Follow
Hung-Jr Shiu
Title
Cited by
Cited by
Year
Data hiding methods based upon DNA sequences
HJ Shiu, KL Ng, JF Fang, RCT Lee, CH Huang
Information Sciences 180 (11), 2196-2208, 2010
2412010
Preserving privacy of online digital physiological signals using blind and reversible steganography
HJ Shiu, BS Lin, CH Huang, PY Chiang, CL Lei
Computer methods and programs in biomedicine 151, 159-170, 2017
472017
DNA based encryption methods
HZ Hsu, RCT Lee
The 23rd workshop on combinatorial mathematics and computation theory, 545, 2006
362006
IoT based smart aquaculture system with automatic aerating and water quality monitoring
KL Tsai, LW Chen, LJ Yang, HJ Shiu, HW Chen
Journal of Internet Technology 23 (1), 177-184, 2022
262022
Data hiding on social media communications using text steganography
HJ Shiu, BS Lin, BS Lin, PY Huang, CH Huang, CL Lei
Risks and Security of Internet and Systems: 12th International Conference …, 2018
142018
High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement—A new vision of non-blind audio steganography
HJ Shiu, BS Lin, CW Cheng, CH Huang, CL Lei
Symmetry 9 (6), 92, 2017
92017
A reversible acoustic data hiding method based on analog modulation
HJ Shiu, SY Tang, CH Huang, RCT Lee, CL Lei
Information Sciences 273, 233-246, 2014
92014
Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines
YH Chuang, CL Lei, HJ Shiu
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 66-73, 2020
82020
Steganography in RGB images using adjacent mean
YH Chuang, BS Lin, YX Chen, HJ Shiu
IEEE access 9, 164256-164274, 2021
72021
Quantifiable Interactivity of Malicious URLs and the Social Media Ecosystem
CM Lai, HJ Shiu, J Chapman
Electronics 9 (12), 2020
72020
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability
PW Chi, MH Wang, HJ Shiu
IEEE Access 8, 89866-89881, 2020
72020
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security
YH Chuang, CL Lei, S Hung-Jr
Symmetry 13 (9), 2021
62021
Adaptive resource management for spot workers in cloud computing environment
LP Chen, FY Leu, HT Chiao, HJ Shiu
International Journal of Web and Grid Services 18 (4), 437-452, 2022
42022
A stereo audio steganography by inserting low-frequency and octave equivalent pure tones
HJ Shiu, BS Lin, BS Lin, WC Lai, CH Huang, CL Lei
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis …, 2018
42018
Efficient adaptive resource management for spot workers in cloud computing environment
LP Chen, FY Leu, HT Chiao, HJ Shiu
Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2022
12022
Novel Reversible Acoustic Steganography Based on Carrier Orthogonality
HJ Shiu, FY Leu, CM Lai, YC Huang
Information Security Applications: 21st International Conference, WISA 2020 …, 2020
12020
Maintaining Secure Level on Symmetric Encryption under Quantum Attack
HJ Shiu, CT Yang, YR Tsai, WC Lin, CM Lai
Applied Sciences 13 (11), 6734-6747, 2023
2023
Rijndael AES 384 512 加密系統
HC Yen, PW Lin, HJ Shiu
CISC 2021, 2021
2021
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security. Symmetry 2021, 13, 1629
YH Chuang, CL Lei, HJ Shiu
s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2021
2021
高容量與高效率嵌入隱寫術
HJ Shiu
國立臺灣大學電機工程學系學位論文 2018, 1-95, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20