªFµØ¤j¾Ç¡A2008¦~05¤ë29¤é¦Ü30¤é¡C 17
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Fourth International Conference on
Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 08)¡Xhttp://bit.kuas.edu.tw/~iihmsp08/¡jijµ{©eû(Program Committee)¡AIEEE¡AHarbin¡AChina¡A2008¦~08¤ë15¤é¦Ü17¤é¡C 18
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Eighth International Conference on
Intelligent Systems Design and Applications (ISDA '08)¡Xhttp://bit.kuas.edu.tw/~isda08/¡jijµ{©eû(Program Committee)¤Î¤À³õ·|ij¥D«ù¤H¡AKaohsiung¡ATaiwan¡A2008¦~11¤ë26¤é¦Ü28¤é¡C 19
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe First International Workshop on Multimedia,
Information Privacy and Intelligent Computing Systems (MPIS'08)¡Xhttp://mpis08.ialab.cs.pu.edu.tw/mpis08/)¡j°Ï°ì¥D®u(Local Chair)¡Bijµ{©eû(Program
Committee)¡AIEEE¡AJiaosi¡AYilan¡ATaiwan¡A2008¦~12¤ë09¤é¦Ü10¤é¡C(in conjunction with the
2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008, http://apscc2008.csie.chu.edu.tw/)) 20
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Future
Generation Communication and Networking (FGCN 2008)¡Xhttp://www.sersc.org/FGCN2008/¡jijµ{©eû(Program Committee)¤Î¼f½Z©eû(¤½g)¡AIEEE¡AHainan Island¡AChina¡A2008¦~12¤ë13¤é¦Ü15¤é¡C 21
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Seond International Workshop on Forensics for
Future Generation Communication Environments (F2GC-08)¡Xhttp://www.sersc.org/F2GC2008/¡jijµ{©eû(Program Committee)¤Î¼f½Z©eû(¤@½g)¡AIEEE¡AHainan Island¡AChina¡A2008¦~12¤ë13¤é¦Ü15¤é¡C 22
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Forensic
Applications and Techniques in Telecommunications,
Information and Multimedia (E-Forensics 2009)¡Xhttp://www.e-forensics.eu/¡jijµ{©eû(Program Committee)¤Î¼f½Z©eû(¤T½g)¡AIEEE¡AAdelaide¡AAustralia¡A2009¦~01¤ë19¤é¦Ü21¤é¡C 23
ÀòÁܾá¥ô¡i²Ä¤Q¤E©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A¥x¥_¡A¥xÆW¬ì§Þ¤j¾Ç¡A2009¦~06¤ë04¤é¦Ü05¤é¡C 24
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Fifth International Conference on Intelligent
Information Hiding and Multimedia Signal Processing (IIHMSP 09)¡Xhttp://bit.kuas.edu.tw/~iihmsp09/¡jijµ{©eû(Program Committee)¡AIEEE¡AKyoto¡AJapan¡A2009¦~09¤ë12¤é¦Ü14¤é¡C F[ EI ] 25
ÀòÁܾá¥ô¡i2009¥Á¥Í¹q¤l¬ã°Q·|¡]WCE2009¡^¡Xhttp://wce2009.ncut.edu.tw/¡j¿Ôij©eû¡B½×¤å¼f¬d©eû¡A¥x¤¤¡A°ê¥ß¶Ô¯q¬ì§Þ¤j¾Ç¡A2009¦~11¤ë06¤é¡C 26
ÀòÁܾá¥ô¡i²Ä¤Q¤K©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A¥xÆW¡A2009¦~11¤ë¡C 27
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Workshop on Multimedia,
Information Privacy and Intelligent Computing Systems (MPIS-2009)¡Xhttp://www.ftrg.org/MPIS2009¡j«ü¾Éijµ{©eû(Steering Committee Member)¡AJiju¡AKorea¡A2009¦~12¤ë10¤é¦Ü12¤é¡C 28
ÀòÁܾá¥ô¡i¤E¤Q¤K¦~¥þ°êpºâ¾÷·|ij¡XNational Computer Symposium (NCS 2009)¡Xhttp://ncs2009.ntpu.edu.tw/CI/CI.htm¡jCryptography and Information Security Workshopijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A¥x¥_¡A°ê¥ß¥x¥_¤j¾Ç¡A2009¦~12¤ë10¤é~12¤é¡C 29
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 5th International Conference on Future
Information Technology (FutureTech 2010)¡Xhttp://www.ftrg.org/futuretech2010¡XTrack 6. Multimedia Convergence¡jijµ{©eû(Program Committee)¡ABusan¡AKorea¡A2010¦~05¤ë21¤é¦Ü23¤é¡C 30
ÀòÁܾá¥ô¡i²Ä¤G¤Q©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A·s¦Ë¡A¥æ³q¤j¾Ç¡A2010¦~05¤ë27¤é¦Ü28¤é¡C 31
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iIEEE International Workshop on Computer Forensics
In Software Engineering (CFSE 2010)¡BIn conjunction with 34th Annual International
Computer Software and Applications Conference (COMPSAC 2010)¡Xhttp://conferences.computer.org/compsac/2009/workshops/CFSE2009CFP.htm¡jijµ{©eû(Program Committee)¡AIEEE¡ASeoul¡ASouth Korea¡A2010¦~07¤ë19¤é¦Ü23¤é¡C 32
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Sixth International Conference on Intelligent
Information Hiding and Multimedia Signal Processing (IIHMSP 10)¡Xhttp://bit.kuas.edu.tw/~iihmsp10/¡jijµ{©eû(Program Committee)¡AIEEE¡ADarmstadt¡AGermany¡A2010¦~10¤ë15¤é¦Ü17¤é¡CF[ EI ] 33
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Multimedia
Information Networking and Security (MINES 2010)¡Xhttp://www.ieee-mines.org¡jijµ{©eû(Technical Program Committee)¡AIEEE¡ANanjing¡AChina¡A2010¦~11¤ë04¤é¦Ü06¤é¡C 34
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 2011 International Conference on Advanced
Software Engineering (ICASE-11), co-sponsored by FTRA and IEEE Changwon
Section¡Xhttp://www.ftrai.org/icase2011¡j¥Xª©©eû·|°Æ¥D®u(Publicity
Co-Chair)¡ABusan¡AKorea,¡A2011¦~05¤ë26¤é¦Ü28¤é¡C 35
ÀòÁܾá¥ô¡i²Ä¤G¤Q¤@©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©eû¡B½×¤å¼f¬d©eû¡A¶³ªL¡A°ê¥ßªê§À¬ì§Þ¤j¾Ç¡A2011¦~05¤ë26¤é¦Ü27¤é¡C 36
ÀòÁܾá¥ô¡i2011 Conference on Network and Information
Security (NIS 2011)¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A²M¶³¬ì§Þ¤j¾Ç¡A2011¦~06¤ë10¤é¡C 37
ÀòÁܾá¥ô¡i»OÆWºô»Úºô¸ô¬ã°Q·| (TANET 2011; Taiwan Academic Network 2011)¡Xhttp://tanet2011.niu.edu.tw/¡j¸ê³q°T¦w¥þ§Þ³N»PºÞ²z»â°ì¼f½Z¥l¶°¤H¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A©yÄõ¡A°ê¥ß©yÄõ¤j¾Ç¡A2011¦~10¤ë24¤é¦Ü26¤é¡C 38
ÀòÁܾá¥ô¡i2011¦~¥Á¥Í¹q¤l¬ã°Q·|(WCE 2011)¡Xhttp://im.ntit.edu.tw/wce2011/index.html¡j¤À³õ·|ij¥D«ù¤H¡A°ê¥ß¥x¤¤§Þ³N¾Ç°|¡A¥x¤¤¡A¥xÆW¡A2011¦~11¤ë11¤é¡C 39
ÀòÁܾá¥ô¡i¤@¦Ê¦~¥þ°êpºâ¾÷·|ij¡XNational Computer Symposium (NCS 2011)¡Xhttp://NCS2011.ncyu.edu.tw¡jCryptography and Information Security Workshopijµ{©eû¡B³Ì¨Î½×¤å¤Î³Ì¨Î¾Ç¥Í½×¤åµû¼f©eû¡A¹Å¸q¡A°ê¥ß¹Å¸q¤j¾Ç¡A2011¦~12¤ë02¤é¦Ü03¤é¡C 40
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iInternational Workshop on Information Science and
Education Technology¡]IET«H®§¬ì¾Ç©M±Ð¨|§Þ³N°ê»Ú¬ã°Q·|¡^(WISET 2012)¡Xhttp://www.acaiconf.org/iset/¡jijµ{©eû(Program Committee)¡AXiamen¡AFujian¡AChina¡A2012¦~03¤ë24¤é¦Ü26¤é¡C 41
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Consumer Electronics,
Communications and Networks (CECNet 2012)¡Xhttp://www.cecnetconf.org/2012¡j§Þ³Nijµ{©eû(Technical Program
Committee)¡AIEEE¡AShanxi¡AChina¡A2012¦~04¤ë21¤é¦Ü23¤é¡C ¡]IEEE®ø¶O¹q¤l¨ó·|¥D¿ì¡A¤j³°´ò¥_¬Ù«w¹ç¾Ç°|©Ó¿ì¡AEI¦¬¿ý¡^ 42
ÀòÁܾá¥ô¡i²Ä¤G¤Q¤G©¡¥þ°ê¸ê°T¦w¥þ·|ij¡Xhttp://cisc2012.cs.nchu.edu.tw¡jijµ{©eû¡B½×¤å¼f¬d©eû¡A¥x¤¤¡A°ê¥ß¤¤¿³¤j¾Ç¡A2012¦~05¤ë30¤é¦Ü31¤é¡C 43
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i2012 International Conference on Innovative
Mobile and Internet Services in Ubiquitous Computing (IMIS 2012)¡Xhttp://voyager.ce.fit.ac.jp/conf/imis/2012/¡j§Þ³Nijµ{©eû(Technical Program
Committee)¡ASanpaolo
Palace Hotel¡AItaly¡A2012¦~07¤ë04¤é¦Ü06¤é¡C 44
ÀòÁܾá¥ô¡iThe 17th Mobile Computing Workshop (MC-2012)º[°ê¬ì·|行°Êpºâpµe¬ã¨s¦¨ªGµoªí·|)¡Xhttp://mc2012.cgu.edu.tw/)¡jijµ{©eû¡A¤jªO®Ú´ËªL·Å¬u´ç°²§ø¡A·s¥_¥«¡A¥xÆW¡A2012¦~08¤ë29¤é¦Ü30¤é¡C 45
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 5th FTRA International Conference on
Human-centirc Computing (HumanCom 2012)¡Xhttp://www.ftrai.org/humancom2012/)¡jijµ{©eû(Program Committee)¡AGwangju¡AKorea¡A2012¦~09¤ë06¤é¦Ü08¤é¡C 46
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 15th International Conference on
Network-Based Information Systems (NBiS-2012): Web and Internet Applications¡X http://133.220.110.102/conf/nbis/2012/index.html¡jijµ{©eû(Program Committee)¡AMelbourne¡AAustralia¡A2012¦~09¤ë26¤é¦Ü28¤é¡C 47
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i2012 6th International Conference on Network and
System Security (NSS 2012)¡Xhttp://www.anss.org.au/nss2012/¡jijµ{©eû(Program Committee)¡AWu Yi Shan¡AFujian¡AChina¡A2012¦~11¤ë21¤é¦Ü23¤é¡C 48
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i2012 International Computer Symposium (ICS 2012) (Workshop on Cryptography and Information Security in conjunction)¡Xhttp://ics2012.ndhu.edu.tw/workshop.php#5¡jijµ{©eû(Program Committee) ¤Î½×¤å¼f¬d©eû(2½g)¡AHualien¡ATaiwan¡AR.O.C.¡A2012¦~12¤ë12¤é¦Ü14¤é¡C 49
ÀòÁܾá¥ô¡i²Ä¤G¤Q¤T©¡¥þ°ê¸ê°T¦w¥þ·|ij¡Xhttp://cisc2013.csie.stust.edu.tw/¡jijµ{©eû¡B½×¤å¼f¬d©eû¡B¤À³õ·|ij¥D«ù¤H¡A¥x«n¡A«n¥x¬ì§Þ¤j¾Ç¡A2013¦~05¤ë23¤é¦Ü24¤é¡C 50
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 7th International Conference on
Network and System Security (NSS 2013)¡Xhttp://anss.org.au/nss2013/¡jijµ{©eû(Program Committee)¤Î½×¤å¼f¬d©eû(5½g)¡AMadrid¡ASpain¡A2013¦~06¤ë03¤é¦Ü04¤é¡C 51
ÀòÁܾá¥ô¡iThe 18th Mobile Computing Workshop
(MC-2013)º[°ê¬ì·|行°Êpºâpµe¬ã¨s¦¨ªGµoªí·|)¡Xhttp://nol.cs.nctu.edu.tw/MC2013)¡jijµ{©eû¡A¦è´ò´ç°²§ø¡A]®ß¡A¥xÆW¡A2013¦~08¤ë27¤é¦Ü28¤é¡C 52
ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 2nd International
Conference on Model-Driven Engineering and Software Development (MODELSWARD
2014)¡Xhttp://www.modelsward.org/¡jijµ{©eû(Program Committee)¡ALisbon¡APortugal¡A2014¦~01¤ë07¤é¦Ü09¤é¡C |
ºaÅA¨Æ¶µ
01
ºaÀò¡iMarquis¥@¬É¦W¤H¿ý(Who,s Who in the World)¡j¥D°ÊÁܽСA¼f¬d¨Ã¥ZµnÓ¤H¨ÆÂÝ©ó²Ä15ª©(1997¦~¡B²Ä845¶)¥@¬É¦W¤H¿ý¤¤¡C 02
³Õ¤h½×¤åºaÀò§»ùÖ°òª÷·|²Ä11©¡¡iÀsÄ˽פå¼ú¡j¡A¨ÃÀòÁÜ¥[¤J¡iÀsÄË·|¡j¡A1997¡C 03
Àò¿ï¡i°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|¤E¤Q¦~«×Àu¨}±Ð®v¡j¡A2001¦~09¤ë¡C 04
Àò¿ï¡i°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|¤E¤Q¥|¦~«×Àu¨}±Ð®v¡j¡A2005¦~07¤ë01¤é¡A¤¤¥¿²z¤u¾Ç°|¶°³«¦r²Ä0940002459¸¹¥O¡C 05
Àò¿ï¡i°ê¨¾³¡¤E¤Q¥|¦~«×Àu¨}±Ð®v¡j¡A2005¦~09¤ë28¤é¡A°ê¨¾³¡¿ï¹D¦r²Ä940012802¸¹¼úª¬¡C 06
Àò¦Û¥Ñ®É³ø°OªÌ°K¥@©¾ÁܽСA³X½Í»P¡u¹F¤å¦è±K½X¡v¬ÛÃö¤§±K½X§Þ³NijÃD¡F³X½Í¸ê®Æ¥Zµn©ó¦Û¥Ñ®É³ø2006¦~5¤ë22¤éA8(¥þ)ª©¡C 07
Chiang-Lung Liu, Chien-Chung Lee, Der-Chyuan Lou, Wien Hong, Jeanne
Chen, and Chih-Wei Shiu, ¡§Reversible data hiding using high-peak prediction
errors,¡¨ Proceedings of the
2009 Workshop on Consumer Electronics
(WCE 2009), National Chin-Yi University of
Technology, Taichung, R.O.C., Nov. 06, 2009, pp. 185-190. http://wce2009.ncut.edu.tw/ ¡i¸ê°T¦w¥þ»â°ì³Ì¨Î½×¤å¡j 08
Der-Chyuan Lou and Sheng-Chih Ho, ¡§Hybrid high-capacity steganography method in
spatial domain,¡¨ in Chinese, Proceedings
of National Computer Symposium 2009 (NCS 2009), Workshop on
Cryptography and Information Security, National Taipei University,
Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 48-57. http://ncs2009.ntpu.edu.tw/CI/CI.htm ¡i¤J³òIEEE³Ì¨Î¾Ç¥Í½×¤å¡j |
ºô¶§ó·s¤é´Á¡G06/06/2013