Der-Chyuan Lou¡]°ú¼wÅv¡^

Department of Computer Science and Information Engineering
Chang Gung University

Taoyuan, Taiwan 33302, R.O.C.

TEL: (O) 886-3-211-8800 ext. 3696
E-mail:

¥D­n¾Ç¾ú

²¦·~¾Ç®Õ

°ê¡@¡@§O

¥D­×¾Çªù¨t©Ò

¾Ç¡@¡@¦ì

°_°W¦~¤ë

°ê¥ß¤¤¥¿¤j¾Ç

¤¤µØ¥Á°ê

¸ê°T¤uµ{¬ã¨s©Ò

¤u¾Ç³Õ¤h

1993/09¦Ü1997/03

°ê¥ß¤¤¤s¤j¾Ç

¤¤µØ¥Á°ê

¹q¾÷¤uµ{¬ã¨s©Ò­pºâ¾÷²Õ

¤u¾ÇºÓ¤h

1989/09¦Ü1991/06

¤¤¥¿²z¤u¾Ç°|

¤¤µØ¥Á°ê

¹q¾÷¨t­pºâ¾÷²Õ

¤u¾Ç¾Ç¤h

1984/09¦Ü1987/06

²{¾»P¸g¾ú

ªA°È¾÷Ãö

ªA°È³¡ªù/¨t©Ò

¾¡@¡@ºÙ

°_°W¦~¤ë

ªø©°¤j¾Ç

¸ê ¤u ¨t

±M¥ô±Ð±Â

2009/08¨´¤µ

Journal of Systems and Software ¡iSCI, EI¡j (Elsevier¤½¥q¥Xª©)

¦w¥þ§Þ³N
Security Technology

»â°ì¥D½s
(Area Editor)

2003/07¨´¤µ

°ê¨¾¤j¾Ç²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô±Ð±Â

2008/10¦Ü2009/07

°ê¨¾¤j¾Ç²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô±Ð±Â­Ý
¸ê¦w¹êÅç«Ç¥D¥ô

2006/11¦Ü2008/09

°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô±Ð±Â­Ý
¹qºâ¤¤¤ß¥D¥ô

2004/04¦Ü2006/10

°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô±Ð±Â­Ý²Õªø

2002/02¦Ü2004/03

°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô°Æ±Ð±Â­Ý²Õªø

2001/06¦Ü2002/01

¤¤¥¿²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô°Æ±Ð±Â

1997/03¦Ü2001/05

°ê¥ß¤¤¥¿¤j¾Ç

¸ê ¤u ¨t

­Ý¥ôÁ¿®v

1995/08¦Ü1997/02

¤¤¥¿²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ôÁ¿®v

1991/07¦Ü1993/08

¤¤¥¿²z¤u¾Ç°|

¹q ¾÷ ¨t

±M¥ô§U±Ð

1987/07¦Ü1989/08

¬ã¨s»â°ì

1.¦h´CÅé¦w¥þ

2.¼Æ¦ìª©ÅvºÞ²z

3.¸ê°TÁôÂÃ

4.¸ê°T¦w¥þ

5.¤À´²¦¡¨t²Î

¬ã¨s­pµe

­pµe¦WºÙ

¸É§U³æ¦ì

¾¡@°È

°õ¦æ´Á¶¡

°g³U°ÝÃD³Ì¨Î¥­¦æºtºâªk¤§³]­p»P¤ÀªR

°ê¬ì·|NSC 87-2218-E-014-010-

¥D«ù¤H

1997/08/01¦Ü 1998/07/31

¸ê®Æ³q°Tºô¸ô¤¤«O±K¸Ë¸m¤§¬ãµo

¤¤¬ì°|

¦@¦P¥D«ù¤H

1997/09/01¦Ü1998/06/30

¸ê°T¦w¥þ¸Ë¸m¤¤¨ã°»¿ù¯à¤Oªº±a²Å¸¹§Ö³t¥[ªk¹q¸ô¤§³]­p

°ê¬ì·|NSC 88-2213-E-014-001-

¥D«ù¤H

1998/08/01¦Ü1999/07/31

³æ¹³Áô§t¦h´º¥B¦Û§t¨Ï¥ÎªÌ¶¥¼h¦s¨ú±±¨îªºªÅ¶¡¸ê®Æ®w¤§¬ãµo

°ê¬ì·|NSC 88-2213-E-014-002-

¥D«ù¤H

1998/08/01¦Ü1999/07/31

RSA¤½¶}ª÷°Í±K½X¨t²Î¤¤ª÷°Í§Ö³t²£¥Í¤§¬ã¨s

°ê¬ì·|NSC 88-2815-C-014-001-E

¥D«ù¤H

1998/11/01¦Ü1999/06/30

RSA¤½¶}ª÷°Í±K½X¨t²Î¤¤ª÷°Í§Ö³t²£¥Íºtºâªk¤§¬ã¨s

¤¤¥¿²z¤u¾Ç°|¾Ç³N±MÃD¬ã¨s­pµe

¥D«ù¤H

1999/07/01¦Ü2000/12/31

¨ãÅçÃÒ¯à¤O¨Ã¥i°»ª¾¼v¹³¾D¿y§ï³¡¥÷ªº¹ÏÁô§Þ³N¤§³]­p»P¹ê§@

°ê¬ì·|NSC 89-2213-E-014-003-

¥D«ù¤H

1999/08/01¦Ü2000/07/31

¹q¸£¯f¬r§Þ³N¤§¥ý´Á¬ã¨s

¤¤¬ì°|

¨ó¦P¥D«ù¤H

2000/07/01¦Ü2000/12/31

§C¦ì¤¸°ª¶Ç¯u«×¼v¹³½s½X¨t²Î»P¹ê²{

°ê¬ì·|NSC 89-2213-E-014-030-

¥D«ù¤H

2000/08/01¦Ü2001/07/31

¸ê®Æ¥[¸Ñ±K¡BÁôÂáB¤Î¶Ç¿é¤§¾ã¦X¨t²Îªº¬ã»s

¤¤¬ì°|

¥D«ù¤H

2001/04/02¦Ü2001/12/31

°ª¦s¬¡©Ê¼Æ¦ì¯B¤ô¦L§Þ³N¤Î¨ä´ú¸Õ¥­¥x¤§¬ãµo(I)

°ê¬ì·|NSC 90-2213-E-014-007-

¥D«ù¤H

2001/08/01¦Ü2002/07/31

±KÆ_ºÞ²z¨t²Î¬ã¨s

°ê¨¾³¡³q¸ê¦¸ªø«Ç

¦@¦P¥D«ù¤H

2002/07/01¦Ü2002/11/30

°ª¦s¬¡©Ê¼Æ¦ì¯B¤ô¦L§Þ³N¤Î¨ä´ú¸Õ¥­¥x¤§¬ãµo(II)

°ê¬ì·|NSC 91-2219-E-014-003-

¥D«ù¤H

2002/08/01¦Ü2003/07/31

«D¹ïºÙ«¬¸ê°TÁôÂç޳N¤§¬ãµo(I)

°ê¬ì·|NSC 92-2213-E-014-013-

¥D«ù¤H

2003/08/01¦Ü2004/07/31

«D¹ïºÙ«¬¸ê°TÁôÂç޳N¤§¬ãµo(II)

°ê¬ì·|NSC 93-2213-E-014-014-

¥D«ù¤H

2004/08/01¦Ü2005/07/31

°ª®e¶qJPEG¸ê°TÁôÂèt²Î¤§¶}µo

¤¤¥¡¤j¾Ç«e¤³q°T¹êÅç«Ç±M®×

¥D«ù¤H

2005/07/01¦Ü2005/12/31

³q¥Îª¼¥Ø«¬ÂñK°»ª¾»P¤º®e¤ÀªR§Þ³N¤§¬ãµo(I)

°ê¬ì·|NSC 95-2221-E-606-032-

¥D«ù¤H

2006/08/01¦Ü2007/07/31

³q¥Îª¼¥Ø«¬ÂñK°»ª¾»P¤º®e¤ÀªR§Þ³N¤§¬ãµo(II)

°ê¬ì·|NSC 96-2221-E-606-008-

¥D«ù¤H

2007/08/01¦Ü2008/07/31

¾AÀ³©Ê³q¥Î«¬¸ê°TÁôÂ𻪾»P¤ÀªR§Þ³N¤§¬ãµo¡X(¨â¦~´Á)

°ê¬ì·|NSC 98-2221-E-182-066-MY2

¥D«ù¤H

2009/08/01¦Ü2011/07/31

´¼¼z«¬µL¥¢¯u¸ê°TÁôÂÃÂñK°»ª¾»P¤ÀªR§Þ³N¤§¬ãµo

°ê¬ì·|NSC 100-2221-E-182-055-

¥D«ù¤H

2011/08/01¦Ü2012/07/31

´¼¼z«¬µL¥¢¯u¸ê°TÁôÂÃÂñK°»ª¾»P¤ÀªR§Þ³N¤§¬ãµo(II)

°ê¬ì·|NSC 101-2221-E-182-070-

¥D«ù¤H

2012/08/01¦Ü2013/07/31

¤@­Ó°ò©óµêÀÀ¾÷¾¹ºÊ±±µ{¦¡¤§¤J«I¨¾¿m¨t²Îªº¬ã¨s»P¹ê§@

°ê¬ì·|NSC 101-2221-E-182-075-

¥D«ù¤H

2012/08/01¦Ü2013/07/31

µÛ§@

Journal Papers

01       Der-Chyuan Lou and Chin-Chen Chang, ¡§Fast exponentiation method obtained by folding the exponent in half,¡¨ IEE Electronics Letters, vol. 32, no. 11, pp. 984-985, May 1996.  F[ SCI, EI ]

02       Chin-Chen Chang, Der-Chyuan Lou, and Tzong-Chen Wu, ¡§A binary access control method using prime factorization,¡¨ Information Sciences, vol. 96, no. 1-2, pp. 15-26, Jan. 1997.  F[ SCI, EI ]

03       Chin-Chen Chang and Der-Chyuan Lou, ¡§Parallel computation of the multi-exponentiation for cryptosystems,¡¨ International Journal of Computer Mathematics, vol. 63, nos. 1/2, pp. 9-26, Jan. 1997.  F[ SCI, EI ]

04       Der-Chyuan Lou and Chin-Chen Chang, ¡§A parallel two-list algorithm for the knapsack problem,¡¨ Parallel Computing, vol. 22, no. 14, pp. 1985-1996, March 1997.  F[ SCI, EI ]

05       Der-Chyuan Lou and Chin-Chen Chang, ¡§A cost optimal search technique for the knapsack problem,¡¨ International Journal of High Speed Computing, vol. 9, no. 1, pp. 1-12, Aug. 1997.  F[ SCI, EI ]

06       Der-Chyuan Lou and Chin-Chen Chang, ¡§An adaptive exponentiation method,¡¨ Journal of Systems and Software, vol. 42, no. 1, pp. 59-69, July 1998.  F[ SCI, EI ]

07       Der-Chyuan Lou and Chin-Chen Chang, ¡§A fast modular multiplication method,¡¨ International Journal of Computer Systems Science and Engineering, vol. 13, no. 6, pp. 353-358, Nov. 1998.  F[ SCI, EI ]

08       Der-Chyuan Lou and Jiang-Lung Liu, ¡§Fault resilient and compression tolerant digital signature for image authentication,¡¨ IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, Feb. 2000.  F[ SCI, EI ]

09       Der-Chyuan Lou and Chin-Chen Chang, ¡§An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation,¡¨ International Journal of Computer Systems Science and Engineering, vol. 15, no. 2, pp. 111-117, March 2000.  F[ SCI, EI ]

10       Der-Chyuan Lou and Te-Lung Yin, ¡§Spatial database with each picture self-contained multiscape and access control in a hierarchy,¡¨Journal of Systems and Software, vol. 56, no. 2, pp. 153-163, March 2001.  F[ SCI, EI ]

11       Der-Chyuan Lou and Te-Lung Yin, ¡§Adaptive digital watermarking using fuzzy clustering technique,¡¨ IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, vol. E84-A, no. 8, pp. 2052-2060, Aug. 2001.  F[ SCI, EI ]

12       Tsorng-Lin Chia, Kuang-Bor Wang, Zen Chen, and Der-Chyuan Lou, ¡§Parallel distance transforms on a linear array architecture,¡¨ Information Processing Letters, vol. 88, no. 2, pp. 73-81, April 2002.  F[ SCI, EI ]

13       Der-Chyuan Lou, Chia-Long Wu, and Rong-Yi Ou, ¡§Application of parallel virtual machine framework to the strong prime problem,¡¨ International Journal of Computer Mathematics, vol. 79, no. 7, pp. 797-806, July 2002.  F[ SCI, EI ]

14       Der-Chyuan Lou and Jiang-Lung Liu, ¡§Steganographic method for secure communications,¡¨ Computers & Security, vol. 21, no. 5, pp. 449-460, Oct. 2002.  F[ SCI, EI ]

15       Der-Chyuan Lou, Te-Lung Yin, and Ming-Chang Chang, ¡§An efficient steganographic approach,¡¨ International Journal of Computer Systems Science and Engineering, vol. 17, no. 4/5, pp. 281-291, July-Sep. 2002.  F[ SCI, EI ]

16       Der-Chyuan Lou and Chia-Hung Sung, ¡§Robust watermarking technique for digital image utilizing invariant relation of vector quantization indices,¡¨ Imaging Science Journal, vol. 50, pp. 291-302, Oct. 2002.  F[ SCI]

17       Der-Chyuan Lou and Te-Lung Yin, ¡§Adaptive digital watermarking using fuzzy logic technique,¡¨ Optical Engineering, vol. 41, no. 10, pp. 2675-2687, Oct. 2002.  F[ SCI, EI ]

18       Chang-Tsun Li, Der-Chyuan Lou, and Jiang-Lung Liu, ¡§Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem,¡¨ Journal of the Chinese Institute of Electrical Engineering (Transactions of the Chinese Institute of Engineers, Series E), vol. 10, no. 1, pp. 99-106, Feb. 2003.  F[ EI ]

19       Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen, and Der-Chyuan Lou, ¡§Parallel execution of a connected component labeling operation on a linear array architecture,¡¨ Journal of Information Science and Engineering, vol. 19, no. 2, pp. 353-370, Mar. 2003.  F[ SCI, EI ]

20       Der-Chyuan Lou, Chia-Long Wu, and Chin-Yin Chen, ¡§Fast exponentiation by folding the signed-digit exponent in half,¡¨ International Journal of Computer Mathematics, vol. 80, no. 10, pp. 1251-1259, Oct. 2003. F[ SCI, EI ]

21       Der-Chyuan Lou and Chia-Hung Sung, ¡§A steganographic scheme for secure communications based on the chaos and Euler theorem,¡¨ IEEE Transactions on Multimedia, vol. 6, no. 3, pp. 501-509, June 2004.  F[ SCI, EI ]

22       Der-Chyuan Lou, Jiang-Lung Liu, and Chang-Tsun Li, ¡§Digital signature-based image authentication,¡¨ Chun-Shien Lu (Eds.), Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing (IGP), Chap. VII, pp. 207-230, 2004.  (Book Chapter)

23       Der-Chyuan Lou and Chia-Hung Sung, ¡§Asymmetric image watermarking based on reversible chaotic maps,¡¨ Imaging Science Journal, vol. 52, no.2, pp. 53-64, June 2004.  F[ SCI ]

24       Der-Chyuan Lou and Chia-Long Wu, ¡§Parallel modular exponentiation using signed-digit-folding technique,¡¨ Informatica ¡V An International Journal of Computing and Informatics, vol. 28, no. 2, pp. 197-205, July 2004.  F[ SCI, EI ]

25       Der-Chyuan Lou and Chia-Long Wu, ¡§Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques,¡¨ International Journal of Computer Mathematics, vol. 81 no. 10, pp. 1187-1202, Oct. 2004.  F[ SCI, EI ]

26       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§An efficient Montgomery exponentiation algorithm for cryptographic applications,¡¨ Informatica, vol. 16, no. 3, pp. 449-468, 2005.  F[ SCI ]

27       Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, and Hao-Kuan Tso, ¡§A robust watermarking scheme using self-reference image,¡¨ Computer Standards & Interfaces, vol. 28, no. 3, pp. 356-367, Jan. 2006.  F[ SCI, EI ]

28       Chengqing Li, Shujun Li, Der-Chyuan Lou, and Dan Zhang, ¡§On the security of the Yen-Guo¡¦s domino signal encryption algorithm (DSEA),¡¨ Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, Feb. 2006.  F[ SCI, EI ]

29       Der-Chyuan Lou, Jieh-Ming Shieh, and Hao-Kuan Tso, ¡§A robust buyer-seller watermarking scheme based on DWT,¡¨ International Journal of Pattern Recognition and Artificial Intelligence, vol. 20, no. 1, pp. 79-90, Feb. 2006.  F[ SCI, EI ]

30       Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§Evolution of information hiding technology,¡¨ Encyclopedia of E-Commerce, E-Government and Mobile Commerce, Idea Group Inc. Encyclopedia, Ed. Dr. Mehdi Khosrow-Pour, pp. 480-487, March 2006.  (Book Chapter)

31       Jiang-Lung Liu, Der-Chyuan Lou, and Hao-Kuan Tso, ¡§A copyright protection scheme for digital image using chaos and fractal compression,¡¨ International Journal of Nonlinear Sciences and Numerical Simulation, vol. 7, no. 2, pp. 197-202, 2006.  F[ SCI ]

32       Ji-Chyun Liu, Der-Chyuan Lou, Chin-Yen Liu, Ching-Yang Wu and Tai-Wei Soong, ¡§Precise determinations of the CPW-fed circular fractal slot antenna,¡¨ Microwave and Optical Technology Letters, vol. 48, no. 8, pp. 1586-1592, 2006.  F[ SCI ]

33       Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang, ¡§Fast parallel exponentiation algorithm for RSA public-key cryptosystem,¡¨ Informatica ¡X An International Journal, vol. 17, no. 3, 445-462, 2006. F[ SCI ]

34       Choung-Lii Chao, Tai-An Cheng, Der-Chyuan Lou, and Chung-Woei Chao, ¡§Development of a non-contact tool setting system for precision diamond turning,¡¨ Journal of Materials Science Forum, vols. 505-507, pp. 367-372, 2006.  F[ SCI, EI ]

35       Der-Chyuan Lou, Hao-Kuan Tso, and Jiang-Lung Liu, ¡§A robust copyright protection scheme for digital images using low-band characteristic,¡¨ Optical Engineering, vol. 45, no. 10, pp. 107002-1~107002-6, Oct. 2006.  F[ SCI, EI ]

36       Der-Chyuan Lou, Hao-Kuan Tso, and Jiang-Lung Liu, ¡§A copyright protection scheme for digital images using visual cryptography technique,¡¨ Computer Standards & Interfaces, vol. 29, no.1, pp. 125-131, Jan. 2007.  F[ SCI, EI ]

37       Der-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, and Te-Jen Chang, ¡§An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques,¡¨ Applied Mathematics and Computation, vol. 185, no. 1, pp. 31-44, Feb. 2007. F[ SCI, EI ]

38       Ming-Chiang Hu, Der-Chyuan Lou, and Ming-Chang Chang, ¡§Dual-wrapped watermarking scheme for image copyright protection,¡¨ Computers & Security, vol. 26, pp. 319-330, 2007. F[ SCI, EI ]

39       Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, and Te-Jen Chang, ¡§Fast modular multi-exponentiation using modified complex arithmetic,¡¨ Applied Mathematics and Computation, vol. 186, no. 2 pp. 1065-1074, March 2007.  F[ SCI, EI ]

40       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast binary multiplication by performing dot counting and complement recoding,¡¨ Applied Mathematics and Computation, vol. 191, no. 1, pp. 132-139, Aug. 2007.  F[ SCI, EI ]

41       Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§Evolution of information hiding technology,¡¨ Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Idea Group Inc. Encyclopedia, Ed. Dr. Hamid Nemati, pp. 144-154, Aug. 2007. (Book Chapter)

42       Ming-Chiang Hu, Der-Chyuan Lou, and Hao-Kuan Tso, ¡§A digital watermarking method using compression concept and coefficient difference,¡¨ Imaging Science Journal, vol. 55, no. 3, pp. 155-163, Sep. 2007.  F[ SCI ]

43       Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang, and Shih-Yun Chen, ¡§Integer factorization for RSA cryptosystem under a PVM environment,¡¨ International Journal of Computer Systems Science and Engineering, vol. 22, nos. 1-2, pp. 25-35, Jan.-March 2007.  F[ SCI, EI ]

44       Der-Chyuan Lou, Chih-Lin Lin, and Chiang-Lung Liu, ¡§Universal steganalysis scheme using support vector machine,¡¨ Optical Engineering, vol. 46, no. 11, pp. 117002-1~117002-10, Nov. 2007.  F[ SCI, EI ]

45       Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu, and Shu-Mei Lee, ¡§Novel healthcare X-rays image hiding scheme using neural network technique,¡¨ Imaging Science Journal, vol. 56, pp. 1-10, Jan. 2008.  F[ SCI ]

46       Der-Chyuan Lou, Chih-Lin Lin, and Jiang-Lung Liu, ¡§Novel steganalysis schemes for BPCS steganography,¡¨ Imaging Science Journal, vol. 56, no. 4, pp. 232-242, Aug. 2008.  F[ SCI ]

47       Der-Chyuan Lou, Ming-Chiang Hu, and Chiang-Lung Liu, ¡§Healthcare image watermarking scheme based on human visnal model and back-propagation network,¡¨ Journal of Chung Cheng Institute of Technology, vol. 37, no. 1, pp. 151-162, Nov. 2008.  F[ EI ]

48       Tzung-Her Chen, Chin-Chen Chang, Chang-Sian Wu, and Der-Chyuan Lou, ¡§On the security of a copyright protection scheme based on visual cryptography,¡¨ Computer Standards & Interfaces, vol. 31, no.1, pp. 1-5, Jan. 2009.  F[ SCI ]

49       Der-Chyuan Lou, Ming-Chiang Hu, and Chiang-Lung Liu, ¡§Multiple-layer data hiding scheme for medical images,¡¨ Computer Standards & Interfaces, vol. 31, no. 2, pp. 329-335, Feb. 2009. F[ SCI, EI ]

Der-Chyuan Lou, Chiang-Lung Liu, and Chih-Lin Lin, ¡§Message estimation for universal steganalysis using multi-classification support vector machine,¡¨ Computer Standards & Interfaces, vol. 31, no. 2, pp. 420-427, Feb. 2009.  F[ SCI, EI ]

50       Te-Jen Chang, Chia-Long Wu, Der-Chyuan Lou, and Ching-Yin Chen, ¡§A low-complexity LUT-based squaring algorithm,¡¨ Computers and Mathematics with Applications, vol. 57, no. 9, pp. 1494-1501, May 2009.  F[ SCI, EI ]

51       Shuenn-Jyi Wang, Der-Chyuan Lou, Dah-Lih Jeng, and Chih-Ting Yeh, ¡§Rotation, scaling, and translation resilient digital image watermarking using log-polar mapping,¡¨ Imaging Science Journal, vol. 57, Issue 4, pp. 177-190, Aug. 2009.  F[ SCI, EI ]

52       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Computational reduction of Wilson's primality test for modern cryptosystems,¡¨ Informatica ¡V An International Journal of Computing and Informatics, vol. 33, no. 4, pp. 453-458, Dec. 2009.  F[ SCI, EI ]

53       Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, and Chwei-Shyong Tsai, ¡§A novel adaptive steganography based on local complexity and human vision sensitivity,¡¨ Journal of Systems and Software, vol. 83, pp. 1236-1248, May 2010.  F[ SCI, EI ]

54       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular multiplication based on complement representation and canonical recoding,¡¨ International Journal of Computer Mathematics, vol. 87, no. 13, pp. 2871-2879, Oct. 2010. F[ SCI, EI ]

55       Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, ¡§Hybrid high-capacity data hiding by pixel-value differencing and modulus function,¡¨ Journal of Internet Technology, vol. 12, no. 2, pp. 303-312, March 2011.  F[ SCI, EI ]

56       Der-Chyuan Lou and Hui-Feng Huang, ¡§Efficient three-party password based key exchange scheme,¡¨ International Journal of Communication Systems, vol. 24, Issue 4, pp. 505-512, April 2011.  F[ SCI, EI ]

57       Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, and Chwei-Shyong Tsai, ¡§A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares,¡¨ Displays, vol. 32, Issue. 3, pp. 118-134, July 2011.  F[ SCI, EI ]

58       Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu, ¡§Steganalysis for multilevel reversible data hiding based on histogram modification of difference images,¡¨ International Journal of Innovative Computing Information and Control, vol. 7, no. 9, pp. 5429-5443, Sep. 2011.  F[ SCI, EI ]

59       Der-Chyuan Lou, Chen-Hao Hu, Chao-Lung Chou, and Chung-Cheng Chiu, ¡§Steganalysis of HMDP reversible data hiding scheme,¡¨ Optics Communications, vol. 284, issue 23, pp. 5406-5414, Nov. 2011.  F[ SCI, EI ]

60       Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu, ¡§Steganalysis of histogram modification reversible data hiding scheme by histogram feature coding,¡¨ International Journal of Innovative Computing Information and Control, vol. 7, no. 11, pp. 6571-6583, Nov. 2011  F[ SCI, EI ]

61       Der-Chyuan Lou and Chen-Hao Hu, ¡§LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis,¡¨ Information Sciences, vol. 188, pp. 346-358, April 2012.  F[ SCI, EI ]

62       Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§Active steganalysis for histogram-shifting based reversible data hiding,¡¨ Optics Communications, vol. 285, issue 10-11, pp. 2510-2518, April 2012.  F[ SCI, EI ]

63       *Chiang-Lung Liu, Kai-Ping Wang, and Der-Chyuan Lou, ¡§Sharing secret images using keyed information hiding technique,¡¨ Journal of Chung Cheng Institute of Technology, vol. 41, no. 2, pp. 11-20, Nov. 2012.  F[ EI ]

64       *Kai-Ping Wang, Chiang-Lung Liu, and Der-Chyuan Lou, ¡§Meaningful color image sharing without pixel expansion problem,¡¨ International Journal of Advancements in Computing Technology, vol. 4, no. 20, pp. 525-535, Nov. 2012.                                                                                                    F[ EI ]

65       Jeanne Chen, *Wien Hong, Chih-Wei Shiu, Der-Chyuan Lou, Chien-Chung Lee, and Chiang-Lung Liu, ¡§Prediction error adjustment technique for high quality reversible data hiding,¡¨ International Journal of Innovative Computing Information and Control, vol. 9, no. 2, pp. 1-12, Feb. 2013.   F[ SCI, EI ]

66       Der-Chyuan Lou, Kuo-Ching Liu, and *Hui-Feng Huang, ¡§Efficient mobile conference scheme for wireless communication,¡¨ Informatica, vol. 24, no. 1, pp. 59-70, April 2013.  F[ SCI, EI ]

67       *Kai-Ping Wang, Chiang-Lung Liu, and Der-Chyuan Lou, ¡§Expansion-free grayscale image sharing using meaningful share images,¡¨ Applied Mechanics and Materials, vols. 284-287, pp 3413-3417, April 2013.  F[ EI ]

68       *Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, and Hui-Feng Huang, ¡§Active steganalysis for interpolation-error based reversible data hiding,¡¨ Pattern Recognition Letters, vol. 34, issue 9, pp. 1032-1036, July 2013.  F[ SCI, EI ]

 

Conference Papers

01           Chang-Tsun Li and Der-Chyuan Lou, ¡§Edge detection based on the multiresolution Fourier transform,¡¨ Proceedings of the 1999 IEEE Workshop on Signal Processing Systems (SiPS ¡¦99): Design and Implementation, Taipei, Taiwan, R.O.C., Oct. 1999, pp. 686-693.

02           Der-Chyuan Lou and Jiang-Lung Liu, ¡§An adaptive technique for the steganography in spatial domain,¡¨ Proceedings of the 1999 National Computer Symposium, Taipei, Taiwan, R.O.C., Dec. 1999, vol. III, pp. C253-C259.

03           Chang-Tsun Li, Der-Chyuan Lou, and Tsung-Hsu Chen, ¡§Image authentication via content-based watermarks and a public key cryptosystem,¡¨ Proceedings of the 2000 IEEE International Conference on Image Processing (ICIP 2000), British Columbia, Canada, Sep. 2000, vol. III, pp. 694-697.

04           Chin-Chen Chang and Der-Chyuan Lou, ¡§An integration of user authentication and dynamic access control,¡¨ Proceedings of the 2000 IEEE International Symposium on Consumer Electronics, Hong-Kong, Dec. 2000, pp. 123-127.

05           Der-Chyuan Lou and Jiang-Lung Liu, ¡§Perceptually based model for the transparency of digital watermarks,¡¨ Proceedings of the 2001 Workshop on Consumer Electronics (WCE 2001), Taipei, Taiwan, R.O.C., Oct. 2001.

06           Der-Chyuan Lou and Chia-Hung Sung, ¡§Image authentication using subcodebooks of vector quantization and error control code,¡¨ Proceedings of the 2001 Workshop on Consumer Electronics (WCE 2001), Taipei, Taiwan, R.O.C., Oct. 2001.

07           Der-Chyuan Lou and Ming-Chiang Hu, ¡§Digital watermarking for the copyright protection of SPIHT coded image,¡¨ Proceedings of CVGIP 2002, Taoyuan, Taiwan, R.O.C., Aug. 2002, pp. 799-805.

08           Der-Chyuan Lou and Ming-Chiang Hu, ¡§Adaptive digital watermarking using neural network clustering technique,¡¨ Proceedings of CVGIP 2003, Kinmen, Taiwan, R.O.C., Aug. 2003, pp. 810-817.

09           Chin-Chen Chang and Der-Chyuan Lou, ¡§Fast parallel computation of multi-exponentiation for public key cryptosystems,¡¨ Proceedings of the Fourth IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Chengdu, China, Aug. 2003, pp. 955-958.

10           Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chiang Hu, ¡§Adaptive digital watermarking using neural network technique,¡¨ Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 325-332.  F[ EI ]

11           Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chang Chang, ¡§Digital watermarking using multiresolution wavelet transform,¡¨ Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 370-377.  F[ EI ]

12           Der-Chyuan Lou and Chia-Hung Sung, ¡§Robust image watermarking based on hybrid transformation,¡¨ Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 394-399.  F[ EI ]

13           Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chang Chang, ¡§Combined private and public watermarking in wavelet transform domain,¡¨ Proceedings of the 2003 National Computer Symposium (NCS 2003), Taichung, Taiwan, R.O.C., Dec. 2003, pp. 1325-1334.

14           Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, and Chao-Lung Chou, and Chin-Chiang Pan, ¡§A JPEG2000 compatible digital watermarking scheme,¡¨ Proceedings of The 2004 IEEE International Conference on Multimedia and Expo (ICME¡¦2004), The Grand Hotel, Taipei, Taiwan, R.O.C., June 27~30, 2004.

15           Der-Chyuan Lou, Jiang-Lung Liu, Ming-Chang Chang, Chin-Chiang Pan, and Chao-Lung Chou, ¡§Adaptive DWT-based watermarking scheme using neighboring mean value relationship,¡¨ Proceedings of 2004 IEEE Asia-Pacific Conference on Circuits and Systems (APCCAS 2004), Tainan, Taiwan, R.O.C., Dec. 2004, pp. 589-592.

16           Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§A robust watermarking scheme using filter and ROI,¡¨ Proceedings of 2004 IEEE Asia-Pacific Conference on Circuits and Systems, Tainan, Taiwan, R.O.C., Dec. 2004, pp. 1137-1140.

17           Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§A robust watermarking technique for still image using compression concept and coefficient difference,¡¨ Proceedings of ICS 2004 ¡V International Computer Symposium 2004, Taipei, Taiwan, R.O.C., Dec 15~17, 2004, pp. 455-460.

18           Yan-Xiang Deng, Chao-Jang Hwang, and Der-Chyuan Lou, ¡§Two-stage reconfigurable computing system architecture,¡¨ Proceedings of the 18th IEEE International Conference on Systems Engineering 2005 (ICSEng 2005), University of Nevada, Las Vegas, USA, Aug. 16-18, 2005, pp. 389-394. (No: 63)

19           Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, ¡§A copyright protection scheme based on self-similarity of DWT,¡¨ Proceedings of CVGIP 2005, Taipei, Taiwan, R.O.C., Aug. 22~23, 2005, pp. 1075-1081.

20           Der-Chyuan Lou, Jiang-Lung Liu, Hao-Kuan Tso, and Ming-Chang Chang, ¡§A grayscale watermarking scheme based on pixel mapping,¡¨ Proceedings of CVGIP 2005, Taipei, Taiwan, R.O.C., Aug. 22~23, 2005, pp. 1082-1089.

21           Ji-Chyun Liu, Ching-Pin Kuei, Chin-Yen Liu, Yaw-Shun Hong, and Der-Chyuan Lou, ¡§Hybrid metal grids/ferrites FSS screens for broad-band microwave absorber design at C-band,¡¨ Proceedings of the Tenth International Symposium on Microwave and Optical Technology (ISMOT-2005), Fukuoka, Japan, Aug. 2005, pp. 712-715.

22           Ji-Chyun Liu, Shuh-Tai Lu, Ching-Yang Wu, Ming-Hsun Chiang, and Der-Chyuan Lou, ¡§An inverse Gaussian monocycle pulse generator with picosecond duration and L/S-band responses for UWB applications,¡¨ Proceedings of the Tenth International Symposium on Microwave and Optical Technology (ISMOT-2005), Fukuoka, Japan, Aug. 2005, pp. 775-778.

23           Yan-Xiang Deng, Chao-Jang Hwang, and Der-Chyuan Lou, ¡§A two-stage reconfigurable image processing system,¡¨ Proceedings of the Eighth IEEE International Symposium on Signal Processing and Its Applications 2005 (ISSPA 2005), Sydney, Australia, Aug. 28~31, 2005, vol. 1, pp. 315-318.

24           Jiang-Lung Liu, Der-Chyuan Lou, Li-Chung Huang, and Chih-Lin Lin, ¡§An image authentication scheme based on wavelet transform and vector quantization,¡¨ in Chinese, Proceedings of TANET 2005, Taichung, Taiwan, R.O.C., Oct. 28, 2005, CD-ROM, F54.pdf.

25           Jiang-Lung Liu, Der-Chyuan Lou, Cheng-Po Kao, and Chih-Lin Lin, ¡§A watermarking scheme integrated with JPEG 2000 compression scheme,¡¨ in Chinese, Proceedings of TANET 2005, Taichung, Taiwan, R.O.C., Oct. 28, 2005, CD-ROM, G14.pdf.

26           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast binary multiplication method for modular exponentiation,¡¨ Proceedings of TANET 2005, Taichung, Taiwan, R.O.C., Oct. 28, 2005, CD-ROM.

27           Jiang-Lung Liu, Der-Chyuan Lou, and Ming-Chiang Hu, ¡§Securing healthcare color images using neural network,¡¨ Proceedings of the 12th International Conference on Neural Information Processing (ICONIP¡¦s 2005), Grand Hotel, Taipei, Taiwan, R.O.C., Oct. 30~Nov. 2, 2005, pp. 608-613.

28           Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, Chao-Lung Chou, and Chin-Chiang Pan, ¡§A JPEG2000 compatible digital watermarking scheme,¡¨ Proceedings of the 2005 Workshop on Consumer Electronics (WCE 2005), Yunlin, Taiwan, R.O.C., Nov. 17~18, 2005, CD-ROM, 122.pdf.

29           Jiang-Lung Liu, Chih-Lin Lin, and Der-Chyuan Lou, ¡§A JPEG2000-compliant method for image authentication and recovery,¡¨ Proceedings of the 2005 International Symposium on Communications (ISCOM 2005), Kaohsiung, Taiwan, R.O.C., Nov. 20~22, 2005, CD-ROM, ISCON05_00071.pdf.

30           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Computational complexity analyses of modular arithmetic for RSA cryptosystem,¡¨ Proceedings of the 23rd Workshop on Combinatorial Mathematics and Computation Theory, Da-Yeh University, Changhua, Taiwan, R.O.C., April 2006, pp. 215-224.

31           ¼B¦¿Às¡B°ú¼wÅv¡B­J©ú±j¡B§d²K¶¯¡B§õ²Q¬ü¡A¡§À³¥Î¶¥¼h¦¡¸ê°TÁôÂç޳N©óÂå¾Ç¼v¹³«OÅ@¤§¬ã¨s¡¨¡A²Ä¤­©¡¨È¤ÓHL7°·±d¸ê°T¥æ´«¼Ð·Ç¬ã°Q·|¡A¥x¥_¡A¥x¤jÂå°|¡A2006¦~07¤ë07¤é¦Ü07¤ë09¤é¡A251-259­¶¡C

32           ¼B¦¿Às¡B°ú¼wÅv¡B¾¤«TÅï¡A¡§¬Û®e©óMP3¤§­µ°TŲ§O§Þ³N¡¨¡A¡u2006³q¸ê¹q§Þ³N»PÀ³¥Î¬ã°Q·|¡v½×¤å¶°¡A°ª¶¯¡A¥xÆW¡A2006¦~10¤ë20¤é¡A²Ä81-86­¶¡C

33           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient sliding window binary exponentiation algorithm using minimal signed digest recording technique,¡¨ Proceedings of Cyberspace 2006: Cybersecurity, Cybercrime and Cyberlaw, Taipei, Taiwan, R.O.C., Nov. 20, 2006, pp. 490-498.

34           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular exponentiation using LUT and radix-b signed-digit recoding,¡¨ Proceedings of 2006 National Symposium on Telecommunications, Kaohsiung, Taiwan, R.O.C., Dec. 01-Dec. 02, 2006.

35           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§An effective sliding-window strategy for speeding up modular arithmetic,¡¨ Proceedings of 2006 National Symposium on Telecommunications, Kaohsiung, Taiwan, R.O.C., Dec. 01-Dec. 02, 2006.

36           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient large integers arithmetic by adopting squaring and complement recoding techniques,¡¨ Proceedings of the 24th Workshop on Combinatorial Mathematics and Computation Theory, National Chi Nan University, Nantou, Taiwan, R.O.C., April 27-28, 2007, pp. 460-464.

37           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient exponentiation evaluation and complexity analyses for cryptographic applications,¡¨ Proceedings of the 17th Information Security Conference (ISC 2007), Chiayi, Taiwan, R.O.C., June 07-08, 2007, pp. 305-317.

38           Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin, and Shin-Her Wang, ¡§An efficient steganalysis scheme based on statistic classification,¡¨ Proceedings of the 17th Information Security Conference (ISC 2007), Chiayi, Taiwan, R.O.C., June 07-08, 2007, pp. 717-727.

39           Der-Chyuan Lou, Chiang-Lung Liu, and Chih-Lin Lin, and Shin-Her Wang, ¡§Length estimation for embedded message using support vector machine,¡¨ Proceedings of the Third IEEE International Conference on IntelligentInformation Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2007, vol. 1, pp. 437-440.

40           Chiang-Lung Liu, Der-Chyuan Lou, and Chien-Chung Lee, ¡§Reversible data embedding using reduced difference expansion,¡¨ Proceedings of the Third IEEE International Conference on IntelligentInformation Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2007, vol. 1, pp. 433-436.

41           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient cryptographical modular exponentiation algorithm design and theoretical computational analyses,¡¨ Proceedings of Cyberspace 2007: Cybersecurity, Cybercrime and Cyberlaw (Cyber 2007), Taoyuan, Taiwan, R.O.C., Nov. 30, 2007, pp. 509~517.

42           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient algorithms design and theoretical computational complexity analyses on cryptographic applications,¡¨ Proceedings of the 2008 Enterprise Resources Program (ERP 2008), Taoyuan, Taiwan, R.O.C., Jan. 12, 2008, pp. 111-122.

43           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Efficient hardware and software design for smart card systems and information security applications,¡¨ Proceedings of 2008 Intelligent Systems Conference on Engineering Applications (ISC 2008), Far East University, Tainan, Taiwan, R.O.C., March 20, 2008, pp. 45.

44           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast squaring algorithm design and Ccomplexity numerical analyses for public-key cryptosystems,¡¨ Proceedings of the 25th Workshop on Combinatorial Mathematics and Computation Theory, Chung Hua University, Hsinchu, Taiwan, R.O.C., April 25-26, 2008, pp. 154-161.

45           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§An efficient Montgomery exponentiation algorithm for public-key cryptosystems,¡¨ Proceedings of the The IEEE International Conference on Intelligence and Security Informatics (ISI 2008), Springer Lecture Notes in Computer Science (LNCS), Grand Formosa Regent Hotel, Taipei, Taiwan, June 16-20, 2008, pp. 284-285.

46           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular arithmetic algorithm design and complexity theoretical analysis for cryptosystems,¡¨ Proceedings of 2008 International Conference of Digital Technology and Innovation Management (IDTIM 2008), Taipei, Taiwan, R.O.C., June 28, 2008, pp. 1601-1612.

47           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, ¡§Fast modular multiplication for e-commerce cryptosystem,¡¨ Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2008, pp. 457-461.  F[ EI ]

48           Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, and Chiang-Lung Liu, ¡§A lossless secret image sharing method,¡¨ Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2008, vol. 3, pp. 616-619.  F[ EI ]

49           Der-Chyuan Lou, Chen-Hao Hu, Hao-Kuan Tso, and Dah-Lih Jeng, ¡§An enhanced digital image RRS LSB steganographic method based on reversible histogram transformation functions,¡¨ in Chinese, Proceedings of the 19th National Conference on Information Security, National Taiwan University of Science and Technology, Taipei, Taiwan, R.O.C., June 04-05, 2009, A401.

50           Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Dah-Lih Jeng, ¡§A secure block-based steganography against statistical analysis,¡¨ in Chinese, Proceedings of the 19th National Conference on Information Security, National Taiwan University of Science and Technology, Taipei, Taiwan, R.O.C., June 04-05, 2009, A402.

51           Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, and Chao-Lung Chou, ¡§Secret sharing method for gray-level images,¡¨ Proceedings of The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 09), IEEE, Kyoto, Japan, Sep. 12-14, 2009, pp. 295-298.  F[ EI ]

52           Chiang-Lung Liu, Chien-Chung Lee, Der-Chyuan Lou, Wien Hong, Jeanne Chen, and Chih-Wei Shiu, ¡§Reversible data hiding using high-peak prediction errors,¡¨ Proceedings of the 2009 Workshop on Consumer Electronics (WCE 2009), National Chin-Yi University of Technology, Taichung, R.O.C., Nov. 06, 2009, pp. 185-190. ¡i¸ê°T¦w¥þ»â°ì³Ì¨Î½×¤å¡j

53           Chia-Long Wu, Hao-Kuan Tso, and Der-Chyuan Lou, ¡§A novel secret image sharing method,¡¨ Proceedings of the 7th Pacific Symposium on Flow Visualization and Image Processing (PSFVIP), National Pingtung University of Science and Technology, Kaohsiung, Taiwan, R.O.C., Nov. 16-19, 2009, #034.

54           Der-Chyuan Lou and Sheng-Chih Ho, ¡§Hybrid high-capacity steganography method in spatial domain,¡¨ in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 48-57.  ¡i¤J³òIEEE³Ì¨Î¾Ç¥Í½×¤å¡j

55           Shuenn-Jyi Wang, Chang-Kai Hsieh, Chih-ChiaLin, Der-ChyuanLou, and Ching-Chuan Chiang, ¡§A video-based abnormal activity detection approach for a court,¡¨ Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Image Processing, Computer Graphics, and Multimedia Technologies, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 207-218.

56           Hao-Kuan Tso, Der-Chyuan Lou, and Chia-Long Wu, ¡§Sharing secret image based on bit plane,¡¨ Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 567-572.

57           Der-Chyuan Lou, Chen-Hao Hu, Chung-Cheng Chiu, and Te-Jen Chang, ¡§Detection of reversible data hiding scheme based on histogram features codes,¡¨ in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 584-588.

58           Der-Chyuan Lou, Chao-Lung Chou, and Chung-Cheng Chiu, ¡§Steganalyses of reversible data hiding techniques,¡¨ in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 589-594.

59           Hao-Kuan Tso and Der-Chyuan Lou, ¡§Sharing secret image based on random grids,¡¨ Proceedings of The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009), Workshop on Computer Science and Its Applications, Jiju, Korea, Dec. 10-12, 2009, vol. 2, pp. 399-403.

60           ¥ª»¨©x¡B§d¹ÅÀs¡B°ú¼wÅv¡A¡§¥b¦â½Õ¼v¹³¤À¨É§Þ³N¡¨¡A2009¼Æ¦ì¤º®e¾Ç³N¬ã°Q·|(The International Conference on Digital Content)¡A®ç¶é¡A¥xÆW¡A2009¦~12¤ë17¤é¡AD3-1¡C

61           Hao-Kuan Tso, Der-Chyuan Lou, and Chung-Cheng Chiu, ¡§Halftone secret sharing method for color images,¡¨ Proceedings of 2010 International Security Technology & Management Conference, Taipei, Taiwan, R.O.C. Sep. 08-10, 2010, pp. 70-75.

62           Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu, ¡§Steganalysis of reversible data hiding based on histogram modification of pixel differences,¡¨ Proceedings of 2010 International Security Technology & Management Conference, Taipei, Taiwan, R.O.C. Sep. 08-10 2010, pp. 118-122.

63           Chia-Long Wu, Der-Chyuan Lou, and Hao-Kuan Tso, ¡§Non-expanded secret sharing method,¡¨ Proceedings of The 2010 International Symposium on GPS/GNSS (GPS/GNSS 2010), Tainan, Taiwan, R.O.C., Oct. 26-28, 2010.

64           Chao-Lung Chou, Der-Chyuan Lou, and Chung-Cheng Chiu, ¡§Steganalysis of reversible data hiding using template matching techniques,¡¨ Proceedings of National Symposium on Telecommunications (NST 2010), Taoyuan, Taiwan, R.O.C., Dec. 03-04, 2010.  ¡i¤J³ò³Ì¨Î¾Ç¥Í½×¤å¼ú¡X¦@§ë½Z278½g¡A¤J³ò¤C½g¡C¡j

65           Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, ¡§High quality steganogrphic method base on MSBs of pixels,¡¨ Proceedings of National Symposium on Telecommunications (NST 2010), Taoyuan, Taiwan, R.O.C., Dec. 03-04, 2010.

66           Hao-Kuan Tso and Der-Chyuan Lou, ¡§Information hiding method using sharing images,¡¨ Proceedings of The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen, China, Dec.13-15, 2010, pp. 642-645.

67           Der-Chyuan Lou, Chao-Lung Chou, and Chung-Cheng Chiu, ¡§Active steganalysis for reversible data hiding based on histogram-shifting technology,¡¨ Proceedings of 2011 Conference on Network and Information Security (NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011, pp. 24-31.

68           Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, ¡§High quality and payload data hiding based on MSBs of pixels in digital images,¡¨ Proceedings of 2011 Conference on Network and Information Security (NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011, pp. 32-40.

69           Hao-Kuan Tso and Der-Chyuan Lou, ¡§¦Ç¶¥µøı±K½X§Þ³N,¡¨ Proceedings of 2011 Conference on Network and Information Security (NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011, pp. 41-47.

70           Fong-Hao Liu, Der-Chyuan Lou, and Jun-Te. Su, ¡§°ò©ó¹w´ú»~®t»P¹³¯À®t­Èªº¥i°f¦¡¸ê°TÁôÂÃ,¡¨ Proceedings of 2011 Conference on Information Technology and Industrial Application (ITIA2011), Technology and Science Institute of Northern Taiwan, Beitou, Taipei, Taiwan, R.O.C., June 10, 2011, S06-07-ID65, pp. 01-07.

71           Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§°w¹ï¥i¦^´_¦¡¨ú¼Ë¼v¹³®t­ÈÂñK§Þ³N¤§¥D°Ê¦¡ÂñK¤ÀªRªk,¡¨ Proceedings of 2011 Conference on Taiwan Academic Network (TANET 2011), Ilan, Taiwan, R.O.C., Oct. 24~26, 2011.

72           Hao-Kuan Tso and Der-Chyuan Lou, ¡§µøı±K½X§Þ³N©óÂå¾Ç¼v¹³¤§À³¥Î,¡¨ Proceedings of 2011 Workshop on Consumer Electronics (WCE 2011), Taichung, Taiwan, R.O.C., Nov. 11, 2011, pp. 1169-1173.

73           Shuenn-Jyi Wang, Chang-Kai Hsieh, Chih-Chia Weng, and Der-Chyuan Lou, ¡§µL­«Å|Àô¹Ò¤§¦hÄá¼v¾÷¤H­û°lÂÜ,¡¨ Proceedings of 2011 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2011), Taoyuan, Taiwan, R.O.C., Nov. 11~13, 2011, pp. 272-279.

74           Hao-Kuan Tso and Der-Chyuan Lou, ¡§¶¥¼h¦¡µøı¤À¨É§Þ³N,¡¨ Proceedings of 2011 National Computer Symposium (NCS 2011), Chiayi, Taiwan, R.O.C., Dec. 2~3, 2011, pp. 38-47.

75           Der-Chyuan Lou, Sheng-Chih Ho, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§Adaptive steganographic method base on pixel value,¡¨ Proceedings of 2011 National Computer Symposium (NCS 2011), Chiayi, Taiwan, R.O.C., Dec. 2~3, 2011, pp. 58-65.

76           Hao-Kuan Tso and Der-Chyuan Lou, ¡§Medical image protection using secret sharing scheme,¡¨ Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2012), Kuala Lumpur, Malaysia, Feb. 20-22, 2012.  (Indexed by SCOPUS since Dec., 2010)

77           Yu-Shiang Lin, Chun-Yuan Lin, and Der-Chyuan Lou, ¡§Efficient parallel RSA decryption algorithm for many-core GPUs with CUDA,¡¨ Proceedings of 2012 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012), American Telecommunications Systems Management Association, Czech Technical University, Prague, Czech Republic, May 24~26, 2012.

78           *Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§Active steganalysis of reversible data hiding: estimation of parameters,¡¨ Proceedings of the 22nd National Conference on Information Security, National Chung Hsing University, Taichung, Taiwan, R.O.C., May 30-31, 2012.  (½×¤å±Ä¥úºÐ¡A¥¼½s­¶½X)

79           *Der-Chyuan Lou, Sheng-Chih Ho, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§´Ó°ò©ó°ÊºAªùÂe­È»PÂñK»Ý¨D¤§¾AÀ³©ÊÂñK§Þ³N,¡¨ in Chinese, Proceedings of the 22nd National Conference on Information Security, National Chung Hsing University, Taichung, Taiwan, R.O.C., May 30-31, 2012.  (½×¤å±Ä¥úºÐ¡A¥¼½s­¶½X)

80           *Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, ¡§An active steganalysis of reversible data hiding: estimating key parameters,¡¨ Proceedings of the International Symposium on Computer, Consumer and Control (IS3C 2012), IEEE, Taichung, Taiwan, R.O.C., June 04~06, 2012.  (½×¤å±Ä¥úºÐ¡A¥¼½s­¶½X)  F[ EI ]

81           *¥ª»¨©x¡B°ú¼wÅv¡A¡§¸ê°TÁôÂç޳N¤§±´°Q¡¨¡A2012¼Æ¦ì»P¬ì§Þ¥Í¬¡³Ð·sÀ³¥Î¾Ç³N¬ã°Q·|¡A®ç¶é³Ð·s§Þ³N¾Ç°|¸ê¤u¨t¡A¤¤Ãc¡A¥xÆW¡A2012¦~06¤ë21¤é¡C  (½×¤å±Ä¥úºÐ¡A¥¼½s­¶½X)

82           Kai-Ping Wang, *Chiang-Lung Liu, and Der-Chyuan Lou, ¡§Expansion-free grayscale image sharing using meaningful share images,¡¨ Proceedings of the 2nd International Conference on Engineering and Technology Innovation 2012 (ICETI 2012), Kaohsiung, Taiwan, R.O.C., Nov. 02~06, 2012, pp. 324.  (½×¤å±Ä¥úºÐ¡A¥¼½s­¶½X)

83           *Kuang-Shyr Wu, Der-Chyuan Lou, Wei-Kuei Chen, and Chien-Ping Chang, ¡§Novel approach for color secret image sharing,¡¨ Proceedings of the 23rd National Conference on Information Security, Southern Taiwan University of Science and Technolog, Tainan, Taiwan, R.O.C., May 23-24, 2013, pp. 115-122.  (in Chinese

84           *Jen-Chun Lee, Chien-Ping Chang, Kuang-Shyr Wu, and Der-Chyuan Lou, ¡§Efficient palm vein recognition approach for biometrics-based identification systems,¡¨ Proceedings of the 23rd National Conference on Information Security, Southern Taiwan University of Science and Technolog, Tainan, Taiwan, R.O.C., May 23-24, 2013, pp. 123-128.

 

¾Ç³N¬¡°Ê

A.¾á¥ô½s¿è©e­û

01           ÀòÁܾá¥ô¤¤µØ¥Á°ê¸ê°T¦w¥þ¾Ç·|¡iCCISA¡FChinese Cryptology and Information Security Association¡j¡i¸ê°T¦w¥þ³q°T¡j¥Xª©©e­û·|½s¿è©e­û¡A2003¦~09¤ë¦Ü2006¦~08¤ë¡B2006¦~09¤ë¦Ü2009¦~08¤ë¡C

02           Àò°ê»Ú´Á¥Z¡iJournal of Systems and Software¡XSCI, EI¡j¥D½s(Editor-in-Chief)ÁܽСA¾á¥ô¸Ó´Á¥Z¡u¦w¥þ§Þ³N»â°ì¥D½s¡v(Area Editor for Security Technology)¡A2003¦~07¤ë¨´¤µ¡C

04           ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|(http://www.csroc.org.tw/)¡i¹q¸£¾Ç¥Z¡XJournal of Computers¡j½s¿è©e­û·|©e­û(Associate Editor)¡A(¹q)¸u¦w¦r²Ä20¸¹¡A2006¦~03¤ë¨´¤µ¡C

05           ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|(http://www.csroc.org.tw/)¡i¹q¸£¾Ç¥Z¡XJournal of Computers¡j¡uºô¸ô¦w¥þ¯S¥Z¡v«È®y¥D½s¡]Guest Editor¡^¡A2008¦~01¤ë¥X¥Z¡C

06           Àò°ê»Ú´Á¥Z¡iInternational Journal of Digital Crime and Forensics¡j¥D½sÁܽСA¾á¥ô¸Ó´Á¥Z½s¿è©e­û(Associate Editor)¡A2008¦~01¤ë¨´¤µ¡C  http://www.igi-global.com/journals/details.asp?id=7828

07           ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|(http://www.csroc.org.tw/)¡i¹q¸£¾Ç¥Z¡XJournal of Computers¡j¡u¼Æ¦ìª©ÅvºÞ²z¯S¥Z¡v«È®y¥D½s¡]Guest Editor¡^¡A2009¦~04¤ë¥X¥Z¡C

08           Àò°ê»Ú´Á¥Z¡iJournal of Information Hiding and Multimedia Signal Processing¡XJIH-MSP¡jÁܽСA¾á¥ô¸Ó´Á¥Z½s¿è©e­û(Associate Editor)¡A2009¦~01¤ë¨´¤µ¡C  http://www.jihmsp.org/

09           ÀòÁܾá¥ô¡i°]¹Îªk¤H°ªµ¥±Ð¨|µûŲ¤¤¤ß¡j99¦~«×¤j¾Ç®Õ°|®Õ°ÈµûŲ©e­û¡A2010¦~01¤ë¦Ü2010¦~12¤ë¡C

10           ÀòÁܾá¥ô¡i²Ä¤E©¡©ô§»¬ì¾Ç¼ú¡j¸ê°TÃþµû¼f©e­û¡A2010¦~05¤ë¦Ü12¤ë¡C

11           Àò°ê»Ú´Á¥Z¡iISRN Signal Processing¡jÁܽСA¾á¥ô¸Ó´Á¥Z½s¿è©e­û(Editor)¡A2010¦~09¤ë¨´¤µ¡C  http://www.hindawi.com/isrn/sp/

12           ÀòÁܾá¥ô¡i°]¹Îªk¤H°ªµ¥±Ð¨|µûŲ¤¤¤ß¡j100¦~«×¤j¾Ç®Õ°|®Õ°ÈµûŲ©e­û¡A2011¦~01¤ë¦Ü2011¦~12¤ë¡C

13           ÀòÁܾá¥ô¡iªk°ê¼Ð·Ç¨ó·|¨È¤Ó°ÏÁ`³¡¡X¦ãªk¿Õ¡]AFNOR¡^°ê»ÚªÑ¥÷¦³­­¤½¥q¡jISMS¡]Information Security Management System¡^¸ê°T¦w¥þºÞ²z¨t²Î±ÂÃҺʷþ©e­û¡A2011¦~08¤ë¦Ü2014¦~07¤ë¡C

14           Àò°ê»Ú´Á¥Z¡iSecurity and Communication Networks¡]Wiley¡^¡XSCI¡jÁܽСA¾á¥ô¸Ó´Á¥Z«È®y½s¿è©e­û(Guest Editor)¡XSpecial Issue on Applied Cryptography for Information and Communication Networks¡A2011¦~11¤ë¡C

 

B.¾á¥ô¼f½Z©e­û

01           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iAdvances in Engineering Software¡j½×¤å¼f¬d©e­û¡A2008¦~11¤ë¡C

02           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iAdvances in Multimedia¡j½×¤å¼f¬d©e­û¡A2011¦~12¤ë¡C

03           ÀòÁܾá¥ô¤¤µØ¥Á°ê¸ê°T¦w¥þ¾Ç·|¡iCCISA¡FChinese Cryptology and Information Security Association¡j¥Xª©¤§¥Zª«¡i¸ê°T¦w¥þ³q°T¡j½×¤å¼f¬d©e­û¡A2003¦~12¤ë¡B2004¦~02¤ë¡B2005¦~03¤ë¡C

04           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iCircuits, Systems and Signal Processing¡j½×¤å¼f¬d©e­û¡A2007¦~11¤ë¡B2008¦~03¤ë¡B2008¦~04¤ë¡B2009¦~11¤ë¡C

05           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iComputers and Electrical Engineering Journal¡j½×¤å¼f¬d©e­û¡A2006¦~11¤ë¡B2008¦~07¤ë(¨â½g)¡C

06           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iComputer Journal¡j½×¤å¼f¬d©e­û¡A2010¦~03¤ë¡B2010¦~09¤ë¡C

07           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iComputer Standards & Interfaces¡j½×¤å¼f¬d©e­û¡A2004¦~07¤ë¡B2007¦~06¤ë¡B2008¦~02¤ë¡B2009¦~03¤ë¡B2011¦~04¤ë¡B2011¦~08¤ë¡C

08           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iDigital Signal Processing¡j½×¤å¼f¬d©e­û¡A2012¦~02¤ë¡B2012¦~12¤ë¡C

09           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iDisplays¡j½×¤å¼f¬d©e­û¡A2012¦~06¤ë¡B2013¦~02¤ë¡B2013¦~03¤ë¡B2013¦~04¤ë¡C

10           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEE Electronics Letters¡j½×¤å¼f¬d©e­û¡A2006¦~10¤ë¡C

11           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEE Proceedings¡XCommunications¡j½×¤å¼f¬d©e­û¡A2005¦~01¤ë¡B2005¦~03¤ë¡B2005¦~10¤ë¡C

12           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEE Proceedings¡XVision, Image & Signal Processing¡j½×¤å¼f¬d©e­û¡A2006¦~05¤ë¡B2006¦~06¤ë¡B2006¦~11¤ë(¨â½g)¡C

13           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIET Communications¡j½×¤å¼f¬d©e­û¡A2007¦~01¤ë¡C(The Institution of Electrical Engineers (IEE) and Institution of Incorporated Engineers (IIE) to form the Institution of Engineering and Technology (IET))

14           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Communications Letters¡j½×¤å¼f¬d©e­û¡A2004¦~09¤ë¡B2008¦~11¤ë¡C

15           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Circuits and Systems-Part II¡j½×¤å¼f¬d©e­û¡A2008¦~10¤ë¡C

16           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Computers¡j½×¤å¼f¬d©e­û¡A2005¦~12¤ë¡B2006¦~02¤ë¡C

17           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Dependable and Secure Computing¡j½×¤å¼f¬d©e­û¡A2008¦~12¤ë¡C

18           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Image Processing¡j½×¤å¼f¬d©e­û¡A2008¦~12¤ë¡B2012¦~04¤ë¡C

19           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Information Forensics and Security¡j½×¤å¼f¬d©e­û¡A2006¦~04¤ë¡C

20           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Information Technology in Biomedicine¡j½×¤å¼f¬d©e­û¡A2007¦~08¤ë¡C

21           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Knowledge and Data Engineering¡j½×¤å¼f¬d©e­û¡A2006¦~07¤ë¡C

22           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Multimedia¡j½×¤å¼f¬d©e­û¡A2002¦~03¤ë¡B2002¦~10¤ë¡B2003¦~09¤ë¡B2003¦~10¤ë¡B2004¦~05¤ë¡B2004¦~09¤ë¡B2004¦~12¤ë¡B2005¦~02¤ë¡B2005¦~03¤ë(¤T½g)¡B2005¦~05¤ë¡B2005¦~10¤ë¡B2005¦~12¤ë¡B2006¦~02¤ë¡B2006¦~06¤ë¡B2006¦~07¤ë¡B2007¦~11¤ë¡B2008¦~02¤ë¡B2008¦~03¤ë¡C

23           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Transactions on Very Large Scale Integration Systems¡j½×¤å¼f¬d©e­û¡A2006¦~08¤ë¡B2010¦~12¤ë¡C

24           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iIEEE Security & Privacy¡j½×¤å¼f¬d©e­û¡A2004¦~08¤ë¡B2013¦~02¤ë¡C

25           ÀòÁܾá¥ô¡iIEEE Signal Processing Letters¡j½×¤å¼f¬d©e­û¡A2007¦~06¤ë10¤é¡C

26           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iImaging Science Journal¡j½×¤å¼f¬d©e­û¡A2002¦~02¤ë¡B2002¦~07¤ë¡B2002¦~10¤ë¡B2002¦~12¤ë¡B2003¦~04¤ë¡B2003¦~11¤ë¡B2004¦~01¤ë¡B2004¦~10¤ë¡B2005¦~01¤ë¡B2005¦~02¤ë¡B2005¦~11¤ë¡B2006¦~04¤ë¡B2006¦~08¤ë¡B2009¦~04¤ë¡B2009¦~09¤ë¡B2010¦~04¤ë¡B2011¦~05¤ë¡C

27           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iImage and Vision Computing¡j½×¤å¼f¬d©e­û¡A2006¦~02¤ë¡B2008¦~12¤ë¡C

28           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInformatica¡j½×¤å¼f¬d©e­û¡A2005¦~10¤ë¡B2006¦~02¤ë¡C

29           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInformation Sciences¡j½×¤å¼f¬d©e­û¡A1999¦~11¤ë¡B2001¦~03¤ë¡B2006¦~08¤ë¡B2007¦~05¤ë¡B2007¦~07¤ë¡B2008¦~12¤ë¡B2009¦~02¤ë¡B2009¦~06¤ë(¨â½g)¡B2009¦~07¤ë(¨â½g)¡B2009¦~11¤ë(¨â½g)¡B2010¦~01¤ë¡B2010¦~04¤ë¡B2010¦~08¤ë(¨â½g)¡B2011¦~08¤ë¡B2011¦~11¤ë(¨â½g)¡B2011¦~12¤ë¡B2013¦~02¤ë¡B2013¦~05¤ë¡C

30           ÀòÁܾá¥ô¡iInformation Technology And Control¡j½×¤å¼f¬d©e­û¡A2013¦~03¤ë17¤é¡C

31           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Communication Systems¡j½×¤å¼f¬d©e­û¡A2012¦~03¤ë¡B2012¦~10¤ë¡B2013¦~01¤ë¡B2013¦~02¤ë¡C

32           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Computer Mathematics¡j½×¤å¼f¬d©e­û¡A2006¦~02¤ë¡B2009¦~11¤ë¡B2012¦~11¤ë¡B2012¦~12¤ë¡B2013¦~04¤ë¡B2013¦~05¤ë¡C

33           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Computers and Applications¡j½×¤å¼f¬d©e­û¡A2008¦~12¤ë¡C

34           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Image and Graphics¡j½×¤å¼f¬d©e­û¡A2013¦~01¤ë¡C

35           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Information and Computer Security¡j½×¤å¼f¬d©e­û¡A2009¦~03¤ë¡B2009¦~09¤ë¡B2010¦~03¤ë¡B2010¦~04¤ë¡B2010¦~06¤ë¡B2010¦~07¤ë¡B2010¦~08¤ë¡B2011¦~10¤ë¡B2012¦~03¤ë¡B2013¦~01¤ë¡C

36           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Information Security¡j½×¤å¼f¬d©e­û¡A2007¦~11¤ë¡B2008¦~04¤ë¡C

37           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Intellectual Property Management¡j½×¤å¼f¬d©e­û¡A2007¦~03¤ë¡C

38           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Multimedia Intelligence and Security¡j½×¤å¼f¬d©e­û¡A2009¦~12¤ë¡C

39           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iInternational Journal of Pattern Recognition and Artificial Intelligence¡j½×¤å¼f¬d©e­û¡A2007¦~07¤ë12¤é¡B2007¦~08¤ë04¤é¡B2007¦~10¤ë06¤é¡C

40           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iISRN Signal Processing¡j½×¤å¼f¬d©e­û¡A2010¦~11¤ë¡B2010¦~12¤ë¡B2011¦~03¤ë¡B2011¦~11¤ë¡B2012¦~03¤ë(¨â½g)¡B2012¦~04¤ë(¤T½g)¡B2012¦~05¤ë¡B2012¦~11¤ë¡B2012¦~12¤ë¡C

41           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of the Chinese Institute of Engineers¡j½×¤å¼f¬d©e­û¡A2005¦~11¤ë¡B2009¦~09¤ë¡B2009¦~11¤ë¡B2009¦~12¤ë¡B2010¦~04¤ë¡B2010¦~07¤ë¡B2011¦~02¤ë¡B2011¦~06¤ë¡B2011¦~08¤ë¡B2012¦~02¤ë¡B2012¦~12¤ë¡B2013¦~02¤ë¡C

42           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Computers¡j½×¤å¼f¬d©e­û¡A2011¦~01¤ë¡B

43           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Engineering and Computer Innovation¡j½×¤å¼f¬d©e­û¡A2008¦~04¤ë¡B2008¦~09¤ë¡B2009¦~12¤ë¡B2010¦~11¤ë¡C

44           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Electromagnetic Waves and Applications¡j½×¤å¼f¬d©e­û¡A2008¦~11¤ë¡C

45           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Electronic Imaging¡j½×¤å¼f¬d©e­û¡A2010¦~12¤ë¡B2013¦~04¤ë¡C

46           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Information Science and Engineering¡j½×¤å¼f¬d©e­û¡A1999¦~04¤ë¡B1999¦~06¤ë¡B2004¦~04¤ë¡B2005¦~04¤ë¡B2005¦~05¤ë¡B2005¦~07¤ë¡B2005¦~10¤ë¡B2006¦~04¤ë¡B2006¦~10¤ë¡B2007¦~02¤ë¡B2008¦~10¤ë¡B2009¦~09¤ë¡C

47           ÀòÁܾá¥ô´Á¥Z¡iJournal of Internet Technology¡j½×¤å¼f¬d©e­û¡A2007¦~07¤ë¡B2007¦~10¤ë¡B2009¦~07¤ë¡C

48           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Medical Systems¡j½×¤å¼f¬d©e­û¡A2011¦~06¤ë¡B2012¦~09¤ë¡B2012¦~11¤ë¡B2012¦~12¤ë¡C

49           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Organizational Computing and Electronic Commerce¡j½×¤å¼f¬d©e­û¡A2004¦~10¤ë¡B2005¦~12¤ë¡C

50           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Systems and Software¡j½×¤å¼f¬d©e­û¡A2000¦~01¤ë¡B2000¦~09¤ë¡B2000¦~12¤ë¡B2001¦~07¤ë¡B2001¦~11¤ë¡B2002¦~01¤ë¡B2002¦~08¤ë¡B2002¦~10¤ë¡C

51           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iJournal of Zhejiang University¡XScience A¡j½×¤å¼f¬d©e­û¡A2008¦~07¤ë¡B2009¦~01¤ë¡C

52           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iKSII Transactions on Internet and Information Systems¡j½×¤å¼f¬d©e­û¡A2012¦~11¤ë¡B2012¦~12¤ë¡C

53           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iMathematical and Computer Modelling¡j½×¤å¼f¬d©e­û¡A2008¦~01¤ë¡C

54           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iMultimedia Tools and Applications¡j½×¤å¼f¬d©e­û¡A2008¦~08¤ë¡C

55           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iNonlinear Dynamics¡j½×¤å¼f¬d©e­û¡A2012¦~11¤ë¡C

56           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iOptical Engineering¡j½×¤å¼f¬d©e­û¡A2000¦~10¤ë¡B2002¦~10¤ë¡B2005¦~12¤ë¡B2006¦~11¤ë¡B2007¦~12¤ë¡B2008¦~03¤ë¡B2009¦~05¤ë¡B2009¦~08¤ë¡B2010¦~12¤ë¡B2011¦~02¤ë¡B2011¦~06¤ë¡B2011¦~07¤ë¡B2012¦~04¤ë¡C

57           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iPhysics Letters A¡j½×¤å¼f¬d©e­û¡A2007¦~02¤ë¡C

58           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iSignal Processing¡j½×¤å¼f¬d©e­û¡A2010¦~03¤ë¡B2010¦~10¤ë¡B2011¦~03¤ë¡B2011¦~09¤ë¡B2011¦~12¤ë¡C

59           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iSecurity and Communication Networks¡j½×¤å¼f¬d©e­û¡A2012¦~03¤ë¡C

60           ÀòÁܾá¥ô°ê»Ú´Á¥Z¡iTelecommunication Systems Journal¡j½×¤å¼f¬d©e­û¡A2010¦~05¤ë¡C

61           ÀòÁܾá¥ô¬ü©M§Þ³N¾Ç°|¡i¬ü©M¾Ç³ø¡j½×¤å¼f¬d©e­û¡A2006¦~11¤ë¡B2008¦~04¤ë¡C

62           ÀòÁܾá¥ôªÅ­x¡i¯èªÅ§Þ³N¾Ç°|¾Ç³ø(Journal of Air Force Institute of Technology)¡j½×¤å¼f¬d©e­û¡A2008¦~04¤ë(¤T½g)¡B2010¦~03¤ë(¤G½g)¡B2011¦~03¤ë(¤G½g)¡C

63           ÀòÁܾá¥ô¤¤µØ¥Á°ê¹q¸£¾Ç·|¡iJournal of Computer¡X¹q¸£¾Ç¥Z¡j½×¤å¼f¬d©e­û¡A2006¦~03¤ë¡B2009¦~12¤ë¡B2010¦~08¤ë¡B2011¦~09¤ë(¤G½g)¡C

 

C.¾á¥ôijµ{©e­û

01           ÀòÁܾá¥ô¡i²Ä¤K©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤Î¤À³õ·|ij¥D«ù¤H¡A°ª¶¯¡A°ê¥ß¤¤¤s¤j¾Ç¡A1998¦~05¤ë¡C

02           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i1998 International Computer Symposium (ICS 1998) ¢w1998°ê»Ú­pºâ¾÷·|ij¡j½×¤å¼f¬d©e­û¡A1998¦~09¤ë¡C

03           ÀòÁܾá¥ô¡i²Ä¤E©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤Î¤À³õ·|ij¥D«ù¤H¡A¥x¤¤¡A´Â¶§¬ì§Þ¤j¾Ç¡A1999¦~05¤ë¡C

04           ÀòÁܾá¥ô¡i¤¤µØ¥Á°ê²Ä¤K©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j½×¤å¼f¬d©e­û¤Î¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A¤¤¥¿²z¤u¾Ç°|¡A1999¦~11¤ë¡C

05           ÀòÁܾá¥ô¡i²Ä¤Q©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¤Î½×¤å¼f¬d©e­û¡Aªá½¬¡A°ê¥ßªFµØ¤j¾Ç¡A2000¦~05¤ë¡C

06           ÀòÁܾá¥ô¡i2000¦~°ê»Ú­pºâ¾÷·|ij¢w2000 International Computer Symposium (ICS2000)¡jijµ{©e­û¤Î½×¤å¼f¬d©e­û¡A¹Å¸q¡A°ê¥ß¤¤¥¿¤j¾Ç¡A2000¦~12¤ë¡C

07           ÀòÁܾá¥ô¡i²Ä¤Q¤@©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¤Î½×¤å¼f¬d©e­û¡A¥x«n¡A°ê¥ß¦¨¥\¤j¾Ç¡A2001¦~5¤ë¡C

08           ÀòÁܾá¥ô¡i¤¤µØ¥Á°ê²Ä¤Q©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j½×¤å²Õ¥l¶°¤H¡B½×¤å¼f¬d©e­û¡B¤Î¤À³õ·|ij¥D«ù¤H¡A¥x¥_¡AºÖµØ°ê»Ú¤å±Ð·|À]¡A2001¦~11¤ë¡C

09           ÀòÁܾá¥ô¡i²Ä¤Q¤G©¡¥þ°ê¸ê°T¦w¥þ·|ij¡j½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A¥x¤¤¡A°·±dº[ºÞ²z¾Ç°|¡A2002¦~05¤ë¡C

10           ÀòÁܾá¥ô¡i²Ä¤Q¤T©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j°õ¦æ©e­û¤Î¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A¥xÆW¡A2004¦~10¤ë¡C

11           ÀòÁܾá¥ô¡i²Ä¤Q¤»©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡B¤Î³Ì¨Î½×¤å¼úµû¼f©e­û¡A¥x¤¤¡A³{¥Ò¤j¾Ç¡A2006¦~05¤ë¡C

12           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 07)¡jijµ{©e­û(Program Committee)¡AIEEE¡AKaohsiung¡ATaiwan¡A2007¦~11¤ë26¤é¦Ü28¤é¡C

13           ÀòÁܾá¥ô¡i³°­x©x®Õ¤K¤Q¤T¶g¦~®Õ¼y°ò¦¾Ç³N¬ã°Q·|¡j¤À³õ·|ij¥D«ù¤H¡A»ñ¤s¡A°ª¶¯¡A³°­x­x©x¾Ç®Õ¡A2007/06/01¡C

14           ÀòÁܾá¥ô¡i²Ä¤Q¤C©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A¹Å¸q¡A¹Å¸q¤j¾Ç¡A2007¦~06¤ë07¤é¦Ü08¤é¡C

15           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iICC'08¡XInformation and Network Security Symposium¡j½×¤å¼f¬d©e­û¡A2007¦~10¤ë¡C

16           ÀòÁܾá¥ô¡i²Ä¤Q¤K©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡Aªá½¬¡AªFµØ¤j¾Ç¡A2008¦~05¤ë29¤é¦Ü30¤é¡C

17           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 08)¡Xhttp://bit.kuas.edu.tw/~iihmsp08/¡jijµ{©e­û(Program Committee)¡AIEEE¡AHarbin¡AChina¡A2008¦~08¤ë15¤é¦Ü17¤é¡C

18           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Eighth International Conference on Intelligent Systems Design and Applications (ISDA '08)¡Xhttp://bit.kuas.edu.tw/~isda08/¡jijµ{©e­û(Program Committee)¤Î¤À³õ·|ij¥D«ù¤H¡AKaohsiung¡ATaiwan¡A2008¦~11¤ë26¤é¦Ü28¤é¡C

19           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS'08)¡Xhttp://mpis08.ialab.cs.pu.edu.tw/mpis08/)¡j°Ï°ì¥D®u(Local Chair)¡Bijµ{©e­û(Program Committee)¡AIEEE¡AJiaosi¡AYilan¡ATaiwan¡A2008¦~12¤ë09¤é¦Ü10¤é¡C(in conjunction with the 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008, http://apscc2008.csie.chu.edu.tw/))

20           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Future Generation Communication and Networking (FGCN 2008)¡Xhttp://www.sersc.org/FGCN2008/¡jijµ{©e­û(Program Committee)¤Î¼f½Z©e­û(¤­½g)¡AIEEE¡AHainan Island¡AChina¡A2008¦~12¤ë13¤é¦Ü15¤é¡C

21           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Seond International Workshop on Forensics for Future Generation Communication Environments (F2GC-08)¡Xhttp://www.sersc.org/F2GC2008/¡jijµ{©e­û(Program Committee)¤Î¼f½Z©e­û(¤@½g)¡AIEEE¡AHainan Island¡AChina¡A2008¦~12¤ë13¤é¦Ü15¤é¡C

22           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (E-Forensics 2009)¡Xhttp://www.e-forensics.eu/¡jijµ{©e­û(Program Committee)¤Î¼f½Z©e­û(¤T½g)¡AIEEE¡AAdelaide¡AAustralia¡A2009¦~01¤ë19¤é¦Ü21¤é¡C

23           ÀòÁܾá¥ô¡i²Ä¤Q¤E©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A¥x¥_¡A¥xÆW¬ì§Þ¤j¾Ç¡A2009¦~06¤ë04¤é¦Ü05¤é¡C

24           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 09)¡Xhttp://bit.kuas.edu.tw/~iihmsp09/¡jijµ{©e­û(Program Committee)¡AIEEE¡AKyoto¡AJapan¡A2009¦~09¤ë12¤é¦Ü14¤é¡C                            F[ EI ]

25           ÀòÁܾá¥ô¡i2009¥Á¥Í¹q¤l¬ã°Q·|¡]WCE2009¡^¡Xhttp://wce2009.ncut.edu.tw/¡j¿Ôij©e­û¡B½×¤å¼f¬d©e­û¡A¥x¤¤¡A°ê¥ß¶Ô¯q¬ì§Þ¤j¾Ç¡A2009¦~11¤ë06¤é¡C

26           ÀòÁܾá¥ô¡i²Ä¤Q¤K©¡°ê¨¾¬ì§Þ¾Ç³N¬ã°Q·|¡j¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A¥xÆW¡A2009¦~11¤ë¡C

27           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009)¡Xhttp://www.ftrg.org/MPIS2009¡j«ü¾Éijµ{©e­û(Steering Committee Member)¡AJiju¡AKorea¡A2009¦~12¤ë10¤é¦Ü12¤é¡C

28           ÀòÁܾá¥ô¡i¤E¤Q¤K¦~¥þ°ê­pºâ¾÷·|ij¡XNational Computer Symposium (NCS 2009)¡Xhttp://ncs2009.ntpu.edu.tw/CI/CI.htm¡jCryptography and Information Security Workshopijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A¥x¥_¡A°ê¥ß¥x¥_¤j¾Ç¡A2009¦~12¤ë10¤é~12¤é¡C

29           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 5th International Conference on Future Information Technology (FutureTech 2010)¡Xhttp://www.ftrg.org/futuretech2010¡XTrack 6. Multimedia Convergence¡jijµ{©e­û(Program Committee)¡ABusan¡AKorea¡A2010¦~05¤ë21¤é¦Ü23¤é¡C

30           ÀòÁܾá¥ô¡i²Ä¤G¤Q©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A·s¦Ë¡A¥æ³q¤j¾Ç¡A2010¦~05¤ë27¤é¦Ü28¤é¡C

31           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iIEEE International Workshop on Computer Forensics In Software Engineering (CFSE 2010)¡BIn conjunction with 34th Annual International Computer Software and Applications Conference (COMPSAC 2010)¡Xhttp://conferences.computer.org/compsac/2009/workshops/CFSE2009CFP.htm¡jijµ{©e­û(Program Committee)¡AIEEE¡ASeoul¡ASouth Korea¡A2010¦~07¤ë19¤é¦Ü23¤é¡C

32           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 10)¡Xhttp://bit.kuas.edu.tw/~iihmsp10/¡jijµ{©e­û(Program Committee)¡AIEEE¡ADarmstadt¡AGermany¡A2010¦~10¤ë15¤é¦Ü17¤é¡CF[ EI ]

33           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Multimedia Information Networking and Security (MINES 2010)¡Xhttp://www.ieee-mines.org¡jijµ{©e­û(Technical Program Committee)¡AIEEE¡ANanjing¡AChina¡A2010¦~11¤ë04¤é¦Ü06¤é¡C

34           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 2011 International Conference on Advanced Software Engineering (ICASE-11), co-sponsored by FTRA and IEEE Changwon Section¡Xhttp://www.ftrai.org/icase2011¡j¥Xª©©e­û·|°Æ¥D®u(Publicity Co-Chair)¡ABusan¡AKorea,¡A2011¦~05¤ë26¤é¦Ü28¤é¡C

35           ÀòÁܾá¥ô¡i²Ä¤G¤Q¤@©¡¥þ°ê¸ê°T¦w¥þ·|ij¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡A¶³ªL¡A°ê¥ßªê§À¬ì§Þ¤j¾Ç¡A2011¦~05¤ë26¤é¦Ü27¤é¡C

36           ÀòÁܾá¥ô¡i2011 Conference on Network and Information Security (NIS 2011)¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A®ç¶é¡A²M¶³¬ì§Þ¤j¾Ç¡A2011¦~06¤ë10¤é¡C

37           ÀòÁܾá¥ô¡i»OÆWºô»Úºô¸ô¬ã°Q·| (TANET 2011; Taiwan Academic Network 2011)¡Xhttp://tanet2011.niu.edu.tw/¡j¸ê³q°T¦w¥þ§Þ³N»PºÞ²z»â°ì¼f½Z¥l¶°¤H¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A©yÄõ¡A°ê¥ß©yÄõ¤j¾Ç¡A2011¦~10¤ë24¤é¦Ü26¤é¡C

38           ÀòÁܾá¥ô¡i2011¦~¥Á¥Í¹q¤l¬ã°Q·|(WCE 2011)¡Xhttp://im.ntit.edu.tw/wce2011/index.html¡j¤À³õ·|ij¥D«ù¤H¡A°ê¥ß¥x¤¤§Þ³N¾Ç°|¡A¥x¤¤¡A¥xÆW¡A2011¦~11¤ë11¤é¡C

39           ÀòÁܾá¥ô¡i¤@¦Ê¦~¥þ°ê­pºâ¾÷·|ij¡XNational Computer Symposium (NCS 2011)¡Xhttp://NCS2011.ncyu.edu.tw¡jCryptography and Information Security Workshopijµ{©e­û¡B³Ì¨Î½×¤å¤Î³Ì¨Î¾Ç¥Í½×¤åµû¼f©e­û¡A¹Å¸q¡A°ê¥ß¹Å¸q¤j¾Ç¡A2011¦~12¤ë02¤é¦Ü03¤é¡C

40           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iInternational Workshop on Information Science and Education Technology¡]IET«H®§¬ì¾Ç©M±Ð¨|§Þ³N°ê»Ú¬ã°Q·|¡^(WISET 2012)¡Xhttp://www.acaiconf.org/iset/¡jijµ{©e­û(Program Committee)¡AXiamen¡AFujian¡AChina¡A2012¦~03¤ë24¤é¦Ü26¤é¡C

41           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe Second International Conference on Consumer Electronics, Communications and Networks (CECNet 2012)¡Xhttp://www.cecnetconf.org/2012¡j§Þ³Nijµ{©e­û(Technical Program Committee)¡AIEEE¡AShanxi¡AChina¡A2012¦~04¤ë21¤é¦Ü23¤é¡C  ¡]IEEE®ø¶O¹q¤l¨ó·|¥D¿ì¡A¤j³°´ò¥_¬Ù«w¹ç¾Ç°|©Ó¿ì¡AEI¦¬¿ý¡^

42           ÀòÁܾá¥ô¡i²Ä¤G¤Q¤G©¡¥þ°ê¸ê°T¦w¥þ·|ij¡Xhttp://cisc2012.cs.nchu.edu.tw¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡A¥x¤¤¡A°ê¥ß¤¤¿³¤j¾Ç¡A2012¦~05¤ë30¤é¦Ü31¤é¡C

43           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i2012 International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012)¡Xhttp://voyager.ce.fit.ac.jp/conf/imis/2012/¡j§Þ³Nijµ{©e­û(Technical Program Committee)¡ASanpaolo Palace Hotel¡AItaly¡A2012¦~07¤ë04¤é¦Ü06¤é¡C

44           ÀòÁܾá¥ô¡iThe 17th Mobile Computing Workshop (MC-2012)º[°ê¬ì·|行°Ê­pºâ­pµe¬ã¨s¦¨ªGµoªí·|)¡Xhttp://mc2012.cgu.edu.tw/)¡jijµ{©e­û¡A¤jªO®Ú´ËªL·Å¬u´ç°²§ø¡A·s¥_¥«¡A¥xÆW¡A2012¦~08¤ë29¤é¦Ü30¤é¡C

45           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 5th FTRA International Conference on Human-centirc Computing (HumanCom 2012)¡Xhttp://www.ftrai.org/humancom2012/)¡jijµ{©e­û(Program Committee)¡AGwangju¡AKorea¡A2012¦~09¤ë06¤é¦Ü08¤é¡C

46           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 15th International Conference on Network-Based Information Systems (NBiS-2012): Web and Internet Applications¡X http://133.220.110.102/conf/nbis/2012/index.html¡jijµ{©e­û(Program Committee)¡AMelbourne¡AAustralia¡A2012¦~09¤ë26¤é¦Ü28¤é¡C

47           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i2012 6th International Conference on Network and System Security (NSS 2012)¡Xhttp://www.anss.org.au/nss2012/¡jijµ{©e­û(Program Committee)¡AWu Yi Shan¡AFujian¡AChina¡A2012¦~11¤ë21¤é¦Ü23¤é¡C

48           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡i2012 International Computer Symposium (ICS 2012) (Workshop on Cryptography and Information Security in conjunction)¡Xhttp://ics2012.ndhu.edu.tw/workshop.php#5¡jijµ{©e­û(Program Committee) ¤Î½×¤å¼f¬d©e­û(2½g)¡AHualien¡ATaiwan¡AR.O.C.¡A2012¦~12¤ë12¤é¦Ü14¤é¡C

49           ÀòÁܾá¥ô¡i²Ä¤G¤Q¤T©¡¥þ°ê¸ê°T¦w¥þ·|ij¡Xhttp://cisc2013.csie.stust.edu.tw/¡jijµ{©e­û¡B½×¤å¼f¬d©e­û¡B¤À³õ·|ij¥D«ù¤H¡A¥x«n¡A«n¥x¬ì§Þ¤j¾Ç¡A2013¦~05¤ë23¤é¦Ü24¤é¡C

50           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 7th International Conference on Network and System Security (NSS 2013)¡Xhttp://anss.org.au/nss2013/¡jijµ{©e­û(Program Committee)¤Î½×¤å¼f¬d©e­û(5½g)¡AMadrid¡ASpain¡A2013¦~06¤ë03¤é¦Ü04¤é¡C

51           ÀòÁܾá¥ô¡iThe 18th Mobile Computing Workshop (MC-2013)º[°ê¬ì·|行°Ê­pºâ­pµe¬ã¨s¦¨ªGµoªí·|)¡Xhttp://nol.cs.nctu.edu.tw/MC2013)¡jijµ{©e­û¡A¦è´ò´ç°²§ø¡A­]®ß¡A¥xÆW¡A2013¦~08¤ë27¤é¦Ü28¤é¡C

52           ÀòÁܾá¥ô°ê»Ú¬ã°Q·|¡iThe 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2014)¡Xhttp://www.modelsward.org/¡jijµ{©e­û(Program Committee)¡ALisbon¡APortugal¡A2014¦~01¤ë07¤é¦Ü09¤é¡C

 

ºaÅA¨Æ¶µ

01           ºaÀò¡iMarquis¥@¬É¦W¤H¿ý(Who,s Who in the World)¡j¥D°ÊÁܽСA¼f¬d¨Ã¥Zµn­Ó¤H¨ÆÂÝ©ó²Ä15ª©(1997¦~¡B²Ä845­¶)¥@¬É¦W¤H¿ý¤¤¡C

02           ³Õ¤h½×¤åºaÀò§»ùÖ°òª÷·|²Ä11©¡¡iÀsÄ˽פå¼ú¡j¡A¨ÃÀòÁÜ¥[¤J¡iÀsÄË·|¡j¡A1997¡C

03           Àò¿ï¡i°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|¤E¤Q¦~«×Àu¨}±Ð®v¡j¡A2001¦~09¤ë¡C

04           Àò¿ï¡i°ê¨¾¤j¾Ç¤¤¥¿²z¤u¾Ç°|¤E¤Q¥|¦~«×Àu¨}±Ð®v¡j¡A2005¦~07¤ë01¤é¡A¤¤¥¿²z¤u¾Ç°|¶°³«¦r²Ä0940002459¸¹¥O¡C

05           Àò¿ï¡i°ê¨¾³¡¤E¤Q¥|¦~«×Àu¨}±Ð®v¡j¡A2005¦~09¤ë28¤é¡A°ê¨¾³¡¿ï¹D¦r²Ä940012802¸¹¼úª¬¡C

06           Àò¦Û¥Ñ®É³ø°OªÌ°K¥@©¾ÁܽСA³X½Í»P¡u¹F¤å¦è±K½X¡v¬ÛÃö¤§±K½X§Þ³NijÃD¡F³X½Í¸ê®Æ¥Zµn©ó¦Û¥Ñ®É³ø2006¦~5¤ë22¤éA8(¥þ)ª©¡C

07           Chiang-Lung Liu, Chien-Chung Lee, Der-Chyuan Lou, Wien Hong, Jeanne Chen, and Chih-Wei Shiu, ¡§Reversible data hiding using high-peak prediction errors,¡¨ Proceedings of the 2009 Workshop on Consumer Electronics (WCE 2009), National Chin-Yi University of Technology, Taichung, R.O.C., Nov. 06, 2009, pp. 185-190.  http://wce2009.ncut.edu.tw/  ¡i¸ê°T¦w¥þ»â°ì³Ì¨Î½×¤å¡j

08           Der-Chyuan Lou and Sheng-Chih Ho, ¡§Hybrid high-capacity steganography method in spatial domain,¡¨ in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 48-57.  http://ncs2009.ntpu.edu.tw/CI/CI.htm  ¡i¤J³òIEEE³Ì¨Î¾Ç¥Í½×¤å¡j

 

 

ºô­¶§ó·s¤é´Á¡G06/06/2013