Der-Chyuan Lou(婁德權)

Department of Computer Science and Information Engineering
Chang Gung University

Taoyuan, Taiwan 33302, R.O.C.

TEL: (O) 886-3-211-8800 ext. 3696
E-mail:

主要學歷

畢業學校

國  別

主修學門系所

學  位

起訖年月

國立中正大學

中華民國

資訊工程研究所

工學博士

1993/091997/03

國立中山大學

中華民國

電機工程研究所計算機組

工學碩士

1989/091991/06

中正理工學院

中華民國

電機系計算機組

工學學士

1984/091987/06

現職與經歷

服務機關

服務部門/系所

職  稱

起訖年月

長庚大學

專任教授

2009/08迄今

Journal of Systems and Software SCI, EI (Elsevier公司出版)

安全技術
Security Technology

領域主編
(Area Editor)

2003/07迄今

國防大學理工學院

專任教授

2008/102009/07

國防大學理工學院

專任教授兼
資安實驗室主任

2006/112008/09

國防大學中正理工學院

專任教授兼
電算中心主任

2004/042006/10

國防大學中正理工學院

專任教授兼組長

2002/022004/03

國防大學中正理工學院

專任副教授兼組長

2001/062002/01

中正理工學院

專任副教授

1997/032001/05

國立中正大學

兼任講師

1995/081997/02

中正理工學院

專任講師

1991/071993/08

中正理工學院

專任助教

1987/071989/08

研究領域

1.多媒體安全

2.數位版權管理

3.資訊隱藏

4.資訊安全

5.分散式系統

研究計畫

計畫名稱

補助單位

職 務

執行期間

迷袋問題最佳平行演算法之設計與分析

國科會NSC 87-2218-E-014-010-

主持人

1997/08/01 1998/07/31

資料通訊網路中保密裝置之研發

中科院

共同主持人

1997/09/011998/06/30

資訊安全裝置中具偵錯能力的帶符號快速加法電路之設計

國科會NSC 88-2213-E-014-001-

主持人

1998/08/011999/07/31

單像隱含多景且自含使用者階層存取控制的空間資料庫之研發

國科會NSC 88-2213-E-014-002-

主持人

1998/08/011999/07/31

RSA公開金匙密碼系統中金匙快速產生之研究

國科會NSC 88-2815-C-014-001-E

主持人

1998/11/011999/06/30

RSA公開金匙密碼系統中金匙快速產生演算法之研究

中正理工學院學術專題研究計畫

主持人

1999/07/012000/12/31

具驗證能力並可偵知影像遭篡改部份的圖隱技術之設計與實作

國科會NSC 89-2213-E-014-003-

主持人

1999/08/012000/07/31

電腦病毒技術之先期研究

中科院

協同主持人

2000/07/012000/12/31

低位元高傳真度影像編碼系統與實現

國科會NSC 89-2213-E-014-030-

主持人

2000/08/012001/07/31

資料加解密、隱藏、及傳輸之整合系統的研製

中科院

主持人

2001/04/022001/12/31

高存活性數位浮水印技術及其測試平台之研發(I)

國科會NSC 90-2213-E-014-007-

主持人

2001/08/012002/07/31

密鑰管理系統研究

國防部通資次長室

共同主持人

2002/07/012002/11/30

高存活性數位浮水印技術及其測試平台之研發(II)

國科會NSC 91-2219-E-014-003-

主持人

2002/08/012003/07/31

非對稱型資訊隱藏技術之研發(I)

國科會NSC 92-2213-E-014-013-

主持人

2003/08/012004/07/31

非對稱型資訊隱藏技術之研發(II)

國科會NSC 93-2213-E-014-014-

主持人

2004/08/012005/07/31

高容量JPEG資訊隱藏系統之開發

中央大學前瞻通訊實驗室專案

主持人

2005/07/012005/12/31

通用盲目型藏密偵知與內容分析技術之研發(I)

國科會NSC 95-2221-E-606-032-

主持人

2006/08/012007/07/31

通用盲目型藏密偵知與內容分析技術之研發(II)

國科會NSC 96-2221-E-606-008-

主持人

2007/08/012008/07/31

適應性通用型資訊隱藏偵知與分析技術之研發—(兩年期)

國科會NSC 98-2221-E-182-066-MY2

主持人

2009/08/012011/07/31

智慧型無失真資訊隱藏藏密偵知與分析技術之研發

國科會NSC 100-2221-E-182-055-

主持人

2011/08/012012/07/31

智慧型無失真資訊隱藏藏密偵知與分析技術之研發(II)

國科會NSC 101-2221-E-182-070-

主持人

2012/08/012013/07/31

一個基於虛擬機器監控程式之入侵防禦系統的研究與實作

國科會NSC 101-2221-E-182-075-

主持人

2012/08/012013/07/31

著作

Journal Papers

01       Der-Chyuan Lou and Chin-Chen Chang, “Fast exponentiation method obtained by folding the exponent in half,” IEE Electronics Letters, vol. 32, no. 11, pp. 984-985, May 1996.  F[ SCI, EI ]

02       Chin-Chen Chang, Der-Chyuan Lou, and Tzong-Chen Wu, “A binary access control method using prime factorization,” Information Sciences, vol. 96, no. 1-2, pp. 15-26, Jan. 1997.  F[ SCI, EI ]

03       Chin-Chen Chang and Der-Chyuan Lou, “Parallel computation of the multi-exponentiation for cryptosystems,” International Journal of Computer Mathematics, vol. 63, nos. 1/2, pp. 9-26, Jan. 1997.  F[ SCI, EI ]

04       Der-Chyuan Lou and Chin-Chen Chang, “A parallel two-list algorithm for the knapsack problem,” Parallel Computing, vol. 22, no. 14, pp. 1985-1996, March 1997.  F[ SCI, EI ]

05       Der-Chyuan Lou and Chin-Chen Chang, “A cost optimal search technique for the knapsack problem,” International Journal of High Speed Computing, vol. 9, no. 1, pp. 1-12, Aug. 1997.  F[ SCI, EI ]

06       Der-Chyuan Lou and Chin-Chen Chang, “An adaptive exponentiation method,” Journal of Systems and Software, vol. 42, no. 1, pp. 59-69, July 1998.  F[ SCI, EI ]

07       Der-Chyuan Lou and Chin-Chen Chang, “A fast modular multiplication method,” International Journal of Computer Systems Science and Engineering, vol. 13, no. 6, pp. 353-358, Nov. 1998.  F[ SCI, EI ]

08       Der-Chyuan Lou and Jiang-Lung Liu, “Fault resilient and compression tolerant digital signature for image authentication,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, Feb. 2000.  F[ SCI, EI ]

09       Der-Chyuan Lou and Chin-Chen Chang, “An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation,” International Journal of Computer Systems Science and Engineering, vol. 15, no. 2, pp. 111-117, March 2000.  F[ SCI, EI ]

10       Der-Chyuan Lou and Te-Lung Yin, “Spatial database with each picture self-contained multiscape and access control in a hierarchy,”Journal of Systems and Software, vol. 56, no. 2, pp. 153-163, March 2001.  F[ SCI, EI ]

11       Der-Chyuan Lou and Te-Lung Yin, “Adaptive digital watermarking using fuzzy clustering technique,” IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, vol. E84-A, no. 8, pp. 2052-2060, Aug. 2001.  F[ SCI, EI ]

12       Tsorng-Lin Chia, Kuang-Bor Wang, Zen Chen, and Der-Chyuan Lou, “Parallel distance transforms on a linear array architecture,” Information Processing Letters, vol. 88, no. 2, pp. 73-81, April 2002.  F[ SCI, EI ]

13       Der-Chyuan Lou, Chia-Long Wu, and Rong-Yi Ou, “Application of parallel virtual machine framework to the strong prime problem,” International Journal of Computer Mathematics, vol. 79, no. 7, pp. 797-806, July 2002.  F[ SCI, EI ]

14       Der-Chyuan Lou and Jiang-Lung Liu, “Steganographic method for secure communications,” Computers & Security, vol. 21, no. 5, pp. 449-460, Oct. 2002.  F[ SCI, EI ]

15       Der-Chyuan Lou, Te-Lung Yin, and Ming-Chang Chang, “An efficient steganographic approach,” International Journal of Computer Systems Science and Engineering, vol. 17, no. 4/5, pp. 281-291, July-Sep. 2002.  F[ SCI, EI ]

16       Der-Chyuan Lou and Chia-Hung Sung, “Robust watermarking technique for digital image utilizing invariant relation of vector quantization indices,” Imaging Science Journal, vol. 50, pp. 291-302, Oct. 2002.  F[ SCI]

17       Der-Chyuan Lou and Te-Lung Yin, “Adaptive digital watermarking using fuzzy logic technique,” Optical Engineering, vol. 41, no. 10, pp. 2675-2687, Oct. 2002.  F[ SCI, EI ]

18       Chang-Tsun Li, Der-Chyuan Lou, and Jiang-Lung Liu, “Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem,” Journal of the Chinese Institute of Electrical Engineering (Transactions of the Chinese Institute of Engineers, Series E), vol. 10, no. 1, pp. 99-106, Feb. 2003.  F[ EI ]

19       Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen, and Der-Chyuan Lou, “Parallel execution of a connected component labeling operation on a linear array architecture,” Journal of Information Science and Engineering, vol. 19, no. 2, pp. 353-370, Mar. 2003.  F[ SCI, EI ]

20       Der-Chyuan Lou, Chia-Long Wu, and Chin-Yin Chen, “Fast exponentiation by folding the signed-digit exponent in half,” International Journal of Computer Mathematics, vol. 80, no. 10, pp. 1251-1259, Oct. 2003. F[ SCI, EI ]

21       Der-Chyuan Lou and Chia-Hung Sung, “A steganographic scheme for secure communications based on the chaos and Euler theorem,” IEEE Transactions on Multimedia, vol. 6, no. 3, pp. 501-509, June 2004.  F[ SCI, EI ]

22       Der-Chyuan Lou, Jiang-Lung Liu, and Chang-Tsun Li, “Digital signature-based image authentication,” Chun-Shien Lu (Eds.), Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing (IGP), Chap. VII, pp. 207-230, 2004.  (Book Chapter)

23       Der-Chyuan Lou and Chia-Hung Sung, “Asymmetric image watermarking based on reversible chaotic maps,” Imaging Science Journal, vol. 52, no.2, pp. 53-64, June 2004.  F[ SCI ]

24       Der-Chyuan Lou and Chia-Long Wu, “Parallel modular exponentiation using signed-digit-folding technique,” Informatica – An International Journal of Computing and Informatics, vol. 28, no. 2, pp. 197-205, July 2004.  F[ SCI, EI ]

25       Der-Chyuan Lou and Chia-Long Wu, “Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques,” International Journal of Computer Mathematics, vol. 81 no. 10, pp. 1187-1202, Oct. 2004.  F[ SCI, EI ]

26       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “An efficient Montgomery exponentiation algorithm for cryptographic applications,” Informatica, vol. 16, no. 3, pp. 449-468, 2005.  F[ SCI ]

27       Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, and Hao-Kuan Tso, “A robust watermarking scheme using self-reference image,” Computer Standards & Interfaces, vol. 28, no. 3, pp. 356-367, Jan. 2006.  F[ SCI, EI ]

28       Chengqing Li, Shujun Li, Der-Chyuan Lou, and Dan Zhang, “On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA),” Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, Feb. 2006.  F[ SCI, EI ]

29       Der-Chyuan Lou, Jieh-Ming Shieh, and Hao-Kuan Tso, “A robust buyer-seller watermarking scheme based on DWT,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 20, no. 1, pp. 79-90, Feb. 2006.  F[ SCI, EI ]

30       Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, “Evolution of information hiding technology,” Encyclopedia of E-Commerce, E-Government and Mobile Commerce, Idea Group Inc. Encyclopedia, Ed. Dr. Mehdi Khosrow-Pour, pp. 480-487, March 2006.  (Book Chapter)

31       Jiang-Lung Liu, Der-Chyuan Lou, and Hao-Kuan Tso, “A copyright protection scheme for digital image using chaos and fractal compression,” International Journal of Nonlinear Sciences and Numerical Simulation, vol. 7, no. 2, pp. 197-202, 2006.  F[ SCI ]

32       Ji-Chyun Liu, Der-Chyuan Lou, Chin-Yen Liu, Ching-Yang Wu and Tai-Wei Soong, “Precise determinations of the CPW-fed circular fractal slot antenna,” Microwave and Optical Technology Letters, vol. 48, no. 8, pp. 1586-1592, 2006.  F[ SCI ]

33       Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang, “Fast parallel exponentiation algorithm for RSA public-key cryptosystem,” Informatica — An International Journal, vol. 17, no. 3, 445-462, 2006. F[ SCI ]

34       Choung-Lii Chao, Tai-An Cheng, Der-Chyuan Lou, and Chung-Woei Chao, “Development of a non-contact tool setting system for precision diamond turning,” Journal of Materials Science Forum, vols. 505-507, pp. 367-372, 2006.  F[ SCI, EI ]

35       Der-Chyuan Lou, Hao-Kuan Tso, and Jiang-Lung Liu, “A robust copyright protection scheme for digital images using low-band characteristic,” Optical Engineering, vol. 45, no. 10, pp. 107002-1~107002-6, Oct. 2006.  F[ SCI, EI ]

36       Der-Chyuan Lou, Hao-Kuan Tso, and Jiang-Lung Liu, “A copyright protection scheme for digital images using visual cryptography technique,” Computer Standards & Interfaces, vol. 29, no.1, pp. 125-131, Jan. 2007.  F[ SCI, EI ]

37       Der-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, and Te-Jen Chang, “An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques,” Applied Mathematics and Computation, vol. 185, no. 1, pp. 31-44, Feb. 2007. F[ SCI, EI ]

38       Ming-Chiang Hu, Der-Chyuan Lou, and Ming-Chang Chang, “Dual-wrapped watermarking scheme for image copyright protection,” Computers & Security, vol. 26, pp. 319-330, 2007. F[ SCI, EI ]

39       Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, and Te-Jen Chang, “Fast modular multi-exponentiation using modified complex arithmetic,” Applied Mathematics and Computation, vol. 186, no. 2 pp. 1065-1074, March 2007.  F[ SCI, EI ]

40       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast binary multiplication by performing dot counting and complement recoding,” Applied Mathematics and Computation, vol. 191, no. 1, pp. 132-139, Aug. 2007.  F[ SCI, EI ]

41       Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, “Evolution of information hiding technology,” Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Idea Group Inc. Encyclopedia, Ed. Dr. Hamid Nemati, pp. 144-154, Aug. 2007. (Book Chapter)

42       Ming-Chiang Hu, Der-Chyuan Lou, and Hao-Kuan Tso, “A digital watermarking method using compression concept and coefficient difference,” Imaging Science Journal, vol. 55, no. 3, pp. 155-163, Sep. 2007.  F[ SCI ]

43       Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang, and Shih-Yun Chen, “Integer factorization for RSA cryptosystem under a PVM environment,” International Journal of Computer Systems Science and Engineering, vol. 22, nos. 1-2, pp. 25-35, Jan.-March 2007.  F[ SCI, EI ]

44       Der-Chyuan Lou, Chih-Lin Lin, and Chiang-Lung Liu, “Universal steganalysis scheme using support vector machine,” Optical Engineering, vol. 46, no. 11, pp. 117002-1~117002-10, Nov. 2007.  F[ SCI, EI ]

45       Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu, and Shu-Mei Lee, “Novel healthcare X-rays image hiding scheme using neural network technique,” Imaging Science Journal, vol. 56, pp. 1-10, Jan. 2008.  F[ SCI ]

46       Der-Chyuan Lou, Chih-Lin Lin, and Jiang-Lung Liu, “Novel steganalysis schemes for BPCS steganography,” Imaging Science Journal, vol. 56, no. 4, pp. 232-242, Aug. 2008.  F[ SCI ]

47       Der-Chyuan Lou, Ming-Chiang Hu, and Chiang-Lung Liu, “Healthcare image watermarking scheme based on human visnal model and back-propagation network,” Journal of Chung Cheng Institute of Technology, vol. 37, no. 1, pp. 151-162, Nov. 2008.  F[ EI ]

48       Tzung-Her Chen, Chin-Chen Chang, Chang-Sian Wu, and Der-Chyuan Lou, “On the security of a copyright protection scheme based on visual cryptography,” Computer Standards & Interfaces, vol. 31, no.1, pp. 1-5, Jan. 2009.  F[ SCI ]

49       Der-Chyuan Lou, Ming-Chiang Hu, and Chiang-Lung Liu, “Multiple-layer data hiding scheme for medical images,” Computer Standards & Interfaces, vol. 31, no. 2, pp. 329-335, Feb. 2009. F[ SCI, EI ]

Der-Chyuan Lou, Chiang-Lung Liu, and Chih-Lin Lin, “Message estimation for universal steganalysis using multi-classification support vector machine,” Computer Standards & Interfaces, vol. 31, no. 2, pp. 420-427, Feb. 2009.  F[ SCI, EI ]

50       Te-Jen Chang, Chia-Long Wu, Der-Chyuan Lou, and Ching-Yin Chen, “A low-complexity LUT-based squaring algorithm,” Computers and Mathematics with Applications, vol. 57, no. 9, pp. 1494-1501, May 2009.  F[ SCI, EI ]

51       Shuenn-Jyi Wang, Der-Chyuan Lou, Dah-Lih Jeng, and Chih-Ting Yeh, “Rotation, scaling, and translation resilient digital image watermarking using log-polar mapping,” Imaging Science Journal, vol. 57, Issue 4, pp. 177-190, Aug. 2009.  F[ SCI, EI ]

52       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Computational reduction of Wilson's primality test for modern cryptosystems,” Informatica – An International Journal of Computing and Informatics, vol. 33, no. 4, pp. 453-458, Dec. 2009.  F[ SCI, EI ]

53       Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, and Chwei-Shyong Tsai, “A novel adaptive steganography based on local complexity and human vision sensitivity,” Journal of Systems and Software, vol. 83, pp. 1236-1248, May 2010.  F[ SCI, EI ]

54       Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast modular multiplication based on complement representation and canonical recoding,” International Journal of Computer Mathematics, vol. 87, no. 13, pp. 2871-2879, Oct. 2010. F[ SCI, EI ]

55       Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, “Hybrid high-capacity data hiding by pixel-value differencing and modulus function,” Journal of Internet Technology, vol. 12, no. 2, pp. 303-312, March 2011.  F[ SCI, EI ]

56       Der-Chyuan Lou and Hui-Feng Huang, “Efficient three-party password based key exchange scheme,” International Journal of Communication Systems, vol. 24, Issue 4, pp. 505-512, April 2011.  F[ SCI, EI ]

57       Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, and Chwei-Shyong Tsai, “A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares,” Displays, vol. 32, Issue. 3, pp. 118-134, July 2011.  F[ SCI, EI ]

58       Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu, “Steganalysis for multilevel reversible data hiding based on histogram modification of difference images,” International Journal of Innovative Computing Information and Control, vol. 7, no. 9, pp. 5429-5443, Sep. 2011.  F[ SCI, EI ]

59       Der-Chyuan Lou, Chen-Hao Hu, Chao-Lung Chou, and Chung-Cheng Chiu, “Steganalysis of HMDP reversible data hiding scheme,” Optics Communications, vol. 284, issue 23, pp. 5406-5414, Nov. 2011.  F[ SCI, EI ]

60       Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu, “Steganalysis of histogram modification reversible data hiding scheme by histogram feature coding,” International Journal of Innovative Computing Information and Control, vol. 7, no. 11, pp. 6571-6583, Nov. 2011  F[ SCI, EI ]

61       Der-Chyuan Lou and Chen-Hao Hu, “LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis,” Information Sciences, vol. 188, pp. 346-358, April 2012.  F[ SCI, EI ]

62       Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, “Active steganalysis for histogram-shifting based reversible data hiding,” Optics Communications, vol. 285, issue 10-11, pp. 2510-2518, April 2012.  F[ SCI, EI ]

63       *Chiang-Lung Liu, Kai-Ping Wang, and Der-Chyuan Lou, “Sharing secret images using keyed information hiding technique,” Journal of Chung Cheng Institute of Technology, vol. 41, no. 2, pp. 11-20, Nov. 2012.  F[ EI ]

64       *Kai-Ping Wang, Chiang-Lung Liu, and Der-Chyuan Lou, “Meaningful color image sharing without pixel expansion problem,” International Journal of Advancements in Computing Technology, vol. 4, no. 20, pp. 525-535, Nov. 2012.                                                                                                    F[ EI ]

65       Jeanne Chen, *Wien Hong, Chih-Wei Shiu, Der-Chyuan Lou, Chien-Chung Lee, and Chiang-Lung Liu, “Prediction error adjustment technique for high quality reversible data hiding,” International Journal of Innovative Computing Information and Control, vol. 9, no. 2, pp. 1-12, Feb. 2013.   F[ SCI, EI ]

66       Der-Chyuan Lou, Kuo-Ching Liu, and *Hui-Feng Huang, “Efficient mobile conference scheme for wireless communication,” Informatica, vol. 24, no. 1, pp. 59-70, April 2013.  F[ SCI, EI ]

67       *Kai-Ping Wang, Chiang-Lung Liu, and Der-Chyuan Lou, “Expansion-free grayscale image sharing using meaningful share images,” Applied Mechanics and Materials, vols. 284-287, pp 3413-3417, April 2013.  F[ EI ]

68       *Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, and Hui-Feng Huang, “Active steganalysis for interpolation-error based reversible data hiding,” Pattern Recognition Letters, vol. 34, issue 9, pp. 1032-1036, July 2013.  F[ SCI, EI ]

 

Conference Papers

01           Chang-Tsun Li and Der-Chyuan Lou, “Edge detection based on the multiresolution Fourier transform,” Proceedings of the 1999 IEEE Workshop on Signal Processing Systems (SiPS ’99): Design and Implementation, Taipei, Taiwan, R.O.C., Oct. 1999, pp. 686-693.

02           Der-Chyuan Lou and Jiang-Lung Liu, “An adaptive technique for the steganography in spatial domain,” Proceedings of the 1999 National Computer Symposium, Taipei, Taiwan, R.O.C., Dec. 1999, vol. III, pp. C253-C259.

03           Chang-Tsun Li, Der-Chyuan Lou, and Tsung-Hsu Chen, “Image authentication via content-based watermarks and a public key cryptosystem,” Proceedings of the 2000 IEEE International Conference on Image Processing (ICIP 2000), British Columbia, Canada, Sep. 2000, vol. III, pp. 694-697.

04           Chin-Chen Chang and Der-Chyuan Lou, “An integration of user authentication and dynamic access control,” Proceedings of the 2000 IEEE International Symposium on Consumer Electronics, Hong-Kong, Dec. 2000, pp. 123-127.

05           Der-Chyuan Lou and Jiang-Lung Liu, “Perceptually based model for the transparency of digital watermarks,” Proceedings of the 2001 Workshop on Consumer Electronics (WCE 2001), Taipei, Taiwan, R.O.C., Oct. 2001.

06           Der-Chyuan Lou and Chia-Hung Sung, “Image authentication using subcodebooks of vector quantization and error control code,” Proceedings of the 2001 Workshop on Consumer Electronics (WCE 2001), Taipei, Taiwan, R.O.C., Oct. 2001.

07           Der-Chyuan Lou and Ming-Chiang Hu, “Digital watermarking for the copyright protection of SPIHT coded image,” Proceedings of CVGIP 2002, Taoyuan, Taiwan, R.O.C., Aug. 2002, pp. 799-805.

08           Der-Chyuan Lou and Ming-Chiang Hu, “Adaptive digital watermarking using neural network clustering technique,” Proceedings of CVGIP 2003, Kinmen, Taiwan, R.O.C., Aug. 2003, pp. 810-817.

09           Chin-Chen Chang and Der-Chyuan Lou, “Fast parallel computation of multi-exponentiation for public key cryptosystems,” Proceedings of the Fourth IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Chengdu, China, Aug. 2003, pp. 955-958.

10           Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chiang Hu, “Adaptive digital watermarking using neural network technique,” Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 325-332.  F[ EI ]

11           Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chang Chang, “Digital watermarking using multiresolution wavelet transform,” Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 370-377.  F[ EI ]

12           Der-Chyuan Lou and Chia-Hung Sung, “Robust image watermarking based on hybrid transformation,” Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 2003, pp. 394-399.  F[ EI ]

13           Der-Chyuan Lou, Jiang-Lung Liu, and Ming-Chang Chang, “Combined private and public watermarking in wavelet transform domain,” Proceedings of the 2003 National Computer Symposium (NCS 2003), Taichung, Taiwan, R.O.C., Dec. 2003, pp. 1325-1334.

14           Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, and Chao-Lung Chou, and Chin-Chiang Pan, “A JPEG2000 compatible digital watermarking scheme,” Proceedings of The 2004 IEEE International Conference on Multimedia and Expo (ICME’2004), The Grand Hotel, Taipei, Taiwan, R.O.C., June 27~30, 2004.

15           Der-Chyuan Lou, Jiang-Lung Liu, Ming-Chang Chang, Chin-Chiang Pan, and Chao-Lung Chou, “Adaptive DWT-based watermarking scheme using neighboring mean value relationship,” Proceedings of 2004 IEEE Asia-Pacific Conference on Circuits and Systems (APCCAS 2004), Tainan, Taiwan, R.O.C., Dec. 2004, pp. 589-592.

16           Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, “A robust watermarking scheme using filter and ROI,” Proceedings of 2004 IEEE Asia-Pacific Conference on Circuits and Systems, Tainan, Taiwan, R.O.C., Dec. 2004, pp. 1137-1140.

17           Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, “A robust watermarking technique for still image using compression concept and coefficient difference,” Proceedings of ICS 2004 – International Computer Symposium 2004, Taipei, Taiwan, R.O.C., Dec 15~17, 2004, pp. 455-460.

18           Yan-Xiang Deng, Chao-Jang Hwang, and Der-Chyuan Lou, “Two-stage reconfigurable computing system architecture,” Proceedings of the 18th IEEE International Conference on Systems Engineering 2005 (ICSEng 2005), University of Nevada, Las Vegas, USA, Aug. 16-18, 2005, pp. 389-394. (No: 63)

19           Der-Chyuan Lou, Jiang-Lung Liu, and Hao-Kuan Tso, “A copyright protection scheme based on self-similarity of DWT,” Proceedings of CVGIP 2005, Taipei, Taiwan, R.O.C., Aug. 22~23, 2005, pp. 1075-1081.

20           Der-Chyuan Lou, Jiang-Lung Liu, Hao-Kuan Tso, and Ming-Chang Chang, “A grayscale watermarking scheme based on pixel mapping,” Proceedings of CVGIP 2005, Taipei, Taiwan, R.O.C., Aug. 22~23, 2005, pp. 1082-1089.

21           Ji-Chyun Liu, Ching-Pin Kuei, Chin-Yen Liu, Yaw-Shun Hong, and Der-Chyuan Lou, “Hybrid metal grids/ferrites FSS screens for broad-band microwave absorber design at C-band,” Proceedings of the Tenth International Symposium on Microwave and Optical Technology (ISMOT-2005), Fukuoka, Japan, Aug. 2005, pp. 712-715.

22           Ji-Chyun Liu, Shuh-Tai Lu, Ching-Yang Wu, Ming-Hsun Chiang, and Der-Chyuan Lou, “An inverse Gaussian monocycle pulse generator with picosecond duration and L/S-band responses for UWB applications,” Proceedings of the Tenth International Symposium on Microwave and Optical Technology (ISMOT-2005), Fukuoka, Japan, Aug. 2005, pp. 775-778.

23           Yan-Xiang Deng, Chao-Jang Hwang, and Der-Chyuan Lou, “A two-stage reconfigurable image processing system,” Proceedings of the Eighth IEEE International Symposium on Signal Processing and Its Applications 2005 (ISSPA 2005), Sydney, Australia, Aug. 28~31, 2005, vol. 1, pp. 315-318.

24           Jiang-Lung Liu, Der-Chyuan Lou, Li-Chung Huang, and Chih-Lin Lin, “An image authentication scheme based on wavelet transform and vector quantization,” in Chinese, Proceedings of TANET 2005, Taichung, Taiwan, R.O.C., Oct. 28, 2005, CD-ROM, F54.pdf.

25           Jiang-Lung Liu, Der-Chyuan Lou, Cheng-Po Kao, and Chih-Lin Lin, “A watermarking scheme integrated with JPEG 2000 compression scheme,” in Chinese, Proceedings of TANET 2005, Taichung, Taiwan, R.O.C., Oct. 28, 2005, CD-ROM, G14.pdf.

26           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast binary multiplication method for modular exponentiation,Proceedings of TANET 2005, Taichung, Taiwan, R.O.C., Oct. 28, 2005, CD-ROM.

27           Jiang-Lung Liu, Der-Chyuan Lou, and Ming-Chiang Hu, “Securing healthcare color images using neural network,” Proceedings of the 12th International Conference on Neural Information Processing (ICONIP’s 2005), Grand Hotel, Taipei, Taiwan, R.O.C., Oct. 30~Nov. 2, 2005, pp. 608-613.

28           Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, Chao-Lung Chou, and Chin-Chiang Pan, “A JPEG2000 compatible digital watermarking scheme,” Proceedings of the 2005 Workshop on Consumer Electronics (WCE 2005), Yunlin, Taiwan, R.O.C., Nov. 17~18, 2005, CD-ROM, 122.pdf.

29           Jiang-Lung Liu, Chih-Lin Lin, and Der-Chyuan Lou, “A JPEG2000-compliant method for image authentication and recovery,” Proceedings of the 2005 International Symposium on Communications (ISCOM 2005), Kaohsiung, Taiwan, R.O.C., Nov. 20~22, 2005, CD-ROM, ISCON05_00071.pdf.

30           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Computational complexity analyses of modular arithmetic for RSA cryptosystem,” Proceedings of the 23rd Workshop on Combinatorial Mathematics and Computation Theory, Da-Yeh University, Changhua, Taiwan, R.O.C., April 2006, pp. 215-224.

31           劉江龍、婁德權、胡明強、吳添雄、李淑美,應用階層式資訊隱藏技術於醫學影像保護之研究第五屆亞太HL7健康資訊交換標準研討會,台北,台大醫院,20060707日至0709日,251-259頁。

32           劉江龍、婁德權、黎俊麟,相容於MP3之音訊鑑別技術,「2006通資電技術與應用研討會」論文集,高雄,台灣,20061020日,第81-86頁。

33           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Efficient sliding window binary exponentiation algorithm using minimal signed digest recording technique,” Proceedings of Cyberspace 2006: Cybersecurity, Cybercrime and Cyberlaw, Taipei, Taiwan, R.O.C., Nov. 20, 2006, pp. 490-498.

34           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast modular exponentiation using LUT and radix-b signed-digit recoding,” Proceedings of 2006 National Symposium on Telecommunications, Kaohsiung, Taiwan, R.O.C., Dec. 01-Dec. 02, 2006.

35           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “An effective sliding-window strategy for speeding up modular arithmetic,” Proceedings of 2006 National Symposium on Telecommunications, Kaohsiung, Taiwan, R.O.C., Dec. 01-Dec. 02, 2006.

36           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Efficient large integers arithmetic by adopting squaring and complement recoding techniques,” Proceedings of the 24th Workshop on Combinatorial Mathematics and Computation Theory, National Chi Nan University, Nantou, Taiwan, R.O.C., April 27-28, 2007, pp. 460-464.

37           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Efficient exponentiation evaluation and complexity analyses for cryptographic applications,” Proceedings of the 17th Information Security Conference (ISC 2007), Chiayi, Taiwan, R.O.C., June 07-08, 2007, pp. 305-317.

38           Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin, and Shin-Her Wang, An efficient steganalysis scheme based on statistic classification,” Proceedings of the 17th Information Security Conference (ISC 2007), Chiayi, Taiwan, R.O.C., June 07-08, 2007, pp. 717-727.

39           Der-Chyuan Lou, Chiang-Lung Liu, and Chih-Lin Lin, and Shin-Her Wang, “Length estimation for embedded message using support vector machine,” Proceedings of the Third IEEE International Conference on IntelligentInformation Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2007, vol. 1, pp. 437-440.

40           Chiang-Lung Liu, Der-Chyuan Lou, and Chien-Chung Lee, “Reversible data embedding using reduced difference expansion,” Proceedings of the Third IEEE International Conference on IntelligentInformation Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2007, vol. 1, pp. 433-436.

41           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Efficient cryptographical modular exponentiation algorithm design and theoretical computational analyses,” Proceedings of Cyberspace 2007: Cybersecurity, Cybercrime and Cyberlaw (Cyber 2007), Taoyuan, Taiwan, R.O.C., Nov. 30, 2007, pp. 509~517.

42           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Efficient algorithms design and theoretical computational complexity analyses on cryptographic applications,” Proceedings of the 2008 Enterprise Resources Program (ERP 2008), Taoyuan, Taiwan, R.O.C., Jan. 12, 2008, pp. 111-122.

43           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Efficient hardware and software design for smart card systems and information security applications,” Proceedings of 2008 Intelligent Systems Conference on Engineering Applications (ISC 2008), Far East University, Tainan, Taiwan, R.O.C., March 20, 2008, pp. 45.

44           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast squaring algorithm design and Ccomplexity numerical analyses for public-key cryptosystems,” Proceedings of the 25th Workshop on Combinatorial Mathematics and Computation Theory, Chung Hua University, Hsinchu, Taiwan, R.O.C., April 25-26, 2008, pp. 154-161.

45           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “An efficient Montgomery exponentiation algorithm for public-key cryptosystems,” Proceedings of the The IEEE International Conference on Intelligence and Security Informatics (ISI 2008), Springer Lecture Notes in Computer Science (LNCS), Grand Formosa Regent Hotel, Taipei, Taiwan, June 16-20, 2008, pp. 284-285.

46           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast modular arithmetic algorithm design and complexity theoretical analysis for cryptosystems,” Proceedings of 2008 International Conference of Digital Technology and Innovation Management (IDTIM 2008), Taipei, Taiwan, R.O.C., June 28, 2008, pp. 1601-1612.

47           Chia-Long Wu, Der-Chyuan Lou, and Te-Jen Chang, “Fast modular multiplication for e-commerce cryptosystem,” Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2008, pp. 457-461.  F[ EI ]

48           Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, and Chiang-Lung Liu, “A lossless secret image sharing method,” Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), Kaohsiung, Taiwan, R.O.C., Nov. 26-28, 2008, vol. 3, pp. 616-619.  F[ EI ]

49           Der-Chyuan Lou, Chen-Hao Hu, Hao-Kuan Tso, and Dah-Lih Jeng,An enhanced digital image RRS LSB steganographic method based on reversible histogram transformation functions,” in Chinese, Proceedings of the 19th National Conference on Information Security, National Taiwan University of Science and Technology, Taipei, Taiwan, R.O.C., June 04-05, 2009, A401.

50           Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Dah-Lih Jeng,A secure block-based steganography against statistical analysis,” in Chinese, Proceedings of the 19th National Conference on Information Security, National Taiwan University of Science and Technology, Taipei, Taiwan, R.O.C., June 04-05, 2009, A402.

51           Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, and Chao-Lung Chou, “Secret sharing method for gray-level images,” Proceedings of The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 09), IEEE, Kyoto, Japan, Sep. 12-14, 2009, pp. 295-298.  F[ EI ]

52           Chiang-Lung Liu, Chien-Chung Lee, Der-Chyuan Lou, Wien Hong, Jeanne Chen, and Chih-Wei Shiu, “Reversible data hiding using high-peak prediction errors,” Proceedings of the 2009 Workshop on Consumer Electronics (WCE 2009), National Chin-Yi University of Technology, Taichung, R.O.C., Nov. 06, 2009, pp. 185-190. 資訊安全領域最佳論文

53           Chia-Long Wu, Hao-Kuan Tso, and Der-Chyuan Lou, “A novel secret image sharing method,” Proceedings of the 7th Pacific Symposium on Flow Visualization and Image Processing (PSFVIP), National Pingtung University of Science and Technology, Kaohsiung, Taiwan, R.O.C., Nov. 16-19, 2009, #034.

54           Der-Chyuan Lou and Sheng-Chih Ho,Hybrid high-capacity steganography method in spatial domain,” in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 48-57.  入圍IEEE最佳學生論文

55           Shuenn-Jyi Wang, Chang-Kai Hsieh, Chih-ChiaLin, Der-ChyuanLou, and Ching-Chuan Chiang, “A video-based abnormal activity detection approach for a court,” Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Image Processing, Computer Graphics, and Multimedia Technologies, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 207-218.

56           Hao-Kuan Tso, Der-Chyuan Lou, and Chia-Long Wu, Sharing secret image based on bit plane,” Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 567-572.

57           Der-Chyuan Lou, Chen-Hao Hu, Chung-Cheng Chiu, and Te-Jen Chang,Detection of reversible data hiding scheme based on histogram features codes,” in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 584-588.

58           Der-Chyuan Lou, Chao-Lung Chou, and Chung-Cheng Chiu,Steganalyses of reversible data hiding techniques,” in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 589-594.

59           Hao-Kuan Tso and Der-Chyuan Lou,Sharing secret image based on random grids,Proceedings of The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009), Workshop on Computer Science and Its Applications, Jiju, Korea, Dec. 10-12, 2009, vol. 2, pp. 399-403.

60           左豪官、吳嘉龍、婁德權半色調影像分享技術2009數位內容學術研討會(The International Conference on Digital Content),桃園,台灣,20091217日,D3-1

61           Hao-Kuan Tso, Der-Chyuan Lou, and Chung-Cheng Chiu, “Halftone secret sharing method for color images,” Proceedings of 2010 International Security Technology & Management Conference, Taipei, Taiwan, R.O.C. Sep. 08-10, 2010, pp. 70-75.

62           Der-Chyuan Lou, Chen-Hao Hu, and Chung-Cheng Chiu, “Steganalysis of reversible data hiding based on histogram modification of pixel differences,” Proceedings of 2010 International Security Technology & Management Conference, Taipei, Taiwan, R.O.C. Sep. 08-10 2010, pp. 118-122.

63           Chia-Long Wu, Der-Chyuan Lou, and Hao-Kuan Tso, “Non-expanded secret sharing method,Proceedings of The 2010 International Symposium on GPS/GNSS (GPS/GNSS 2010), Tainan, Taiwan, R.O.C., Oct. 26-28, 2010.

64           Chao-Lung Chou, Der-Chyuan Lou, and Chung-Cheng Chiu, “Steganalysis of reversible data hiding using template matching techniques,” Proceedings of National Symposium on Telecommunications (NST 2010), Taoyuan, Taiwan, R.O.C., Dec. 03-04, 2010.  入圍最佳學生論文獎共投稿278篇,入圍七篇。

65           Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, “High quality steganogrphic method base on MSBs of pixels,” Proceedings of National Symposium on Telecommunications (NST 2010), Taoyuan, Taiwan, R.O.C., Dec. 03-04, 2010.

66           Hao-Kuan Tso and Der-Chyuan Lou, “Information hiding method using sharing images,Proceedings of The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen, China, Dec.13-15, 2010, pp. 642-645.

67           Der-Chyuan Lou, Chao-Lung Chou, and Chung-Cheng Chiu, “Active steganalysis for reversible data hiding based on histogram-shifting technology,” Proceedings of 2011 Conference on Network and Information Security (NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011, pp. 24-31.

68           Der-Chyuan Lou, Sheng-Chih Ho, and Chung-Cheng Chiu, “High quality and payload data hiding based on MSBs of pixels in digital images,” Proceedings of 2011 Conference on Network and Information Security (NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011, pp. 32-40.

69           Hao-Kuan Tso and Der-Chyuan Lou, “灰階視覺密碼技術,” Proceedings of 2011 Conference on Network and Information Security (NIS 2011), Taoyuan, Taiwan, R.O.C., June 10, 2011, pp. 41-47.

70           Fong-Hao Liu, Der-Chyuan Lou, and Jun-Te. Su, “基於預測誤差與像素差值的可逆式資訊隱藏,” Proceedings of 2011 Conference on Information Technology and Industrial Application (ITIA2011), Technology and Science Institute of Northern Taiwan, Beitou, Taipei, Taiwan, R.O.C., June 10, 2011, S06-07-ID65, pp. 01-07.

71           Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, “針對可回復式取樣影像差值藏密技術之主動式藏密分析法,” Proceedings of 2011 Conference on Taiwan Academic Network (TANET 2011), Ilan, Taiwan, R.O.C., Oct. 24~26, 2011.

72           Hao-Kuan Tso and Der-Chyuan Lou, “視覺密碼技術於醫學影像之應用,” Proceedings of 2011 Workshop on Consumer Electronics (WCE 2011), Taichung, Taiwan, R.O.C., Nov. 11, 2011, pp. 1169-1173.

73           Shuenn-Jyi Wang, Chang-Kai Hsieh, Chih-Chia Weng, and Der-Chyuan Lou, “無重疊環境之多攝影機人員追蹤,” Proceedings of 2011 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2011), Taoyuan, Taiwan, R.O.C., Nov. 11~13, 2011, pp. 272-279.

74           Hao-Kuan Tso and Der-Chyuan Lou, “階層式視覺分享技術,” Proceedings of 2011 National Computer Symposium (NCS 2011), Chiayi, Taiwan, R.O.C., Dec. 2~3, 2011, pp. 38-47.

75           Der-Chyuan Lou, Sheng-Chih Ho, Hao-Kuan Tso, and Chung-Cheng Chiu, “Adaptive steganographic method base on pixel value,” Proceedings of 2011 National Computer Symposium (NCS 2011), Chiayi, Taiwan, R.O.C., Dec. 2~3, 2011, pp. 58-65.

76           Hao-Kuan Tso and Der-Chyuan Lou, “Medical image protection using secret sharing scheme,” Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2012), Kuala Lumpur, Malaysia, Feb. 20-22, 2012.  (Indexed by SCOPUS since Dec., 2010)

77           Yu-Shiang Lin, Chun-Yuan Lin, and Der-Chyuan Lou, “Efficient parallel RSA decryption algorithm for many-core GPUs with CUDA, Proceedings of 2012 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012), American Telecommunications Systems Management Association, Czech Technical University, Prague, Czech Republic, May 24~26, 2012.

78           *Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu,Active steganalysis of reversible data hiding: estimation of parameters,” Proceedings of the 22nd National Conference on Information Security, National Chung Hsing University, Taichung, Taiwan, R.O.C., May 30-31, 2012.  (論文採光碟,未編頁碼)

79           *Der-Chyuan Lou, Sheng-Chih Ho, Hao-Kuan Tso, and Chung-Cheng Chiu,植基於動態門檻值與藏密需求之適應性藏密技術,” in Chinese, Proceedings of the 22nd National Conference on Information Security, National Chung Hsing University, Taichung, Taiwan, R.O.C., May 30-31, 2012.  (論文採光碟,未編頁碼)

80           *Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, and Chung-Cheng Chiu, “An active steganalysis of reversible data hiding: estimating key parameters, Proceedings of the International Symposium on Computer, Consumer and Control (IS3C 2012), IEEE, Taichung, Taiwan, R.O.C., June 04~06, 2012.  (論文採光碟,未編頁碼)  F[ EI ]

81           *左豪官、婁德權資訊隱藏技術之探討2012數位與科技生活創新應用學術研討會,桃園創新技術學院資工系,中壢,台灣20120621日。  (論文採光碟,未編頁碼)

82           Kai-Ping Wang, *Chiang-Lung Liu, and Der-Chyuan Lou, “Expansion-free grayscale image sharing using meaningful share images,” Proceedings of the 2nd International Conference on Engineering and Technology Innovation 2012 (ICETI 2012), Kaohsiung, Taiwan, R.O.C., Nov. 02~06, 2012, pp. 324.  (論文採光碟,未編頁碼)

83           *Kuang-Shyr Wu, Der-Chyuan Lou, Wei-Kuei Chen, and Chien-Ping Chang, “Novel approach for color secret image sharing,” Proceedings of the 23rd National Conference on Information Security, Southern Taiwan University of Science and Technolog, Tainan, Taiwan, R.O.C., May 23-24, 2013, pp. 115-122.  (in Chinese

84           *Jen-Chun Lee, Chien-Ping Chang, Kuang-Shyr Wu, and Der-Chyuan Lou, “Efficient palm vein recognition approach for biometrics-based identification systems,” Proceedings of the 23rd National Conference on Information Security, Southern Taiwan University of Science and Technolog, Tainan, Taiwan, R.O.C., May 23-24, 2013, pp. 123-128.

 

學術活動

A.擔任編輯委員

01           獲邀擔任中華民國資訊安全學會【CCISAChinese Cryptology and Information Security Association】【資訊安全通訊】出版委員會編輯委員,200309月至200608月、200609月至200908月。

02           國際期刊Journal of Systems and Software—SCI, EI主編(Editor-in-Chief)邀請,擔任該期刊「安全技術領域主(Area Editor for Security Technology)200307月迄今。

04           獲邀擔任中華民國電腦學會(http://www.csroc.org.tw/)【電腦學刊—Journal of Computers編輯委員會委員(Associate Editor)()聘安字第20號,200603月迄今。

05           獲邀擔任中華民國電腦學會(http://www.csroc.org.tw/)【電腦學刊—Journal of Computers】「網路安全特刊」客座主編(Guest Editor),200801月出刊。

06           國際期刊International Journal of Digital Crime and Forensics主編邀請,擔任該期刊編輯委員(Associate Editor)200801月迄今。  http://www.igi-global.com/journals/details.asp?id=7828

07           獲邀擔任中華民國電腦學會(http://www.csroc.org.tw/)【電腦學刊—Journal of Computers】「數位版權管理特刊」客座主編(Guest Editor),200904月出刊。

08           國際期刊Journal of Information Hiding and Multimedia Signal Processing—JIH-MSP邀請,擔任該期刊編輯委員(Associate Editor)200901月迄今。  http://www.jihmsp.org/

09           獲邀擔任【財團法人高等教育評鑑中心99年度大學校院校務評鑑委員201001201012

10           獲邀擔任【第九屆旺宏科學獎資訊類評審委員201005月至12月。

11           國際期刊ISRN Signal Processing邀請,擔任該期刊編輯委員(Editor)201009月迄今。  http://www.hindawi.com/isrn/sp/

12           獲邀擔任【財團法人高等教育評鑑中心100年度大學校院校務評鑑委員201101201112

13           獲邀擔任【法國標準協會亞太區總部艾法諾(AFNOR)國際股份有限公司ISMSInformation Security Management System)資訊安全管理系統授證監督委員201108月至201407月。

14           國際期刊Security and Communication NetworksWiley—SCI邀請,擔任該期刊客座編輯委員(Guest Editor)Special Issue on Applied Cryptography for Information and Communication Networks201111月。

 

B.擔任審稿委員

01           獲邀擔任國際期刊Advances in Engineering Software論文審查委員,200811月。

02           獲邀擔任國際期刊Advances in Multimedia論文審查委員,201112月。

03           獲邀擔任中華民國資訊安全學會【CCISAChinese Cryptology and Information Security Association】出版之刊物【資訊安全通訊】論文審查委員,200312月、200402月、200503月。

04           獲邀擔任國際期刊Circuits, Systems and Signal Processing論文審查委員,200711月、200803月、200804月、200911月。

05           獲邀擔任國際期刊Computers and Electrical Engineering Journal論文審查委員,200611月、200807(兩篇)

06           獲邀擔任國際期刊Computer Journal論文審查委員,201003月、201009月。

07           獲邀擔任國際期刊Computer Standards & Interfaces論文審查委員,200407月、200706月、200802月、200903月、201104月、201108月。

08           獲邀擔任國際期刊Digital Signal Processing論文審查委員,201202月、201212月。

09           獲邀擔任國際期刊Displays論文審查委員,201206月、201302月、201303月、201304月。

10           獲邀擔任國際期刊IEE Electronics Letters論文審查委員,200610月。

11           獲邀擔任國際期刊IEE Proceedings—Communications論文審查委員,200501月、200503月、200510月。

12           獲邀擔任國際期刊IEE Proceedings—Vision, Image & Signal Processing論文審查委員,200605月、200606月、200611(兩篇)

13           獲邀擔任國際期刊IET Communications論文審查委員,200701月。(The Institution of Electrical Engineers (IEE) and Institution of Incorporated Engineers (IIE) to form the Institution of Engineering and Technology (IET))

14           獲邀擔任國際期刊IEEE Communications Letters論文審查委員,200409月、200811月。

15           獲邀擔任國際期刊IEEE Transactions on Circuits and Systems-Part II論文審查委員,200810月。

16           獲邀擔任國際期刊IEEE Transactions on Computers論文審查委員,200512月、200602月。

17           獲邀擔任國際期刊IEEE Transactions on Dependable and Secure Computing論文審查委員,200812月。

18           獲邀擔任國際期刊IEEE Transactions on Image Processing論文審查委員,200812月、201204月。

19           獲邀擔任國際期刊IEEE Transactions on Information Forensics and Security論文審查委員,200604月。

20           獲邀擔任國際期刊IEEE Transactions on Information Technology in Biomedicine論文審查委員,200708月。

21           獲邀擔任國際期刊IEEE Transactions on Knowledge and Data Engineering論文審查委員,200607月。

22           獲邀擔任國際期刊IEEE Transactions on Multimedia論文審查委員,200203月、200210月、200309月、200310月、200405月、200409月、200412月、200502月、200503(三篇)200505月、200510月、200512月、200602月、200606月、200607月、200711月、200802月、200803月。

23           獲邀擔任國際期刊IEEE Transactions on Very Large Scale Integration Systems論文審查委員,200608月、201012月。

24           獲邀擔任國際期刊IEEE Security & Privacy論文審查委員,200408月、201302月。

25           獲邀擔任IEEE Signal Processing Letters論文審查委員,20070610日。

26           獲邀擔任國際期刊Imaging Science Journal論文審查委員,200202月、200207月、200210月、200212月、200304月、200311月、200401月、200410月、200501月、200502月、200511月、200604月、200608月、200904月、200909月、201004月、201105月。

27           獲邀擔任國際期刊Image and Vision Computing論文審查委員,200602月、200812月。

28           獲邀擔任國際期刊Informatica論文審查委員,200510月、200602月。

29           獲邀擔任國際期刊Information Sciences論文審查委員,199911月、200103月、200608月、200705月、200707月、200812月、200902月、200906(兩篇)200907(兩篇)200911(兩篇)201001月、201004月、201008(兩篇)201108月、201111(兩篇)201112月、201302月、201305月。

30           獲邀擔任Information Technology And Control論文審查委員,20130317日。

31           獲邀擔任國際期刊International Journal of Communication Systems論文審查委員,201203月、201210月、201301月、201302月。

32           獲邀擔任國際期刊International Journal of Computer Mathematics論文審查委員,200602月、200911月、201211月、201212月、201304月、201305月。

33           獲邀擔任國際期刊International Journal of Computers and Applications論文審查委員,200812月。

34           獲邀擔任國際期刊International Journal of Image and Graphics論文審查委員,201301月。

35           獲邀擔任國際期刊International Journal of Information and Computer Security論文審查委員,200903月、200909月、201003月、201004月、201006月、201007月、201008月、201110月、201203月、201301月。

36           獲邀擔任國際期刊International Journal of Information Security論文審查委員,200711月、200804月。

37           獲邀擔任國際期刊International Journal of Intellectual Property Management論文審查委員,200703月。

38           獲邀擔任國際期刊International Journal of Multimedia Intelligence and Security論文審查委員,200912月。

39           獲邀擔任國際期刊International Journal of Pattern Recognition and Artificial Intelligence論文審查委員,20070712日、20070804日、20071006日。

40           獲邀擔任國際期刊ISRN Signal Processing論文審查委員,201011月、201012月、201103月、201111月、201203(兩篇)201204(三篇)201205月、201211月、201212月。

41           獲邀擔任國際期刊Journal of the Chinese Institute of Engineers論文審查委員,200511月、200909月、200911月、200912月、201004月、201007月、201102月、201106月、201108月、201202月、201212月、201302月。

42           獲邀擔任國際期刊Journal of Computers論文審查委員,201101月、

43           獲邀擔任國際期刊Journal of Engineering and Computer Innovation論文審查委員,200804月、200809月、200912月、201011月。

44           獲邀擔任國際期刊Journal of Electromagnetic Waves and Applications論文審查委員,200811月。

45           獲邀擔任國際期刊Journal of Electronic Imaging論文審查委員,201012月、201304月。

46           獲邀擔任國際期刊Journal of Information Science and Engineering論文審查委員,199904月、199906月、200404月、200504月、200505月、200507月、200510月、200604月、200610月、200702月、200810月、200909月。

47           獲邀擔任期刊Journal of Internet Technology論文審查委員,200707月、200710月、200907月。

48           獲邀擔任國際期刊Journal of Medical Systems論文審查委員,201106月、201209月、201211月、201212月。

49           獲邀擔任國際期刊Journal of Organizational Computing and Electronic Commerce論文審查委員,200410月、200512月。

50           獲邀擔任國際期刊Journal of Systems and Software論文審查委員,200001月、200009月、200012月、200107月、200111月、200201月、200208月、200210月。

51           獲邀擔任國際期刊Journal of Zhejiang University—Science A論文審查委員,200807月、200901月。

52           獲邀擔任國際期刊KSII Transactions on Internet and Information Systems論文審查委員,201211月、201212月。

53           獲邀擔任國際期刊Mathematical and Computer Modelling論文審查委員,200801月。

54           獲邀擔任國際期刊Multimedia Tools and Applications論文審查委員,200808月。

55           獲邀擔任國際期刊Nonlinear Dynamics論文審查委員,201211月。

56           獲邀擔任國際期刊Optical Engineering論文審查委員,200010月、200210月、200512月、200611月、200712月、200803月、200905月、200908月、201012月、201102月、201106月、201107月、201204月。

57           獲邀擔任國際期刊Physics Letters A論文審查委員,200702月。

58           獲邀擔任國際期刊Signal Processing論文審查委員,201003月、201010月、201103月、201109月、201112月。

59           獲邀擔任國際期刊Security and Communication Networks論文審查委員,201203月。

60           獲邀擔任國際期刊Telecommunication Systems Journal論文審查委員,201005月。

61           獲邀擔任美和技術學院【美和學報】論文審查委員,200611月、200804月。

62           獲邀擔任空軍【航空技術學院學報(Journal of Air Force Institute of Technology)論文審查委員,200804(三篇)201003(二篇)201103(二篇)

63           獲邀擔任中華民國電腦學會【Journal of Computer電腦學刊】論文審查委員,200603月、200912月、201008月、201109(二篇)

 

C.擔任議程委員

01           獲邀擔任【第八屆全國資訊安全會議】議程委員、論文審查委員、及分場會議主持人,高雄,國立中山大學,199805月。

02           獲邀擔任國際研討會【1998 International Computer Symposium (ICS 1998) ─1998國際計算機會議】論文審查委員,199809月。

03           獲邀擔任【第九屆全國資訊安全會議】議程委員、論文審查委員、及分場會議主持人,台中,朝陽科技大學,199905月。

04           獲邀擔任【中華民國第八屆國防科技學術研討會】論文審查委員及分場會議主持人,桃園,中正理工學院,199911月。

05           獲邀擔任第十屆全國資訊安全會議議程委員及論文審查委員,花蓮,國立東華大學,200005月。

06           獲邀擔任2000年國際計算機會議─2000 International Computer Symposium (ICS2000)議程委員及論文審查委員,嘉義,國立中正大學,200012月。

07           獲邀擔任第十一屆全國資訊安全會議議程委員及論文審查委員,台南,國立成功大學,20015月。

08           獲邀擔任【中華民國第十屆國防科技學術研討會】論文組召集人、論文審查委員、及分場會議主持人,台北,福華國際文教會館,200111月。

09           獲邀擔任第十二屆全國資訊安全會議論文審查委員、分場會議主持人,台中,健康暨管理學院,200205月。

10           獲邀擔任【第十三屆國防科技學術研討會】執行委員及分場會議主持人,桃園,台灣,200410月。

11           獲邀擔任第十六屆全國資訊安全會議議程委員、論文審查委員、分場會議主持人、及最佳論文獎評審委員,台中,逢甲大學,200605月。

12           獲邀擔任國際研討會The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 07)】議程委員(Program Committee)IEEEKaohsiungTaiwan20071126日至28日。

13           獲邀擔任【陸軍官校八十三週年校慶基礎學術研討會】分場會議主持人,鳳山,高雄,陸軍軍官學校,2007/06/01

14           獲邀擔任第十七屆全國資訊安全會議議程委員、論文審查委員、分場會議主持人,嘉義,嘉義大學,20070607日至08日。

15           獲邀擔任國際研討會ICC'08—Information and Network Security Symposium論文審查委員,200710月。

16           獲邀擔任第十八屆全國資訊安全會議議程委員、論文審查委員、分場會議主持人,花蓮,東華大學,20080529日至30日。

17           獲邀擔任國際研討會The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 08)—http://bit.kuas.edu.tw/~iihmsp08/】議程委員(Program Committee)IEEEHarbinChina20080815日至17日。

18           獲邀擔任國際研討會The Eighth International Conference on Intelligent Systems Design and Applications (ISDA '08)—http://bit.kuas.edu.tw/~isda08/】議程委員(Program Committee)及分場會議主持人,KaohsiungTaiwan20081126日至28日。

19           獲邀擔任國際研討會The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS'08)—http://mpis08.ialab.cs.pu.edu.tw/mpis08/)區域主席(Local Chair)、議程委員(Program Committee)IEEEJiaosiYilanTaiwan20081209日至10日。(in conjunction with the 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008, http://apscc2008.csie.chu.edu.tw/))

20           獲邀擔任國際研討會The Second International Conference on Future Generation Communication and Networking (FGCN 2008)—http://www.sersc.org/FGCN2008/】議程委員(Program Committee)及審稿委員(五篇)IEEEHainan IslandChina20081213日至15日。

21           獲邀擔任國際研討會The Seond International Workshop on Forensics for Future Generation Communication Environments (F2GC-08)—http://www.sersc.org/F2GC2008/】議程委員(Program Committee)及審稿委員(一篇)IEEEHainan IslandChina20081213日至15日。

22           獲邀擔任國際研討會The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (E-Forensics 2009)—http://www.e-forensics.eu/議程委員(Program Committee)及審稿委員(三篇)IEEEAdelaideAustralia20090119日至21

23           獲邀擔任第十九屆全國資訊安全會議議程委員、論文審查委員、分場會議主持人,台北,台灣科技大學,20090604日至05日。

24           獲邀擔任國際研討會The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 09)—http://bit.kuas.edu.tw/~iihmsp09/】議程委員(Program Committee)IEEEKyotoJapan20090912日至14日。                            F[ EI ]

25           獲邀擔任2009民生電子研討會(WCE2009http://wce2009.ncut.edu.tw/諮議委員、論文審查委員,台中,國立勤益科技大學,20091106日。

26           獲邀擔任【第十八屆國防科技學術研討會】分場會議主持人,桃園,台灣,200911月。

27           獲邀擔任國際研討會The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009)—http://www.ftrg.org/MPIS2009】指導議程委員(Steering Committee Member)JijuKorea20091210日至12日。

28           獲邀擔任【九十八年全國計算機會議—National Computer Symposium (NCS 2009)—http://ncs2009.ntpu.edu.tw/CI/CI.htmCryptography and Information Security Workshop議程委員、論文審查委員、分場會議主持人,台北,國立台北大學,20091210~12日。

29           獲邀擔任國際研討會The 5th International Conference on Future Information Technology (FutureTech 2010)—http://www.ftrg.org/futuretech2010—Track 6. Multimedia Convergence】議程委員(Program Committee)BusanKorea20100521日至23日。

30           獲邀擔任第二十屆全國資訊安全會議議程委員、論文審查委員、分場會議主持人,新竹,交通大學,20100527日至28日。

31           獲邀擔任國際研討會IEEE International Workshop on Computer Forensics In Software Engineering (CFSE 2010)In conjunction with 34th Annual International Computer Software and Applications Conference (COMPSAC 2010)http://conferences.computer.org/compsac/2009/workshops/CFSE2009CFP.htm議程委員(Program Committee)IEEESeoulSouth Korea20100719日至23

32           獲邀擔任國際研討會The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 10)—http://bit.kuas.edu.tw/~iihmsp10/】議程委員(Program Committee)IEEEDarmstadtGermany20101015日至17日。F[ EI ]

33           獲邀擔任國際研討會The Second International Conference on Multimedia Information Networking and Security (MINES 2010)—http://www.ieee-mines.org】議程委員(Technical Program Committee)IEEENanjingChina20101104日至06日。

34           獲邀擔任國際研討會The 2011 International Conference on Advanced Software Engineering (ICASE-11), co-sponsored by FTRA and IEEE Changwon Section—http://www.ftrai.org/icase2011】出版委員會副主席(Publicity Co-Chair)BusanKorea,20110526日至28日。

35           獲邀擔任第二十一屆全國資訊安全會議議程委員、論文審查委員,雲林,國立虎尾科技大學,20110526日至27日。

36           獲邀擔任2011 Conference on Network and Information Security (NIS 2011)議程委員、論文審查委員、分場會議主持人,桃園,清雲科技大學,20110610日。

37           獲邀擔任【臺灣網際網路研討會 (TANET 2011; Taiwan Academic Network 2011)—http://tanet2011.niu.edu.tw/資通訊安全技術與管理領域審稿召集人、論文審查委員、分場會議主持人,宜蘭,國立宜蘭大學,20111024日至26日。

38           獲邀擔任【2011年民生電子研討會(WCE 2011)—http://im.ntit.edu.tw/wce2011/index.html分場會議主持人,國立台中技術學院,台中,台灣,20111111日。

39           獲邀擔任【一百年全國計算機會議—National Computer Symposium (NCS 2011)—http://NCS2011.ncyu.edu.twCryptography and Information Security Workshop議程委員、最佳論文及最佳學生論文評審委員,嘉義,國立嘉義大學,20111202日至03日。

40           獲邀擔任國際研討會International Workshop on Information Science and Education TechnologyIET信息科學和教育技術國際研討會)(WISET 2012)—http://www.acaiconf.org/iset/】議程委員(Program Committee)XiamenFujianChina20120324日至26日。

41           獲邀擔任國際研討會The Second International Conference on Consumer Electronics, Communications and Networks (CECNet 2012)—http://www.cecnetconf.org/2012】技術議程委員(Technical Program Committee)IEEEShanxiChina20120421日至23日。  IEEE消費電子協會主辦,大陸湖北省咸寧學院承辦,EI收錄

42           獲邀擔任第二十二屆全國資訊安全會議http://cisc2012.cs.nchu.edu.tw議程委員、論文審查委員,台中,國立中興大學,20120530日至31日。

43           獲邀擔任國際研討會2012 International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012)—http://voyager.ce.fit.ac.jp/conf/imis/2012/】技術議程委員(Technical Program Committee)Sanpaolo Palace HotelItaly20120704日至06日。

44           獲邀擔任The 17th Mobile Computing Workshop (MC-2012)暨國科會行動計算計畫研究成果發表會)—http://mc2012.cgu.edu.tw/)議程委員,大板根森林溫泉渡假村,新北市,台灣20120829日至30

45           獲邀擔任國際研討會The 5th FTRA International Conference on Human-centirc Computing (HumanCom 2012)—http://www.ftrai.org/humancom2012/)】議程委員(Program Committee)GwangjuKorea20120906日至08日。

46           獲邀擔任國際研討會The 15th International Conference on Network-Based Information Systems (NBiS-2012): Web and Internet Applications— http://133.220.110.102/conf/nbis/2012/index.html】議程委員(Program Committee)MelbourneAustralia20120926日至28日。

47           獲邀擔任國際研討會2012 6th International Conference on Network and System Security (NSS 2012)—http://www.anss.org.au/nss2012/】議程委員(Program Committee)Wu Yi ShanFujianChina20121121日至23日。

48           獲邀擔任國際研討會2012 International Computer Symposium (ICS 2012) (Workshop on Cryptography and Information Security in conjunction)http://ics2012.ndhu.edu.tw/workshop.php#5】議程委員(Program Committee) 及論文審查委員(2)HualienTaiwanR.O.C.20121212日至14日。

49           獲邀擔任第二十三屆全國資訊安全會議http://cisc2013.csie.stust.edu.tw/議程委員、論文審查委員、分場會議主持人,台南,南台科技大學20130523日至24日。

50           獲邀擔任國際研討會The 7th International Conference on Network and System Security (NSS 2013)—http://anss.org.au/nss2013/】議程委員(Program Committee)及論文審查委員(5)MadridSpain20130603日至04日。

51           獲邀擔任The 18th Mobile Computing Workshop (MC-2013)暨國科會行動計算計畫研究成果發表會)—http://nol.cs.nctu.edu.tw/MC2013)議程委員,西湖渡假村,苗栗,台灣20130827日至28

52           獲邀擔任國際研討會The 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2014)—http://www.modelsward.org/】議程委員(Program Committee)LisbonPortugal20140107日至09日。

 

榮譽事項

01           榮獲Marquis世界名人錄(Who,s Who in the World)主動邀請,審查並刊登個人事蹟於第15(1997年、第845)世界名人錄中。

02           博士論文榮獲宏眥簹鷛|第11【龍騰論文獎】,並獲邀加入【龍騰會】1997

03           獲選國防大學中正理工學院九十年度優良教師】200109月。

04           獲選國防大學中正理工學院九十四年度優良教師】20050701日,中正理工學院集釩字第0940002459號令。

05           獲選【國防部九十四年度優良教師】20050928日,國防部選道字第940012802號獎狀。

06           自由時報記者袁世忠邀請,訪談與「達文西密碼」相關之密碼技術議題;訪談資料刊登於自由時報2006522A8()

07           Chiang-Lung Liu, Chien-Chung Lee, Der-Chyuan Lou, Wien Hong, Jeanne Chen, and Chih-Wei Shiu, “Reversible data hiding using high-peak prediction errors,” Proceedings of the 2009 Workshop on Consumer Electronics (WCE 2009), National Chin-Yi University of Technology, Taichung, R.O.C., Nov. 06, 2009, pp. 185-190.  http://wce2009.ncut.edu.tw/  資訊安全領域最佳論文

08           Der-Chyuan Lou and Sheng-Chih Ho,Hybrid high-capacity steganography method in spatial domain,” in Chinese, Proceedings of National Computer Symposium 2009 (NCS 2009), Workshop on Cryptography and Information Security, National Taipei University, Taipei, Taiwan, R.O.C., Nov. 27-28, 2009, pp. 48-57.  http://ncs2009.ntpu.edu.tw/CI/CI.htm  入圍IEEE最佳學生論文

 

 

網頁更新日期:06/06/2013